default search action
Jianhua Li 0001
Person information
- affiliation: Shanghai Jiao Tong University, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, China
Other persons with the same name
- Jianhua Li (aka: Jian-Hua Li, Jian-hua Li, Jian Hua Li) — disambiguation page
- Jianhua Li 0002 (aka: Jack Li 0002) — Deakin University, Melbourne, Australia (and 1 more)
- Jianhua Li 0003 — Hefei University of Technology, School of Computer Science and Information, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j116]Wenkai Huang, Gaolei Li, Xiaoyu Yi, Jianhua Li, Chengcheng Zhao, Ying Yin:
SupRTE: Suppressing Backdoor Injection in Federated Learning via Robust Trust Evaluation. IEEE Intell. Syst. 39(5): 66-77 (2024) - [j115]Kangkang Sun, Hansong Xu, Kun Hua, Xi Lin, Gaolei Li, Tigang Jiang, Jianhua Li:
Joint Top-K Sparsification and Shuffle Model for Communication-Privacy-Accuracy Tradeoffs in Federated-Learning-Based IoV. IEEE Internet Things J. 11(11): 19721-19735 (2024) - [j114]Xiaoyu Yi, Gaolei Li, Bei Chen, Xi Lin, Zhiyuan Peng, Yuchen Liu, Jianhua Li:
HSESR: Hierarchical Software Execution State Representation for Ultralow-Latency Threat Alerting Over Internet of Things. IEEE Internet Things J. 11(21): 34283-34295 (2024) - [j113]Kangkang Sun, Jun Wu, Ali Kashif Bashir, Jianhua Li, Hansong Xu, Qianqian Pan, Yasser D. Al-Otaibi:
Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation. IEEE Internet Things J. 11(22): 35902-35916 (2024) - [j112]Kangkang Sun, Lizheng Liu, Qianqian Pan, Jianhua Li, Jun Wu:
Large-Scale Mean-Field Federated Learning for Detection and Defense: A Byzantine Robustness Approach in IoT. IEEE Internet Things J. 11(22): 36370-36383 (2024) - [j111]Ao Ding, Gaolei Li, Xiaoyu Yi, Xi Lin, Jianhua Li, Chaofeng Zhang:
Generative AI for Software Security Analysis: Fundamentals, Applications, and Challenges. IEEE Softw. 41(6): 46-54 (2024) - [j110]Chao Sang, Jun Wu, Jianhua Li, Mohsen Guizani:
From Control Application to Control Logic: PLC Decompile Framework for Industrial Control System. IEEE Trans. Inf. Forensics Secur. 19: 8685-8700 (2024) - [j109]Yilun Hu, Jun Wu, Gaolei Li, Jianhua Li, Jinke Cheng:
Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning. IEEE Trans. Netw. Sci. Eng. 11(3): 2549-2560 (2024) - [j108]Qianqian Pan, Jun Wu, Jianhua Li, Wu Yang, Mohsen Guizani:
Blockchain and Multi-Agent Learning Empowered Incentive IRS Resource Scheduling for Intelligent Reconfigurable Networks. IEEE/ACM Trans. Netw. 32(2): 943-958 (2024) - [j107]Kangkang Sun, Jun Wu, Qianqian Pan, Xi Zheng, Jianhua Li, Shui Yu:
Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving. IEEE Trans. Veh. Technol. 73(4): 5020-5035 (2024) - [c165]Bei Chen, Gaolei Li, Xi Lin, Zheng Wang, Jianhua Li:
BlockAgents: Towards Byzantine-Robust LLM-Based Multi-Agent Coordination via Blockchain. ACM TUR-C 2024 - [c164]Yuliang Chen, Xi Lin, Gaolei Li, Lixing Chen, Jing Wang, Siyi Liao, Jianhua Li:
Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT. CSCWD 2024: 935-940 - [c163]Siyuan Li, Xi Lin, Yaju Liu, Gaolei Li, Jianhua Li:
OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization. HotOptics@SIGCOMM 2024 - [c162]Xuankai Zhang, Jun Wu, Jianhua Li, Ali Kashif Bashir, Chao Sang, Bei Pei, Marwan Omar:
A Binary Level Verification Framework for Real-Time Performance of PLC Program in Backhaul/Fronthaul Networks. ICC 2024: 37-42 - [c161]Xichun Cai, Lixing Chen, Yang Bai, Xi Lin, Gaolei Li, Jianhua Li:
Learning-Based DApp Task Scheduling for Elastic Hybrid Computing in Edge Web 3.0. ICC 2024: 1770-1775 - [c160]Feng Gao, Lixing Chen, Quanhai Zhang, Gaolei Li, Xi Lin, Yang Bai, Jianhua Li:
Scale Wisely, Secure Wholly: P2P Swarm Learning Over Consortium Blockchain in Edge Networks. ICC 2024: 4596-4601 - [c159]Rui Xu, Gaolei Li, Yuchen Liu, Yue Zhao, Jiawen Kang, Jianhua Li:
Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper. ICNC 2024: 55-59 - [c158]Xin Song, Lixing Chen, Junhua Tang, Jianhua Li, Yang Bai, Wu Yang:
Adaptively Compressed Swarm Learning for Distributed Traffic Prediction over IoV-Web3.0. IJCNN 2024: 1-8 - [c157]Siyuan Li, Xi Lin, Hansong Xu, Kun Hua, Xiaomin Jin, Gaolei Li, Jianhua Li:
Multi-Agent RL-Based Industrial AIGC Service Offloading over Wireless Edge Networks. INFOCOM (Workshops) 2024: 1-6 - [c156]Xiaoyu Yi, Gaolei Li, Wenkai Huang, Xi Lin, Jianhua Li, Yuchen Liu:
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes. Internetware 2024 - [c155]Long Li, Gaolei Li, Shuilin Li, Rui Xu, Jianhua Li:
ZeroTKS: Zero-trust Knowledge Synchronization via Federated Fine-tuning for Secure Semantic Communications. MobiHoc 2024: 422-427 - [c154]Xinzheng Feng, Jun Wu, Qianqian Pan, Jianhua Li:
Digital Twin Enhanced Data Protection Based on Cloud-Edge Collaboration in Healthcare System. SmartCloud 2024: 1-6 - [c153]Yaju Liu, Xi Lin, Siyuan Li, Gaolei Li, Qinghua Mao, Jianhua Li:
Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach. SmartCloud 2024: 60-65 - [c152]Rui Xu, Gaolei Li, Zhaohui Yang, Mingzhe Chen, Yuchen Liu, Jianhua Li:
Covert and Reliable Semantic Communication Against Cross-Layer Privacy Inference over Wireless Edge Networks. WCNC 2024: 1-6 - [c151]Jiani Zhu, Xi Lin, Yuxin Qi, Gaolei Li, Chaofeng Zhang, Jianhua Li:
Local Differential Private Spatio- Temporal Dynamic Graph Learning for Wireless Social Networks. WCNC 2024: 1-6 - [c150]Yuxin Qi, Xi Lin, Ziyao Liu, Gaolei Li, Jingyu Wang, Jianhua Li:
LinkGuard: Link Locally Privacy-Preserving Graph Neural Networks with Integrated Denoising and Private Learning. WWW (Companion Volume) 2024: 593-596 - [i22]Hanqing Fu, Gaolei Li, Jun Wu, Jianhua Li, Xi Lin, Kai Zhou, Yuchen Liu:
Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices. CoRR abs/2403.18607 (2024) - [i21]Siyuan Li, Xi Lin, Hansong Xu, Kun Hua, Xiaomin Jin, Gaolei Li, Jianhua Li:
Multi-Agent RL-Based Industrial AIGC Service Offloading over Wireless Edge Networks. CoRR abs/2405.02972 (2024) - [i20]Siyuan Li, Xi Lin, Yaju Liu, Jianhua Li:
Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness. CoRR abs/2405.05930 (2024) - [i19]Yaju Liu, Xi Lin, Siyuan Li, Gaolei Li, Qinghua Mao, Jianhua Li:
Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach. CoRR abs/2405.08328 (2024) - [i18]Xiao Yang, Gaolei Li, Jianhua Li:
Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions. CoRR abs/2406.10573 (2024) - [i17]Siyuan Li, Xi Lin, Yaju Liu, Gaolei Li, Jianhua Li:
OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization. CoRR abs/2406.15906 (2024) - [i16]Weichen Li, Xiaotong Huang, Jianwu Zheng, Zheng Wang, Chaokun Wang, Li Pan, Jianhua Li:
rLLM: Relational Table Learning with LLMs. CoRR abs/2407.20157 (2024) - [i15]Xing Ai, Guanyu Zhu, Yulin Zhu, Yu Zheng, Gaolei Li, Jianhua Li, Kai Zhou:
SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks. CoRR abs/2408.16537 (2024) - 2023
- [j106]Yang Bai, Lixing Chen, Jianhua Li, Jun Wu, Pan Zhou, Zichuan Xu, Jie Xu:
Multicore Federated Learning for Mobile-Edge Computing Platforms. IEEE Internet Things J. 10(7): 5940-5952 (2023) - [j105]Xinzheng Feng, Jun Wu, Yulei Wu, Jianhua Li, Wu Yang:
Blockchain and digital twin empowered trustworthy self-healing for edge-AI enabled industrial Internet of things. Inf. Sci. 642: 119169 (2023) - [j104]Kuan Wang, Jun Wu, James Xi Zheng, Jianhua Li, Wu Yang, Athanasios V. Vasilakos:
Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources. IEEE Trans. Cloud Comput. 11(2): 1194-1203 (2023) - [j103]Xi Lin, Jun Wu, Jianhua Li, Chao Sang, Shiyan Hu, M. Jamal Deen:
Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully. IEEE Trans. Dependable Secur. Comput. 20(6): 5113-5129 (2023) - [j102]Xinzheng Feng, Jun Wu, Ali Kashif Bashir, Jianhua Li, Ao Shen, Mohammad Dahman Alshehri:
Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(4): 4661-4670 (2023) - [j101]Xi Lin, Jun Wu, Jianhua Li, Xi Zheng, Gaolei Li:
Friend-as-Learner: Socially-Driven Trustworthy and Efficient Wireless Federated Edge Learning. IEEE Trans. Mob. Comput. 22(1): 269-283 (2023) - [j100]Xi Lin, Jun Wu, Jianhua Li, Wu Yang, Mohsen Guizani:
Stochastic Digital-Twin Service Demand With Edge Response: An Incentive-Based Congestion Control Approach. IEEE Trans. Mob. Comput. 22(4): 2402-2416 (2023) - [j99]Xiaoyu Yi, Jun Wu, Gaolei Li, Ali Kashif Bashir, Jianhua Li, Ahmad Ali AlZubi:
Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2537-2550 (2023) - [j98]Siyuan Li, Xi Lin, Jun Wu, Wei Zhang, Jianhua Li:
Digital Twin and Artificial Intelligence-Empowered Panoramic Video Streaming: Reducing Transmission Latency in the Extended Reality-Assisted Vehicular Metaverse. IEEE Veh. Technol. Mag. 18(4): 56-65 (2023) - [c149]Qinghua Mao, Xi Lin, Gaolei Li, Lixing Chen, Yuchen Liu, Yuxin Qi, Jianhua Li:
Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification. ISPA/BDCloud/SocialCom/SustainCom 2023: 125-130 - [c148]Jinke Cheng, Gaolei Li, Xi Lin, Hao Peng, Jianhua Li:
Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI. ISPA/BDCloud/SocialCom/SustainCom 2023: 640-647 - [c147]Xiaoyu Yi, Gaolei Li, Ao Ding, Yan Zheng, Yuqing Li, Jianhua Li:
AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences. ISPA/BDCloud/SocialCom/SustainCom 2023: 1149-1156 - [c146]Kangkang Sun, Xiaojin Zhang, Xi Lin, Gaolei Li, Jing Wang, Jianhua Li:
Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning. EISA 2023: 118-132 - [c145]Bei Chen, Gaolei Li, Mingzhe Chen, Yuchen Liu, Xiaoyu Yi, Jianhua Li:
PBE-Plan: Periodic Backdoor Erasing Plan for Trustworthy Federated Learning. HPCC/DSS/SmartCity/DependSys 2023: 41-48 - [c144]Xiao Yang, Gaolei Li, Xiaoyi Tao, Chaofeng Zhang, Jianhua Li:
Black-Box Graph Backdoor Defense. ICA3PP (5) 2023: 163-180 - [c143]Jiajin Yang, Lixing Chen, Junhua Tang, Jianhua Li, Wu Yang:
Swarm Reinforcement Learning for Collaborative Content Caching in Information Centric Networks. ICC 2023: 384-390 - [c142]Xuewei Hou, Lixing Chen, Junhua Tang, Jianhua Li, Wu Yang:
Hierarchical Swarm Learning for Edge-Assisted Collaborative Vehicle Trajectory Prediction. ICC 2023: 4144-4149 - [c141]Yingrui Tong, Jun Feng, Gaolei Li, Xi Lin, Chengcheng Zhao, Xiaoyu Yi, Jianhua Li:
SemSBA: Semantic-perturbed Stealthy Backdoor Attack on Federated Semi-supervised Learning. ICPADS 2023: 1569-1576 - [c140]Yilei Xue, Xi Lin, Jun Wu, Jianhua Li:
Wireless Coded Distributed Learning with Gaussian-based Local Differential Privacy. ISIT 2023: 1943-1948 - [c139]Chao Sang, Jianhua Li, Jun Wu, Wu Yang:
ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICS. MSN 2023: 215-222 - [c138]Siyuan Li, Xi Lin, Gaolei Li, Lixing Chen, Siyi Liao, Jing Wang, Jianhua Li:
DPG-DT: Differentially Private Generative Digital Twin for Imbalanced Learning in Industrial IoT. MSN 2023: 270-276 - [c137]Rui Xu, Gaolei Li, Zhaohui Yang, Xiao Yang, Jianhua Li:
Reinforcement Learning-Empowered Decentralized Channel Selection for Dense Wi-Fi 7 Networks. WCSP 2023: 1008-1013 - [i14]Kangkang Sun, Xiaojin Zhang, Xi Lin, Gaolei Li, Jing Wang, Jianhua Li:
Toward the Tradeoffs between Privacy, Fairness and Utility in Federated Learning. CoRR abs/2311.18190 (2023) - 2022
- [j97]Jiana Li, Jun Wu, Changlian Li, Wu Yang, Ali Kashif Bashir, Jianhua Li, Yasser D. Al-Otaibi:
Information-Centric Wireless Sensor Networking Scheme With Water-Depth-Awareness Content Caching for Underwater IoT. IEEE Internet Things J. 9(2): 858-867 (2022) - [j96]Xi Lin, Jun Wu, Ali Kashif Bashir, Jianhua Li, Wu Yang, Md. Jalil Piran:
Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design. IEEE Internet Things J. 9(16): 14685-14698 (2022) - [j95]Qianqian Pan, Jun Wu, James Xi Zheng, Wu Yang, Jianhua Li:
Differential Privacy and IRS Empowered Intelligent Energy Harvesting for 6G Internet of Things. IEEE Internet Things J. 9(22): 22109-22122 (2022) - [j94]Qianqian Pan, Jun Wu, Ali Kashif Bashir, Jianhua Li, Jie Wu:
Side-Channel Fuzzy Analysis-Based AI Model Extraction Attack With Information-Theoretic Perspective in Intelligent IoT. IEEE Trans. Fuzzy Syst. 30(11): 4642-4656 (2022) - [j93]Qianqian Pan, Jun Wu, Ali Kashif Bashir, Jianhua Li, Wu Yang, Yasser D. Al-Otaibi:
Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach. IEEE Trans. Ind. Informatics 18(5): 3473-3483 (2022) - [j92]Qianqian Pan, Jun Wu, Jamel Nebhen, Ali Kashif Bashir, Yu Su, Jianhua Li:
Artificial Intelligence-Based Energy Efficient Communication System for Intelligent Reflecting Surface-Driven VANETs. IEEE Trans. Intell. Transp. Syst. 23(10): 19714-19726 (2022) - [j91]Siyi Liao, Jun Wu, Ali Kashif Bashir, Wu Yang, Jianhua Li, Usman Tariq:
Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities. IEEE Trans. Intell. Transp. Syst. 23(11): 22619-22629 (2022) - [j90]Siyi Liao, Jun Wu, Shahid Mumtaz, Jianhua Li, Rosario Morello, Mohsen Guizani:
Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach. IEEE Trans. Mob. Comput. 21(5): 1596-1608 (2022) - [j89]Tianpeng Ye, Gaolei Li, Ijaz Ahmad, Chaofeng Zhang, Xiang Lin, Jianhua Li:
FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection. IEEE Trans. Netw. Serv. Manag. 19(1): 73-88 (2022) - [j88]Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao:
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning. J. Comput. Virol. Hacking Tech. 18(4): 453-463 (2022) - [j87]Qianqian Pan, Jun Wu, Ali Kashif Bashir, Jianhua Li, Sahil Vashisht, Raheel Nawaz:
Blockchain and AI Enabled Configurable Reflection Resource Allocation for IRS-Aided Coexisting Drone-Terrestrial Networks. IEEE Wirel. Commun. 29(6): 46-54 (2022) - [c136]Xuewei Hou, Lixing Chen, Junhua Tang, Jianhua Li:
Multi-Agent Learning Automata for Online Adaptive Control of Large-Scale Traffic Signal Systems. GLOBECOM 2022: 1497-1502 - [c135]Yang Wang, Xi Lin, Jun Wu, Ali Kashif Bashir, Wu Yang, Jianhua Li, Muhammad Imran:
Contrastive GNN-based Traffic Anomaly Analysis Against Imbalanced Dataset in IoT-based ITS. GLOBECOM 2022: 3557-3562 - [c134]Ke Zhou, Xi Lin, Jun Wu, Ali Kashif Bashir, Jianhua Li, Muhammad Imran:
Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul Networks. GLOBECOM 2022: 5777-5782 - 2021
- [j86]Jianan Li, Jun Wu, Jianhua Li, Ali Kashif Bashir, Md. Jalil Piran, Ashiq Anjum:
Blockchain-Based Trust Edge Knowledge Inference of Multi-Robot Systems for Collaborative Tasks. IEEE Commun. Mag. 59(7): 94-100 (2021) - [j85]Xiaofeng Wang, Jianhua Li, Li Yang, Hongmei Mi:
Unsupervised learning for community detection in attributed networks based on graph convolutional network. Neurocomputing 456: 147-155 (2021) - [j84]Siyi Liao, Jun Wu, Jianhua Li, Kostromitin Konstantin:
Information-Centric Massive IoT-Based Ubiquitous Connected VR/AR in 6G: A Proposed Caching Consensus Approach. IEEE Internet Things J. 8(7): 5172-5184 (2021) - [j83]Hansong Xu, Jun Wu, Jianhua Li, Xi Lin:
Deep-Reinforcement-Learning-Based Cybertwin Architecture for 6G IIoT: An Integrated Design of Control, Communication, and Computing. IEEE Internet Things J. 8(22): 16337-16348 (2021) - [j82]Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir, Wu Yang:
Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones. IEEE Internet Things Mag. 4(1): 12-18 (2021) - [j81]Xiaofeng Wang, Jianhua Li, Li Yang, Hongmei Mi, Jia Yuan Yu:
Weakly-supervised learning for community detection based on graph convolution in attributed networks. Int. J. Mach. Learn. Cybern. 12(12): 3529-3539 (2021) - [j80]Li Ding, Jun Wu, Xiaofei Zhang, Jianhua Li, Jin Ma:
Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture. IEEE Open J. Comput. Soc. 2: 106-116 (2021) - [j79]Lei Xu, Chunxiao Jiang, Yi Qian, Jianhua Li, Youjian Zhao, Yong Ren:
Privacy-Accuracy Trade-Off in Differentially-Private Distributed Classification: A Game Theoretical Approach. IEEE Trans. Big Data 7(4): 770-783 (2021) - [j78]Xi Lin, Jun Wu, Shahid Mumtaz, Sahil Garg, Jianhua Li, Mohsen Guizani:
Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City. IEEE Trans. Emerg. Top. Comput. 9(3): 1373-1385 (2021) - [j77]Kuan Wang, Jun Wu, Xi Zheng, Alireza Jolfaei, Jianhua Li, Dongjin Yu:
Leveraging Energy Function Virtualization With Game Theory for Fault-Tolerant Smart Grid. IEEE Trans. Ind. Informatics 17(1): 678-687 (2021) - [j76]Fuli Qiao, Jun Wu, Jianhua Li, Ali Kashif Bashir, Shahid Mumtaz, Usman Tariq:
Trustworthy Edge Storage Orchestration in Intelligent Transportation Systems Using Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 22(7): 4443-4456 (2021) - [c133]Yuan Shi, Gaolei Li, Xin Xu, Jun Wu, Jianhua Li:
PFCC: Predictive Fast Consensus Convergence for Mobile Blockchain over 5G Slicing-enabled IoT. GLOBECOM 2021: 1-6 - [c132]Guanghui Tong, Gaolei Li, Jun Wu, Jianhua Li:
GradMFL: Gradient Memory-Based Federated Learning for Hierarchical Knowledge Transferring Over Non-IID Data. ICA3PP (1) 2021: 612-626 - [c131]Jingsong Li, Junhua Tang, Jianhua Li, Futai Zou:
Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV. ICC Workshops 2021: 1-7 - [c130]Yihao Qiu, Jun Wu, Shahid Mumtaz, Jianhua Li, Anwer Al-Dulaimi, Joel J. P. C. Rodrigues:
MT-MTD: Muti-Training based Moving Target Defense Trojaning Attack in Edged-AI network. ICC 2021: 1-6 - [c129]Qili Shen, Jun Wu, Jianhua Li, Xiaofei Zhang, Kuan Wang:
Communication Modeling for Targeted Delivery under Bio-DoS Attack in 6G Molecular Networks. ICC 2021: 1-6 - [c128]Qianqian Pan, Jun Wu, Xi Lin, Jianhua Li:
Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 254-261 - 2020
- [j75]Jianan Li, Jun Wu, Guangquan Xu, Jianhua Li, Xi Zheng, Alireza Jolfaei:
Integrating NFV and ICN for Advanced Driver-Assistance Systems. IEEE Internet Things J. 7(7): 5861-5873 (2020) - [j74]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang:
Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT. IEEE Netw. 34(1): 69-75 (2020) - [j73]Qianqian Pan, Jun Wu, Jianhua Li, Wu Yang, Zhitao Guan:
Blockchain and AI Empowered Trust-Information-Centric Network for Beyond 5G. IEEE Netw. 34(6): 38-45 (2020) - [j72]Gaolei Li, Mianxiong Dong, Laurence T. Yang, Kaoru Ota, Jun Wu, Jianhua Li:
Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 653-665 (2020) - [j71]Gaolei Li, Kaoru Ota, Mianxiong Dong, Jun Wu, Jianhua Li:
DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems. IEEE Trans. Ind. Informatics 16(5): 3267-3277 (2020) - [j70]Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir, Shahid Mumtaz, Alireza Jolfaei, Nida Kvedaraite:
Cognitive Popularity Based AI Service Sharing for Software-Defined Information-Centric Networks. IEEE Trans. Netw. Sci. Eng. 7(4): 2126-2136 (2020) - [j69]Haoran Liang, Jun Wu, Xi Zheng, Mengshi Zhang, Jianhua Li, Alireza Jolfaei:
Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 96:1-96:23 (2020) - [j68]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang:
Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing. IEEE Trans. Sustain. Comput. 5(3): 341-352 (2020) - [j67]Tianpeng Ye, Xiang Lin, Jun Wu, Gaolei Li, Jianhua Li:
Processing capability and QoE driven optimized computation offloading scheme in vehicular fog based F-RAN. World Wide Web 23(4): 2547-2565 (2020) - [c127]Tianpeng Ye, Yinghua Ma, Xiang Lin, Jianhua Li:
A Token Level Multi-target Stance Detection Dataset. DSC 2020: 253-256 - [c126]Chao Sang, Jun Wu, Jianhua Li, Ali Kashif Bashir, Fucai Luo, Rupak Kharel:
RALaaS: Resource-Aware Learning-as-a-Service in Edge-Cloud Collaborative Smart Connected Communities. GLOBECOM 2020: 1-6 - [c125]Wentao Zhang, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
A Big Data Management Architecture for Standardized IoT Based on Smart Scalable SNMP. ICC 2020: 1-7 - [c124]Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir:
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN. INFOCOM Workshops 2020: 231-236 - [i13]Qianqian Pan, Jun Wu, Xi Zheng, Jianhua Li, Shenghong Li, Athanasios V. Vasilakos:
Leveraging AI and Intelligent Reflecting Surface for Energy-Efficient Communication in 6G IoT. CoRR abs/2012.14716 (2020)
2010 – 2019
- 2019
- [j66]Siyi Liao, Jianhua Li, Jun Wu, Wu Yang, Zhitao Guan:
Fog-Enabled Vehicle as a Service for Computing Geographical Migration in Smart Cities. IEEE Access 7: 8726-8736 (2019) - [j65]Chengcheng Zhao, Mianxiong Dong, Kaoru Ota, Jianhua Li, Jun Wu:
Edge-MapReduce-Based Intelligent Information-Centric IoV: Cognitive Route Planning. IEEE Access 7: 50549-50560 (2019) - [j64]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Meng Wang:
Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet. IEEE Commun. Mag. 57(7): 48-54 (2019) - [j63]Haoran Liang, Jun Wu, Shahid Mumtaz, Jianhua Li, Xi Lin, Miaowen Wen:
MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X. IEEE Commun. Mag. 57(10): 77-83 (2019) - [j62]Weiyang Wang, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:
CDLB: a cross-domain load balancing mechanism for software defined networks in cloud data centre. Int. J. Comput. Sci. Eng. 18(1): 44-53 (2019) - [j61]Gaolei Li, Guangquan Xu, Arun Kumar Sangaiah, Jun Wu, Jianhua Li:
EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected Healthcare. IEEE Netw. 33(6): 37-43 (2019) - [j60]Jianan Li, Zhenyu Zhou, Jun Wu, Jianhua Li, Shahid Mumtaz, Xi Lin, Haris Gacanin, Sattam Al Otaibi:
Decentralized On-Demand Energy Supply for Blockchain in Internet of Things: A Microgrids Approach. IEEE Trans. Comput. Soc. Syst. 6(6): 1395-1406 (2019) - [j59]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Zhitao Guan:
FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks. IEEE Trans. Emerg. Top. Comput. 7(4): 553-564 (2019) - [j58]Xi Lin, Jianhua Li, Jun Wu, Haoran Liang, Wu Yang:
Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach. IEEE Trans. Ind. Informatics 15(12): 6367-6378 (2019) - [c123]Tianpeng Ye, Xiang Lin, Jun Wu, Gaolei Li, Jianhua Li:
Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RAN. DSC 2019: 196-201 - [c122]Fuli Qiao, Mianxiong Dong, Kaoru Ota, Siyi Liao, Jun Wu, Jianhua Li:
Making Big Data Intelligent Storable at the Edge: Storage Resource Intelligent Orchestration. GLOBECOM 2019: 1-6 - [c121]Chuanhua Xu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
SCEH: Smart Customized E-Health Framework for Countryside Using Edge AI and Body Sensor Networks. GLOBECOM 2019: 1-6 - [c120]Li Zhang, Jun Wu, Shahid Mumtaz, Jianhua Li, Haris Gacanin, Joel J. P. C. Rodrigues:
Edge-to-Edge Cooperative Artificial Intelligence in Smart Cities with On-Demand Learning Offloading. GLOBECOM 2019: 1-6 - [c119]Liqun Cui, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Yang Wu:
NSTN: Name-Based Smart Tracking for Network Status in Information-Centric Internet of Things. ICC 2019: 1-6 - [c118]Gengshen Lin, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid. ICC 2019: 1-6 - [c117]Yi Liu, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Hao Chen:
SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN. ICC 2019: 1-6 - [c116]Haoran Liang, Jun Wu, Zhi Liu, Jianhua Li:
Shape-Unconstrained Privacy-Preserving Range Query for Fog Computing Supported Vehicular Networks Using Image. ICCC 2019: 683-688 - [c115]Jie Ren, Yi Liu, Jun Wu, Jianhua Li, Kuan Wang:
Smart NCAP supporting Low-Rate DDoS Detection for IEEE 21451-1-5 Internet of Things. ICPS 2019: 532-535 - [c114]Haotian Xu, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li:
Toward Software Defined Dynamic Defense as a Service for 5G-Enabled Vehicular Networks. iThings/GreenCom/CPSCom/SmartData 2019: 880-887 - [c113]Sheng Yu, Jianhua Li, Jun Wu:
Emergent LBS: If GNSS Fails, How Can 5G-enabled Vehicles Get Locations Using Fogs? IWCMC 2019: 597-602 - [c112]Qili Shen, Jun Wu, Jianhua Li:
Edge Learning based Green Content Distribution for Information-Centric Internet of Things. TSP 2019: 67-70 - [c111]Xi Lin, Jianhua Li, Wu Yang, Jun Wu, Zhifeng Zong, Xiaodong Wang:
Vehicle-to-Cloudlet: Game-Based Computation Demand Response for Mobile Edge Computing through Vehicles. VTC Spring 2019: 1-6 - 2018
- [j57]Gaolei Li, Jun Wu, Jianhua Li, Zhenyu Zhou, Longhua Guo:
SLA-Aware Fine-Grained QoS Provisioning for Multi-Tenant Software-Defined Networks. IEEE Access 6: 159-170 (2018) - [j56]Longhua Guo, Jianhua Li, Jie Wu, Wei Chang, Jun Wu:
A Novel Airbnb Matching Scheme in Shared Economy Using Confidence and Prediction Uncertainty Analysis. IEEE Access 6: 10320-10331 (2018) - [j55]Gaolei Li, Jun Wu, Jianhua Li, Zhitao Guan, Longhua Guo:
Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE. IEEE Access 6: 11278-11288 (2018) - [j54]Gaolei Li, Qiaolun Zhang, Jianhua Li, Jun Wu, Peng Zhang:
Energy-Efficient Location Privacy Preserving in Vehicular Networks Using Social Intimate Fogs. IEEE Access 6: 49801-49810 (2018) - [j53]Kuan Wang, Jianhua Li, Jun Wu, Gaolei Li:
QoS-Predicted Energy Efficient Routing for Information-Centric Smart Grid: A Network Calculus Approach. IEEE Access 6: 52867-52876 (2018) - [j52]Lina Huang, Yi Liu, Jun Wu, Gaolei Li, Jianhua Li:
Software-defined dynamic QoS provisioning for smart metering in energy Internet using fog computing and network calculus. IET Cyper-Phys. Syst.: Theory & Appl. 3(3): 142-149 (2018) - [j51]Futai Zou, Linsen Li, Yue Wu, Jianhua Li, Siyu Zhang, Kaida Jiang:
Detecting Domain-Flux Malware Using DNS Failure Traffic. Int. J. Softw. Eng. Knowl. Eng. 28(2): 151-174 (2018) - [j50]Lei Xu, Chunxiao Jiang, Nengqiang He, Yi Qian, Yong Ren, Jianhua Li:
Check in or Not? A Stochastic Game for Privacy Preserving in Point-of-Interest Recommendation System. IEEE Internet Things J. 5(5): 4178-4190 (2018) - [j49]Jiang-xing Wu, Jian-hua Li, Xin-sheng Ji:
Security for cyberspace: challenges and opportunities. Frontiers Inf. Technol. Electron. Eng. 19(12): 1459-1461 (2018) - [j48]Jianhua Li:
Cyber security meets artificial intelligence: a survey. Frontiers Inf. Technol. Electron. Eng. 19(12): 1462-1474 (2018) - [j47]Jun Wu, Kaoru Ota, Mianxiong Dong, Jianhua Li, Hongkai Wang:
Big Data Analysis-Based Security Situational Awareness for Smart Grid. IEEE Trans. Big Data 4(3): 408-417 (2018) - [j46]Gaolei Li, Jun Wu, Jianhua Li, Kuan Wang, Tianpeng Ye:
Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(10): 4702-4711 (2018) - [j45]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Zhitao Guan:
Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(1): 27-38 (2018) - [j44]Jun Du, Chunxiao Jiang, Erol Gelenbe, Lei Xu, Jianhua Li, Yong Ren:
Distributed Data Privacy Preservation in IoT Applications. IEEE Wirel. Commun. 25(6): 68-76 (2018) - [c110]Yandong Liu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Jun Wu:
Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks. CAMAD 2018: 1-6 - [c109]Aixin Zhang, Shalin Huang, Xinghua Wu, Shilin Wang, Jianhua Li:
An Effective Verifiable Database Protocol in Severe Untrusted Environment. CSCloud/EdgeCom 2018: 5-11 - [c108]Weiwei Zhao, Li Qiang, Huanying Zou, Aixin Zhang, Jianhua Li:
Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage. CSCloud/EdgeCom 2018: 29-34 - [c107]Jianan Li, Jianhua Li, Jun Wu, Gengshen Lin:
On-Demand Fog Caching Service for ICN Using Synthetical Popularity, Cost, and Importance Status. GLOBECOM 2018: 1-6 - [c106]Siyi Liao, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Tianpeng Ye:
Vehicle Mobility-Based Geographical Migration of Fog Resource for Satellite-Enabled Smart Cities. GLOBECOM 2018: 1-6 - [c105]Meng Xi, Jun Wu, Jianhua Li, Gaolei Li:
Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection. GLOBECOM 2018: 1-6 - [c104]Lintao Dang, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:
Resource-Efficient Secure Data Sharing for Information Centric E-Health System Using Fog Computing. ICC 2018: 1-6 - [c103]Chengcheng Zhao, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:
MapReduce Enabling Content Analysis Architecture for Information-Centric Networks Using CNN. ICC 2018: 1-6 - [c102]Longhua Guo, Jie Wu, Wei Chang, Jun Wu, Jianhua Li:
K-Loop Free Assignment in Conference Review Systems. ICNC 2018: 542-547 - [c101]Lintao Dang, Qiang Li, Jun Wu, Jianhua Li:
A Hierarchical Access Control Encryption Scheme Based on Partially Ordered Set. ICCSP 2018: 122-127 - [c100]Xinzheng Feng, Jun Wu, Jianhua Li, Shen Wang:
Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB. IECON 2018: 5221-5227 - [c99]Shuang Hu, Lin Hou, Gongliang Chen, Jian Weng, Jianhua Li:
Reputation-based Distributed Knowledge Sharing System in Blockchain. MobiQuitous 2018: 476-481 - [c98]Junhua Tang, Shuli Zhao, Yue Wu, Jianhua Li:
Caching Strategy for Scalable Video Coding in Information-Centric Networking. SSIC 2018: 1-6 - [c97]Xiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li:
A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System. SSIC 2018: 1-6 - [i12]Gaolei Li, Jianhua Li, Jun Wu:
Fog-enabled Edge Learning for Cognitive Content-Centric Networking in 5G. CoRR abs/1808.09141 (2018) - 2017
- [j43]Xiaofeng Wang, Gongshen Liu, Jianhua Li:
Overlapping Community Detection Based on Structural Centrality in Complex Networks. IEEE Access 5: 25258-25269 (2017) - [j42]Longhua Guo, Jun Wu, Gaolei Li, Jianhua Li, Jie Wu:
Software-defined networking model for smart transformers with ISO/IEC/IEEE 21451 sensors. ICT Express 3(2): 67-71 (2017) - [j41]Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li:
Detecting malware based on expired command-and-control traffic. Int. J. Distributed Sens. Networks 13(7) (2017) - [j40]Hao Ge, Jianhua Li, Shenghong Li, Wen Jiang, Yifan Wang:
A novel parallel framework for pursuit learning schemes. Neurocomputing 228: 198-204 (2017) - [j39]Yuchen Liu, Aixin Zhang, Shenghong Li, Junhua Tang, Jianhua Li:
A lightweight authentication scheme based on self-updating strategy for space information network. Int. J. Satell. Commun. Netw. 35(3): 231-248 (2017) - [j38]Longhua Guo, Mianxiong Dong, Kaoru Ota, Qiang Li, Tianpeng Ye, Jun Wu, Jianhua Li:
A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle. IEEE Internet Things J. 4(2): 601-610 (2017) - [j37]ZahidMehmood, Gongliang Chen, Jianhua Li, Aiiad Albeshri:
An Untraceable ECC-Based Remote User Authentication Scheme. KSII Trans. Internet Inf. Syst. 11(3): 1742-1760 (2017) - [j36]Jun Wu, Zhou Su, Shen Wang, Jianhua Li:
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems. Sensors 17(8): 1744 (2017) - [j35]Lei Xu, Chunxiao Jiang, Yi Qian, Youjian Zhao, Jianhua Li, Yong Ren:
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. IEEE Trans. Inf. Forensics Secur. 12(2): 271-285 (2017) - [c96]Xinzheng Feng, Jun Wu, Kuan Wang, Jianhua Li, Meng Wang:
Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things. DASC/PiCom/DataCom/CyberSciTech 2017: 326-330 - [c95]Hao Ge, Jinchao Huang, Chong Di, Jianhua Li, Shenghong Li:
Learning Automata Based Approach for Influence Maximization Problem on Social Networks. DSC 2017: 108-117 - [c94]Weiyi Han, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:
SD-OPTS: Software-Defined On-Path Time Synchronization for Information-Centric Smart Grid. GLOBECOM 2017: 1-6 - [c93]Shan He, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Gaolei Li:
Software-Defined Efficient Service Reconstruction in Fog Using Content Awareness and Weighted Graph. GLOBECOM 2017: 1-6 - [c92]Lei Xu, Chunxiao Jiang, Jianhua Li, Youjian Zhao, Yong Ren:
Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach. GLOBECOM 2017: 1-6 - [c91]Daphne Guibert, Jun Wu, Shan He, Meng Wang, Jianhua Li:
CC-fog: Toward content-centric fog networks for E-health. Healthcom 2017: 1-5 - [c90]Gaolei Li, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Tianpeng Ye:
Towards QoE named content-centric wireless multimedia sensor networks with mobile sinks. ICC 2017: 1-6 - [c89]Meng Wang, Jun Wu, Gaolei Li, Jianhua Li, Qiang Li:
Fog computing based content-aware taxonomy for caching optimization in information-centric networks. INFOCOM Workshops 2017: 474-475 - [c88]Gaolei Li, Jun Wu, Jianhua Li, Kuan Wang, Shan He:
SDN Based Content-Centric QoS-Guaranteed for Wireless Multimedia Sensor Networks. INISCOM 2017: 40-48 - [c87]Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang, Jianhua Li:
A Novel Image Classification Method with CNN-XGBoost Model. IWDW 2017: 378-390 - [c86]Longhua Guo, Jie Wu, Wei Chang, Jun Wu, Jianhua Li:
Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared Economy. LCN 2017: 591-594 - 2016
- [j34]Xiaofeng Wang, Gongshen Liu, Li Pan, Jianhua Li:
Uncovering fuzzy communities in networks with structural similarity. Neurocomputing 210: 26-33 (2016) - [j33]Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols without bilinear pairings. Inf. Sci. 367-368: 176-193 (2016) - [j32]Tianpeng Ye, Zhou Su, Jun Wu, Longhua Guo, Jianhua Li, Gaolei Li:
A Safety Resource Allocation Mechanism against Connection Fault for Vehicular Cloud Computing. Mob. Inf. Syst. 2016: 2747808:1-2747808:13 (2016) - [j31]Shenghong Li, Hao Ge, Ying-Chang Liang, Feng Zhao, Jianhua Li:
Estimator Goore Game based quality of service control with incomplete information for wireless sensor networks. Signal Process. 126: 77-86 (2016) - [j30]Shibo Luo, Jun Wu, Jianhua Li, Longhua Guo:
A multi-stage attack mitigation mechanism for software-defined home networks. IEEE Trans. Consumer Electron. 62(2): 200-207 (2016) - [c85]Shiyong Zhang, Gongliang Chen, Jianhua Li:
State Recovering Attack Against Quavium. AINA Workshops 2016: 361-364 - [c84]Xinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao, Yuchen Liu:
A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems. Inscrypt 2016: 187-204 - [c83]Gongshen Liu, Kui Meng, Hongyi Guo, Li Pan, Jianhua Li:
Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community. DSC 2016: 382-387 - [c82]Haolin Zhang, Gongshen Liu, Li Pan, Kui Meng, Jianhua Li:
GEV Regression with Convex Loss Applied to Imbalanced Binary Classification. DSC 2016: 532-537 - [c81]Futai Zou, Siyu Zhang, Bei Pei, Li Pan, Linsen Li, Jianhua Li:
Survey on Domain Name System Security. DSC 2016: 602-607 - [c80]Longhua Guo, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li:
A Name-Based Secure Communication Mechanism for Smart Grid Employing Wireless Networks. GLOBECOM 2016: 1-6 - [c79]Gaolei Li, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li, Tianpeng Ye:
Deep Packet Inspection Based Application-Aware Traffic Control for Software Defined Networks. GLOBECOM 2016: 1-6 - [c78]Yuchen Liu, Aixin Zhang, Jianhua Li, Jun Wu:
An anonymous distributed key management system based on CL-PKC for space information network. ICC 2016: 1-7 - [c77]Hao Ge, Haiyu Huang, Yulin Li, Shenghong Li, Jianhua Li:
Two Approaches on Accelerating Bayesian Two Action Learning Automata. ICIC (3) 2016: 239-247 - [c76]Lina Huang, Gaolei Li, Jun Wu, Lan Li, Jianhua Li, Rosario Morello:
Software-defined QoS provisioning for fog computing advanced wireless sensor networks. IEEE SENSORS 2016: 1-3 - [c75]Weiwei Zhao, Aixin Zhang, Jianhua Li, Xinghua Wu, Yuchen Liu:
Analysis and design of an authentication protocol for space information network. MILCOM 2016: 43-48 - [c74]Junhua Tang, Shujun Lin, Cunqing Hua, Yue Wu, Jianhua Li:
Channel aware resource allocation for device-to-device communication underlaying cellular networks. SSIC 2016: 1-5 - [c73]Shiyong Zhang, Gongliang Chen, Jianhua Li:
Cube attack on reduced-round Enhanced-Bivium. SSIC 2016: 1-4 - [c72]Yutao Zhang, Gongshen Liu, Jun Wu, Jianhua Li, Longhua Guo:
Toward interests drift mechanism for social network. SSIC 2016: 1-5 - [c71]Shibo Luo, Hongkai Wang, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei:
How to Defend against Sophisticated Intrusions in Home Networks Using SDN and NFV. VTC Spring 2016: 1-5 - [c70]Shibo Luo, Hongkai Wang, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei:
Improving Energy Efficiency in Industrial Wireless Sensor Networks Using SDN and NFV. VTC Spring 2016: 1-5 - [c69]Gaolei Li, Yang Wu, Jun Wu, Jianhua Li, Chengcheng Zhao:
Security-Aware Distributed Service Composition for Wireless Sensor Networks Based Smart Metering in Smart Grid Using Software Defined Networks. WICON 2016: 91-97 - 2015
- [j29]Hao Ge, Wen Jiang, Shenghong Li, Jianhua Li, Yifan Wang, Yuchun Jing:
A novel estimator based learning automata algorithm. Appl. Intell. 42(2): 262-275 (2015) - [j28]Shibo Luo, Mianxiong Dong, Kaoru Ota, Jun Wu, Jianhua Li:
A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks. Sensors 15(12): 31843-31858 (2015) - [j27]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li:
Passive Image-Splicing Detection by a 2-D Noncausal Markov Model. IEEE Trans. Circuits Syst. Video Technol. 25(2): 185-199 (2015) - [j26]Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li:
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential. IEEE Trans. Inf. Forensics Secur. 10(3): 543-557 (2015) - [c68]Shibo Luo, Jun Wu, Jianhua Li, Bei Pei:
A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks. FCST 2015: 325-329 - [c67]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Longhua Guo, Gaolei Li:
Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks. GLOBECOM 2015: 1-6 - [c66]Longhua Guo, Jianhua Li, Jun Wu, Zhengmin Xia, Shengjun Zheng:
A Security Mechanism for Demand Response Using RBAC and Pub/sub. ISADS 2015: 260-265 - [c65]Shibo Luo, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei:
Toward Vulnerability Assessment for 5G Mobile Communication Networks. SmartCity 2015: 72-76 - [c64]Keke Gu, Junhua Tang, Li Pan, Jianhua Li:
Overlapping Community Detection Using NVPA. SmartCity 2015: 197-202 - [c63]Yang Sun, Junhua Tang, Li Pan, Jianhua Li:
Matrix Based Community Evolution Events Detection in Online Social Networks. SmartCity 2015: 465-470 - [c62]Shibo Luo, Jun Wu, Jianhua Li, Longhua Guo, Bei Pei:
Context-Aware Traffic Forwarding Service for Applications in SDN. SmartCity 2015: 557-561 - [c61]Yanan Wang, Xiuzhen Chen, Jianhua Li:
A new genetic-based rumor diffusion model for social networks. SSIC 2015: 1-5 - 2014
- [j25]Shi-Lin Wang, Alan Wee-Chung Liew, Shenghong Li, Yu-Jin Zhang, Jianhua Li:
Detection of shifted double JPEG compression by an adaptive DCT coefficient model. EURASIP J. Adv. Signal Process. 2014: 101 (2014) - [j24]Jun Wu, Zhitao Guan, Ming Zhan, Jianhua Li, Yuwei Su:
Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid. Int. J. Distributed Sens. Networks 10 (2014) - [j23]Bin Lian, Gongliang Chen, Jianhua Li:
Provably secure E-cash system with practical and efficient complete tracing. Int. J. Inf. Sec. 13(3): 271-289 (2014) - [j22]Wenchao Li, Ping Yi, Yue Wu, Li Pan, Jianhua Li:
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network. J. Electr. Comput. Eng. 2014: 240217:1-240217:8 (2014) - [c60]Kui Meng, Gongshen Liu, Qiong Hu, Jianhua Li:
An modularity-based overlapping community structure detecting algorithm. ASONAM 2014: 113-117 - [c59]Yueguo Zhang, Lili Dong, Shenghong Li, Jianhua Li:
Abnormal crowd behavior detection using interest points. BMSB 2014: 1-4 - [c58]Yanan Wang, Jianhua Li, Xiuzhen Chen, Wanyu Huang:
Multiple evidence fusion based information diffusion model for social network. ChinaCom 2014: 102-105 - [c57]Sijun Ren, Ping Yi, Yue Wu, Jianhua Li:
An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree. CSE 2014: 1205-1212 - [c56]Xiaofeng Wang, Gongshen Liu, Jianhua Li:
A detecting community method in complex networks with fuzzy clustering. DSAA 2014: 484-490 - [c55]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li:
A denial of service attack in advanced metering infrastructure network. ICC 2014: 1029-1034 - [c54]Sijun Ren, Ping Yi, Ting Zhu, Yue Wu, Jianhua Li:
A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks. ICCC 2014: 829-834 - [c53]Xudong Zhao, Jianhua Li, Shilin Wang, Shenghong Li:
A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection. ICME 2014: 1-6 - [c52]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Bei Pei:
A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things. UIC/ATC/ScalCom 2014: 666-671 - 2013
- [j21]Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci. China Inf. Sci. 56(8): 1-14 (2013) - [j20]Liang Ni, Gongliang Chen, Jianhua Li:
Escrowable identity-based authenticated key agreement protocol with strong security. Comput. Math. Appl. 65(9): 1339-1349 (2013) - [c51]Yueguo Zhang, Lili Dong, Jianhua Li, Shenghong Li, Zhiyong John Gao:
A complex network-based approach to estimating the number of people in video surveillance. BMSB 2013: 1-4 - [c50]Chenye Shi, Jianhua Li, Jieyuan Chen, Xiuzhen Chen:
Chinese SNS blog classification using semantic similarity. CASoN 2013: 1-6 - [c49]Lianghong Qian, Lei Fan, Jianhua Li:
Implementing quasi-parallel breadth-first search in MapReduce for large-scale social network mining. CASoN 2013: 7-14 - [c48]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Quanqiao Yuan:
Image splicing detection based on noncausal Markov model. ICIP 2013: 4462-4466 - [c47]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li, Xiang Lin:
A Distributed Scheme for Image Splicing Detection. IWDW 2013: 314-325 - 2012
- [j19]Xudong Zhao, Shenghong Li, Shilin Wang, Jianhua Li, Kongjin Yang:
Optimal chroma-like channel design for passive color image splicing detection. EURASIP J. Adv. Signal Process. 2012: 240 (2012) - [j18]Yun Tian, Gongliang Chen, Jianhua Li:
A New Ultralightweight RFID Authentication Protocol with Permutation. IEEE Commun. Lett. 16(5): 702-705 (2012) - [j17]Yun Tian, Gongliang Chen, Jianhua Li:
Quavium - A New Stream Cipher Inspired by Trivium. J. Comput. 7(5): 1278-1283 (2012) - [c46]Fang Wang, Aixin Zhang, Jianhua Li, Shenghong Li:
Perceptual Compressive Sensing Scheme Based on Human Vision System. ACIS-ICIS 2012: 351-355 - [c45]Chungang Liu, Jianhua Li, Xiuzhen Chen:
Network Vulnerability Analysis Using Text Mining. ACIIDS (2) 2012: 274-283 - [c44]Yueguo Zhang, Lili Dong, Shenghong Li, Jianhua Li:
A complex network-based approach for interest point detection in images. BMSB 2012: 1-4 - [c43]Xiuzhen Chen, Jianhua Li, Shenghong Li, Yanan Wang:
Hierarchical activeness state evaluation model for BBS network community. CHINACOM 2012: 206-211 - [c42]Yetian Xia, Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Constructing the On/Off Covert Channel on Xen. CIS 2012: 568-572 - [c41]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li:
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. GLOBECOM 2012: 3037-3042 - [c40]Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:
Countering Universal Image Tampering Detection with Histogram Restoration. IWDW 2012: 282-289 - [c39]Aixin Zhang, Chao Guan, Haomiao Jiang, Jianhua Li:
An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation. IWDW 2012: 495-506 - 2011
- [j16]Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao:
Strongly secure identity-based authenticated key agreement protocols. Comput. Electr. Eng. 37(2): 205-217 (2011) - [j15]Xiaochao Zi, Lihong Yao, Xinghao Jiang, Li Pan, Jianhua Li:
Evaluating the transmission rate of covert timing channels in a network. Comput. Networks 55(12): 2760-2771 (2011) - [j14]Yin Li, Gongliang Chen, Jianhua Li:
An alternative class of irreducible polynomials for optimal extension fields. Des. Codes Cryptogr. 60(2): 171-182 (2011) - [j13]Junhua Tang, Sisi Dai, Jianhua Li, Shenghong Li:
Gossip-based scalable directed diffusion for wireless sensor networks. Int. J. Commun. Syst. 24(11): 1418-1430 (2011) - [j12]Yin Li, Gongliang Chen, Jianhua Li:
Speedup of bit-parallel Karatsuba multiplier in GF(2m) generated by trinomials. Inf. Process. Lett. 111(8): 390-394 (2011) - [j11]Xiuzhen Chen, Shenghong Li, Jianhua Li, Zhiyuan Zhang:
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork. J. Comput. Networks Commun. 2011: 150762:1-150762:9 (2011) - [c38]Zhiyuan Zhang, Aixin Zhang, Jianhua Li, Shenghong Li:
An efficient angle-based shape matching approach towards object recognition. ICME 2011: 1-5 - [c37]Xudong Zhao, Shilin Wang, Shenghong Li, Jianhua Li:
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection. IWDW 2011: 243-256 - [c36]Luyi Chen, Shilin Wang, Shenghong Li, Jianhua Li:
New Feature Presentation of Transition Probability Matrix for Image Tampering Detection. IWDW 2011: 376-386 - [i11]Hao Peng, Songnian Lu, Dandan Zhao, Aixin Zhang, Jianhua Li:
An Anti-attack Model Based on Complex Network Theory in P2P networks. CoRR abs/1108.5530 (2011) - 2010
- [j10]Xiaochao Zi, Lihong Yao, Li Pan, Jianhua Li:
Implementing a passive network covert timing channel. Comput. Secur. 29(6): 686-696 (2010) - [j9]Kai Wang, Jianhua Li, Li Pan:
Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint. Future Gener. Comput. Syst. 26(7): 986-1002 (2010) - [j8]Xun Sun, Jianhua Li, Hu Yin, Gongliang Chen:
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme. Informatica 21(1): 117-122 (2010) - [j7]Zhengmin Xia, Songnian Lu, Jianhua Li, Junhua Tang:
Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic. Informatica (Slovenia) 34(4): 497-507 (2010) - [j6]Yin Li, Gongliang Chen, Yi-yang Chen, Jianhua Li:
An extension of TYT inversion algorithm in polynomial basis. Inf. Process. Lett. 110(8-9): 300-303 (2010) - [c35]Jin Ma, Xiuzhen Chen, Jianhua Li:
An Approach to Privacy-Preserving Alert Correlation and Analysis. APSCC 2010: 620-624 - [c34]Hao Peng, Songnian Lu, Jianhua Li, Aixin Zhang, Dandan Zhao:
An Anonymity Scheme Based on Pseudonym in P2P Networks. e-Forensics 2010: 287-293 - [c33]Yin Li, Gongliang Chen, Jianhua Li:
Fast Forth Power and Its Application in Inversion Computation for a Special Class of Trinomials. ICCSA (2) 2010: 14-24 - [c32]Xudong Zhao, Jianhua Li, Shenghong Li, Shilin Wang:
Detecting Digital Image Splicing in Chroma Spaces. IWDW 2010: 12-22
2000 – 2009
- 2009
- [j5]Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li:
A study of on/off timing channel based on packet delay distribution. Comput. Secur. 28(8): 785-794 (2009) - [c31]Zhengmin Xia, Songnian Lu, Jianhua Li, Aixin Zhang:
A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. ICICS 2009: 283-292 - [c30]Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu:
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. ITNG 2009: 541-545 - [c29]Zhengmin Xia, Songnian Lu, Jianhua Li, Jin Ma:
Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity. WISM 2009: 383-392 - [i10]Yun Tian, Gongliang Chen, Jianhua Li:
On the Design of Trivium. IACR Cryptol. ePrint Arch. 2009: 431 (2009) - 2008
- [j4]Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan:
Building network attack graph for alert causal correlation. Comput. Secur. 27(5-6): 188-196 (2008) - [j3]Kai Wang, Li Pan, Jianhua Li:
Peer-to-Peer Based Fast File Dissemination in UMTS Networks. IEICE Trans. Commun. 91-B(12): 3860-3871 (2008) - [c28]Ning Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi:
Group-Based Trust Model in P2P System Based on Trusted Computing. CSSE (3) 2008: 797-801 - [c27]Xinghao Jiang, Tanfeng Sun, Jianhua Li, Ye Yun:
A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection. IWDW 2008: 45-51 - [c26]Xinghao Jiang, Tanfeng Sun, Jianhua Li:
A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection. PCM 2008: 891-893 - [c25]Linchun Li, Jianhua Li, Yue Wu, Ping Yi:
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. PerCom 2008: 324-329 - [i9]Xun Sun, Jianhua Li, Gongliang Chen, Shutang Yang:
Identity-Based Directed Signature Scheme from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2008: 305 (2008) - 2007
- [c24]Chunbo Ma, Jun Ao, Jianhua Li:
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. HCI (15) 2007: 124-133 - [c23]Chunbo Ma, Jun Ao, Jianhua Li:
A Novel Verifier-Based Authenticated Key Agreement Protocol. ICIC (3) 2007: 1044-1050 - [c22]Ye Yun, Xinghao Jiang, Tanfeng Sun, Jianhua Li:
An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification. PCM 2007: 437-440 - [c21]Xinghao Jiang, Tanfeng Sun, Jianhua Li:
The Application of Wavelet & DCSK Watermarking in Multimedia Security. SITIS 2007: 103-108 - [c20]Yaogong Wang, Li Pan, Jianhua Li:
The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks. SITIS 2007: 137-142 - [c19]Min Zuo, Jianhua Li, Gongshen Liu:
A Discussion on Personalized Trust Management for Flat P2P Communities. SITIS 2007: 193-199 - [c18]Min Zuo, Yinghua Ma, Richard Chbeir, Jianhua Li:
Combating P2P File Pollution with Co-alerting. SITIS 2007: 289-297 - [c17]Min Zuo, Jianhua Li, Gongshen Liu:
An Adaptive Collaborative Filtering Algorithm for Online Reputation Systems. SITIS 2007: 1029-1035 - [c16]Linchun Li, Jianhua Li, Ling Tie, Jun Pan:
ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. SNPD (2) 2007: 262-267 - [i8]Chunbo Ma, Jun Ao, Jianhua Li:
Provable password-based tripartite key agreement protocol. IACR Cryptol. ePrint Arch. 2007: 184 (2007) - [i7]Chunbo Ma, Jun Ao, Jianhua Li:
Scalable Storage Scheme from Forward Key Rotation. IACR Cryptol. ePrint Arch. 2007: 211 (2007) - [i6]Chunbo Ma, Jun Ao, Jianhua Li:
Group-based Proxy Re-encryption scheme. IACR Cryptol. ePrint Arch. 2007: 274 (2007) - [i5]Chunbo Ma, Jun Ao, Jianhua Li:
Group-oriented encryption secure against collude attack. IACR Cryptol. ePrint Arch. 2007: 371 (2007) - 2006
- [c15]Wu Yang, Xiao-chun Yun, Jianhua Li:
An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. APWeb Workshops 2006: 835-841 - [c14]Chunbo Ma, Jianhua Li:
Adaptable Designated Group Signature. ICIC (1) 2006: 1053-1061 - [c13]Miaomiao Zhang, Gongliang Chen, Jianhua Li:
Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. IMSCCS (2) 2006: 135-141 - [c12]Jie Liu, Lei Fan, Jianhua Li:
Cryptanalysis and improvement on Yang-Shieh authentication schemes. PST 2006: 64 - [i4]Hao Chen, Liang Ma, Jianhua Li:
Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes. CoRR abs/cs/0606011 (2006) - [i3]Hao Chen, Jianhua Li:
Lower Bounds on the Algebraic Immunity of Boolean Functions. CoRR abs/cs/0608080 (2006) - [i2]Miaomiao Zhang, Gongliang Chen, Jianhua Li, Licheng Wang, Haifeng Qian:
A New Construction of Time Capsule Signature. IACR Cryptol. ePrint Arch. 2006: 113 (2006) - [i1]Chunbo Ma, Jun Ao, Jianhua Li:
Chameleon-Based Deniable Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2006: 318 (2006) - 2005
- [j2]Rui Jiang, Li Pan, Jianhua Li:
An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2): 169-174 (2005) - [c11]Qiang Li, Jianhua Li:
Topic-Specific Text Filtering Based on Multiple Reducts. AIS-ADM 2005: 175-183 - [c10]Qiang Li, Jianhua Li:
An Efficient Topic-Specific Web Text Filtering Framework. APWeb 2005: 157-163 - [c9]Min Zuo, Jianhua Li:
Constructing Fair-Exchange P2P File Market. GCC 2005: 941-946 - [c8]Lan Li, Xinghao Jiang, Jianhua Li:
Enforce Mandatory Access Control Policy on XML Documents. ICICS 2005: 336-349 - [c7]Qiang Sun, Jianhua Li, Xinran Liang, Shenghong Li:
Using Double-Layer One-Class Classification for Anti-jamming Information Filtering. ISNN (3) 2005: 361-366 - [c6]Min Zuo, Kai Wang, Jianhua Li:
The Application of Collaborative Filtering for Trust Management in P2P Communities. ISPA 2005: 383-394 - [c5]Yijuan Shi, Gongliang Chen, Jianhua Li:
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. ITCC (1) 2005: 757-761 - 2004
- [j1]Rui Jiang, Li Pan, Jianhua Li:
Further analysis of password authentication schemes based on authentication tests. Comput. Secur. 23(6): 469-477 (2004) - [c4]Qiang Li, Jianhua Li, Xiang Li, Shenghong Li:
Evaluation Incompleteness of Knowledge in Data Mining. AWCC 2004: 278-284 - [c3]Yingjie Wang, Jianhua Li, Ling Tie, Qiang Li:
An Efficient Key Management for Large Dynamic Groups. CNSR 2004: 131-136 - [c2]Gongshen Liu, Jianhua Li, Xiang Li, Qiang Li:
New Feature Selection and Weighting Methods Based on Category Information. ICADL 2004: 330-338 - [c1]Yingjie Wang, Jianhua Li, Lei Fan:
Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature. SNPD 2004: 349-351
Coauthor Index
aka: Shilin Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint