关注
Hongjuan Li
标题
引用次数
引用次数
年份
Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks
H Li, K Lin, K Li
Computer Communications 34 (4), 591-597, 2011
1892011
Body area network security: a fuzzy attribute-based signcryption scheme
C Hu, N Zhang, H Li, X Cheng, X Liao
IEEE journal on selected areas in communications 31 (9), 37-46, 2013
1702013
Secure and efficient data communication protocol for wireless body area networks
C Hu, H Li, Y Huo, T Xiang, X Liao
IEEE Transactions on multi-scale computing systems 2 (2), 94-107, 2016
1602016
Channel quality prediction based on Bayesian inference in cognitive radio networks
X Xing, T Jing, Y Huo, H Li, X Cheng
2013 Proceedings IEEE Infocom, 1465-1473, 2013
1382013
Cooperative relay selection in cognitive radio networks
TJ , Shixiang Zhu, Hongjuan Li, Xiuzhen Cheng, Yan Huo
INFOCOM, 175-179, 2013
111*2013
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks
H Li, X Xing, J Zhu, X Cheng, K Li, R Bie, T Jing
IEEE Transactions on Vehicular Technology 66 (1), 645-655, 2017
892017
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks
H Li, X Cheng, K Li, X Xing, T Jing
2013 Proceedings IEEE INFOCOM, 165-169, 2013
892013
Optimal spectrum sensing interval in cognitive radio networks
X Xing, T Jing, H Li, Y Huo, X Cheng, T Znati
IEEE Transactions on parallel and Distributed Systems 25 (9), 2408-2417, 2013
572013
Robust collaborative spectrum sensing schemes for cognitive radio networks
H Li, X Cheng, K Li, C Hu, N Zhang, W Xue
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2190-2200, 2013
462013
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
H Li, K Li, W Qu, I Stojmenovic
ICA3PP, 2-13, 2014
352014
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
H Li, K Li, W Qu, I Stojmenovic
Future Generation Computer Systems 37, 108-116, 2014
352014
An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks
L Ju, H Li, Y Liu, W Xue, K Li, Z Chi
2010 Proceedings of the 5th International Conference on Ubiquitous …, 2010
342010
Detecting driver phone calls in a moving vehicle based on voice features
T Song, X Cheng, H Li, J Yu, S Wang, R Bie
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
212016
Perturbation-based private profile matching in social networks
R Li, H Li, X Cheng, X Zhou, K Li, S Wang, R Bie
IEEE Access 5, 19720-19732, 2017
112017
Efficient customized privacy preserving friend discovery in mobile social networks
H Li, X Cheng, K Li, Z Tian
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
112015
Secure friend discovery based on encounter history in mobile social networks.
HL Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen
Personal and Ubiquitous Computing 19 (7), 999-1009, 2015
102015
Secure Friend Discovery Based on Encounter History in Mobile Social Networks
HL , Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen
Identification, Information and Knowledge in the Internet of Things (IIKI …, 2014
10*2014
A practically optimized implementation of attribute based cryptosystems
C Hu, F Zhang, T Xiang, H Li, X Xiao, G Huang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
82014
A fast approach to unknown tag identification in large scale RFID systems
X Liu, K Li, Y Shen, G Min, B Xiao, W Qu, H Li
2013 22nd International Conference on Computer Communication and Networks …, 2013
82013
Target counting in wireless sensor networks
D Wu, B Zhang, H Li, X Cheng
The Art of Wireless Sensor Networks: Volume 2: Advanced Topics and …, 2014
72014
系统目前无法执行此操作,请稍后再试。
文章 1–20