Fenghua Li

According to our database1, Fenghua Li authored at least 93 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network.
IEEE Trans. Information Forensics and Security, 2019

Combination Model of Heterogeneous Data for Security Measurement.
J. UCS, 2019

A game theoretic approach to cooperative intrusion detection.
J. Comput. Science, 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet of Things Journal, 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet of Things Journal, 2019

A Searchable CP-ABE Privacy Preserving Scheme.
I. J. Network Security, 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
IJITWE, 2019

Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips.
IEICE Transactions, 2019

Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario.
IEEE Access, 2019

HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach.
Proceedings of the Computational Science - ICCS 2019, 2019

On data visualization for securities investment fund analysis.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
A game-theoretic approach to advertisement dissemination in ephemeral networks.
World Wide Web, 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Vehicular Technology, 2018

Privacy-Preserving Partner Selection for Ride-Sharing Services.
IEEE Trans. Vehicular Technology, 2018

Security Measurement for Unknown Threats Based on Attack Preferences.
Security and Communication Networks, 2018

HAC: Hybrid Access Control for Online Social Networks.
Security and Communication Networks, 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Security and Communication Networks, 2018

Design of Multi Cipher Processing Architecture for Random Cross Access.
Microprocessors and Microsystems - Embedded Hardware Design, 2018

An Efficient Stream Data Processing Model for Multiuser Cryptographic Service.
J. Electrical and Computer Engineering, 2018

Photoplethysmography based psychological stress detection with pulse rate variability feature differences and elastic net.
IJDSN, 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptology ePrint Archive, 2018

DESC: enabling secure data exchange based on smart contracts.
SCIENCE CHINA Information Sciences, 2018

Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Resolving Access Conflicts: An Auction-Based Incentive Approach.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Wi-Live, Adaptive Scenario-Aware Wireless Multicast Solution for Living Streaming Based on Software Defined Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach.
Proceedings of the Computational Science - ICCS 2018, 2018

Real-Time Data Incentives for IoT Searches.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Server-aided private set intersection based on reputation.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017

Secure Transmission with Limited Feedback in MISOME Wiretap Channels.
Proceedings of the International Conference on Networking and Network Applications, 2017

Receive Buffer Pre-division Based Flow Control for MPTCP.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Privacy-Preserving Method for Photo Sharing in Instant Message Systems.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SRAM: A State-Aware Risk Assessment Model for Intrusion Response.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Time obfuscation-based privacy-preserving scheme for location-based services.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

A core-stateless IP mobility management scheme based on OpenFlow protocol.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Achieving lightweight, time-specific and secure access control in cloud storage.
Proceedings of the 2016 International Conference on Computing, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Voronoi-Based Dummy Generation Algorithm for Privacy-Aware Location-Based Services.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Role and Time-Based Access Control with Efficient Revocation for Cloud Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Design and Implementation of an Extensible Network Device Management System.
Proceedings of the 10th International Conference on Complex, 2016

Extensible Command Parsing Method for Network Device.
Proceedings of the 10th International Conference on Complex, 2016

2015
A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Networking and Applications, 2015

Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing.
TIIS, 2015

A Novel Cyberspace-Oriented Access Control Model.
IACR Cryptology ePrint Archive, 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Does dynamic still work in today's 'D'HCP.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Preserving identity privacy on multi-owner cloud data during public verification.
Security and Communication Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
Journal of Communications and Networks, 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
TIIS, 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Research on Credible Regulation Mechanism for the Trading of Digital Works.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Reliable Supervision Model and Implementation for the Trading of Digital Works.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption.
IEEE Trans. Information Forensics and Security, 2013

Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding.
IEEE Trans. Information Forensics and Security, 2013

Privacy-preserving logistic regression outsourcing in cloud computing.
IJGUC, 2013

An improved attack on clock-controlled shift registers based on hardware implementation.
SCIENCE CHINA Information Sciences, 2013

Chaotic modulations for digital underwater acoustic communications.
Proceedings of the Conference on Underwater Networks and Systems, 2013

Video steganography with multi-path motion estimation.
Proceedings of the Media Watermarking, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
Research on Access Control Mechanism for Digital Products Trading.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2010

RPS: range-based path selection method for concurrent multipath transfer.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Action-Based Access Control for Web Services.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A new approach for UC security concurrent deniable authentication.
Science in China Series F: Information Sciences, 2008

Enhanced Architecture of TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A novel infrastructure WLAN locating method based on neural network.
Proceedings of the AINTEC '08, 2008

2004
Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods.
IEEE Geosci. Remote Sensing Lett., 2004


  Loading...