Li Xu
According to our database1,
Li Xu
authored at least 120 papers
between 2006 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepage:
-
at orcid.org
On csauthors.net:
Bibliography
2019
On exploiting priority relation graph for reliable multi-path communication in mobile social networks.
Inf. Sci., 2019
Minimum Neighborhood of Alternating Group Graphs.
IEEE Access, 2019
2018
Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Vehicular Technology, 2018
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme.
IEEE Trans. Information Forensics and Security, 2018
The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs.
IEEE Trans. Dependable Sec. Comput., 2018
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Social Systems, 2018
The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model.
J. Comput. Syst. Sci., 2018
Identity-based non-repudiable dynamic provable data possession in cloud storage.
Computers & Electrical Engineering, 2018
2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wireless Personal Communications, 2017
Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embedded Comput. Syst., 2017
Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Scientific Programming, 2017
Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017
Self-adaptive trust management based on game theory in fuzzy large-scale networks.
Soft Comput., 2017
Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks.
J. Network and Computer Applications, 2017
Strongly Secure Certificateless Signature Scheme in the Standard Model with Resisting Malicious-But-Passive KGC Attack Ability.
J. Inf. Sci. Eng., 2017
A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017
An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Computer Communications, 2017
Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Applied Mathematics and Computation, 2017
2016
The Extra Connectivity, Extra Conditional Diagnosability, and t/m-Diagnosability of Arrangement Graphs.
IEEE Trans. Reliability, 2016
The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks.
IEEE Trans. Parallel Distrib. Syst., 2016
Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model.
Theor. Comput. Sci., 2016
The t/k-Diagnosability for Regular Networks.
IEEE Trans. Computers, 2016
Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks.
Sensors, 2016
Trustworthiness-hypercube-based reliable communication in mobile social networks.
Inf. Sci., 2016
Evolutionarily stable opportunistic spectrum access in cognitive radio networks.
IET Communications, 2016
Secure routing and resource allocation based on game theory in cooperative cognitive radio networks.
Concurrency and Computation: Practice and Experience, 2016
Worm propagation model in mobile network.
Concurrency and Computation: Practice and Experience, 2016
Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016
A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016
2015
The Reliability of Subgraphs in the Arrangement Graph.
IEEE Trans. Reliability, 2015
The Extra Connectivity and Conditional Diagnosability of Alternating Group Networks.
IEEE Trans. Parallel Distrib. Syst., 2015
A novel sleep scheduling scheme in green wireless sensor networks.
The Journal of Supercomputing, 2015
Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommunication Systems, 2015
Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model.
Theor. Comput. Sci., 2015
The t/k-Diagnosability of Star Graph Networks.
IEEE Trans. Computers, 2015
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks.
J. UCS, 2015
Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015
Batch public auditing for distributed mobile cloud computing.
IJHPCN, 2015
Cooperative attribute-based access control for enterprise computing system.
IJES, 2015
Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks.
IJDSN, 2015
Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks.
IJDSN, 2015
Collecting all data continuously in wireless sensor networks with a mobile base station.
IJCSE, 2015
Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model.
Int. J. Comput. Math., 2015
Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
IJAHUC, 2015
A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Generation Comp. Syst., 2015
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015
An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Applied Mathematics and Computer Science, 2015
A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015
A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model".
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Localization for Jamming Attack in Wireless Sensor Networks.
Proceedings of the Intelligent Data Analysis and Applications, 2015
An AGV Mechanism Based Secure Routing Protocol for Internet of Things.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wireless Personal Communications, 2014
Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014
Distributed Separate Coding for Continuous Data Collection in Wireless Sensor Networks.
TOSN, 2014
Conditional diagnosability of arrangement graphs under the PMC model.
Theor. Comput. Sci., 2014
Anomaly diagnosis based on regression and classification analysis of statistical traffic features.
Security and Communication Networks, 2014
A local joint fast handoff scheme in cognitive wireless mesh networks.
Security and Communication Networks, 2014
Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism.
J. Applied Mathematics, 2014
A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intelligence and Humanized Computing, 2014
Matrix-based pairwise key establishment for wireless mesh networks.
Future Generation Comp. Syst., 2014
Security of new generation computing systems.
Concurrency and Computation: Practice and Experience, 2014
Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurrency and Computation: Practice and Experience, 2014
Ticket-based handoff authentication for wireless mesh networks.
Computer Networks, 2014
GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014
Identity-Based Transitive Signcryption.
Proceedings of the Network and System Security - 8th International Conference, 2014
A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014
A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
The Social Feature-Based Priority Relation Graph of Mobile Social Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerging Topics Comput., 2013
How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013
A Supermodular Game Framework for Power Control of Wireless Sensor Networks.
IJDSN, 2013
An efficient self-diagnosis protocol for hierarchical wireless mesh networks.
Concurrency and Computation: Practice and Experience, 2013
Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.
Concurrency and Computation: Practice and Experience, 2013
Software Service Signature (S3) for authentication in cloud computing.
Cluster Computing, 2013
Data dynamics for remote data possession checking in cloud storage.
Computers & Electrical Engineering, 2013
Group Data Collection in wireless sensor networks with a mobile base station.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013
Congestion Control Based on Cross-Layer Game Optimization in Wireless Mesh Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Constructing Connected Dominating Set Based on Crossed Cube in WSN.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
A Secure Cloud Storage System from Threshold Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Attribute-Based Signatures with Efficient Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013
2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012
A Novel Data Collection Scheme for WSNs.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012
Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Role Based Privacy-Aware Secure Routing in WMNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Multi-objective Optimization Based Virtual Resource Allocation Strategy for Cloud Computing.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012
2011
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game.
Computers & Mathematics with Applications, 2011
A study of subdividing hexagon-clustered WSN for power saving: Analysis and simulation.
Ad Hoc Networks, 2011
2010
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
IJSN, 2010
QoS analysis of medium access control in LR-WPANs under bursty error channels.
Future Generation Comp. Syst., 2010
How to Construct a Divisible Online/Offline Signature.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
RFID System Security Using Identity-Based Cryptography.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Service Price Discrimination in Wireless Network.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010
2009
QoS Performance Analysis of IEEE 802.15.4 MAC in LR-WPAN with Bursty Error Channels.
Proceedings of the MSN 2009, 2009
2008
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks.
JCM, 2008
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network.
JCM, 2008
A New Security Mechanism Based on SIP in Wireless LAN-3G Integration.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007
Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007
A new group rekeying scheme based on t-packing designs for ad hoc networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network.
Proceedings of the Advances in Grid and Pervasive Computing, 2006
Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Anti-Collusion Anonymous Credentials Scheme.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006