default search action
Fenghua Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j63]Xianya Yu, Yonggang Zou, Xiuying Mou, Siying Li, Zhongrui Bai, Lidong Du, Zhenfeng Li, Peng Wang, Xianxiang Chen, Xiaoran Li, Fenghua Li, Huaiyong Li, Zhen Fang:
A deep learning method for contactless emotion recognition from ballistocardiogram. Biomed. Signal Process. Control. 99: 106891 (2025) - [j62]Yunchuan Guo, Xiao Wang, Mingjie Yu, Fenghua Li, Zhen Pang, Liang Fang:
An on-the-fly framework for usable access control policy mining. Comput. Secur. 150: 104211 (2025) - 2024
- [j61]Chao Guo, Guangyu Hu, Chenglei Pan, Fenghua Li, Haitao Xu, Zhu Han:
Authentication for Satellite Internet Resource Slicing Access Based on Trust Measurement. IEEE Internet Things J. 11(12): 21788-21806 (2024) - [j60]Fenghua Li, Guoxiong Liu, Zhiling Zou, Yang Yan, Xin Huang, Xuanang Liu, Zhengkui Liu:
A Classification Framework for Depressive Episode Using R-R Intervals From Smartwatch. IEEE Trans. Affect. Comput. 15(3): 1387-1399 (2024) - [j59]Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Dependable Secur. Comput. 21(1): 153-167 (2024) - [j58]Menghao Zhang, Guanyu Li, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. IEEE Trans. Inf. Forensics Secur. 19: 601-615 (2024) - [j57]Haoyang Wang, Kai Fan, Chong Yu, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang, Haojin Zhu:
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing. IEEE Trans. Serv. Comput. 17(5): 2583-2596 (2024) - [c106]Fanfan Hao, Zhu Wang, Yaobing Xu, Siyuan Leng, Liang Fang, Fenghua Li:
Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition. CSCWD 2024: 151-156 - [c105]Likun Zhang, Jingwei Sun, Shoukun Guo, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Memorization in Deep Learning from Data Distribution. ICASSP 2024: 5565-5569 - [c104]Siyuan Leng, Yunchuan Guo, Lin Zhang, Fanfan Hao, Xiaogang Cao, Fenghua Li, Wenlong Kou:
Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing. ICC 2024: 1394-1399 - [c103]Yanbo Zhang, Mi Wen, Weiwei Li, Ben Niu, Weidong Qiu, Fenghua Li:
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning. ICC 2024: 5184-5189 - [c102]Lin Zhang, Yunchuan Guo, Siyuan Leng, Xiaogang Cao, Fenghua Li, Liang Fang:
Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems. ICCS (1) 2024: 224-239 - [c101]Chong Han, Fenghua Li, Mei Wang, Chunfang Zhou, Zhongqiu Liu, Che Yang:
Framework of a PBL tutor system based on the triple helix model in environmental science. ICETC 2024: 511-517 - [c100]Dianyao Gong, Feng Fang, Fenghua Li, Xianming Zhao:
Addressing the Demands of Learning in Materials Forming Mechanics Based on the PBL Method. ICETC 2024: 529-533 - [i6]Likun Zhang, Hao Wu, Lingcui Zhang, Fengyuan Xu, Jin Cao, Fenghua Li, Ben Niu:
Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine? CoRR abs/2409.15781 (2024) - [i5]Peng Tang, Xin Li, Yuxin Chen, Weidong Qiu, Haochen Mei, Allison Holmes, Fenghua Li, Shujun Li:
A Comprehensive Study on GDPR-Oriented Analysis of Privacy Policies: Taxonomy, Corpus and GDPR Concept Classifiers. CoRR abs/2410.04754 (2024) - [i4]Junhai Yang, Fenghua Li, Yixuan Zhang, Junhao Zhang, Liang Fang, Yunchuan Guo:
Automatic State Machine Inference for Binary Protocol Reverse Engineering. CoRR abs/2412.02540 (2024) - 2023
- [j56]Caifeng Wan, Liheng Zhou, Ye Jin, Fenghua Li, Lin Wang, Wenjin Yin, Yaohui Wang, Hongli Li, Lixin Jiang, Jinsong Lu:
Strain ultrasonic elastography imaging features of locally advanced breast cancer: association with response to neoadjuvant chemotherapy and recurrence-free survival. BMC Medical Imaging 23(1): 216 (2023) - [j55]Lili Chen, Zhen Wang, Jintao Wu, Yunchuan Guo, Fenghua Li, Zifu Li:
Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach. Concurr. Comput. Pract. Exp. 35(20) (2023) - [j54]Haoyang Wang, Kai Fan, Hongyan Chen, Qi Chen, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang:
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. IEEE Trans. Dependable Secur. Comput. 20(3): 2578-2592 (2023) - [j53]Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng:
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. IEEE Trans. Dependable Secur. Comput. 20(5): 3572-3587 (2023) - [c99]Lin Zhang, Yunchuan Guo, Siyuan Leng, Zifu Li, Fenghua Li, Liang Fang:
A Moving Target Defense Approach for the Distributed Dynamic Network. ISPA/BDCloud/SocialCom/SustainCom 2023: 336-343 - [c98]Siyuan Leng, Fenghua Li, Lin Zhang, Yitong Wen, Yunchuan Guo, Liang Fang:
ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain. ISPA/BDCloud/SocialCom/SustainCom 2023: 402-409 - [c97]Yuming Lu, Fenghua Li, Yitong Wen, Liang Fang, Shoukun Guo, Zifu Li:
Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis. ISPA/BDCloud/SocialCom/SustainCom 2023: 482-490 - [c96]Ben Niu, Xindi Wang, Likun Zhang, Shoukun Guo, Jin Cao, Fenghua Li:
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning. GLOBECOM 2023: 4259-4264 - [c95]Shuanghong Yu, Fenghua Li, Han Zhang, Kunling He, Xingkun Yao:
GapReplay: A High-Accuracy Packet Replayer. ICC 2023: 1616-1621 - [c94]Fenghua Li, Mei Wang, Chunfang Zhou, Maria Inmaculada Navarro Gonzalez, Chong Han, Yong Li:
Collaboration and orchestration in a virtual teaching organization of environmental education. ICETC 2023: 155-161 - [c93]Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou:
On-Demand Allocation of Cryptographic Computing Resource with Load Prediction. ICICS 2023: 179-196 - [c92]Minqiu Tian, Fenghua Li, Kui Geng, Wenlong Kou, Chao Guo:
A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things. ICICS 2023: 284-301 - [c91]Likun Zhang, Yahong Chen, Ang Li, Binghui Wang, Yiran Chen, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation. WACV 2023: 4690-4698 - 2022
- [j52]Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo:
Detecting conflict of heterogeneous access control policies. Digit. Commun. Networks 8(5): 664-679 (2022) - [j51]Haonan Yan, Xiaoguang Li, Rui Dai, Hui Li, Xingwen Zhao, Fenghua Li:
MARS: Automated Protocol Analysis Framework for Internet of Things. IEEE Internet Things J. 9(19): 18333-18345 (2022) - [j50]Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. IEEE Trans. Dependable Secur. Comput. 19(4): 2680-2694 (2022) - [j49]Ben Niu, Yahong Chen, Zhibo Wang, Fenghua Li, Boyang Wang, Hui Li:
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE Trans. Mob. Comput. 21(1): 125-138 (2022) - [j48]Ben Niu, Qinghua Li, Hanyi Wang, Guohong Cao, Fenghua Li, Hui Li:
A Framework for Personalized Location Privacy. IEEE Trans. Mob. Comput. 21(9): 3071-3083 (2022) - [j47]Chenghao Rong, Jessie Hui Wang, Juncai Liu, Jilong Wang, Fenghua Li, Xiaolei Huang:
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics. IEEE/ACM Trans. Netw. 30(2): 867-880 (2022) - [c90]Chaoyang Li, Fenghua Li, Mingjie Yu, Yunchuan Guo, Yitong Wen, Zifu Li:
Insider Threat Detection Using Generative Adversarial Graph Attention Networks. GLOBECOM 2022: 2680-2685 - [c89]Fenghua Li, Chong Han, Chunfang Zhou, Mei Wang, Dianyao Gong, Che Yang, Tao Du:
Designing Problem-based Learning at a Department Level in Resources and Environment: An Interdisciplinary Study. ICETC 2022: 528-532 - [c88]Haonan Yan, Xiaoguang Li, Ziyao Guo, Hui Li, Fenghua Li, Xiaodong Lin:
ARCANE: An Efficient Architecture for Exact Machine Unlearning. IJCAI 2022: 4006-4013 - [c87]Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Yuhang Xie, Chunhao Zheng:
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. INFOCOM Workshops 2022: 1-6 - [c86]Siyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, Fenghua Li:
DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection. ISCC 2022: 1-7 - [c85]Quan Yuan, Fenghua Li, Jessie Hui Wang, Shuanghong Yu, Allen Hong, Xingkun Yao:
PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry. IFIP Networking 2022: 1-9 - [c84]Kunling He, Changqing An, Jessie Hui Wang, Tianshu Li, Linmei Zu, Fenghua Li:
Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme. NOMS 2022: 1-9 - [c83]Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Fast and Scalable In-Network Scanning with Programmable Switches. NSDI 2022: 667-681 - [c82]Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li:
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. SecureComm 2022: 630-647 - [c81]Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li:
Efficiently Constructing Topology of Dynamic Networks. TrustCom 2022: 44-51 - [c80]Minqiu Tian, Zifu Li, Fenghua Li, Jin Cao, Chao Guo:
A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. TrustCom 2022: 299-306 - [c79]Fanfan Hao, Zhu Wang, Mengyao Shi, Tingting Peng, Liang Fang, Fenghua Li:
Inferring Attack Paths in Networks with Periodic Topology Changes. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 724-731 - [c78]Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, Fenghua Li:
DP-Opt: Identify High Differential Privacy Violation by Optimization. WASA (2) 2022: 406-416 - 2021
- [j46]Shuai Zhao, Fenghua Li, Hongwei Li, Rongxing Lu, Siqi Ren, Haiyong Bao, Jianhong Lin, Song Han:
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids. IEEE Trans. Inf. Forensics Secur. 16: 521-536 (2021) - [c77]Shuying Zhuang, Jessie Hui Wang, Jilong Wang, Zujiang Pan, Tianhao Wu, Fenghua Li, Zhiyong Zhang:
Discovering obscure looking glass sites on the web to facilitate internet measurement research. CoNEXT 2021: 426-439 - [c76]Wei Jin, Kui Geng, Mingjie Yu, Yunchuan Guo, Fenghua Li:
Efficiently Managing Large-Scale Keys in HDFS. HPCC/DSS/SmartCity/DependSys 2021: 353-360 - [c75]Yunchuan Guo, Xiyang Sun, Mingjie Yu, Fenghua Li, Kui Geng, Zifu Li:
Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach. ICCS (1) 2021: 525-539 - [c74]Fenghua Li, Mei Wang, Xiangli Nan, Xiahe Liu, Chunfang Zhou, Dianyao Gong:
Exploration of Problem-based Learning at Inter-course Level. ICETC 2021: 309-313 - [c73]Haibo Wang, Tao Gao, Weizhen Dang, Jing'an Xue, Jiahao Cao, Fenghua Li, Jilong Wang:
Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network. ICNP 2021: 1-11 - [c72]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10 - 2020
- [j45]Mingxin Ma, Guozhen Shi, Xinyi Shi, Mang Su, Fenghua Li:
Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent. IEEE Access 8: 148157-148168 (2020) - [j44]Tao Chen, Shaoxiong Tu, Haolu Wang, Xuesong Liu, Fenghua Li, Wang Jin, Xiaowen Liang, Xiaoqun Zhang, Jian Wang:
Computer-aided diagnosis of gallbladder polyps based on high resolution ultrasonography. Comput. Methods Programs Biomed. 185: 105118 (2020) - [j43]Fenghua Li, Yongjun Li, Siyuan Leng, Yunchuan Guo, Kui Geng, Zhen Wang, Liang Fang:
Dynamic countermeasures selection for multi-path attacks. Comput. Secur. 97: 101927 (2020) - [j42]Rongna Xie, Guozhen Shi, Yunchuan Guo, Fenghua Li:
A topic-centric access control model for the publish/subscribe paradigm. Concurr. Comput. Pract. Exp. 32(9) (2020) - [j41]Guang Sun, Hongzhang Lv, Wangdong Jiang, Fenghua Li:
General process of big data analysis and visualisation. Int. J. Comput. Sci. Eng. 23(2): 177-184 (2020) - [j40]Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
Exploiting location-related behaviors without the GPS data on smartphones. Inf. Sci. 527: 444-459 (2020) - [j39]Yuanyuan He, Jianbing Ni, Ben Niu, Fenghua Li, Xuemin (Sherman) Shen:
Privbus: A privacy-enhanced crowdsourced bus service via fog computing. J. Parallel Distributed Comput. 135: 156-168 (2020) - [j38]Fenghua Li, Zifu Li, Liang Fang, Yongjun Li, Yaobing Xu, Yunchuan Guo:
Securing instruction interaction for hierarchical management. J. Parallel Distributed Comput. 137: 91-103 (2020) - [j37]Lili Chen, Zhen Wang, Fenghua Li, Yunchuan Guo, Kui Geng:
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. Sensors 20(3): 804 (2020) - [j36]Haibo Wang, Jessie Hui Wang, Jilong Wang, Weizhen Dang, Jing'an Xue, Fenghua Li, Jinzhe Shan:
Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-Scale Wireless Network. IEEE/ACM Trans. Netw. 28(2): 832-845 (2020) - [j35]Fenghua Li, Peijie Yin, Yahong Chen, Ben Niu, Hui Li:
Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE Wirel. Commun. 27(3): 31-37 (2020) - [j34]Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li:
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. Wirel. Commun. Mob. Comput. 2020: 8836351:1-8836351:10 (2020) - [c71]Ben Niu, Yahong Chen, Likun Zhang, Fenghua Li:
Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster. CNS 2020: 1-2 - [c70]Tianzhu Chen, Fenghua Li, Fuzhen Zhuang, Yunchuan Guo, Liang Fang:
The Linear Geometry Structure of Label Matrix for Multi-label Learning. DEXA (2) 2020: 229-244 - [c69]Ben Niu, Likun Zhang, Yahong Chen, Ang Li, Wei Du, Jin Cao, Fenghua Li:
A Framework to Preserve User Privacy for Machine Learning as a Service. GLOBECOM 2020: 1-6 - [c68]Yunchuan Guo, Han Zhang, Zifu Li, Fenghua Li, Liang Fang, Lihua Yin, Jin Cao:
Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? ICC 2020: 1-6 - [c67]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [c66]Ben Niu, Yahong Chen, Boyang Wang, Jin Cao, Fenghua Li:
Utility-aware Exponential Mechanism for Personalized Differential Privacy. WCNC 2020: 1-6 - [i3]Haonan Yan, Xiaoguang Li, Hui Li, Jiamin Li, Wenhai Sun, Fenghua Li:
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack. CoRR abs/2011.00418 (2020)
2010 – 2019
- 2019
- [j33]Mingxin Ma, Guozhen Shi, Fenghua Li:
Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario. IEEE Access 7: 34045-34059 (2019) - [j32]Li Li, Fenghua Li, Guozhen Shi:
Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 48-55 (2019) - [j31]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Jinbo Xiong:
An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int. J. Inf. Technol. Web Eng. 14(2): 74-91 (2019) - [j30]Tao Feng, Xiaoyu Yin, Ye Lu, Junli Fang, Fenghua Li:
A Searchable CP-ABE Privacy Preserving Scheme. Int. J. Netw. Secur. 21(4): 680-689 (2019) - [j29]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j28]Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo, Jinjun Chen:
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies. IEEE Internet Things J. 6(2): 1471-1483 (2019) - [j27]Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li:
A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30: 118-126 (2019) - [j26]Xiuze Dong, Yunchuan Guo, Fenghua Li, Liju Dong, Arshad Khan:
Combination Model of Heterogeneous Data for Security Measurement. J. Univers. Comput. Sci. 25(3): 270-281 (2019) - [j25]Qingyou Yang, Kaiping Xue, Jie Xu, Jiajie Wang, Fenghua Li, Nenghai Yu:
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network. IEEE Trans. Inf. Forensics Secur. 14(2): 486-497 (2019) - [c65]Guang Sun, Fenghua Li, Jiayi Ren, Hongzhang Lv, Yanfei Xiao, Yingchao Wang:
On data visualization for securities investment fund analysis. ACM TUR-C 2019: 146:1-146:11 - [c64]Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:
Enhanced blockchain based key management scheme against key exposure attack. AIIPCC 2019: 68:1-68:6 - [c63]Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:
Hierarchical Key Management Scheme with Multilevel Secure Access. CyberC 2019: 97-102 - [c62]Haonan Yan, Hui Li, Mingchi Xiao, Rui Dai, Xianchun Zheng, Xingwen Zhao, Fenghua Li:
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis. GLOBECOM 2019: 1-6 - [c61]Yunchuan Guo, Xiao Wang, Liang Fang, Yongjun Li, Fenghua Li, Kui Geng:
Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach. ICCS (1) 2019: 590-603 - [c60]Fenghua Li, Zhe Sun, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. ICNC 2019: 390-394 - [c59]Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. ICNC 2019: 418-424 - [c58]Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. ICNC 2019: 425-431 - [c57]Congcong Miao, Jilong Wang, Tianying Ji, Hui Wang, Chao Xu, Fenghua Li, Fengyuan Ren:
BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANs. ICNP 2019: 1-11 - [c56]Fenghua Li, Zhe Sun, Ang Li, Ben Niu, Hui Li, Guohong Cao:
HideMe: Privacy-Preserving Photo Sharing on Social Networks. INFOCOM 2019: 154-162 - [c55]Pu Yu, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. WCNC 2019: 1-7 - 2018
- [j24]Jiao Liang, Weili Han, Zeqing Guo, Yaoliang Chen, Chang Cao, Xiaoyang Sean Wang, Fenghua Li:
DESC: enabling secure data exchange based on smart contracts. Sci. China Inf. Sci. 61(4): 049102:1-049102:3 (2018) - [j23]Fenghua Li, Peida Xu, Shichun Zheng, Wenfeng Chen, Yang Yan, Suo Lu, Zhengkui Liu:
Photoplethysmography based psychological stress detection with pulse rate variability feature differences and elastic net. Int. J. Distributed Sens. Networks 14(9) (2018) - [j22]Li Li, Fenghua Li, Guozhen Shi, Kui Geng:
An Efficient Stream Data Processing Model for Multiuser Cryptographic Service. J. Electr. Comput. Eng. 2018: 3917827:1-3917827:10 (2018) - [j21]Li Li, Fenghua Li, Kui Geng, Guozhen Shi:
Design of Multi Cipher Processing Architecture for Random Cross Access. Microprocess. Microsystems 61: 336-343 (2018) - [j20]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. Secur. Commun. Networks 2018: 6854612:1-6854612:16 (2018) - [j19]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Ben Niu:
HAC: Hybrid Access Control for Online Social Networks. Secur. Commun. Networks 2018: 7384194:1-7384194:11 (2018) - [j18]Lihua Yin, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. Secur. Commun. Networks 2018: 7412627:1-7412627:13 (2018) - [j17]Yuanyuan He, Jianbing Ni, Xinyu Wang, Ben Niu, Fenghua Li, Xuemin Shen:
Privacy-Preserving Partner Selection for Ride-Sharing Services. IEEE Trans. Veh. Technol. 67(7): 5994-6005 (2018) - [j16]Fengwei Wang, Hui Zhu, Ximeng Liu, Rongxing Lu, Fenghua Li, Hui Li, Songnian Zhang:
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services. IEEE Trans. Veh. Technol. 67(11): 11084-11097 (2018) - [j15]Lihua Yin, Yunchuan Guo, Fenghua Li, Yanwei Sun, Junyan Qian, Athanasios V. Vasilakos:
A game-theoretic approach to advertisement dissemination in ephemeral networks. World Wide Web 21(2): 241-260 (2018) - [c54]Fenghua Li, Yahong Chen, Ben Niu, Yuanyuan He, Kui Geng, Jin Cao:
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services. GLOBECOM 2018: 1-6 - [c53]Boxiu Tian, Fenghua Li, Kui Geng, Lingcui Zhang, Dingyan Li:
2-MR: a two-phase mapreduce approach for incremental replication. ICBDT 2018: 19-24 - [c52]Yunchuan Guo, Liang Fang, Kui Geng, Lihua Yin, Fenghua Li, Lihua Chen:
Real-Time Data Incentives for IoT Searches. ICC 2018: 1-6 - [c51]Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li:
Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach. ICCS (1) 2018: 83-97 - [c50]Fenghua Li, Yongjun Li, Zhengkun Yang, Yunchuan Guo, Lihua Yin, Zhen Wang:
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. ICCCN 2018: 1-9 - [c49]Mengfan Lv, Fenghua Li, Lingcui Zhang, Kui Geng, Kun He:
A Reliable Multicast Transport Protocol for Device Management in Space-ground Integrated Network. ICMSSP 2018: 104-108 - [c48]Haibo Wang, Jilong Wang, Weizhen Dang, Jing'an Xue, Fenghua Li:
Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network. INFOCOM 2018: 1628-1636 - [c47]Tong Qin, Hewu Li, Qian Wu, Naijia Liu, Fenghua Li:
Wi-Live, Adaptive Scenario-Aware Wireless Multicast Solution for Living Streaming Based on Software Defined Networks. IWCMC 2018: 48-53 - [c46]Liang Fang, Lihua Yin, Yunchuan Guo, Zhen Wang, Fenghua Li:
Resolving Access Conflicts: An Auction-Based Incentive Approach. MILCOM 2018: 1-6 - [c45]Yuanyuan He, Jianbing Ni, Ben Niu, Fenghua Li, Xuemin Sherman Shen:
Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach. WiOpt 2018: 1-8 - [i2]Fenghua Li, Hui Li, Ben Niu, Jinjun Chen:
Privacy Computing: Concept, Computing Framework And Future Development Trends. IACR Cryptol. ePrint Arch. 2018: 1145 (2018) - 2017
- [j14]En Zhang, Fenghua Li, Ben Niu, Yanchao Wang:
Server-aided private set intersection based on reputation. Inf. Sci. 387: 180-194 (2017) - [j13]Fenghua Li, Yuanyuan He, Ben Niu, Hui Li:
Small-world: Secure friend matching over physical world and social networks. Inf. Sci. 387: 205-220 (2017) - [c44]Fenghua Li, Fangxin Xiong, Chao Li, Lihua Yin, Guozhen Shi, Boxiu Tian:
SRAM: A State-Aware Risk Assessment Model for Intrusion Response. DSC 2017: 232-237 - [c43]Fenghua Li, Zifu Li, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo:
Cyberspace-Oriented Access Control: Model and Policies. DSC 2017: 261-266 - [c42]Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017: 1-6 - [c41]Fenghua Li, Xinyu Wang, Ben Niu, Hui Li, Chao Li, Lihua Chen:
TrackU: Exploiting User's Mobility Behavior via WiFi List. GLOBECOM 2017: 1-6 - [c40]Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li, Binxing Fang:
Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ICA3PP 2017: 313-327 - [c39]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - [c38]Yuanyuan He, Kuan Zhang, Hanyi Wang, Fenghua Li, Ben Niu, Hui Li:
Impact factor-based group recommendation scheme with privacy preservation in MSNs. ICC 2017: 1-6 - [c37]Fenghua Li, Jingyang Yu, Lingcui Zhang, Zhe Sun, Mengfan Lv:
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. ICCSP 2017: 38-43 - [c36]Jiangping Han, Kaiping Xue, Hao Yue, Peilin Hong, Nenghai Yu, Fenghua Li:
Receive Buffer Pre-division Based Flow Control for MPTCP. MSN 2017: 19-31 - [c35]Jiao Quan, Xiaochen Li, Yeqiu Xiao, Yulong Shen, Fenghua Li:
Secure Transmission with Limited Feedback in MISOME Wiretap Channels. NaNA 2017: 48-53 - [c34]Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen:
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NSS 2017: 486-496 - [c33]Ziwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, Fenghua Li:
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. SpaCCS Workshops 2017: 54-63 - [c32]Fenghua Li, Jiawen Liu, Liang Fang, Ben Niu, Kui Geng, Hui Li:
Pricing Privacy Leakage in Location-Based Services. WASA 2017: 406-418 - 2016
- [c31]Jianan Lin, Qiaoduo Zhang, Lingcui Zhang, Fenghua Li:
Design and Implementation of an Extensible Network Device Management System. CISIS 2016: 456-461 - [c30]Ning Li, Lingcui Zhang, Qiaoduo Zhang, Fenghua Li:
Extensible Command Parsing Method for Network Device. CISIS 2016: 462-467 - [c29]Fenghua Li, Yanchao Wang, Jinbo Xiong, Rongna Xie:
Role and Time-Based Access Control with Efficient Revocation for Cloud Storage. DSC 2016: 284-289 - [c28]Cui Zhang, Fenghua Li:
A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based Services. DSC 2016: 561-566 - [c27]Yuanyuan He, Fenghua Li, Ben Niu, Jiafeng Hua:
Achieving secure and accurate friend discovery based on friend-of-friend's recommendations. ICC 2016: 1-6 - [c26]Fenghua Li, Yuanyuan He, Ben Niu, Hui Li, Hanyi Wang:
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation. ICNC 2016: 1-6 - [c25]Ben Niu, Sheng Gao, Fenghua Li, Hui Li, Zongqing Lu:
Protection of location privacy in continuous LBSs against adversaries with background information. ICNC 2016: 1-6 - [c24]Yanchao Wang, Fenghua Li, Ben Niu, Rongna Xie:
Achieving lightweight, time-specific and secure access control in cloud storage. ICNC 2016: 1-5 - [c23]Yicheng Dai, Fenghua Li, Hewu Li, Qian Wu:
A core-stateless IP mobility management scheme based on OpenFlow protocol. IWCMC 2016: 1117-1122 - [c22]Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. MILCOM 2016: 1004-1009 - [c21]Fenghua Li, Hanyi Wang, Ben Niu, Yuanyuan He, Jiafeng Hua, Hui Li:
A practical group matching scheme for privacy-aware users in mobile social networks. WCNC 2016: 1-6 - [c20]Fenghua Li, Sheng Wan, Ben Niu, Hui Li, Yuanyuan He:
Time obfuscation-based privacy-preserving scheme for location-based services. WCNC 2016: 1-6 - [c19]Fenghua Li, Sheng Wan, Ben Niu, Hui Li, Yuanyuan He:
Time obfuscation-based privacy-preserving scheme for Location-Based Services. WCNC Workshops 2016: 465-470 - 2015
- [j12]Haoxing Li, Fenghua Li, Chenggen Song, Yalong Yan:
Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. KSII Trans. Internet Inf. Syst. 9(7): 2719-2735 (2015) - [j11]Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen:
A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Netw. Appl. 8(6): 1025-1037 (2015) - [c18]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. ICC 2015: 7246-7251 - [c17]Weihao Li, Ben Niu, Hui Li, Fenghua Li:
Privacy-preserving strategies in service quality aware Location-Based Services. ICC 2015: 7328-7334 - [c16]Hewu Li, Zhouyang Zhao, Fenghua Li, Qian Wu:
Does dynamic still work in today's 'D'HCP. IWCMC 2015: 751-756 - [c15]Ben Niu, Yuanyuan He, Fenghua Li, Hui Li:
Achieving secure friend discovery in social strength-aware PMSNs. MILCOM 2015: 947-953 - [c14]Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, Fangfang Shan:
Achieving Lightweight and Secure Access Control in Multi-authority Cloud. TrustCom/BigDataSE/ISPA (1) 2015: 459-466 - [i1]Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan:
A Novel Cyberspace-Oriented Access Control Model. IACR Cryptol. ePrint Arch. 2015: 637 (2015) - 2014
- [j10]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. KSII Trans. Internet Inf. Syst. 8(11): 4028-4049 (2014) - [j9]Boyang Wang, Hui Li, Xuefeng Liu, Fenghua Li, Xiaoqing Li:
Efficient public verification on the integrity of multi-owner data in the cloud. J. Commun. Networks 16(6): 592-599 (2014) - [j8]Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li, Fenghua Li:
Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Networks 7(11): 2104-2113 (2014) - [c13]Guozhen Shi, Mang Su, Fenghua Li, Jiapeng Lou, Qiong Huang:
A User-Based Document Management Mechanism in Cloud. CIS 2014: 377-381 - [c12]Guozhen Shi, Ying Shen, Fenghua Li, Mang Su:
A Reliable Supervision Model and Implementation for the Trading of Digital Works. CIS 2014: 484-488 - [c11]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li:
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy. SecureComm (1) 2014: 374-394 - [c10]Guozhen Shi, Ying Shen, Fenghua Li, Mang Su, Dong Liu:
Research on Credible Regulation Mechanism for the Trading of Digital Works. SecureComm (1) 2014: 519-523 - 2013
- [j7]Lei Li, Xianghui Liu, Zheng Wang, Fenghua Li:
An improved attack on clock-controlled shift registers based on hardware implementation. Sci. China Inf. Sci. 56(11): 1-10 (2013) - [j6]Xudong Zhu, Hui Li, Fenghua Li:
Privacy-preserving logistic regression outsourcing in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 144-150 (2013) - [j5]Kede Ma, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li:
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Trans. Inf. Forensics Secur. 8(3): 553-562 (2013) - [j4]Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li:
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 8(5): 779-788 (2013) - [c9]Boyang Wang, Baochun Li, Hui Li, Fenghua Li:
Certificateless public auditing for data integrity in the cloud. CNS 2013: 136-144 - [c8]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. INCoS 2013: 38-45 - [c7]Yun Cao, Xianfeng Zhao, Fenghua Li, Nenghai Yu:
Video steganography with multi-path motion estimation. Media Watermarking, Security, and Forensics 2013: 86650K - [c6]Jun Wang, Haibin Wang, Renhe Zhang, Fenghua Li:
Chaotic modulations for digital underwater acoustic communications. WUWNet 2013: 10:1-10:2 - 2011
- [c5]Fenghua Li, Yinyan Xu, Dongdong Li, Jinghui Zhang:
Research on Access Control Mechanism for Digital Products Trading. CIS 2011: 1041-1045 - 2010
- [j3]Junzhi Yan, Jianfeng Ma, Fenghua Li, Sang-Jae Moon:
Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 10(2-3): 235-251 (2010) - [c4]Wang Yang, Hewu Li, Fenghua Li, Qian Wu, Jianping Wu:
RPS: range-based path selection method for concurrent multipath transfer. IWCMC 2010: 944-948
2000 – 2009
- 2009
- [c3]Fenghua Li, Wei Wang, Jianfeng Ma, Haoxin Su:
Action-Based Access Control for Web Services. IAS 2009: 637-642 - 2008
- [j2]Tao Feng, Fenghua Li, Jianfeng Ma, Sang-Jae Moon:
A new approach for UC security concurrent deniable authentication. Sci. China Ser. F Inf. Sci. 51(4): 352-367 (2008) - [c2]Xiaole Ding, Hewu Li, Fenghua Li, Jianping Wu:
A novel infrastructure WLAN locating method based on neural network. AINTEC 2008: 47-55 - [c1]Fenghua Li, Wei Wang, Jianfeng Ma, Zhenguo Ding:
Enhanced Architecture of TPM. ICYCS 2008: 1532-1537 - 2004
- [j1]Fenghua Li, Qing Huo Liu, Lin-Ping Song:
Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods. IEEE Geosci. Remote. Sens. Lett. 1(2): 107-111 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint