Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks H Li, K Lin, K Li Computer Communications 34 (4), 591-597, 2011 | 189 | 2011 |
Body area network security: a fuzzy attribute-based signcryption scheme C Hu, N Zhang, H Li, X Cheng, X Liao IEEE journal on selected areas in communications 31 (9), 37-46, 2013 | 170 | 2013 |
Secure and efficient data communication protocol for wireless body area networks C Hu, H Li, Y Huo, T Xiang, X Liao IEEE Transactions on multi-scale computing systems 2 (2), 94-107, 2016 | 160 | 2016 |
Channel quality prediction based on Bayesian inference in cognitive radio networks X Xing, T Jing, Y Huo, H Li, X Cheng 2013 Proceedings IEEE Infocom, 1465-1473, 2013 | 138 | 2013 |
Cooperative relay selection in cognitive radio networks TJ , Shixiang Zhu, Hongjuan Li, Xiuzhen Cheng, Yan Huo INFOCOM, 175-179, 2013 | 111* | 2013 |
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks H Li, X Xing, J Zhu, X Cheng, K Li, R Bie, T Jing IEEE Transactions on Vehicular Technology 66 (1), 645-655, 2017 | 89 | 2017 |
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks H Li, X Cheng, K Li, X Xing, T Jing 2013 Proceedings IEEE INFOCOM, 165-169, 2013 | 89 | 2013 |
Optimal spectrum sensing interval in cognitive radio networks X Xing, T Jing, H Li, Y Huo, X Cheng, T Znati IEEE Transactions on parallel and Distributed Systems 25 (9), 2408-2417, 2013 | 57 | 2013 |
Robust collaborative spectrum sensing schemes for cognitive radio networks H Li, X Cheng, K Li, C Hu, N Zhang, W Xue IEEE Transactions on Parallel and Distributed Systems 25 (8), 2190-2200, 2013 | 46 | 2013 |
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks H Li, K Li, W Qu, I Stojmenovic ICA3PP, 2-13, 2014 | 35 | 2014 |
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks H Li, K Li, W Qu, I Stojmenovic Future Generation Computer Systems 37, 108-116, 2014 | 35 | 2014 |
An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks L Ju, H Li, Y Liu, W Xue, K Li, Z Chi 2010 Proceedings of the 5th International Conference on Ubiquitous …, 2010 | 34 | 2010 |
Detecting driver phone calls in a moving vehicle based on voice features T Song, X Cheng, H Li, J Yu, S Wang, R Bie IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 21 | 2016 |
Perturbation-based private profile matching in social networks R Li, H Li, X Cheng, X Zhou, K Li, S Wang, R Bie IEEE Access 5, 19720-19732, 2017 | 11 | 2017 |
Efficient customized privacy preserving friend discovery in mobile social networks H Li, X Cheng, K Li, Z Tian 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 11 | 2015 |
Secure friend discovery based on encounter history in mobile social networks. HL Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen Personal and Ubiquitous Computing 19 (7), 999-1009, 2015 | 10 | 2015 |
Secure Friend Discovery Based on Encounter History in Mobile Social Networks HL , Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen Identification, Information and Knowledge in the Internet of Things (IIKI …, 2014 | 10* | 2014 |
A practically optimized implementation of attribute based cryptosystems C Hu, F Zhang, T Xiang, H Li, X Xiao, G Huang 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 8 | 2014 |
A fast approach to unknown tag identification in large scale RFID systems X Liu, K Li, Y Shen, G Min, B Xiao, W Qu, H Li 2013 22nd International Conference on Computer Communication and Networks …, 2013 | 8 | 2013 |
Target counting in wireless sensor networks D Wu, B Zhang, H Li, X Cheng The Art of Wireless Sensor Networks: Volume 2: Advanced Topics and …, 2014 | 7 | 2014 |