Li Li

Affiliations:
  • Harbin Institute of Technology, Shenzhen Graduate School, School of Computer Science and Technology, Key Laboratory of Network Oriented Intelligent Computation, China


According to our database1, Li Li authored at least 40 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold.
Sensors, 2022

2021
CL-ADMM: A Cooperative-Learning-Based Optimization Framework for Resource Management in MEC.
IEEE Internet Things J., 2021

2020
ECOR: An Energy Aware Coded Opportunistic Routing for Cognitive Radio Social Internet of Things.
Wirel. Pers. Commun., 2020

OODT: Obstacle Aware Opportunistic Data Transmission for Cognitive Radio Ad Hoc Networks.
IEEE Trans. Commun., 2020

A Cooperative Learning Framework for Resource Management in MEC: An ADMM Perspective.
CoRR, 2020

TOT: Trust aware opportunistic transmission in cognitive radio Social Internet of Things.
Comput. Commun., 2020

2019
Distortion less secret image sharing scheme for Internet of Things system.
Clust. Comput., 2019

DSOR: A Traffic-Differentiated Secure opportunistic Routing with Game Theoretic Approach in MANETs.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

PSOGT: PSO and Game Theoretic Based Task Allocation in Mobile Edge Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Centroid-Based Audio Steganography Scheme in Wavelet Domain.
J. Inf. Hiding Multim. Signal Process., 2018

2017
ETOR: Energy and Trust Aware Opportunistic Routing in Cognitive Radio Social Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Quantum color image encryption based on multiple discrete chaotic systems.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
A Novel Routing Scheme for Resource-Constraint Opportunistic Networks: A Cooperative Multiplayer Bargaining Game Approach.
IEEE Trans. Veh. Technol., 2016

TCPJGNC: A transport control protocol based on network coding for multi-hop cognitive radio networks.
Comput. Commun., 2016

Combined channel assignment and network coded opportunistic routing in cognitive radio networks.
Comput. Electr. Eng., 2016

An incentive aware routing for selfish opportunistic networks: A game theoretic approach.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Social-Based Broadcast in Cognitive Radio Networks: A Network Coding Perspective.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

A secure routing based on social trust in opportunistic networks.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016

2015
TCPNC-DGSA: Efficient Network Coding Scheme for TCP in Multi-hop Cognitive Radio Networks.
Wirel. Pers. Commun., 2015

A Cross-Layer QoS Design with Energy and Traffic Balance Aware for Different Types of Traffic in MANETs.
Wirel. Pers. Commun., 2015

Opportunistic routing with admission control in wireless ad hoc networks.
Comput. Commun., 2015

2014
Capacity Analysis in Multi-Radio Multi-Channel Cognitive Radio Networks: A Small World Perspective.
Wirel. Pers. Commun., 2014

A new image encryption scheme based on cyclic elliptic curve and chaotic system.
Multim. Tools Appl., 2014

Transport Protocols in Cognitive Radio Networks: A Survey.
KSII Trans. Internet Inf. Syst., 2014

GTR: A novel routing scheme based on game theory in opportunistic networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

CROR: Coding-aware opportunistic routing in multi-channel cognitive radio networks.
Proceedings of the IEEE Global Communications Conference, 2014

Joint channel assignment and opportunistic routing for maximizing throughput in cognitive radio networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces.
Signal Process., 2013

A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques.
J. Inf. Hiding Multim. Signal Process., 2013

2012
Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]
Signal Process., 2012

Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images.
Signal Process., 2012

A Novel Expression Deformation Model for 3D Face Recognition.
IEICE Trans. Inf. Syst., 2012

Saliency based SIFT keypoints filtration.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A new image encryption based on chaotic systems and singular value decomposition.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A novel secret image sharing scheme based on chaotic system.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

QoS guaranteed resource block allocation algorithm in LTE downlink.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

A MAC protocol based on dynamic time adjusting in wireless MIMO networks.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2007
Framework for Windows Password Function Security Enhancement.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007


  Loading...