Jinguo Li

Orcid: 0000-0002-7980-0312

According to our database1, Jinguo Li authored at least 38 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An LDP-Based Privacy-Preserving Longitudinal and Multidimensional Range Query Scheme in IoT.
IEEE Internet Things J., February, 2024

FPCNN: A fast privacy-preserving outsourced convolutional neural network with low-bandwidth.
Knowl. Based Syst., January, 2024

Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024

2023
FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system.
Multim. Tools Appl., October, 2023

Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment.
Int. J. Inf. Sec., June, 2023

Attention-YOLOV4: a real-time and high-accurate traffic sign detection algorithm.
Multim. Tools Appl., February, 2023

Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy.
IEEE Trans. Cloud Comput., 2023

Intrusion Detection based on Multi-measure Feature Selection and DSCA-BiLSTM in Fog Environment.
Proceedings of the 11th International Conference on Communications and Broadband Networking, 2023

2022
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs.
J. Syst. Archit., 2022

AnoGLA: An efficient scheme to improve network anomaly detection.
J. Inf. Secur. Appl., 2022

A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
IEEE Access, 2022

A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Trust, 2022

2021
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021

An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks, 2020

Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl., 2020

Cloud-assisted secure and conjunctive publish/subscribe service in smart grids.
IET Inf. Secur., 2020

An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020

Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access, 2020

An Adversarial Attack with Fusion of Polarization for Unmanned Scenes.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl., 2019

Unknown Vulnerability Risk Assessment Based on Directed Graph Models: A Survey.
IEEE Access, 2019

Achieve Revocable Access Control for Fog-Based Smart Grid System.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Adversarial attack against scene recognition system for unmanned vehicles.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2017
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Improved detection for copy-move forgery with multi-scale sliding windows.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

2016
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016

Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J., 2016

Secret Share Based Program Access Authorization Protocol for Smart Metering.
Int. J. Netw. Secur., 2016

PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

2014
Privacy and integrity preserving skyline queries in tiered sensor networks.
Secur. Commun. Networks, 2014

2013
A comprehensive metering scheme for intellectual property protection during both after-sale and evaluation periods of IC design.
IEICE Electron. Express, 2013

Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

A Multi-dimensional Packet Classification Algorithm Based on Hierarchical All-Match B+ Tree.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Towards Dynamic and Scalable High-Speed IP Address Lookup Based on B+ Tree.
IEICE Trans. Inf. Syst., 2012

2011
Evaluation Method for Milling Machining Deformation of Thin-Walled Structures.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011


  Loading...