default search action
Teng Li 0003
Person information
- affiliation: Xidian University, School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Teng Li — disambiguation page
- Teng Li 0001 — Anhui University, College of Electrical Engineering and Automation, Hefei, China (and 3 more)
- Teng Li 0002 — Harvard University, Division of Engineering and Applied Sciences, Cambridge, MA, USA
- Teng Li 0004 — Sun Yat-Sen University, School of Geospatial Engineering and Science, Zhuhai, China (and 1 more)
- Teng Li 0005 — University of British Columbia, Department of Mechanical Engineering, Vancouver, Canada
- Teng Li 0006 — Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, Cooperative Medianet Innovation Center, Shanghai, China
- Teng Li 0007 — Ministry of Natural Resources, Second Institute of Oceanography, State Key Laboratory of Satellite Ocean Environment Dynamics, Hangzhou, China
- Teng Li 0008 — Marvell Semiconductor, Inc., Santa Clara, CA, USA (and 2 more)
- Teng Li 0009 — Facebook AI Research, Menlo Park, CA, USA (and 1 more)
- Teng Li 0010 — National University of Defense Technology, National Laboratory for Parallel and Distributed Processing, Changsha, China
- Teng Li 0011 — National University of Defense Technology, Beijing Institute for Advanced Study, Beijing, China (and 1 more)
- Teng Li 0012 — Hubei Normal University, School of Computer and Information Engineering, Huangshi, China
- Teng Li 0013 — Southeast University, School of Information Science and Engineering, State Key Laboratory of Millimeter Waves, Nanjing, China (and 4 more)
- Teng Li 0014 — Tongji University, School of Mechanical Engineering, Shanghai, China
- Teng Li 0015 — University of Alberta, Faculty of Engineering, Department of Electrical and Computer Engineering, Edmonton, Canada (and 1 more)
- Teng Li 0016 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Teng Li 0017 — ShanghaiTech University, School of Information Science and Technology, Shanghai, China (and 1 more)
- Teng Li 0018 — Beijing Jiaotong University, School of Electrical Engineering, Beijing, China (and 1 more)
- Teng Li 0019 — Hefei University of Technology, China
- Teng Li 0020 — Chongqing College of Electronic Engineering, Artificial Intelligence and Big Data College, Chongqing, China
- Teng Li 0021 — Syracuse University, Department of Electrical Engineering and Computer Science, Syracuse, NY, USA
- Teng Li 0022 — Cranfield University, School of Aerospace, Transport and Manufacturing, Cranfield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Teng Li, Weiguo Lin, Ruichen Ma, Zhuo Ma, Yulong Shen, Jianfeng Ma:
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci. China Inf. Sci. 67(5) (2024) - [j28]Pengbin Feng, Le Gai, Li Yang, Qin Wang, Teng Li, Ning Xi, Jian Feng Ma:
DawnGNN: Documentation augmented windows malware detection using graph neural network. Comput. Secur. 140: 103788 (2024) - [j27]Teng Li, Ximeng Liu, Wei Qiao, Xiongjie Zhu, Yulong Shen, Jianfeng Ma:
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation. IEEE Trans. Dependable Secur. Comput. 21(3): 1179-1195 (2024) - [j26]Chuang Tian, Jianfeng Ma, Teng Li, Junwei Zhang, Chengyan Ma, Ning Xi:
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings. IEEE Trans. Inf. Forensics Secur. 19: 4448-4463 (2024) - [j25]Xin Kang, Zhuo Ma, Yang Liu, Teng Li, Zuobin Ying, Bingsheng Zhang:
Multi-Party Private Edge Computing for Collaborative Quantitative Exposure Detection of Endemic Diseases. IEEE Trans. Mob. Comput. 23(12): 12020-12034 (2024) - [c21]Zhuo Ma, Yilong Yang, Yang Liu, Tong Yang, Xinjing Liu, Teng Li, Zhan Qin:
Need for Speed: Taming Backdoor Attacks with Speed and Precision. SP 2024: 1217-1235 - [i2]Wei Qiao, Yebo Feng, Teng Li, Zijian Zhang, Zhengzi Xu, Zhuo Ma, Yulong Shen, Jianfeng Ma, Yang Liu:
Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning. CoRR abs/2410.17910 (2024) - 2023
- [j24]Junwei Zhang, Xin Kang, Yang Liu, Huawei Ma, Teng Li, Zhuo Ma, Sergey Gataullin:
A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem. Symmetry 15(2): 319 (2023) - [j23]Zhuzhu Wang, Cui Hu, Bin Xiao, Yang Liu, Teng Li, Zhuo Ma, Jianfeng Ma:
Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database. IEEE Trans. Big Data 9(5): 1408-1419 (2023) - [j22]Jiawei Zhang, Teng Li, Zuobin Ying, Jianfeng Ma:
Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT. IEEE Trans. Cloud Comput. 11(2): 1546-1561 (2023) - [j21]Xuewen Dong, Lingtao Xue, Zhiwei Zhang, Yushu Zhang, Teng Li, Zhichao You, Yulong Shen:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. IEEE Trans. Cloud Comput. 11(3): 3139-3152 (2023) - [j20]Teng Li, Ya Jiang, Chi Lin, Mohammad S. Obaidat, Yulong Shen, Jianfeng Ma:
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning. IEEE Trans. Dependable Secur. Comput. 20(1): 740-757 (2023) - [j19]Yilong Yang, Zhuo Ma, Bin Xiao, Yang Liu, Teng Li, Junwei Zhang:
Reveal Your Images: Gradient Leakage Attack Against Unbiased Sampling-Based Secure Aggregation. IEEE Trans. Knowl. Data Eng. 35(12): 12958-12971 (2023) - [j18]Chi Lin, Wei Yang, Haipeng Dai, Teng Li, Yi Wang, Lei Wang, Guowei Wu, Qiang Zhang:
Near Optimal Charging Schedule for 3-D Wireless Rechargeable Sensor Networks. IEEE Trans. Mob. Comput. 22(6): 3525-3540 (2023) - [j17]Teng Li, Jiawei Zhang, Yulong Shen, Jianfeng Ma:
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Serv. Comput. 16(5): 3425-3438 (2023) - [c20]Xin Zhang, Yanbo Yang, Baoshan Li, Minchao Li, Teng Li, Jiawei Zhang:
Research on Activation Functions in Machine Learning Based Network Coding. NaNA 2023: 307-312 - [c19]Teng Li, Shengkai Zhang, Zexu Dang, Yongcai Xiao, Zhuo Ma:
TripleLP: Privacy-Preserving Log Parsing Based on Blockchain. PAAP 2023: 1-6 - 2022
- [j16]Chuang Tian, Qi Jiang, Teng Li, Junwei Zhang, Ning Xi, Jianfeng Ma:
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment. Comput. Networks 218: 109421 (2022) - [j15]Jiawei Zhang, Teng Li, Qi Jiang, Jianfeng Ma:
Enabling efficient traceable and revocable time-based data sharing in smart city. EURASIP J. Wirel. Commun. Netw. 2022(1): 1-26 (2022) - [j14]Teng Li, Jiawei Zhang, Mohammad S. Obaidat, Chi Lin, Yangxu Lin, Yulong Shen, Jianfeng Ma:
Energy-Efficient and Secure Communication Toward UAV Networks. IEEE Internet Things J. 9(12): 10061-10076 (2022) - [j13]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. IEEE J. Sel. Areas Commun. 40(11): 3191-3206 (2022) - [j12]Jiawei Zhang, Teng Li, Mohammad S. Obaidat, Chi Lin, Jianfeng Ma:
Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems. IEEE Syst. J. 16(1): 1355-1366 (2022) - [c18]Yebo Feng, Jianzhen Luo, Chengyan Ma, Teng Li, Liang Hui:
I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network. GLOBECOM 2022: 6427-6432 - [c17]Shi Xiangnan, Yanbo Yang, Qiwei Xu, Teng Li, Jiawei Zhang:
Research on grassland grazing environment planning based on GA-ACO hybrid algorithm. NaNA 2022: 1-6 - [i1]Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma:
CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases. CoRR abs/2201.08133 (2022) - 2021
- [j11]Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection via Graph Representation Learning. Mob. Inf. Syst. 2021: 5538841:1-5538841:14 (2021) - [j10]Jiawei Zhang, Jianfeng Ma, Teng Li, Qi Jiang:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. Secur. Commun. Networks 2021: 6646445:1-6646445:17 (2021) - [j9]Teng Li, Jiawei Zhang, Yangxu Lin, Shengkai Zhang, Jianfeng Ma:
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things. Secur. Commun. Networks 2021: 6689448:1-6689448:13 (2021) - [j8]Jiawei Zhang, Ning Lu, Teng Li, Jian-Feng Ma:
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing. Wirel. Commun. Mob. Comput. 2021: 8513869:1-8513869:15 (2021) - [c16]Tianci Zhou, Yong Zeng, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li:
Cold-start Recommendation Method Based on Homomorphic Encryption. NaNA 2021: 461-465 - 2020
- [j7]Di Lu, Ruidong Han, Yue Wang, Yongzhi Wang, Xuewen Dong, Xindi Ma, Teng Li, Jianfeng Ma:
A secured TPM integration scheme towards smart embedded system based collaboration network. Comput. Secur. 97: 101922 (2020) - [c15]Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection Based on Call Graph via Graph Neural Network. NaNA 2020: 368-374
2010 – 2019
- 2019
- [j6]Teng Li, Jianfeng Ma, Qingqi Pei, Houbing Song, Yulong Shen, Cong Sun:
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification. IEEE Access 7: 35302-35316 (2019) - [j5]Teng Li, Jianfeng Ma, Yulong Shen, Qingqi Pei:
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning. Entropy 21(8): 734 (2019) - [j4]Teng Li, Jianfeng Ma, Cong Sun:
SRDPV: secure route discovery and privacy-preserving verification in MANETs. Wirel. Networks 25(4): 1731-1747 (2019) - [c14]Teng Li, Jianfeng Ma, XinDi Ma, Chenyang Gao, He Wang, Chengyan Ma, Jing Yu, Di Lu, Jiawei Zhang:
Lightweight Secure Communication Mechanism Towards UAV Networks. GLOBECOM Workshops 2019: 1-6 - [c13]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Chi Lin, Siqi Ma, Mohammad S. Obaidat:
AClog: Attack Chain Construction Based on Log Correlation. GLOBECOM 2019: 1-6 - [c12]Teng Li, Jianfeng Ma, Qingqi Pei, Chengyan Ma, Dawei Wei, Cong Sun:
Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks. ICC 2019: 1-6 - [c11]Xuewen Dong, Qiao Kang, Yang Xu, Zhuo Ma, Teng Li:
Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation. INFOCOM Workshops 2019: 1047-1048 - [c10]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyan Yan, Qun Zhang, Xinghua Li, Teng Li:
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. ML4CS 2019: 123-139 - [c9]Jiawei Zhang, Jianfeng Ma, Zhuo Ma, Ning Lu, Yanbo Yang, Teng Li, Dawei Wei:
Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health. NaNA 2019: 319-324 - [c8]Teng Li, Jianfeng Ma, Pengbin Feng, Yue Meng, XinDi Ma, Jiawei Zhang, Chenyang Gao, Di Lu:
Lightweight Security Authentication Mechanism Towards UAV Networks. NaNA 2019: 379-384 - [c7]Chenyang Gao, Jianfeng Ma, Yulong Shen, Teng Li, Fei Li, Yuelin Gao:
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm. NaNA 2019: 458-463 - 2018
- [j3]Teng Li, Jianfeng Ma, Cong Sun, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. J. Inf. Sci. Eng. 34(4): 943-960 (2018) - [j2]Teng Li, Jianfeng Ma, Cong Sun:
Dlog: diagnosing router events with syslogs for anomaly detection. J. Supercomput. 74(2): 845-867 (2018) - [c6]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification. APSIPA 2018: 240-246 - [c5]Teng Li, Jianfeng Ma, Qingqi Pei, Yulong Shen, Cong Sun:
Anomalies Detection of Routers Based on Multiple Information Learning. NaNA 2018: 206-211 - 2017
- [j1]Teng Li, Jianfeng Ma, Cong Sun:
NetPro: detecting attacks in MANET routing with provenance and verification. Sci. China Inf. Sci. 60(11): 118101 (2017) - [c4]Cong Sun, Pengbin Feng, Teng Li, Jianfeng Ma:
Data-Oriented Instrumentation against Information Leakages of Android Applications. COMPSAC (2) 2017: 485-490 - [c3]Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. NaNA 2017: 5-10 - 2016
- [c2]Siqi Ma, David Lo, Teng Li, Robert H. Deng:
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. AsiaCCS 2016: 711-722 - 2015
- [c1]Teng Li, Jianfeng Ma, Cong Sun:
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. ICA3PP (3) 2015: 449-462
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint