Sledovat
Jinguo Li
Jinguo Li
Shanghai University of Electric Power
E-mailová adresa ověřena na: shiep.edu.cn
Název
Citace
Citace
Rok
Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks
J Li, M Wen, T Zhang
IEEE Internet of Things Journal 3 (3), 408-417, 2015
1202015
HYBRID-CNN: An efficient scheme for abnormal flow detection in the SDN-Based Smart Grid
P Ding, J Li, L Wang, M Wen, Y Guan
Security and communication networks 2020, 1-20, 2020
292020
Attention-YOLOV4: a real-time and high-accurate traffic sign detection algorithm
Y Li, J Li, P Meng
Multimedia Tools and Applications 82, 757-7582, 2023
282023
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs
H Wang, L Wang, K Zhang, J Li, Y Luo
IEEE Access 10, 15605-15618, 2022
242022
Unknown vulnerability risk assessment based on directed graph models: a survey
W He, H Li, J Li
IEEE Access 7, 168201-168225, 2019
222019
Big data storage security
M Wen, S Yu, J Li, H Li, K Lu
Big Data Concepts, Theories, and Applications, 237-255, 2016
152016
A data aggregation scheme with fine-grained access control for the smart grid
M Wen, X Zhang, H Li, J Li
2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-5, 2017
132017
Ensemble feature selection for improving intrusion detection classification accuracy
W He, H Li, J Li
Proceedings of the 2019 international conference on artificial intelligence …, 2019
122019
AnoGLA: An efficient scheme to improve network anomaly detection
Q Ding, J Li
Journal of Information Security and Applications 66, 103149, 2022
112022
Efficient BiSRU combined with feature dimensionality reduction for abnormal traffic detection
P Ding, J Li, M Wen, L Wang, H Li
IEEE Access 8, 164414-164427, 2020
112020
Secure and verifiable multi-owner ranked-keyword search in cloud computing
J Li, Y Lin, M Wen, C Gu, B Yin
Wireless Algorithms, Systems, and Applications: 10th International …, 2015
112015
Toward efficient and effective bullying detection in online social network
J Wu, M Wen, R Lu, B Li, J Li
Peer-to-Peer networking and Applications 13 (5), 1567-1576, 2020
102020
An accurate ensemble forecasting approach for highly dynamic cloud workload with vmd and r-transformer
S Zhou, J Li, K Zhang, M Wen, Q Guan
IEEE Access 8, 115992-116003, 2020
92020
一种基于遗传算法的 DCT 域鲁棒水印技术
朱宁波, 李晋国
湖南大学学报: 自然科学版 38 (4), 77-82, 2011
92011
An adversarial attack based on incremental learning techniques for unmanned in 6G scenes
H Lv, M Wen, R Lu, J Li
IEEE Transactions on Vehicular Technology 70 (6), 5254-5264, 2021
82021
Achieve revocable access control for fog-based smart grid system
S Chen, M Wen, R Lu, J Li, S Chen
2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-7, 2019
82019
An effective intrusion detection model for class-imbalanced learning based on smote and attention mechanism
X Jiao, J Li
2021 18th International Conference on Privacy, Security and Trust (PST), 1-6, 2021
52021
A bidirectional broadcasting authentication scheme for wireless sensor networks
L Xu, M Wen, J Li
2015 IEEE Conference on Collaboration and Internet Computing (CIC), 200-204, 2015
52015
车载自组织网络中基于椭圆曲线零知识证明的匿名安全认证机制
李晋国, 林亚平, 李睿, 周四望
通信学报 34 (5), 52-61, 2013
52013
Secure and verifiable top-k query in two-tiered sensor networks
T Zhou, Y Lin, W Zhang, S Xiao, J Li
Security and Privacy in Communication Networks: 9th International ICST …, 2013
52013
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20