default search action
Xinghua Li 0001
Person information
- affiliation (PhD 2007): Xidian University, School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Xinghua Li — disambiguation page
- Xinghua Li 0002 — Wuhan University, School of Remote Sensing and Information Engineering, China
- Xinghua Li 0003 — Tianjin University, State Key Laboratory of Precision Measuring Technology and Instruments, China
- Xinghua Li 0004 — Zijin Mining Group Company Ltd., Daxing District, Beijing, China
- Xinghua Li 0005 — Ningxia Grid Information & Telecommunication Company, Yinchuan, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j106]Yuqian Ma, Wenbo Shi, Xinghua Li, Qingfeng Cheng:
Provable secure authentication key agreement for wireless body area networks. Frontiers Comput. Sci. 18(5): 185811 (2024) - [j105]Sen Wang, Zhongyuan Jiang, Xinghua Li, Jianfeng Ma:
MLDR: An O(|V|/4) and Near-Optimal Routing Scheme for LEO Mega-Constellations. IEEE Internet Things J. 11(10): 18663-18675 (2024) - [j104]Shuqin Liu, Yinbin Miao, Feng Li, Xinghua Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things. IEEE Internet Things J. 11(16): 27494-27508 (2024) - [j103]Yue Wang, Chao Yang, Ruidong Han, Xinghua Li, Jianfeng Ma:
Dvatar: Simulating the Binary Firmware of Drones. IEEE Internet Things J. 11(19): 30661-30675 (2024) - [j102]Xiaomin Wei, Cong Sun, Xinghua Li, Jianfeng Ma:
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio. J. Syst. Archit. 153: 103212 (2024) - [j101]Zhongyuan Jiang, Haibo Liu, Jing Li, Xinghua Li, Jianfeng Ma, Philip S. Yu:
Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk. Int. J. Mach. Learn. Cybern. 15(11): 4959-4971 (2024) - [j100]Haiyan Zhang, Xinghua Li, Jiawei Tang, Chunlei Peng, Yunwei Wang, Ning Zhang, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo:
Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders. IEEE Trans. Computers 73(10): 2405-2419 (2024) - [j99]Yinbin Miao, Feng Li, Xinghua Li, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. IEEE Trans. Dependable Secur. Comput. 21(4): 1845-1862 (2024) - [j98]Yinbin Miao, Ziteng Liu, Xinghua Li, Meng Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation. IEEE Trans. Dependable Secur. Comput. 21(4): 2361-2375 (2024) - [j97]Man Zhang, Xinghua Li, Yanbing Ren, Bin Luo, Yinbin Miao, Ximeng Liu, Robert H. Deng:
Privacy-Preserved Data Trading Via Verifiable Data Disturbance. IEEE Trans. Dependable Secur. Comput. 21(4): 3126-3140 (2024) - [j96]Guichuan Zhao, Qi Jiang, Ding Wang, Xindi Ma, Xinghua Li:
Deep Hashing Based Cancelable Multi-Biometric Template Protection. IEEE Trans. Dependable Secur. Comput. 21(4): 3751-3767 (2024) - [j95]Yinbin Miao, Rongpeng Xie, Xinghua Li, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient and Secure Federated Learning Against Backdoor Attacks. IEEE Trans. Dependable Secur. Comput. 21(5): 4619-4636 (2024) - [j94]Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage. IEEE Trans. Inf. Forensics Secur. 19: 2746-2760 (2024) - [j93]Qi Jiang, Guichuan Zhao, Xindi Ma, Meng Li, Youliang Tian, Xinghua Li:
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection. IEEE Trans. Inf. Forensics Secur. 19: 3593-3607 (2024) - [j92]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Wanyun Xu, Yanbing Ren, Robert H. Deng:
Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading. IEEE Trans. Inf. Forensics Secur. 19: 5545-5560 (2024) - [j91]Yinbin Miao, Xinru Yan, Xinghua Li, Shujiang Xu, Ximeng Liu, Hongwei Li, Robert H. Deng:
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack. IEEE Trans. Inf. Forensics Secur. 19: 5814-5827 (2024) - [j90]Yinbin Miao, Da Kuang, Xinghua Li, Shujiang Xu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings. IEEE Trans. Inf. Forensics Secur. 19: 5828-5841 (2024) - [j89]Zhe Chen, Haiyan Zhang, Xinghua Li, Yinbin Miao, Xiaohan Zhang, Man Zhang, Siqi Ma, Robert H. Deng:
FDFL: Fair and Discrepancy-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 8140-8154 (2024) - [j88]Yifan Zhang, Yinbin Miao, Xinghua Li, Linfeng Wei, Zhiquan Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing. IEEE Trans. Ind. Informatics 20(3): 3316-3326 (2024) - [j87]Yinbin Miao, Yutao Yang, Xinghua Li, Linfeng Wei, Zhiquan Liu, Robert H. Deng:
Efficient Privacy-Preserving Spatial Data Query in Cloud Computing. IEEE Trans. Knowl. Data Eng. 36(1): 122-136 (2024) - [j86]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Yanbing Ren, Siqi Ma:
PEAK: Privacy-Enhanced Incentive Mechanism for Distributed -Anonymity in LBS. IEEE Trans. Knowl. Data Eng. 36(2): 781-794 (2024) - [j85]Bin Luo, Xinghua Li, Ximeng Liu, Jingjing Guo, Yanbing Ren, Siqi Ma, Jianfeng Ma:
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing. IEEE Trans. Knowl. Data Eng. 36(3): 927-942 (2024) - [j84]Haiyan Zhang, Xinghua Li, Mengfan Xu, Ximeng Liu, Tong Wu, Jian Weng, Robert H. Deng:
BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective. IEEE Trans. Knowl. Data Eng. 36(11): 5661-5674 (2024) - [j83]Yinbin Miao, Feng Li, Xinghua Li, Zhiquan Liu, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud. IEEE Trans. Mob. Comput. 23(5): 3650-3665 (2024) - [j82]Zhe Ren, Xinghua Li, Yinbin Miao, Zhuowen Li, Zihao Wang, Mengyao Zhu, Ximeng Liu, Robert H. Deng:
Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning. IEEE Trans. Mob. Comput. 23(6): 6563-6578 (2024) - [j81]Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of Vehicles. IEEE Trans. Mob. Comput. 23(7): 7725-7738 (2024) - [j80]Xueyang Feng, Zhongyuan Jiang, Wei You, Jie Yang, Xinghua Li, Jian Feng Ma:
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture. IEEE Trans. Netw. Serv. Manag. 21(3): 3609-3622 (2024) - [j79]Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, Xinghua Li:
Interface-Based Side Channel in TEE-Assisted Networked Services. IEEE/ACM Trans. Netw. 32(1): 613-626 (2024) - [j78]Zihao Wang, Hang Wang, Zhuowen Li, Xinghua Li, Yinbin Miao, Yanbing Ren, Yunwei Wang, Zhe Ren, Robert H. Deng:
Robust Permissioned Blockchain Consensus for Unstable Communication in FANET. IEEE/ACM Trans. Netw. 32(1): 699-712 (2024) - [j77]Bin Luo, Xinghua Li, Yinbin Miao, Man Zhang, Ximeng Liu, Yanbing Ren, Xizhao Luo, Robert H. Deng:
PAM3S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS. IEEE/ACM Trans. Netw. 32(1): 729-744 (2024) - [j76]Sen Wang, Zhongyuan Jiang, Xinghua Li, Jianfeng Ma:
K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNs. IEEE/ACM Trans. Netw. 32(4): 3347-3360 (2024) - [j75]Man Zhang, Xinghua Li, Yinbin Miao, Bin Luo, Siqi Ma, Kim-Kwang Raymond Choo, Robert H. Deng:
Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS. IEEE Trans. Serv. Comput. 17(2): 589-603 (2024) - [j74]Yuqian Ma, Xinghua Li, Wenbo Shi, Qingfeng Cheng:
STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles. IEEE Trans. Veh. Technol. 73(4): 4830-4841 (2024) - [c23]Zhengjie Du, Yuekang Li, Yaowen Zheng, Xiaohan Zhang, Cen Zhang, Yi Liu, Sheikh Mahbub Habib, Xinghua Li, Linzhang Wang, Yang Liu, Bing Mao:
Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations. WWW 2024: 1668-1679 - [i2]Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng:
A Survey of Protocol Fuzzing. CoRR abs/2401.01568 (2024) - 2023
- [j73]Zhizhuang Jia, Chao Yang, Xiaoyun Zhao, Xinghua Li, Jian Feng Ma:
Design and implementation of an efficient container tag dynamic taint analysis. Comput. Secur. 135: 103528 (2023) - [j72]Mengfan Xu, Xinghua Li:
FedG2L: a privacy-preserving federated learning scheme base on "G2L" against poisoning attack. Connect. Sci. 35(1) (2023) - [j71]Hongyang Li, Xinghua Li, Qingfeng Cheng:
A fine-grained privacy protection data aggregation scheme for outsourcing smart grid. Frontiers Comput. Sci. 17(1) (2023) - [j70]Xinru Yan, Yinbin Miao, Xinghua Li, Kim-Kwang Raymond Choo, Xiangdong Meng, Robert H. Deng:
Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT. IEEE Internet Things J. 10(15): 13281-13291 (2023) - [j69]Peilei Xue, Xinghua Li, Zhongyuan Jiang, Bin Luo, Yinbin Miao, Ximeng Liu, Robert H. Deng:
A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction. IEEE Internet Things J. 10(23): 20899-20913 (2023) - [j68]Jingjing Guo, Zhiquan Liu, Siyi Tian, Feiran Huang, Jiaxing Li, Xinghua Li, Kostromitin Konstantin Igorevich, Jianfeng Ma:
TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks. IEEE J. Sel. Areas Commun. 41(11): 3548-3560 (2023) - [j67]Zhe Ren, Xinghua Li, Qi Jiang, Yunwei Wang, Jianfeng Ma, Chunyu Miao:
Network Slicing in 6G: An Authentication Framework for Unattended Terminals. IEEE Netw. 37(1): 78-86 (2023) - [j66]Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Siqi Ma, Jian Weng:
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network. IEEE Trans. Cloud Comput. 11(4): 3381-3395 (2023) - [j65]Yinbin Miao, Wei Zheng, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Secure Model-Contrastive Federated Learning With Improved Compressive Sensing. IEEE Trans. Inf. Forensics Secur. 18: 3430-3444 (2023) - [j64]Yinbin Miao, Yutao Yang, Xinghua Li, Zhiquan Liu, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 18: 3921-3933 (2023) - [j63]Jingjing Guo, Huamin Gao, Zhiquan Liu, Feiran Huang, Junwei Zhang, Xinghua Li, Jianfeng Ma:
ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 24(2): 2447-2460 (2023) - [j62]Tong Wu, Xinghua Li, Yinbin Miao, Mengfan Xu, Haiyan Zhang, Ximeng Liu, Kim-Kwang Raymond Choo:
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 24(3): 3528-3540 (2023) - [j61]Yinbin Miao, Yutao Yang, Xinghua Li, Kim-Kwang Raymond Choo, Xiangdong Meng, Robert H. Deng:
Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(12): 13603-13616 (2023) - [j60]Qiuyun Tong, Xinghua Li, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing. IEEE Trans. Knowl. Data Eng. 35(5): 5159-5172 (2023) - [j59]Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j58]Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng:
Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries. ACM Trans. Storage 19(4): 38:1-38:25 (2023) - [j57]Xinghua Li, Lizhong Bai, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing. IEEE Trans. Serv. Comput. 16(1): 504-514 (2023) - [j56]Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [j55]Yinbin Miao, Yueming Yu, Xinghua Li, Yu Guo, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Defending Against Membership Inference Attack by Shielding Membership Signals. IEEE Trans. Serv. Comput. 16(6): 4087-4101 (2023) - [j54]Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Yunwei Wang, Qiuyun Tong, Jianfeng Ma:
Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework. IEEE Trans. Serv. Comput. 16(6): 4591-4604 (2023) - [j53]Zhan Zhang, Xinghua Li, Yunwei Wang, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET. IEEE Trans. Veh. Technol. 72(11): 14987-15001 (2023) - [c22]Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan, Ning Zhang:
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. DSN 2023: 28-41 - [c21]Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib:
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation. USENIX Security Symposium 2023: 2867-2884 - 2022
- [j52]Ting Chen, Qingfeng Cheng, Xinghua Li:
An anonymous key agreement protocol with robust authentication for smart grid infrastructure. Sci. China Inf. Sci. 65(9): 1-3 (2022) - [j51]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyang Yan, Qun Zhang, Xinghua Li:
Detection of global positioning system spoofing attack on unmanned aerial vehicle system. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j50]Qingfeng Cheng, Ting Chen, Siqi Ma, Xinghua Li:
Improvement on a batch authenticated key agreement scheme. Frontiers Comput. Sci. 16(2): 162803 (2022) - [j49]Xinghua Li, Ting Chen, Qingfeng Cheng, Jian-Feng Ma:
An efficient and authenticated key establishment scheme based on fog computing for healthcare system. Frontiers Comput. Sci. 16(4): 164815 (2022) - [j48]Meixia Miao, Jiawei Li, Yunling Wang, Jianghong Wei, Xinghua Li:
Verifiable data streaming protocol supporting update history queries. Int. J. Intell. Syst. 37(12): 11342-11361 (2022) - [j47]Xinghua Li, Hengyou Zhang, Yinbin Miao, Siqi Ma, Jianfeng Ma, Ximeng Liu, Kim-Kwang Raymond Choo:
CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles. IEEE Internet Things J. 9(5): 3359-3371 (2022) - [j46]Bin Luo, Xinghua Li, Ximeng Liu, Yanbing Ren, Man Zhang, Jingjing Guo, Kim-Kwang Raymond Choo:
RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking. IEEE Internet Things J. 9(22): 23201-23214 (2022) - [j45]Qingfeng Cheng, Yuting Li, Wenbo Shi, Xinghua Li:
A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network. Mob. Networks Appl. 27(1): 346-356 (2022) - [j44]Hongyang Li, Qingfeng Cheng, Xinghua Li, Siqi Ma, Jianfeng Ma:
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing. IEEE Syst. J. 16(2): 1832-1841 (2022) - [j43]Yanbing Ren, Xinghua Li, Yinbin Miao, Bin Luo, Jian Weng, Kim-Kwang Raymond Choo, Robert H. Deng:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 17: 804-818 (2022) - [j42]Xiaohan Zhang, Xinghua Li, Yinbin Miao, Xizhao Luo, Yunwei Wang, Siqi Ma, Jian Weng:
A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT. IEEE Trans. Ind. Informatics 18(7): 4456-4465 (2022) - [j41]Jingjing Guo, Haiyang Li, Feiran Huang, Zhiquan Liu, Yanguo Peng, Xinghua Li, Jianfeng Ma, Varun G. Menon, Konstantin Kostromitin Igorevich:
ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning. IEEE Trans. Ind. Informatics 18(10): 6526-6536 (2022) - [j40]Yunwei Wang, Xinghua Li, Xiaohan Zhang, Ximeng Liu, Jian Weng:
ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs. IEEE Trans. Intell. Transp. Syst. 23(9): 16558-16575 (2022) - [c20]Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li:
Handle the Traces: Revisiting the Attack on ECDSA with EHNP. ACISP 2022: 147-167 - [c19]Yinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. ACSAC 2022: 159-170 - [c18]Mengfan Xu, Xinghua Li:
FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme. CSS 2022: 244-258 - [c17]Jinzheng Cao, Qingfeng Cheng, Xinghua Li, Yanbin Pan:
BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices. ICICS 2022: 3-18 - [c16]Mengfan Xu, Xinghua Li:
FedBC: An Efficient and Privacy-Preserving Federated Consensus Scheme. SocialSec 2022: 148-162 - 2021
- [j39]Ting Chen, Xinghua Li, Qingfeng Cheng:
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. Sci. China Inf. Sci. 64(9) (2021) - [j38]Dawei Wei, Jianfeng Ma, Linbo Luo, Yunbo Wang, Lei He, Xinghua Li:
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach. Comput. Networks 199: 108439 (2021) - [j37]Mengfan Xu, Xinghua Li, Yunwei Wang, Bin Luo, Jingjing Guo:
Privacy-preserving multisource transfer learning in intrusion detection system. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j36]Xinghua Li, Ting Chen, Qingfeng Cheng, Siqi Ma, Jianfeng Ma:
Smart Applications in Edge Computing: Overview on Authentication and Data Security. IEEE Internet Things J. 8(6): 4063-4080 (2021) - [j35]Xinghua Li, Zhongyuan Hu, Mengfan Xu, Yunwei Wang, Jianfeng Ma:
Transfer learning based intrusion detection scheme for Internet of vehicles. Inf. Sci. 547: 119-135 (2021) - [j34]Zhe Ren, Xinghua Li, Qi Jiang, Qingfeng Cheng, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. Secur. Commun. Networks 2021: 6694058:1-6694058:19 (2021) - [j33]Yuting Li, Qingfeng Cheng, Ximeng Liu, Xinghua Li:
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing. IEEE Syst. J. 15(1): 935-946 (2021) - [j32]Xinghua Li, Mengyao Zhu, Laurence T. Yang, Mengfan Xu, Zhuo Ma, Cheng Zhong, Hui Li, Yang Xiang:
Sustainable Ensemble Learning Driving Intrusion Detection Model. IEEE Trans. Dependable Secur. Comput. 18(4): 1591-1604 (2021) - [j31]Xinghua Li, Yanbing Ren, Laurence T. Yang, Ning Zhang, Bin Luo, Jian Weng, Ximeng Liu:
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. IEEE Trans. Netw. Sci. Eng. 8(3): 2073-2086 (2021) - [j30]Xinghua Li, Jiao Liu, Mohammad S. Obaidat, Pandi Vijayakumar, Qi Jiang, Ruhul Amin:
An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs. IEEE Trans. Veh. Technol. 70(8): 7992-8006 (2021) - 2020
- [j29]Jingjing Guo, Xinghua Li, Zhiquan Liu, Jianfeng Ma, Chao Yang, Junwei Zhang, Dapeng Wu:
TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 7(7): 6647-6662 (2020) - [j28]Xinghua Li, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo, Jian Weng, Jianfeng Ma, Xiaoming Huang:
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 7(12): 11789-11802 (2020) - [j27]Yuting Li, Qingfeng Cheng, Xinghua Li:
Analysis and improvement of a key exchange and authentication protocol in client-server environment. J. Ambient Intell. Humaniz. Comput. 11(9): 3787-3799 (2020) - [j26]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang:
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. IEEE Trans. Serv. Comput. 13(6): 985-998 (2020) - [j25]Bin Luo, Xinghua Li, Jian Weng, Jingjing Guo, Jianfeng Ma:
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET. IEEE Trans. Veh. Technol. 69(2): 2034-2048 (2020) - [j24]Xinghua Li, Mengfan Xu, Pandi Vijayakumar, Neeraj Kumar, Ximeng Liu:
Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things. IEEE Trans. Veh. Technol. 69(8): 8820-8831 (2020) - [c15]Jiao Liu, Xinghua Li, Qi Jiang, Mohammad S. Obaidat, Pandi Vijayakumar:
BUA: A Blockchain-based Unlinkable Authentication in VANETs. ICC 2020: 1-6
2010 – 2019
- 2019
- [j23]Qingsong Yao, Jianfeng Ma, Rui Li, Xinghua Li, Jinku Li, Jiao Liu:
Energy-Aware RFID Authentication in Edge Computing. IEEE Access 7: 77964-77980 (2019) - [j22]Zhuo Ma, Tian Zhang, Ximeng Liu, Xinghua Li, Kui Ren:
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory. IEEE Trans. Veh. Technol. 68(8): 8091-8102 (2019) - [j21]Xinghua Li, Yunwei Wang, Pandi Vijayakumar, Debiao He, Neeraj Kumar, Jianfeng Ma:
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network. IEEE Trans. Veh. Technol. 68(11): 11309-11322 (2019) - [c14]Mengfan Xu, Xinghua Li, Jianfeng Ma, Cheng Zhong, Weidong Yang:
Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network. ICC 2019: 1-6 - [c13]Qin Qiao, Xinghua Li, Yunwei Wang, Bin Luo, Yanbing Ren, Jianfeng Ma:
Credible Routing Scheme of SDN-Based Cloud Using Blockchain. ICPCSEE (1) 2019: 189-206 - [c12]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyan Yan, Qun Zhang, Xinghua Li, Teng Li:
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. ML4CS 2019: 123-139 - 2018
- [j20]Jingjing Guo, Jianfeng Ma, Xinghua Li, Tao Zhang, Zhiquan Liu:
A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication. IEEE Access 6: 4375-4386 (2018) - [j19]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Zhiquan Liu, Hui Li:
Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing. IEEE Internet Things J. 5(4): 3008-3018 (2018) - [j18]Jingjing Guo, Jianfeng Ma, Xinxin Guo, Xinghua Li, Junwei Zhang, Tao Zhang:
Trust-based service composition and selection in service oriented architecture. Peer-to-Peer Netw. Appl. 11(5): 862-880 (2018) - [j17]Li Yang, Yafeng Qiao, Zhihong Liu, Jianfeng Ma, Xinghua Li:
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm. Soft Comput. 22(2): 453-464 (2018) - 2017
- [j16]Xinghua Li, Jiajia Liu, Qingsong Yao, Jianfeng Ma:
Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks. IEEE Access 5: 5281-5291 (2017) - [j15]Hai Liu, Xinghua Li, Jianfeng Ma, Mengfan Xu, Jingjing Guo:
Reconstruction methodology for rational secret sharing based on mechanism design. Sci. China Inf. Sci. 60(8): 088101:1-088101:3 (2017) - [j14]Hai Liu, Xinghua Li, Mengfan Xu, Ruo Mo, Jianfeng Ma:
A fair data access control towards rational users in cloud storage. Inf. Sci. 418: 258-271 (2017) - [j13]Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang:
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. J. Inf. Sci. Eng. 33(4): 1007-1023 (2017) - [j12]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme with CS E-Ticket. Secur. Commun. Networks 2017: 4796373:1-4796373:9 (2017) - [j11]Xinghua Li, Meixia Miao, Hai Liu, Jianfeng Ma, Kuan-Ching Li:
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. 21(14): 3907-3917 (2017) - [c11]Hai Liu, Xinghua Li, Hui Li, Jianfeng Ma, XinDi Ma:
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. INFOCOM 2017: 1-9 - 2016
- [j10]Xinghua Li, Ermeng Wang, Weidong Yang, Jianfeng Ma:
DALP: A demand-aware location privacy protection scheme in continuous location-based services. Concurr. Comput. Pract. Exp. 28(4): 1219-1236 (2016) - [c10]Qingsong Yao, Jianfeng Ma, Cong Sun, Xinghua Li, Jinku Li:
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags. MSCC@MobiHoc 2016: 23-28 - [c9]Kai Fan, Panfei Song, Zhao Du, Haojin Zhu, Hui Li, Yintang Yang, Xinghua Li, Chao Yang:
NFC Secure Payment and Verification Scheme for Mobile Payment. WASA 2016: 116-125 - 2015
- [j9]Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li:
Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28(2): 383-393 (2015) - [j8]Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li:
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. Int. J. Embed. Syst. 7(3/4): 257-265 (2015) - [c8]Xinghua Li, Hai Liu, Fushan Wei, Jianfeng Ma, Weidong Yang:
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks. GLOBECOM 2015: 1-6 - 2014
- [j7]Sheng Gao, Jianfeng Ma, Cong Sun, Xinghua Li:
Balancing trajectory privacy and data utility using a personalized anonymization model. J. Netw. Comput. Appl. 38: 125-134 (2014) - [j6]Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma:
FLAP: An Efficient WLAN Initial Access Authentication Protocol. IEEE Trans. Parallel Distributed Syst. 25(2): 488-497 (2014) - [c7]Xinghua Li, Lingjuan Deng, Sheng Gao, Jianfeng Ma, Qingsong Yao:
A demand-aware location privacy protection scheme in continuous location-based services. ICCVE 2014: 112-117 - 2013
- [j5]Xinghua Li, Xiang Lu, Jianfeng Ma:
An Engine for Automatic Code Generation of Security Protocols in Multiple Languages. Smart Comput. Rev. 3(3): 174-189 (2013) - 2012
- [c6]Xinghua Li, Jianfeng Ma, Yulong Shen:
An efficient WLAN initial access authentication protocol. GLOBECOM 2012: 1035-1040 - 2011
- [j4]Xinghua Li, Jianfeng Ma, YoungHo Park, Li Xu:
A USIM-Based Uniform Access Authentication Framework in Mobile Communication. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j3]Xinghua Li, Xiang Lu, Jianfeng Ma, Zhenfang Zhu, Li Xu, YoungHo Park:
Authentications and Key Management in 3G-WLAN Interworking. Mob. Networks Appl. 16(3): 394-407 (2011) - [c5]Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma:
Analysis of the Authentication Protocols Based on Game Theory. CIS 2011: 788-792 - 2010
- [j2]Zhuo Ma, Jianfeng Ma, Sang-Jae Moon, Xinghua Li:
An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment. IEICE Trans. Inf. Syst. 93-D(3): 430-437 (2010)
2000 – 2009
- 2009
- [c4]Yulong Shen, Qingqi Pei, Xinghua Li, Hailin Feng, Jianfeng Ma:
The Development Mode of Trust E-commerce Services. ICEBE 2009: 181-187 - [i1]Tao Feng, Xian Guo, Jianfeng Ma, Xinghua Li:
UC-Secure Source Routing Protocol. IACR Cryptol. ePrint Arch. 2009: 85 (2009) - 2007
- [c3]Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. NPC 2007: 306-314 - 2006
- [c2]Xinghua Li, Sang-Jae Moon, Jianfeng Ma:
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. ACNS 2006: 340-348 - 2005
- [j1]Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
Security extension for the Canetti-Krawczyk model in identity-based systems. Sci. China Ser. F Inf. Sci. 48(1): 117-124 (2005) - [c1]Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model. CIS (2) 2005: 356-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint