Xinghua Li
Orcid: 0000-0002-5583-4155Affiliations:
- Xidian University, School of Cyber Engineering, Xi'an, China (PhD 2007)
According to our database1,
Xinghua Li
authored at least 133 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
IEEE Trans. Knowl. Data Eng., November, 2024
Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk.
Int. J. Mach. Learn. Cybern., November, 2024
IEEE Trans. Computers, October, 2024
IEEE Internet Things J., October, 2024
Frontiers Comput. Sci., October, 2024
IEEE/ACM Trans. Netw., August, 2024
IEEE Trans. Mob. Comput., July, 2024
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture.
IEEE Trans. Netw. Serv. Manag., June, 2024
Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., June, 2024
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024
IEEE Internet Things J., May, 2024
STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles.
IEEE Trans. Veh. Technol., April, 2024
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024
IEEE Trans. Ind. Informatics, March, 2024
IEEE/ACM Trans. Netw., February, 2024
IEEE/ACM Trans. Netw., February, 2024
PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024
IEEE Trans. Knowl. Data Eng., February, 2024
IEEE Trans. Knowl. Data Eng., January, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
IEEE Trans. Inf. Forensics Secur., 2024
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio.
J. Syst. Archit., 2024
IEEE Internet Things J., 2024
Proceedings of the ACM on Web Conference 2024, 2024
PIC-BI: Practical and Intelligent Combinatorial Batch Identification for UAV assisted IoT Networks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023
FedG2L: a privacy-preserving federated learning scheme base on "G2L" against poisoning attack.
Connect. Sci., December, 2023
Comput. Secur., December, 2023
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023
Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries.
ACM Trans. Storage, November, 2023
TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks.
IEEE J. Sel. Areas Commun., November, 2023
IEEE Internet Things J., August, 2023
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., March, 2023
IEEE Trans. Intell. Transp. Syst., February, 2023
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid.
Frontiers Comput. Sci., February, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023
IEEE Netw., 2023
A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
Int. J. Intell. Syst., December, 2022
ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022
A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network.
Mob. Networks Appl., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
An efficient and authenticated key establishment scheme based on fog computing for healthcare system.
Frontiers Comput. Sci., 2022
Frontiers Comput. Sci., 2022
Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022
An anonymous key agreement protocol with robust authentication for smart grid infrastructure.
Sci. China Inf. Sci., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IEEE Trans. Veh. Technol., 2021
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Dependable Secur. Comput., 2021
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
IEEE Syst. J., 2021
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
Trans. Emerg. Telecommun. Technol., 2021
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach.
Comput. Networks, 2021
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment.
Sci. China Inf. Sci., 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Serv. Comput., 2020
Analysis and improvement of a key exchange and authentication protocol in client-server environment.
J. Ambient Intell. Humaniz. Comput., 2020
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Trans. Veh. Technol., 2019
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Data Science, 2019
Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018
Peer-to-Peer Netw. Appl., 2018
IEEE Internet Things J., 2018
A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018
2017
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017
Secur. Commun. Networks, 2017
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017
Sci. China Inf. Sci., 2017
Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
DALP: A demand-aware location privacy protection scheme in continuous location-based services.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016
2015
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords.
Int. J. Embed. Syst., 2015
Int. J. Commun. Syst., 2015
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014
A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
2013
Smart Comput. Rev., 2013
2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Mob. Networks Appl., 2011
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
IEICE Trans. Inf. Syst., 2010
2009
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
2007
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
2006
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005