Fenghua Li

According to our database1, Fenghua Li authored at least 114 papers between 2004 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020

Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs.
IEEE Wirel. Commun., 2020

Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-Scale Wireless Network.
IEEE/ACM Trans. Netw., 2020

A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.
Sensors, 2020

Securing instruction interaction for hierarchical management.
J. Parallel Distributed Comput., 2020

Privbus: A privacy-enhanced crowdsourced bus service via fog computing.
J. Parallel Distributed Comput., 2020

Exploiting location-related behaviors without the GPS data on smartphones.
Inf. Sci., 2020

A topic-centric access control model for the publish/subscribe paradigm.
Concurr. Comput. Pract. Exp., 2020

Dynamic countermeasures selection for multi-path attacks.
Comput. Secur., 2020

Computer-aided diagnosis of gallbladder polyps based on high resolution ultrasonography.
Comput. Methods Programs Biomed., 2020

Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent.
IEEE Access, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?
Proceedings of the 2020 IEEE International Conference on Communications, 2020

The Linear Geometry Structure of Label Matrix for Multi-label Learning.
Proceedings of the Database and Expert Systems Applications, 2020

Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
IEEE Trans. Inf. Forensics Secur., 2019

Combination Model of Heterogeneous Data for Security Measurement.
J. Univers. Comput. Sci., 2019

A game theoretic approach to cooperative intrusion detection.
J. Comput. Sci., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019

A Searchable CP-ABE Privacy Preserving Scheme.
Int. J. Netw. Secur., 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019

Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario.
IEEE Access, 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

BDAC: A Behavior-aware Dynamic Adaptive Configuration on DHCP in Wireless LANs.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach.
Proceedings of the Computational Science - ICCS 2019, 2019

PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Hierarchical Key Management Scheme with Multilevel Secure Access.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Enhanced blockchain based key management scheme against key exposure attack.
Proceedings of the International Conference on Artificial Intelligence, 2019

On data visualization for securities investment fund analysis.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
A game-theoretic approach to advertisement dissemination in ephemeral networks.
World Wide Web, 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018

Privacy-Preserving Partner Selection for Ride-Sharing Services.
IEEE Trans. Veh. Technol., 2018

Security Measurement for Unknown Threats Based on Attack Preferences.
Secur. Commun. Networks, 2018

HAC: Hybrid Access Control for Online Social Networks.
Secur. Commun. Networks, 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018

Design of Multi Cipher Processing Architecture for Random Cross Access.
Microprocess. Microsystems, 2018

An Efficient Stream Data Processing Model for Multiuser Cryptographic Service.
J. Electr. Comput. Eng., 2018

Photoplethysmography based psychological stress detection with pulse rate variability feature differences and elastic net.
Int. J. Distributed Sens. Networks, 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptol. ePrint Arch., 2018

DESC: enabling secure data exchange based on smart contracts.
Sci. China Inf. Sci., 2018

Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Resolving Access Conflicts: An Auction-Based Incentive Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Wi-Live, Adaptive Scenario-Aware Wireless Multicast Solution for Living Streaming Based on Software Defined Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach.
Proceedings of the Computational Science - ICCS 2018, 2018

Real-Time Data Incentives for IoT Searches.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Server-aided private set intersection based on reputation.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

Receive Buffer Pre-division Based Flow Control for MPTCP.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Privacy-Preserving Method for Photo Sharing in Instant Message Systems.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SRAM: A State-Aware Risk Assessment Model for Intrusion Response.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A core-stateless IP mobility management scheme based on OpenFlow protocol.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Achieving lightweight, time-specific and secure access control in cloud storage.
Proceedings of the 2016 International Conference on Computing, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based Services.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Role and Time-Based Access Control with Efficient Revocation for Cloud Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Design and Implementation of an Extensible Network Device Management System.
Proceedings of the 10th International Conference on Complex, 2016

Extensible Command Parsing Method for Network Device.
Proceedings of the 10th International Conference on Complex, 2016

2015
A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer Peer Netw. Appl., 2015

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2015

A Novel Cyberspace-Oriented Access Control Model.
IACR Cryptol. ePrint Arch., 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Does dynamic still work in today's 'D'HCP.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Research on Credible Regulation Mechanism for the Trading of Digital Works.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Reliable Supervision Model and Implementation for the Trading of Digital Works.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2013

Privacy-preserving logistic regression outsourcing in cloud computing.
Int. J. Grid Util. Comput., 2013

An improved attack on clock-controlled shift registers based on hardware implementation.
Sci. China Inf. Sci., 2013

Chaotic modulations for digital underwater acoustic communications.
Proceedings of the Conference on Underwater Networks and Systems, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
Research on Access Control Mechanism for Digital Products Trading.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

RPS: range-based path selection method for concurrent multipath transfer.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Action-Based Access Control for Web Services.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A new approach for UC security concurrent deniable authentication.
Sci. China Ser. F Inf. Sci., 2008

Enhanced Architecture of TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A novel infrastructure WLAN locating method based on neural network.
Proceedings of the AINTEC '08, 2008

2004
Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods.
IEEE Geosci. Remote. Sens. Lett., 2004


  Loading...