Jiliang Li
Orcid: 0009-0004-2852-0865
According to our database1,
Jiliang Li
authored at least 45 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Int. J. Hum. Comput. Interact., June, 2025
BountyBench: Dollar Impact of AI Agent Attackers and Defenders on Real-World Cybersecurity Systems.
CoRR, May, 2025
IEEE Internet Things J., April, 2025
Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis.
CoRR, March, 2025
StealthPath: Privacy-Preserving Path Validation in the Data Plane of Path-Aware Networks.
IEEE Trans. Dependable Secur. Comput., 2025
A Comparative Study on ChatGPT and Checklist as Support Tools for Unit Testing Education.
Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025
MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025
2024
IEEE Netw., November, 2024
Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy, and Future Directions.
IEEE Internet Things J., June, 2024
Delayed packing attack and countermeasure against transaction information based applications.
Inf. Sci., January, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Sustain. Comput., 2024
Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems.
IEEE Trans. Netw. Sci. Eng., 2024
Proc. ACM Softw. Eng., 2024
Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection.
IEEE Internet Things J., 2024
IACR Cryptol. ePrint Arch., 2024
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2024
Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
Comput. Secur., September, 2023
Appl. Soft Comput., September, 2023
2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids.
J. Inf. Secur. Appl., May, 2023
IEEE Trans. Ind. Informatics, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the 3rd International Conference on Electronic Information Technology and Smart Agriculture, 2023
2022
Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022
Proceedings of the Financial Cryptography and Data Security, 2022
2021
IEEE Trans. Veh. Technol., 2021
LCEDA: Lightweight and Communication-Efficient Data Aggregation Scheme for Smart Grid.
IEEE Internet Things J., 2021
PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things.
IEEE Internet Things J., 2021
P2S2O: Pseudonymous Polling System for Small Organizations.
Proceedings of the 6th International Conference on Internet of Things, 2021
2020
Trust Based Secure Content Delivery in Vehicular Networks: A Bargaining Game Theoretical Approach.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Netw. Sci. Eng., 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
2019
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019
CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2019
2018
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018
2011
An integrated proteomics analysis of bone tissues in response to mechanical stimulation.
BMC Syst. Biol., 2011
2006
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006