Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks J Li, M Wen, T Zhang IEEE Internet of Things Journal 3 (3), 408-417, 2015 | 123 | 2015 |
Attention-YOLOV4: a real-time and high-accurate traffic sign detection algorithm Y Li, J Li, P Meng Multimedia Tools and Applications 82, 757-7582, 2023 | 35 | 2023 |
HYBRID-CNN: An efficient scheme for abnormal flow detection in the SDN-Based Smart Grid P Ding, J Li, L Wang, M Wen, Y Guan Security and communication networks 2020, 1-20, 2020 | 31 | 2020 |
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs H Wang, L Wang, K Zhang, J Li, Y Luo IEEE Access 10, 15605-15618, 2022 | 28 | 2022 |
Unknown vulnerability risk assessment based on directed graph models: a survey W He, H Li, J Li IEEE Access 7, 168201-168225, 2019 | 22 | 2019 |
Efficient BiSRU combined with feature dimensionality reduction for abnormal traffic detection P Ding, J Li, M Wen, L Wang, H Li IEEE Access 8, 164414-164427, 2020 | 17 | 2020 |
Big data storage security M Wen, S Yu, J Li, H Li, K Lu Big Data Concepts, Theories, and Applications, 237-255, 2016 | 15 | 2016 |
Ensemble feature selection for improving intrusion detection classification accuracy W He, H Li, J Li Proceedings of the 2019 international conference on artificial intelligence …, 2019 | 13 | 2019 |
A data aggregation scheme with fine-grained access control for the smart grid M Wen, X Zhang, H Li, J Li 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-5, 2017 | 13 | 2017 |
AnoGLA: An efficient scheme to improve network anomaly detection Q Ding, J Li Journal of Information Security and Applications 66, 103149, 2022 | 11 | 2022 |
Toward efficient and effective bullying detection in online social network J Wu, M Wen, R Lu, B Li, J Li Peer-to-Peer networking and Applications 13 (5), 1567-1576, 2020 | 11 | 2020 |
Secure and verifiable multi-owner ranked-keyword search in cloud computing J Li, Y Lin, M Wen, C Gu, B Yin Wireless Algorithms, Systems, and Applications: 10th International …, 2015 | 11 | 2015 |
An adversarial attack based on incremental learning techniques for unmanned in 6G scenes H Lv, M Wen, R Lu, J Li IEEE Transactions on Vehicular Technology 70 (6), 5254-5264, 2021 | 9 | 2021 |
An accurate ensemble forecasting approach for highly dynamic cloud workload with vmd and r-transformer S Zhou, J Li, K Zhang, M Wen, Q Guan IEEE Access 8, 115992-116003, 2020 | 9 | 2020 |
Achieve revocable access control for fog-based smart grid system S Chen, M Wen, R Lu, J Li, S Chen 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-7, 2019 | 9 | 2019 |
一种基于遗传算法的 DCT 域鲁棒水印技术 朱宁波, 李晋国 湖南大学学报: 自然科学版 38 (4), 77-82, 2011 | 9 | 2011 |
An effective intrusion detection model for class-imbalanced learning based on smote and attention mechanism X Jiao, J Li 2021 18th International Conference on Privacy, Security and Trust (PST), 1-6, 2021 | 5 | 2021 |
A bidirectional broadcasting authentication scheme for wireless sensor networks L Xu, M Wen, J Li 2015 IEEE Conference on Collaboration and Internet Computing (CIC), 200-204, 2015 | 5 | 2015 |
车载自组织网络中基于椭圆曲线零知识证明的匿名安全认证机制 李晋国, 林亚平, 李睿, 周四望 通信学报 34 (5), 52-61, 2013 | 5 | 2013 |
Secure and verifiable top-k query in two-tiered sensor networks T Zhou, Y Lin, W Zhang, S Xiao, J Li Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 5 | 2013 |