default search action
Hongning Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Xinyue Zhang, Hongning Li, Jingyi Wang, Yuanxiong Guo, Qingqi Pei, Pan Li, Miao Pan:
Data-Driven Caching With Users' Content Preference Privacy in Information-Centric Networks. IEEE Trans. Wirel. Commun. 20(9): 5744-5753 (2021) - 2020
- [j9]Rui Hu, Yuanxiong Guo, Hongning Li, Qingqi Pei, Yanmin Gong:
Personalized Federated Learning With Differential Privacy. IEEE Internet Things J. 7(10): 9530-9539 (2020) - [j8]Sai Mounika Errapotu, Hongning Li, Rong Yu, Shaolei Ren, Qingqi Pei, Miao Pan, Zhu Han:
Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers. IEEE Trans. Dependable Secur. Comput. 17(4): 691-702 (2020) - [c18]Pavana Prakash, Jiahao Ding, Hongning Li, Sai Mounika Errapotu, Qingqi Pei, Miao Pan:
Privacy Preserving Facial Recognition Against Model Inversion Attacks. GLOBECOM 2020: 1-6 - [c17]Rui Hu, Yuanxiong Guo, Hongning Li, Qingqi Pei, Yanmin Gong:
Privacy-Preserving Personalized Federated Learning. ICC 2020: 1-6 - [c16]Hongning Li, Jiexiong Chen, Le Wang, Qingqi Pei, Hao Yue:
Privacy-preserving Data Aggregation for Big Data in Financial Institutions. INFOCOM Workshops 2020: 978-983
2010 – 2019
- 2019
- [j7]Hongning Li, Yu Gu, Jiexiong Chen, Qingqi Pei:
Speed Adjustment Attack on Cooperative Sensing in Cognitive Vehicular Networks. IEEE Access 7: 75925-75934 (2019) - [j6]Yushuang Yan, Qingqi Pei, Hongning Li:
Privacy-Preserving Compressive Model for Enhanced Deep-Learning-Based Service Provision System in Edge Computing. IEEE Access 7: 92921-92937 (2019) - [j5]Jiexiong Chen, Shasha Huang, Hongning Li, Xin Lv, Ying Cai:
PSO-Based Agent Cooperative Spectrum Sensing in Cognitive Radio Networks. IEEE Access 7: 142963-142973 (2019) - [c15]Hao Yue, Lijie Zhou, Kaiping Xue, Hongning Li:
MADAFE: Malicious Account Detection on Twitter with Automated Feature Extraction. WCSP 2019: 1-6 - 2018
- [j4]Yuanxiong Guo, Hongning Li, Miao Pan:
Colocation Data Center Demand Response Using Nash Bargaining Theory. IEEE Trans. Smart Grid 9(5): 4017-4026 (2018) - [j3]Zi Li, Qingqi Pei, Ian D. Markwood, Yao Liu, Miao Pan, Hongning Li:
Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking. IEEE Trans. Veh. Technol. 67(6): 5042-5053 (2018) - [c14]Xinyue Zhang, Jingyi Wang, Hongning Li, Yuanxiong Guo, Qingqi Pei, Pan Li, Miao Pan:
Data-Driven Caching with Users' Local Differential Privacy in Information-Centric Networks. GLOBECOM 2018: 1-6 - [c13]Michael Lee, Jie Wang, Hongning Li, Feng Ye, Hao Yue:
Reader Scheduling for Information Collection in Large-Scale RFID Systems. VTC Fall 2018: 1-5 - 2016
- [j2]Hongning Li, Qingqi Pei, Wenjing Zhang:
Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks. Int. J. Distributed Sens. Networks 12(9): 3794582 (2016) - [c12]Luyao Niu, Yuanxiong Guo, Hongning Li, Miao Pan:
A Nash Bargaining Approach to Emergency Demand Response in Colocation Data Centers. GLOBECOM 2016: 1-6 - 2015
- [c11]Xiaoyan Zhu, Ripei Hao, Shunrong Jiang, Haotian Chi, Hongning Li:
Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter. GLOBECOM 2015: 1-6 - [c10]Qingqi Pei, Lichuan Ma, Hongning Li, Zi Li, Dingyu Yan, Zhao Li:
Reputation-based coalitional games for spectrum allocation in distributed Cognitive Radio networks. ICC 2015: 7269-7274 - [c9]Hongning Li, Qingqi Pei, Yao Liu:
Agent-based Channel Selection scheme against location inference attack in cognitive radio networks. MILCOM 2015: 941-946 - 2014
- [c8]Hongning Li, Xianjun Liu, Leilei Xu:
Analysis of Distributed Consensus-Based Spectrum Sensing Algorithm in Cognitive Radio Networks. CIS 2014: 593-597 - 2013
- [j1]Qingqi Pei, Beibei Yuan, Lei Li, Hongning Li:
A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing 101: 129-138 (2013) - 2012
- [c7]Lu Zhang, Qingqi Pei, Hongning Li:
Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network. CIS 2012: 670-673 - [c6]Qingqi Pei, Lei Li, Hongning Li, Beibei Yuan:
Adaptive Trust Management Mechanism for Cognitive Radio Networks. TrustCom 2012: 826-831 - 2011
- [c5]Weichang Li, Hongning Li, Min Xie, Shupo Bu:
An Identity-based Secure Routing Protocol in WSNs. CIS 2011: 703-706 - [c4]Qingqi Pei, Rui Liang, Hongning Li:
A Trust Management Model in Centralized Cognitive Radio Networks. CyberC 2011: 491-496 - 2010
- [c3]Hongning Li, Qingqi Pei, Xiaohong Jiang, Rui Liang, Peng Geng:
A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks. CIS 2010: 478-482
2000 – 2009
- 2007
- [c2]Guopei Wu, Zhen Ren, Hongning Li:
Investigation on the Optimum Routine Test Interval of Protective Equipments Based on Reliability Analysis. IMECS 2007: 1668-1673 - [c1]Hongning Li, Zhen Ren:
Research on the Optimum Inspection Interval of Digital Relay Based on MIS. IMECS 2007: 1739-1743
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint