A privacy preserving communication protocol for IoT applications in smart homes T Song, R Li, B Mei, J Yu, X Xing, X Cheng IEEE Internet of Things Journal 4 (6), 1844-1852, 2017 | 368 | 2017 |
Blockchain for large-scale internet of things data storage and protection R Li, T Song, B Mei, H Li, X Cheng, L Sun IEEE Transactions on Services Computing 12 (5), 762-771, 2018 | 353 | 2018 |
IoT applications on secure smart shopping system R Li, T Song, N Capurso, J Yu, J Couture, X Cheng IEEE Internet of Things Journal 4 (6), 1945-1954, 2017 | 183 | 2017 |
Incentive mechanism design for joint resource allocation in blockchain-based federated learning Z Wang, Q Hu, R Li, M Xu, Z Xiong IEEE Transactions on Parallel and Distributed Systems 34 (5), 1536-1547, 2023 | 44 | 2023 |
Image and attribute based convolutional neural network inference attacks in social networks B Mei, Y Xiao, R Li, H Li, X Cheng, Y Sun IEEE Transactions on Network Science and Engineering 7 (2), 869-879, 2018 | 37 | 2018 |
Ultraviolet radiation measurement via smart devices B Mei, R Li, W Cheng, J Yu, X Cheng IEEE Internet of Things Journal 4 (4), 934-944, 2017 | 35 | 2017 |
A novel secure and efficient data aggregation scheme for IoT R Li, C Sturtivant, J Yu, X Cheng IEEE Internet of Things Journal 6 (2), 1551-1560, 2018 | 32 | 2018 |
BDRA: Blockchain and decentralized identifiers assisted secure registration and authentication for VANETs X Li, T Jing, R Li, H Li, X Wang, D Shen IEEE Internet of Things Journal 10 (14), 12140-12155, 2022 | 28 | 2022 |
Efficient CityCam-to-edge cooperative learning for vehicle counting in ITS H Xu, Z Cai, R Li, W Li IEEE Transactions on Intelligent Transportation Systems 23 (9), 16600-16611, 2022 | 25 | 2022 |
An overview of privacy preserving schemes for industrial Internet of Things Y Huo, C Meng, R Li, T Jing China Communications 17 (10), 1-18, 2020 | 23 | 2020 |
A cross-layer cooperative jamming scheme for social internet of things Y Huo, J Fan, Y Wen, R Li Tsinghua Science and Technology 26 (4), 523-535, 2021 | 22 | 2021 |
Efficient privacy-preserving schemes for dot-product computation in mobile computing C Hu, R Li, W Li, J Yu, Z Tian, R Bie Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, 51-59, 2016 | 21 | 2016 |
IoT applications on secure smart shopping R Li, T Song, N Capurso, J Yu, X Cheng 2016 International Conference on Identification, Information and Knowledge …, 2016 | 19 | 2016 |
Secure auctions without an auctioneer via verifiable secret sharing M Larson, C Hu, R Li, W Li, X Cheng Proceedings of the 2015 workshop on privacy-aware mobile computing, 1-6, 2015 | 19 | 2015 |
Secure multi‐unit sealed first‐price auction mechanisms W Li, M Larson, C Hu, R Li, X Cheng, R Bie Security and Communication Networks 9 (16), 3833-3843, 2016 | 18 | 2016 |
A bidder-oriented privacy-preserving vcg auction scheme M Larson, R Li, C Hu, W Li, X Cheng, R Bie Wireless Algorithms, Systems, and Applications: 10th International …, 2015 | 16 | 2015 |
Privacy-preserving combinatorial auction without an auctioneer C Hu, R Li, B Mei, W Li, A Alrawais, R Bie EURASIP Journal on Wireless Communications and Networking 2018, 1-8, 2018 | 13 | 2018 |
A privacy-preserving outsourcing computing scheme based on secure trusted environment Z Liu, C Hu, R Li, T Xiang, X Li, J Yu, H Xia IEEE Transactions on Cloud Computing 11 (3), 2325-2336, 2022 | 12 | 2022 |
Cryptographic algorithms for privacy-preserving online applications. R Li, Y Xiao, C Zhang, T Song, C Hu Math. Found. Comput. 1 (4), 311-330, 2018 | 12 | 2018 |
Perturbation-based private profile matching in social networks R Li, H Li, X Cheng, X Zhou, K Li, S Wang, R Bie IEEE Access 5, 19720-19732, 2017 | 11 | 2017 |