Guorui Li

Orcid: 0009-0001-7824-5206

According to our database1, Guorui Li authored at least 46 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive Time-Frequency Segment Optimization for Motor Imagery Classification.
Sensors, March, 2024

2023
The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things.
IEEE Intell. Syst., 2023

Software and Behavior Diversification for Swarm Robotics Systems.
Proceedings of the 10th ACM Workshop on Moving Target Defense, 2023

2022
Matrix Completion via Schatten Capped $p$p Norm.
IEEE Trans. Knowl. Data Eng., 2022

Adaptive ground-roll attenuation using local nonlinear filtering.
Comput. Geosci., 2022

2020
Modeling on virtual network embedding using reinforcement learning.
Concurr. Comput. Pract. Exp., 2020

Urban Landscape Design Optimization Based on Interactive Genetic Algorithm.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading.
IEEE Internet Things J., 2019

A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks.
Int. J. Embed. Syst., 2019

Jellyfish-Inspired Soft Robot Driven by Fluid Electrode Dielectric Organic Robotic Actuators.
Frontiers Robotics AI, 2019

2018
A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks.
Sensors, 2018

An Iterative Hard Thresholding Algorithm based on Sparse Randomized Kaczmarz Method for Compressed Sensing.
Int. J. Comput. Intell. Appl., 2018

A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing.
Proceedings of the 2018 IEEE SmartWorld, 2018

Application on Information Island with Information Visualization and Software Engineering.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Application Research on Virtualized Desktop Technology in Private Colleges and Universities of Art and Design.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

2017
Virtual network embedding with pre-transformation and incentive convergence mechanism.
Concurr. Comput. Pract. Exp., 2017

A Data Reconstruction Algorithm Based on Neural Network for Compressed Sensing.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
Unbalanced Threshold Based Distributed Data Collection Scheme in Multisink Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A DPSO-Based Load Balancing Virtual Network Embedding Algorithm with Particle Initialization Strategy.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

MISTER: An Approximate Minimum Steiner Tree Based Routing Scheme in Wireless Sensor Networks.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

2015
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN.
Proceedings of the 13th IEEE International Conference on Trust, 2014

An approximate l0 norm based signal reconstruction algorithm in the compressive sampling theory.
Proceedings of the IEEE 6th International Conference on Awareness Science and Technology, 2014

2013
On-line Calibration of Semiconductor Gas Sensors Based on Prediction Model.
J. Comput., 2013

Automatic ARIMA modeling-based data aggregation scheme in wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

A Compressive Sensing Based Secure Data Transmission Scheme.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
EMAP: An efficient mutual authentication protocol for passive RFID tags.
Int. J. Autom. Comput., 2012

Differential Kullback-Leibler Divergence Based Anomaly Detection Scheme in Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2010
Efficient Group Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010

A Study on Secure RFID Mutual Authentication Scheme.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2008
Group-based intrusion detection system in wireless sensor networks.
Comput. Commun., 2008

A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008

A Distributed Intrusion Detection Scheme for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Mutual Authentication in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008

A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Secure Multiple Deployment in Wireless Sensor Networks.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Key Management in Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Key Predistribution in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Composite Key Management Scheme for Mobile Ad Hoc Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Hexagon-Based Key Predistribution Scheme in Sensor Networks.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006


  Loading...