Li Xu

According to our database1, Li Xu authored at least 113 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme.
IEEE Trans. Information Forensics and Security, 2018

The g-Good-Neighbor Conditional Diagnosability of Arrangement Graphs.
IEEE Trans. Dependable Sec. Comput., 2018

The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model.
J. Comput. Syst. Sci., 2018

2017
Network Coding Based Converge-Cast Scheme in Wireless Sensor Networks.
Wireless Personal Communications, 2017

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design.
ACM Trans. Embedded Comput. Syst., 2017

Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Scientific Programming, 2017

Uncertain random spectra: a new metric for assessing the survivability of mobile wireless sensor networks.
Soft Comput., 2017

Self-adaptive trust management based on game theory in fuzzy large-scale networks.
Soft Comput., 2017

Crossed Cube Ring: A k-connected virtual backbone for wireless sensor networks.
J. Network and Computer Applications, 2017

A new universal designated verifier transitive signature scheme for big graph data.
J. Comput. Syst. Sci., 2017

Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017

An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Computer Communications, 2017

Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Applied Mathematics and Computation, 2017

2016
The Extra Connectivity, Extra Conditional Diagnosability, and t/m-Diagnosability of Arrangement Graphs.
IEEE Trans. Reliability, 2016

The Extra, Restricted Connectivity and Conditional Diagnosability of Split-Star Networks.
IEEE Trans. Parallel Distrib. Syst., 2016

Relating the extra connectivity and the conditional diagnosability of regular graphs under the comparison model.
Theor. Comput. Sci., 2016

The t/k-Diagnosability for Regular Networks.
IEEE Trans. Computers, 2016

Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks.
Sensors, 2016

Trustworthiness-hypercube-based reliable communication in mobile social networks.
Inf. Sci., 2016

Evolutionarily stable opportunistic spectrum access in cognitive radio networks.
IET Communications, 2016

Secure routing and resource allocation based on game theory in cooperative cognitive radio networks.
Concurrency and Computation: Practice and Experience, 2016

Worm propagation model in mobile network.
Concurrency and Computation: Practice and Experience, 2016

Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

2015
The Reliability of Subgraphs in the Arrangement Graph.
IEEE Trans. Reliability, 2015

The Extra Connectivity and Conditional Diagnosability of Alternating Group Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

A novel sleep scheduling scheme in green wireless sensor networks.
The Journal of Supercomputing, 2015

Cross-layer design in wireless multi-hop networks: a bargaining game theoretic analysis.
Telecommunication Systems, 2015

Conditional diagnosability and strong diagnosability of Split-Star Networks under the PMC model.
Theor. Comput. Sci., 2015

The t/k-Diagnosability of Star Graph Networks.
IEEE Trans. Computers, 2015

Cost-Effective Authentic and Anonymous Data Sharing with Forward Security.
IEEE Trans. Computers, 2015

A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks.
J. UCS, 2015

Universal designated verifier transitive signatures for graph-based big data.
Inf. Sci., 2015

Batch public auditing for distributed mobile cloud computing.
IJHPCN, 2015

Cooperative attribute-based access control for enterprise computing system.
IJES, 2015

Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks.
IJDSN, 2015

Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks.
IJDSN, 2015

Collecting all data continuously in wireless sensor networks with a mobile base station.
IJCSE, 2015

Conditional diagnosability and strong diagnosability of shuffle-cubes under the comparison model.
Int. J. Comput. Math., 2015

Matrix-based key pre-distribution schemes in WMNs using pre and post deployment knowledge.
IJAHUC, 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Generation Comp. Syst., 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

An Efficient Connected Dominating Set Algorithm in WSNS Based on the Induced Tree of the Crossed Cube.
Applied Mathematics and Computer Science, 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

A Novel Sleep Scheduling Algorithm for Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Localization for Jamming Attack in Wireless Sensor Networks.
Proceedings of the Intelligent Data Analysis and Applications, 2015

An AGV Mechanism Based Secure Routing Protocol for Internet of Things.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wireless Personal Communications, 2014

Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Distributed Separate Coding for Continuous Data Collection in Wireless Sensor Networks.
TOSN, 2014

Conditional diagnosability of arrangement graphs under the PMC model.
Theor. Comput. Sci., 2014

Anomaly diagnosis based on regression and classification analysis of statistical traffic features.
Security and Communication Networks, 2014

A local joint fast handoff scheme in cognitive wireless mesh networks.
Security and Communication Networks, 2014

Dynamics stability in wireless sensor networks active defense model.
J. Comput. Syst. Sci., 2014

Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism.
J. Applied Mathematics, 2014

A secure remote data integrity checking cloud storage system from threshold encryption.
J. Ambient Intelligence and Humanized Computing, 2014

Matrix-based pairwise key establishment for wireless mesh networks.
Future Generation Comp. Syst., 2014

Security of new generation computing systems.
Concurrency and Computation: Practice and Experience, 2014

Optimizing wireless unicast and multicast sensor networks on the basis of evolutionary game theory.
Concurrency and Computation: Practice and Experience, 2014

Ticket-based handoff authentication for wireless mesh networks.
Computer Networks, 2014

GO-ABE: Group-Oriented Attribute-Based Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

Identity-Based Transitive Signcryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks.
Proceedings of the Computer Security - ESORICS 2014, 2014

A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

The Social Feature-Based Priority Relation Graph of Mobile Social Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
A Matrix-Based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge.
IEEE Trans. Emerging Topics Comput., 2013

How to achieve non-repudiation of origin with privacy protection in cloud computing.
J. Comput. Syst. Sci., 2013

A Supermodular Game Framework for Power Control of Wireless Sensor Networks.
IJDSN, 2013

An efficient self-diagnosis protocol for hierarchical wireless mesh networks.
Concurrency and Computation: Practice and Experience, 2013

Analysis of the MAC protocol in low rate wireless personal area networks with bursty ON-OFF traffic.
Concurrency and Computation: Practice and Experience, 2013

Software Service Signature (S3) for authentication in cloud computing.
Cluster Computing, 2013

Data dynamics for remote data possession checking in cloud storage.
Computers & Electrical Engineering, 2013

Group Data Collection in wireless sensor networks with a mobile base station.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Congestion Control Based on Cross-Layer Game Optimization in Wireless Mesh Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Dynamic Opportunistic Spectrum Access of Multi-channel Multi-radio Based on Game Theory in Wireless Cognitive Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Constructing Connected Dominating Set Based on Crossed Cube in WSN.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Cloud Storage System from Threshold Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Attribute-Based Signatures with Efficient Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Matrix-Based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge.
Proceedings of IEEE International Conference on Communications, 2013

2012
A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption.
Comput. J., 2012

A Novel Data Collection Scheme for WSNs.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic Analysis.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Role Based Privacy-Aware Secure Routing in WMNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Identity-Based Proxy Signature for Cloud Service in SaaS.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Multi-objective Optimization Based Virtual Resource Allocation Strategy for Cloud Computing.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Incentive mechanism for selfish nodes in wireless sensor networks based on evolutionary game.
Computers & Mathematics with Applications, 2011

A study of subdividing hexagon-clustered WSN for power saving: Analysis and simulation.
Ad Hoc Networks, 2011

2010
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks.
IJSN, 2010

QoS analysis of medium access control in LR-WPANs under bursty error channels.
Future Generation Comp. Syst., 2010

How to Construct a Divisible Online/Offline Signature.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

RFID System Security Using Identity-Based Cryptography.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Service Price Discrimination in Wireless Network.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

2009
QoS Performance Analysis of IEEE 802.15.4 MAC in LR-WPAN with Bursty Error Channels.
Proceedings of the MSN 2009, 2009

2008
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks.
JCM, 2008

Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network.
JCM, 2008

A New Security Mechanism Based on SIP in Wireless LAN-3G Integration.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

On the Security of WAI Protocol in the Third Version of WAPI.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Hierarchical Identity-Based Online/Offline Encryption.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Private Key Management in Hierarchical Identity-Based Encryption.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Identity Based Private Matching.
Proceedings of the Third International Workshop on Security, 2007

Routing Protocols Based on Double Auction for Ad Hoc Networks.
Proceedings of the International Conference on Networking, 2007

A new group rekeying scheme based on t-packing designs for ad hoc networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Multi-Identity Single-Key Decryption without Random Oracles.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
A Coloring Based Backbone Construction Algorithm in Wireless Ad Hoc Network.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Secure and Efficient Trust Negotiation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Anti-Collusion Anonymous Credentials Scheme.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006


  Loading...