Xuran Li

Orcid: 0000-0002-2658-6113

According to our database1, Xuran Li authored at least 30 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy and Security in Ubiquitous Integrated Sensing and Communication: Threats, Challenges and Future Directions.
IEEE Internet Things Mag., 2024

Stackelberg game-based task offloading in mobile edge computing-enabled hierarchical multi-coalition unmanned aerial vehicle networks.
Int. J. Commun. Syst., 2024

The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness.
CoRR, 2024

An outlier detection based two-stage EEG artifact removal method using empirical wavelet transform and canonical correlation analysis.
Biomed. Signal Process. Control., 2024

2023
On the Performance Trade-Off of Distributed Integrated Sensing and Communication Networks.
IEEE Wirel. Commun. Lett., December, 2023

Digital Twins Based Intelligent State Prediction Method for Maneuvering-Target Tracking.
IEEE J. Sel. Areas Commun., November, 2023

RobustFair: Adversarial Evaluation through Fairness Confusion Directed Gradient Search.
CoRR, 2023

Accurate Fairness: Improving Individual Fairness without Trading Accuracy.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Hyperspectral Reflectance Characteristics of Rice Canopies under Changes in Diffuse Radiation Fraction.
Remote. Sens., 2022

Infectious Probability Analysis on COVID-19 Spreading With Wireless Edge Networks.
IEEE J. Sel. Areas Commun., 2022

Adversarial Input Detection Based on Critical Transformation Robustness.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic?
Pervasive Mob. Comput., 2021

Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communications.
Comput. Stand. Interfaces, 2021

Coverage Analysis of Blockchain-enabled Wireless IoMT Networks.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
Artificial noise aided scheme to secure UAV-assisted Internet of Things with wireless power transfer.
Comput. Commun., 2020

Securing Internet of Medical Things with Friendly-jamming schemes.
Comput. Commun., 2020

2018
A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.
Sensors, 2018

When Friendly Jamming Meets Wireless Energy Transfer.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Friendly-Jamming: An anti-eavesdropping scheme in wireless networks.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

AE-shelter: An novel anti-eavesdropping scheme in wireless networks.
Proceedings of the IEEE International Conference on Communications, 2017

2016
On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks.
Sensors, 2016

On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.
Sensors, 2016

An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things.
Mob. Inf. Syst., 2016

On analyzing eavesdropping behaviours in underwater acoustic sensor networks.
Proceedings of the 11th ACM International Conference on Underwater Networks & Systems, 2016

Friendly-Jamming: An Anti-Eavesdropping Scheme in Wireless Networks of Things.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

On Eavesdropping Attacks in Wireless Networks.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2015
On modeling eavesdropping attacks in wireless networks.
J. Comput. Sci., 2015

Local connectivity of wireless networks with directional antennas.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Eavesdropping attacks in underwater acoustic networks.
Proceedings of the 10th International Conference on Information, 2015

2014
An analytical model on eavesdropping attacks in wireless networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014


  Loading...