Qi Li

Orcid: 0000-0002-7280-7378

Affiliations:
  • Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China
  • Xidian University, School of Computer Science and Technology, Xi'an, China (PhD 2014)


According to our database1, Qi Li authored at least 52 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024

2023
Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing.
IEEE Internet Things J., October, 2023

Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023

2022
An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications.
IEEE Trans. Veh. Technol., 2022

Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2022

Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022

OKV: Optimized Key-Value Data Collection with Local Differential Privacy.
Proceedings of the International Conference on Networking and Network Applications, 2022

Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Provable Data Possession with Outsourced Data Transfer.
IEEE Trans. Serv. Comput., 2021

Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing.
Secur. Commun. Networks, 2021

Computation-transferable authenticated key agreement protocol for smart healthcare.
J. Syst. Archit., 2021

A lightweight privacy protection scheme based on user preference in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021

Attribute-based Encryption for Cloud Computing Access Control: A Survey.
ACM Comput. Surv., 2021

2020
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.
Secur. Commun. Networks, 2020

Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.
IEEE Access, 2020

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth.
IEEE Access, 2020

2019
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet Things J., 2019

Fine-grained multi-authority access control in IoT-enabled mHealth.
Ann. des Télécommunications, 2019

Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019

A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud.
Wirel. Commun. Mob. Comput., 2018

A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud.
IEEE Access, 2018

Robust and Scalable Data Access Control in D2D Communications.
IEEE Access, 2018

D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018

A Novel Data Secure Deletion Scheme for Mobile Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Multi-authority attribute-based access control scheme in mHealth cloud with unbounded attribute universe and decryption outsourcing.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Reputation Propagation for Web Service Composition: A Shapley Value Approach.
Proceedings of the International Conference on Networking and Network Applications, 2017

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016

2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mob. Inf. Syst., 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014

Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci., 2014

2013
Access control requirements for structured document in cloud computing.
Int. J. Grid Util. Comput., 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013


  Loading...