default search action
Beibei Li 0002
Person information
- affiliation: Sichuan University, Chengdu, China
Other persons with the same name
- Beibei Li — disambiguation page
- Beibei Li 0001 — Institute of Software, Chinese Academy of Sciences, Beijing, China
- Beibei Li 0003 — Carnegie Mellon University, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Weina Niu, Xuhan Liao, Shiping Huang, Yudong Li, Xiaosong Zhang, Beibei Li:
A robust Wide & Deep learning framework for log-based anomaly detection. Appl. Soft Comput. 153: 111314 (2024) - [j42]Yuxiao Deng, Anqi Wang, Lei Zhang, Ying Lei, Beibei Li, Yizhou Li:
FedRFC: Federated Learning with Recursive Fuzzy Clustering for improved non-IID data training. Future Gener. Comput. Syst. 160: 835-843 (2024) - [j41]Weina Niu, Zimu Li, Zhaoxu He, Aduo Wang, Beibei Li, Xiaosong Zhang:
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion. IEEE Internet Things J. 11(3): 4442-4453 (2024) - [j40]Zian Zhang, Haiyong Bao, Rongxing Lu, Cheng Huang, Beibei Li:
KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare. IEEE Internet Things J. 11(5): 7918-7934 (2024) - [j39]Beibei Li, Youtong Chen, Lei Zhang, Licheng Wang, Yanyu Cheng:
HomeSentinel: Intelligent Anti-Fingerprinting for IoT Traffic in Smart Homes. IEEE Trans. Inf. Forensics Secur. 19: 4780-4793 (2024) - [j38]Wanying Dai, Beibei Li, Qingyun Du, Ziqing Zhu, Ao Liu:
Chaos-Based Index-of-Min Hashing Scheme for Cancellable Biometrics Security. IEEE Trans. Inf. Forensics Secur. 19: 8982-8997 (2024) - [j37]Ao Liu, Beibei Li, Tao Li, Pan Zhou, Rui Wang:
AN-GCN: An Anonymous Graph Convolutional Network Against Edge-Perturbing Attacks. IEEE Trans. Neural Networks Learn. Syst. 35(1): 88-102 (2024) - [j36]Jing Wu, Qimei Chen, Hao Jiang, Haozhao Wang, Yulai Xie, Wenzheng Xu, Pan Zhou, Zichuan Xu, Lixing Chen, Beibei Li, Xiumin Wang, Dapeng Oliver Wu:
Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach. IEEE Trans. Netw. Sci. Eng. 11(4): 3782-3799 (2024) - [c24]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-Induced Resonance in Transductive GCNs against Graph Adversarial Attacks. AAAI 2024: 13855-13863 - [c23]Lingfeng Yao, Weina Niu, Qingjun Yuan, Beibei Li, Yanfeng Zhang, Xiaosong Zhang:
A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data. ICC 2024: 2719-2724 - [c22]Liang Liu, Yuhao He, Lei Zhang, Lin Liu, Beibei Li:
GraphCyber: Identifying IP Usage Scenarios for Cyberspace Mapping. ICC 2024: 3310-3315 - [c21]Hanyuan Huang, Beibei Li, Tao Li:
A Cooperative Differential Evolution Based Intrusion Detection System for Unknown Cyberattacks. INFOCOM (Workshops) 2024: 1-2 - [c20]Hangjun Che, Xinyu Pu, Deqiang Ouyang, Beibei Li:
Enhanced Tensorial Self-representation Subspace Learning for Incomplete Multi-view Clustering. ACM Multimedia 2024: 719-728 - [i5]Ao Liu, Wenshan Li, Beibei Li, Wengang Ma, Tao Li, Pan Zhou:
Grimm: A Plug-and-Play Perturbation Rectifier for Graph Neural Networks Defending against Poisoning Attacks. CoRR abs/2412.08555 (2024) - 2023
- [j35]Hanyuan Huang, Tao Li, Yong Ding, Beibei Li, Ao Liu:
An artificial immunity based intrusion detection system for unknown cyberattacks. Appl. Soft Comput. 148: 110875 (2023) - [j34]Weina Niu, Yuheng Luo, Kangyi Ding, Xiaosong Zhang, Yanping Wang, Beibei Li:
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning. Comput. J. 66(3): 540-553 (2023) - [j33]Beibei Li, Peiran Wang, Zerui Shao, Ao Liu, Yukun Jiang, Yizhou Li:
Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach. Future Gener. Comput. Syst. 147: 136-148 (2023) - [j32]Beibei Li, Yujie Chang, Hanyuan Huang, Wenshan Li, Tao Li, Wen Chen:
Artificial immunity based distributed and fast anomaly detection for Industrial Internet of Things. Future Gener. Comput. Syst. 148: 367-379 (2023) - [j31]Beibei Li, Ziqing Zhu, Linghao Zhang, Zhengwei Chang, Liang Zhao, Arun Kumar:
EPPSQ: Achieving efficient and privacy-preserving statistics queries over encrypted data in smart grids. Future Gener. Comput. Syst. 149: 265-279 (2023) - [j30]Beibei Li, Yaxin Shi, Qinglei Kong, Qingyun Du, Rongxing Lu:
Incentive-Based Federated Learning for Digital-Twin-Driven Industrial Mobile Crowdsensing. IEEE Internet Things J. 10(20): 17851-17864 (2023) - [j29]Meng Huang, Tao Li, Beibei Li, Nian Zhang, Hanyuan Huang:
Fast Attack Detection Method for Imbalanced Data in Industrial Cyber-Physical Systems. J. Artif. Intell. Soft Comput. Res. 13(4): 229-245 (2023) - [j28]Beibei Li, Yuqing Guo, Qingyun Du, Ziqing Zhu, Xiaohui Li, Rongxing Lu:
$\bm {P}^{\bm {3}}$: Privacy-Preserving Prediction of Real-Time Energy Demands in EV Charging Networks. IEEE Trans. Ind. Informatics 19(3): 3029-3038 (2023) - [c19]Zhongbai Jiang, Yanwei Sun, Beibei Li, Bowen Sun, Shenduo Xiong, Yehao Li, Wenyue Du:
Threat-Aware Data Transmission in Software-Defined Networks. DSC 2023: 443-449 - [c18]Xinkai Wang, Beibei Li, Wanying Dai, Rongkuan Ma, Hanyuan Huang:
A Lightweight Few-Shot Attack Detection Scheme for Industrial Cognitive Radio Networks. GLOBECOM 2023: 964-969 - [c17]Youlin Li, Weina Niu, Yukun Zhu, Jiacheng Gong, Beibei Li, Xiaosong Zhang:
Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator. ICC 2023: 753-758 - [i4]Beibei Li, Zerui Shao, Ao Liu, Peiran Wang:
FedCliP: Federated Learning with Client Pruning. CoRR abs/2301.06768 (2023) - [i3]Xiang Li, Guoqi Li, Leitao Gao, Beibei Li, Gaoxi Xiao:
Sufficient Control of Complex Networks. CoRR abs/2303.05772 (2023) - [i2]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Guangquan Xu, Pan Zhou:
Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience. CoRR abs/2306.06909 (2023) - [i1]Ao Liu, Wenshan Li, Tao Li, Beibei Li, Hanyuan Huang, Pan Zhou:
Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks. CoRR abs/2312.08651 (2023) - 2022
- [j27]Liang Liu, Lin Liu, Beibei Li, Yi Zhong, Shan Liao, Lei Zhang:
MSCCS: A Monero-based security-enhanced covert communication system. Comput. Networks 205: 108759 (2022) - [j26]Jinghong Lan, Xudong Liu, Bo Li, Jie Sun, Beibei Li, Jun Zhao:
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection. Comput. Secur. 123: 102919 (2022) - [j25]Haiyong Bao, Binbin Ren, Beibei Li, Qinglei Kong:
BBNP: A Blockchain-Based Novel Paradigm for Fair and Secure Smart Grid Communications. IEEE Internet Things J. 9(15): 12984-12996 (2022) - [j24]Yuchuan Deng, Hao Jiang, Peijing Cai, Tong Wu, Pan Zhou, Beibei Li, Hao Lu, Jing Wu, Xin Chen, Kehao Wang:
Resource Provisioning for Mitigating Edge DDoS Attacks in MEC-Enabled SDVN. IEEE Internet Things J. 9(23): 24264-24280 (2022) - [j23]Hang Zhu, Weina Niu, Xuhan Liao, Xiaosong Zhang, Xiaofen Wang, Beibei Li, Zheyuan He:
Attacker Traceability on Ethereum through Graph Analysis. Secur. Commun. Networks 2022: 3448950:1-3448950:12 (2022) - [j22]Yanyu Cheng, Kwok Hung Li, Kah Chan Teh, Sheng Luo, Beibei Li:
Two-Tier NOMA-Based Wireless Powered Communication Networks. IEEE Syst. J. 16(3): 4698-4707 (2022) - [j21]Beibei Li, Yukun Jiang, Qingqi Pei, Tao Li, Liang Liu, Rongxing Lu:
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 23(9): 16728-16740 (2022) - [j20]Beibei Li, Shang Ma, Ruilong Deng, Kim-Kwang Raymond Choo, Jin Yang:
Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach. IEEE Trans. Netw. Serv. Manag. 19(2): 1705-1716 (2022) - [c16]Weina Niu, Zhenqi Yu, Zimu Li, Beibei Li, Runzi Zhang, Xiaosong Zhang:
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph. GLOBECOM 2022: 3356-3361 - [c15]Beibei Li, Yaxin Shi, Yuqing Guo, Qinglei Kong, Yukun Jiang:
Incentive and Knowledge Distillation Based Federated Learning for Cross-Silo Applications. INFOCOM Workshops 2022: 1-6 - [c14]Chuhan Liu, Wei Yan, Fengkai Xu, Wenlong Yang, Beibei Li:
User Behavior Simulation in ICS Cyber Ranges. PST 2022: 1-5 - [c13]Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li, Xiaosong Zhang:
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM. TrustCom 2022: 167-174 - 2021
- [j19]Junjiang He, Wen Chen, Tao Li, Beibei Li, Yongbin Zhu, Meng Huang:
HD-NSA: A real-valued negative selection algorithm based on hierarchy division. Appl. Soft Comput. 112: 107726 (2021) - [j18]Junjiang He, Tao Li, Beibei Li, Xiaolong Lan, Zhiyong Li, Yunpeng Wang:
An immune-based risk assessment method for digital virtual assets. Comput. Secur. 102: 102134 (2021) - [j17]Yunhua Huang, Tao Li, Lijia Zhang, Beibei Li, Xiaojie Liu:
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction. Comput. Secur. 104: 102218 (2021) - [j16]Haiyong Bao, Beibei Li:
A novel privacy preserving data aggregation scheme with data integrity and fault tolerance for smart grid communications. Frontiers Comput. Sci. 15(5): 155812 (2021) - [j15]Yihong Li, Yunpeng Wang, Tao Li, Beibei Li, Xiaolong Lan:
SP-SMOTE: A novel space partitioning based synthetic minority oversampling technique. Knowl. Based Syst. 228: 107269 (2021) - [j14]Beibei Li, Yuhao Wu, Jiarui Song, Rongxing Lu, Tao Li, Liang Zhao:
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5615-5624 (2021) - [j13]Qinglei Kong, Feng Yin, Rongxing Lu, Beibei Li, Xiaohong Wang, Shuguang Cui, Ping Zhang:
Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog. IEEE Trans. Ind. Informatics 17(12): 8453-8463 (2021) - [c12]Beibei Li, Yukun Jiang, Wenbin Sun, Weina Niu, Peiran Wang:
FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks. GLOBECOM 2021: 1-6 - [c11]Beibei Li, Yaxin Shi, Qinglei Kong, Chao Zhai, Yuankai Ouyang:
Honeypot-Enabled Optimal Defense Strategy Selection for Smart Grids. GLOBECOM 2021: 1-6 - [c10]Qinglei Kong, Feng Yin, Yue Xiao, Beibei Li, Xuejia Yang, Shuguang Cui:
Achieving Blockchain-based Privacy-Preserving Location Proofs under Federated Learning. ICC 2021: 1-6 - [c9]Xiaoxia Ma, Beibei Li, Qinglei Kong, Yuankai Ouyang, Rongxing Lu:
On Secure and Efficient Data Sharing for Smart Grids: An Anti-Collusion Scheme. ICC 2021: 1-6 - [c8]Yuankai Ouyang, Beibei Li, Qinglei Kong, Han Song, Tao Li:
FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks. ICC 2021: 1-6 - [c7]Beibei Li, Qingyun Du, Jiarui Song, Aohan Li, Xiaoxia Ma:
Locating False Data Injection Attacks on Smart Grids Using D-FACTS Devices. ICSOC 2021: 287-301 - [c6]Beibei Li, Peiran Wang, Hanyuan Huang, Shang Ma, Yukun Jiang:
FLPhish: Reputation-based Phishing Byzantine Defense in Ensemble Federated Learning. ISCC 2021: 1-6 - 2020
- [b1]Beibei Li, Rongxing Lu, Gaoxi Xiao:
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Wireless Networks, Springer 2020, ISBN 978-3-030-58671-3, pp. 1-151 - [j12]Yong Fang, Wenjie Zhang, Beibei Li, Fan Jing, Lei Zhang:
Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API. IEEE Access 8: 2313-2326 (2020) - [j11]Min Meng, Gaoxi Xiao, Beibei Li:
Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks. Autom. 122: 109242 (2020) - [j10]Beibei Li, Yue Xiao, Yaxin Shi, Qinglei Kong, Yuhao Wu, Haiyong Bao:
Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems. IEEE Open J. Comput. Soc. 1: 250-261 (2020) - [j9]Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li, Jinguo Li:
Toward efficient and effective bullying detection in online social network. Peer-to-Peer Netw. Appl. 13(5): 1567-1576 (2020) - [j8]Beibei Li, Gaoxi Xiao, Rongxing Lu, Ruilong Deng, Haiyong Bao:
On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices. IEEE Trans. Ind. Informatics 16(2): 854-864 (2020) - [c5]Jiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li:
ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy. LCN 2020: 491-496 - [c4]Hui Guo, Shuguang Huang, Min Zhang, Zulie Pan, Fan Shi, Cheng Huang, Beibei Li:
Classification of Malware Variant Based on Ensemble Learning. ML4CS (1) 2020: 125-139
2010 – 2019
- 2019
- [j7]Mi Wen, Shan Chen, Rongxing Lu, Beibei Li, Sijia Chen:
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System. IEEE Access 7: 137968-137981 (2019) - [j6]Beibei Li, Rongxing Lu, Gaoxi Xiao, Haiyong Bao, Ali A. Ghorbani:
Towards insider threats detection in smart grid communication systems. IET Commun. 13(12): 1728-1736 (2019) - [j5]Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo:
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498: 91-105 (2019) - [j4]Beibei Li, Rongxing Lu, Kim-Kwang Raymond Choo, Wei Wang, Sheng Luo:
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach. ACM Trans. Cyber Phys. Syst. 3(1): 10:1-10:25 (2019) - 2018
- [c3]Beibei Li, Rongxing Lu, Gaoxi Xiao, Zhou Su, Ali A. Ghorbani:
PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids. GLOBECOM 2018: 1-6 - [c2]Mi Wen, Donghuan Yao, Beibei Li, Rongxing Lu:
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid. ICC 2018: 1-6 - 2017
- [j3]Beibei Li, Rongxing Lu, Wei Wang, Kim-Kwang Raymond Choo:
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distributed Comput. 103: 32-41 (2017) - [c1]Beibei Li, Rongxing Lu, Gaoxi Xiao:
HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure. GLOBECOM 2017: 1-6 - 2016
- [j2]Haiyong Bao, Rongxing Lu, Beibei Li, Ruilong Deng:
BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid. IEEE Internet Things J. 3(2): 190-205 (2016) - [j1]Beibei Li, Rongxing Lu, Wei Wang, Kim-Kwang Raymond Choo:
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System. IEEE Trans. Inf. Forensics Secur. 11(11): 2415-2425 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint