Lili Sun

Orcid: 0000-0001-8541-8139

According to our database1, Lili Sun authored at least 75 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hybrid traffic security shaping scheme combining TAS and CQSF of time-sensitive networks in smart grid.
EURASIP J. Wirel. Commun. Netw., December, 2023

Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud.
IEEE Trans. Serv. Comput., 2023

Study on Credit Risk Control by Variational Inference.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Physical Layer Security Against Passive Eavesdropper in Digital Twin-Enabler Power Grid: An IRS-Assisted Approach.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

An ASN.1 UPER Encoding Based Fuzzing Method for Radio Resource Control Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2023

PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient and Privacy-Preserving Eclipse Query Over Encrypted Data.
Proceedings of the IEEE Global Communications Conference, 2023

Lightweight Multi-Role Recommendation System in TV live-streaming.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2023

A Framework for TLS Implementation Vulnerability Testing in 5G.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Temperature Compensation With Highly Integrated Ionization Sensor Array Used in Simultaneous Detection of Mixed Gases.
IEEE Trans. Ind. Electron., 2022

Unlocking the Potential of Deep Learning for Migratory Waterbirds Monitoring Using Surveillance Video.
Remote. Sens., 2022

A lightweight IoT firmware vulnerability detection scheme based on homology detection.
J. High Speed Networks, 2022

Research on the similarity between nodes with hypernymy/hyponymy relations based on IC and taxonomical structure.
Int. Arab J. Inf. Technol., 2022

KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
HOG-ESRs Face Emotion Recognition Algorithm Based on HOG Feature and ESRs Method.
Symmetry, 2021

Interpretable Variational Graph Autoencoder with Noninformative Prior.
Future Internet, 2021

Attributed network representation learning via improved graph attention with robust negative sampling.
Appl. Intell., 2021

Influence of HNB Product Packaging Health Warning Design on Risk Perception Based on Eye Tracking.
Proceedings of the Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. AI, Product and Service, 2021

Influence of the Color and Logo Position of HNB Products on User Experience Based on Eye Tracking.
Proceedings of the Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. AI, Product and Service, 2021

Cross-Cultural Research on Consumer Decision Making of HNB Product Modeling Based on Eye Tracking.
Proceedings of the Cross-Cultural Design. Experience and Product Design Across Cultures, 2021

2020
Study on a storage location strategy based on clustering and association algorithms.
Soft Comput., 2020

2019
面向燃气调压应用的RBF人工智能控制策略 (RBF Artificial Intelligence Control Strategy for Gas Pressure Regulating Application).
计算机科学, 2019

Finding an Optimum Set of Roles in a CPAC Model.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Service-Aware Resource Allocation Based on RAN Slicing for Smart Grid.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
Preserving Data Privacy and Security in Australian My Health Record System: A Quality Health Care Implication.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Research on Application of Logistics Service Quality Management Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Research on the Application of RFID Technology in Logistics Warehousing Management System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

User-Oriented Energy-Saving Offloading for Wireless Virtualization Aided Mobile Edge Computing.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2017
Exploring A Trust Based Recommendation Approach for Videos in Online Social Network.
J. Signal Process. Syst., 2017

The Channel Compressive Sensing Estimation for Power Line Based on OMP Algorithm.
J. Electr. Comput. Eng., 2017

Analysis on the Application of Dense Storage Technology in Logistics Based on the IoT.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Analysis on the Application of the Internet of Things Technology to Jingdong Mall's Supply Chain Management.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

The Electronic Commerce in the Era of Internet of Things and Big Data.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Research on, and Development of, Data Extraction and Data Cleaning Technology Based on the Internet of Things.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Protecting outsourced data in cloud computing through access management.
Concurr. Comput. Pract. Exp., 2016

Lower and upper bounds for the blow-up time for nonlinear wave equation with variable sources.
Comput. Math. Appl., 2016

Controlled assembly of nanosilver particles inside bacterial cell scaffold.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

2014
Access control management for e-Healthcare in cloud environment.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014

A lower bound for the blow-up time to a damped semilinear wave equation.
Appl. Math. Lett., 2014

Coefficients optimization in femtocell utility function for distributed utility-based SINR adaption algorithm.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

2013
Privacy Preserving Large-Scale Rating Data Publishing.
EAI Endorsed Trans. Scalable Inf. Syst., 2013

Octopus: efficient data intensive computing on virtualized datacenters.
Proceedings of the 6th Annual International Systems and Storage Conference, 2013

SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Role-based access control to outsourced data in could computing.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

2012
Half-Metallic Properties of Single-Walled Polymeric Manganese Phthalocyanine Nanotubes.
Sensors, 2012

Purpose Based Access Control for Privacy Protection in E-Healthcare Services.
J. Softw., 2012

A purpose-based access control in native XML databases.
Concurr. Comput. Pract. Exp., 2012

Semantic access control for cloud computing based on e-Healthcare.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
Access control and authorization for protecting disseminative information in E-learning workflow.
Concurr. Comput. Pract. Exp., 2011

Extended k-anonymity models against sensitive attribute disclosure.
Comput. Commun., 2011

Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A purpose based usage access control model for E-healthcare services.
Proceedings of the 2011 International Conference on Data and Knowledge Engineering, 2011

Design and Implementation of Multimedia Online Courseware Based on XML/XSLT and JavaScript.
Proceedings of the Information Computing and Applications, 2011

Extending Synchronization Constructs in OpenMP to Exploit Pipeline Parallelism on Heterogeneous Multi-core.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Cluster-Based Scheduling Algorithm for Periodic XML Data Broadcast in Wireless Environments.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Purpose-Based Access Control Policies and Conflicting Analysis.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Trust-Involved Access Control in Collaborative Open Social Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Purpose Based Access Control in XML Databases System.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Authorization Algorithms for Permission-Role Assignments.
J. Univers. Comput. Sci., 2009

Using Usage Control to Access XML Databases.
Int. J. Inf. Syst. Serv. Sect., 2009

An evidential reasoning approach to Sarbanes-Oxley mandated internal control risk assessment.
Int. J. Account. Inf. Syst., 2009

Extended K-Anonymity Models Against Attribute Disclosure.
Proceedings of the Third International Conference on Network and System Security, 2009

Privacy preserving on Radio Frequency Identification systems.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

2008
Searching for stable hept-C<sub>62</sub>X<sub>2</sub> (X = F, Cl, and Br): Structures and stabilities of heptagon-containing C<sub>62</sub> halogenated derivatives.
J. Comput. Chem., 2008

Distance optimization based coverage control algorithm in mobile sensor network.
Proceedings of the IEEE International Conference on Systems, 2008

XML and web services security.
Proceedings of the 12th International Conference on CSCW in Design, 2008

2007
Using Bayesian networks for bankruptcy prediction: Some methodological issues.
Eur. J. Oper. Res., 2007

Protecting Disseminative Information in E-Learning.
Proceedings of the Advances in Web Based Learning, 2007

2006
An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions.
J. Manag. Inf. Syst., 2006

2005
XML undeniable signatures.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Towards Secure XML Document with Usage Control.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Authorization Algorithms for the Mobility of User-Role Relationship.
Proceedings of the Computer Science 2005, 2005

2004
High-order open and closed loop iterative learning control scheme with initial state learning.
Proceedings of the 8th International Conference on Control, 2004

Anonymous Access Scheme for Electronic Services.
Proceedings of the Computer Science 2004, 2004


  Loading...