Li Lin

Orcid: 0000-0002-3097-4995

Affiliations:
  • Beijing University of Technology, College of Computer Science, Key Laboratory of Trusted Computing, Beijing, China
  • National Engineering Laboratory for Classified Information Security Protection, Beijing, China
  • Beihang University, Institute of Advanced Computing Technology, Beijing, China (PhD 2009)


According to our database1, Li Lin authored at least 16 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PPVerifier: A Privacy-Preserving and Verifiable Federated Learning Method in Cloud-Edge Collaborative Computing Environment.
IEEE Internet Things J., May, 2023

2021
BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2018
PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments.
IEEE Access, 2018

Whether Android Applications Broadcast Your Private information: A Naive Bayesian-based Analysis Approach (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

2016
TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments.
Int. J. Grid High Perform. Comput., 2016

PQsel: combining privacy with quality of service in cloud service selection.
Int. J. Big Data Intell., 2016

Packet: a privacy-aware access control policy composition method for services composition in cloud environments.
Frontiers Comput. Sci., 2016

Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2014
A privacy-aware cloud service selection method toward data life-cycle.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2009
QGrid: An Adaptive Trust Aware Resource Management Framework.
IEEE Syst. J., 2009

A negotiation-based trust establishment service for CROWN grid.
Int. J. Auton. Adapt. Commun. Syst., 2009

2008
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Balancing Trust and Incentive in Peer-to-Peer Collaborative System.
Int. J. Netw. Secur., 2007

Sustaining Incentive in Grid Resource Allocation: A Reinforcement Learning Approach.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
A Framework to Provide Trust and Incentive in CROWN Grid for Dynamic Resource Management.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006


  Loading...