default search action
Hong Li 0004
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing Key Laboratory of IOT Information Security, China
Other persons with the same name
- Hong Li — disambiguation page
- Hong Li 0001 — DFKI, Language Technology Lab, Saarbrücken, Germany
- Hong Li 0002 — Beijing Jiaotong University, School of Electrical Engineering, China (and 1 more)
- Hong Li 0003 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Hong Li 0005 — Xianyang Normal University, School of Computer Science, China (and 1 more)
- Hong Li 0006 — Inner Mongolia University, School of Mathematical Sciences, Hohhot, China
- Hong Li 0007 — Xidian University, School of Mathematics and Statistics, National Key Laboratory of Antennas and Microwave Technology, Xi'an, China
- Hong Li 0008 — University of Lapland, Rovaniemi, Finland
- Hong Li 0009 — Huazhong University of Science and Technology, School of Mathematics and Statistics, Wuhan, China
- Hong Li 0010 — Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, China
- Hong Li 0011 — New Jersey Institute of Technology, Center for Wireless Communication and Signal Processing Research, Newark, NJ, USA
- Hong Li 0012 — NXP Semiconductors, Eindhoven, The Netherlands (and 3 more)
- Hong Li 0013 — Chinese Academy of Sciences, Shanghai Institutes for Biological Sciences, Key Laboratory of Computational Biology, China
- Hong Li 0014 — East Carolina University, Department of Information Management Systems, Greenville, NC, USA
- Hong Li 0015 — Shanghai Jiao Tong University, Shanghai, China (and 2 more)
- Hong Li 0016 — Beihang University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Peipei Liu, Gaosheng Wang, Hong Li, Jie Liu, Yimo Ren, Hongsong Zhu, Limin Sun:
Multi-granularity cross-modal representation learning for named entity recognition on social media. Inf. Process. Manag. 61(1): 103546 (2024) - [j36]Pengfei Hu, Wenhao Li, Yifan Ma, Panneer Selvam Santhalingam, Parth H. Pathak, Hong Li, Huanle Zhang, Guoming Zhang, Xiuzhen Cheng, Prasant Mohapatra:
Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN. IEEE Trans. Mob. Comput. 23(1): 941-954 (2024) - [j35]Siyuan Li, Yongpan Wang, Chaopeng Dong, Shouguo Yang, Hong Li, Hao Sun, Zhe Lang, Zuxin Chen, Weijie Wang, Hongsong Zhu, Limin Sun:
LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries. ACM Trans. Softw. Eng. Methodol. 33(2): 52:1-52:35 (2024) - [j34]Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Hong Li, Zhi Li, Limin Sun:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM Trans. Softw. Eng. Methodol. 33(4): 108:1-108:26 (2024) - [c49]Peipei Liu, Hong Li, Yimo Ren, Jie Liu, Shuaizong Si, Hongsong Zhu, Limin Sun:
Hierarchical Aligned Multimodal Learning for NER on Tweet Posts. AAAI 2024: 18680-18688 - [c48]Yimo Ren, Jinfa Wang, Jie Liu, Peipei Liu, Hong Li, Hongsong Zhu, Limin Sun:
A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks. ICASSP 2024: 7855-7859 - [c47]Chaopeng Dong, Siyuan Li, Shouguo Yang, Yang Xiao, Yongpan Wang, Hong Li, Zhi Li, Limin Sun:
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. ICSE 2024: 66:1-66:12 - [c46]Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. SP 2024: 2775-2793 - [i8]Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, Limin Sun:
TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves. CoRR abs/2407.06853 (2024) - 2023
- [j33]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. Comput. Secur. 131: 103317 (2023) - [j32]Liting Deng, Hui Wen, Mingfeng Xin, Hong Li, Zhiwen Pan, Limin Sun:
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks. Comput. Secur. 132: 103323 (2023) - [j31]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
Owner name entity recognition in websites based on multiscale features and multimodal co-attention. Expert Syst. Appl. 224: 120014 (2023) - [j30]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer. Int. J. Intell. Syst. 2023: 1-11 (2023) - [j29]Shangfeng Wan, Qiang Li, Haining Wang, Hong Li, Limin Sun:
DevTag: A Benchmark for Fingerprinting IoT Devices. IEEE Internet Things J. 10(7): 6388-6399 (2023) - [j28]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE Internet Things J. 10(14): 12126-12139 (2023) - [j27]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Zhi Li, Hongsong Zhu, Limin Sun:
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. Knowl. Inf. Syst. 65(10): 4411-4429 (2023) - [j26]Xianglong Zhang, Huanle Zhang, Guoming Zhang, Hong Li, Dongxiao Yu, Xiuzhen Cheng, Pengfei Hu:
Model Poisoning Attack on Neural Network Without Reference Data. IEEE Trans. Computers 72(10): 2978-2989 (2023) - [j25]Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun:
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE Trans. Dependable Secur. Comput. 20(5): 3890-3909 (2023) - [j24]Shouguo Yang, Zhengzi Xu, Yang Xiao, Zhe Lang, Wei Tang, Yang Liu, Zhiqiang Shi, Hong Li, Limin Sun:
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis. ACM Trans. Softw. Eng. Methodol. 32(6): 158:1-158:29 (2023) - [c45]Yongfei Liu, Hong Li, Wenyuan Zhang, Fei Lv, Shuaizong Si:
Intrusion Detection Based on Sampling and Improved OVA Technique on Imbalanced Data. CSCWD 2023: 175-180 - [c44]Yimo Ren, Zhi Li, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. DASFAA (Workshops) 2023: 19-33 - [c43]Peipei Liu, Xin Zheng, Hong Li, Jie Liu, Yimo Ren, Hongsong Zhu, Limin Sun:
Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis. ICASSP 2023: 1-5 - [c42]Yongpan Wang, Chaopeng Dong, Siyuan Li, Fucai Luo, Renjie Su, Zhanwei Song, Hong Li:
FlowEmbed: Binary function embedding model based on relational control flow graph and byte sequence. ICPADS 2023: 950-957 - [c41]Peipei Liu, Hong Li, Zhiyu Wang, Yimo Ren, Jie Liu, Fei Lv, Hongsong Zhu, Limin Sun:
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. IJCNN 2023: 1-8 - [c40]Yimo Ren, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun:
User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels. IJCNN 2023: 1-8 - [c39]Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Kejiang Ye, Limin Sun:
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ISSTA 2023: 360-372 - [c38]Siyuan Li, Chaopeng Dong, Yongpan Wang, Wenming Liu, Weijie Wang, Hong Li, Hongsong Zhu, Limin Sun:
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries. MILCOM 2023: 741-746 - [c37]Yimo Ren, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun:
DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things. SIGIR 2023: 1929-1933 - [i7]Siyuan Li, Yongpan Wang, Chaopeng Dong, Shouguo Yang, Hong Li, Hao Sun, Zhe Lang, Zuxin Chen, Weijie Wang, Hongsong Zhu, Limin Sun:
LibAM: An Area Matching Framework for Detecting Third-party Libraries in Binaries. CoRR abs/2305.04026 (2023) - [i6]Peipei Liu, Hong Li, Yimo Ren, Jie Liu, Shuaizong Si, Hongsong Zhu, Limin Sun:
A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments. CoRR abs/2305.08372 (2023) - 2022
- [j23]Fangtian Zhong, Pengfei Hu, Guoming Zhang, Hong Li, Xiuzhen Cheng:
Reinforcement learning based adversarial malware example generation against black-box detectors. Comput. Secur. 121: 102869 (2022) - [j22]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE Internet Things J. 9(11): 7989-8000 (2022) - [j21]Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Trans. Dependable Secur. Comput. 19(3): 2054-2069 (2022) - [c36]Weifeng Wang, Peipei Liu, Zhiyu Wang, Yimo Ren, Hong Li, Fang Zuo:
Automatic Construction of Large-Scale IoT Datasets with Multi-strategy Fusion. CWSN 2022: 31-43 - [c35]Peipei Liu, Hong Li, Zuoguang Wang, Jie Liu, Yimo Ren, Hongsong Zhu:
Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence. ICPR 2022: 1557-1563 - [c34]Jingfei Bian, Nan Yu, Hong Li, Hongsong Zhu, Qiang Wang, Limin Sun:
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification. SecureComm 2022: 20-38 - [c33]Zhihui Zhao, Yicheng Zeng, Jinfa Wang, Hong Li, Hongsong Zhu, Limin Sun:
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing. SRDS 2022: 166-177 - [c32]Mengjie Sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li, Limin Sun:
Inferring Device Interactions for Attack Path Discovery in Smart Home IoT. WASA (1) 2022: 64-75 - [c31]Jiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li, Limin Sun:
Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement. WASA (1) 2022: 603-612 - [c30]Yimo Ren, Hong Li, Min Xu, Gang Xiong, Shuqin Zhang, Hongsong Zhu, Limin Sun:
Joint Classification of IoT Devices and Relations in the Internet with Network Traffic. WCNC 2022: 560-565 - [i5]Peipei Liu, Hong Li, Zuoguang Wang, Jie Liu, Yimo Ren, Hongsong Zhu:
Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence. CoRR abs/2207.00232 (2022) - [i4]Peipei Liu, Hong Li, Zhiyu Wang, Yimo Ren, Jie Liu, Fei Lyu, Hongsong Zhu, Limin Sun:
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises. CoRR abs/2210.10581 (2022) - [i3]Peipei Liu, Xin Zheng, Hong Li, Jie Liu, Yimo Ren, Hongsong Zhu, Limin Sun:
Improving the Modality Representation with Multi-View Contrastive Learning for Multimodal Sentiment Analysis. CoRR abs/2210.15824 (2022) - 2021
- [j20]Shuqin Zhang, Guangyao Bai, Hong Li, Peipei Liu, Minzhi Zhang, Shujun Li:
Multi-Source Knowledge Reasoning for Data-Driven IoT Security. Sensors 21(22): 7579 (2021) - [c29]Shuqin Zhang, Minzhi Zhang, Hong Li, Guangyao Bai:
Threat Analysis of IoT Security Knowledge Graph Based on Confidence. SETE 2021: 254-264 - [c28]Yimo Ren, Hong Li, Hongsong Zhu, Limin Sun:
FIUD: A Framework to Identify Users of Devices. WASA (2) 2021: 45-57 - [c27]Xiao Hu, Hong Li, Zhiqiang Shi, Nan Yu, Hongsong Zhu, Limin Sun:
A Robust IoT Device Identification Method with Unknown Traffic Detection. WASA (1) 2021: 190-202 - [i2]Mingfeng Xin, Hui Wen, Liting Deng, Hong Li, Qiang Li, Limin Sun:
Firmware Re-hosting Through Static Binary-level Porting. CoRR abs/2107.09856 (2021) - [i1]Kai Cheng, Tao Liu, Le Guan, Peng Liu, Hong Li, Hongsong Zhu, Limin Sun:
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis. CoRR abs/2109.12209 (2021) - 2020
- [j19]Yan Hu, Hong Li, Tom H. Luan, An Yang, Limin Sun, Zhiliang Wang, Rui Wang:
Detecting stealthy attacks on industrial control systems using a permutation entropy-based method. Future Gener. Comput. Syst. 108: 1230-1240 (2020) - [j18]Yongle Chen, Xiaojian Wang, Yuli Yang, Hong Li:
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract. Sensors 20(4): 1062 (2020) - [j17]Bo Mei, Yinhao Xiao, Ruinian Li, Hong Li, Xiuzhen Cheng, Yunchuan Sun:
Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks. IEEE Trans. Netw. Sci. Eng. 7(2): 869-879 (2020) - [c26]Yimo Ren, Hong Li, Hongsong Zhu, Limin Sun, Weizhong Wang, Yachao Li:
The Mining of IP Landmarks for Internet Webcams. CWSN 2020: 257-268 - [c25]Xulun Hu, Weidong Zhang, Hong Li, Yan Hu, Zhaoteng Yan, Xiyue Wang, Limin Sun:
VES: A Component Version Extracting System for Large-Scale IoT Firmwares. WASA (2) 2020: 39-48 - [c24]Zhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao, Yan Hu:
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients. WASA (1) 2020: 755-767
2010 – 2019
- 2019
- [j16]Zhihao Wang, Hong Li, Qiang Li, Wei Li, Hongsong Zhu, Limin Sun:
Towards IP geolocation with intermediate routers based on topology discovery. Cybersecur. 2(1): 13 (2019) - [j15]Yan Hu, Hong Li, Hong Yang, Yuyan Sun, Limin Sun, Zhiliang Wang:
Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP J. Wirel. Commun. Netw. 2019: 74 (2019) - [j14]Saide Zhu, Wei Li, Hong Li, Ling Tian, Guangchun Luo, Zhipeng Cai:
Coin Hopping Attack in Blockchain-Based IoT. IEEE Internet Things J. 6(3): 4614-4626 (2019) - [j13]Ruinian Li, Tianyi Song, Bo Mei, Hong Li, Xiuzhen Cheng, Limin Sun:
Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE Trans. Serv. Comput. 12(5): 762-771 (2019) - [c23]Ji-Yao Liu, Yunhua He, Chao Wang, Yan Hu, Hong Li, Limin Sun:
An Anonymous Blockchain-Based Logging System for Cloud Computing. BlockSys 2019: 288-301 - [c22]Ming Zhou, Shichao Lv, Libo Yin, Xin Chen, Hong Li, Limin Sun:
SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks. ICC 2019: 1-6 - [c21]Ke Li, Hong Li, Hongsong Zhu, Limin Sun, Hui Wen:
Side-Channel Information Leakage of Traffic Data in Instant Messaging. IPCCC 2019: 1-8 - [c20]Yucheng Wang, Xu Wang, Hongsong Zhu, Hai Zhao, Hong Li, Limin Sun:
ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WASA 2019: 346-357 - [c19]Qianwen Wei, Shujun Li, Wei Li, Hong Li, Mingsheng Wang:
Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. WASA 2019: 358-369 - 2018
- [j12]Jingzhong Wang, Mengru Li, Yunhua He, Hong Li, Ke Xiao, Chao Wang:
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications. IEEE Access 6: 17545-17556 (2018) - [j11]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Chao Yang, Limin Sun:
A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications. IEEE Access 6: 27324-27335 (2018) - [j10]Yan Hu, An Yang, Hong Li, Yuyan Sun, Limin Sun:
A survey of intrusion detection on industrial control systems. Int. J. Distributed Sens. Networks 14(8) (2018) - [j9]Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun:
Who owns Internet of Thing devices? Int. J. Distributed Sens. Networks 14(11) (2018) - [j8]Saide Zhu, Wei Li, Hong Li, Chunqiang Hu, Zhipeng Cai:
A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining. Math. Found. Comput. 1(4): 393-414 (2018) - [j7]Chunqiang Hu, Hang Liu, Liran Ma, Yan Huo, Arwa Alrawais, Xiuhua Li, Hong Li, Qingyu Xiong:
A Secure and Scalable Data Communication Scheme in Smart Grids. Wirel. Commun. Mob. Comput. 2018 (2018) - [c18]Weidong Zhang, Yu Chen, Hong Li, Zhi Li, Limin Sun:
PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. ICC 2018: 1-6 - [c17]Weidong Zhang, Hong Li, Hui Wen, Hongsong Zhu, Limin Sun:
A graph neural network based efficient firmware information extraction method for IoT devices. IPCCC 2018: 1-8 - [c16]Qi Liu, Hong Li, Yan Hu, Limin Sun:
A Check-In System Leveraging Face Recognition. iThings/GreenCom/CPSCom/SmartData 2018: 412-418 - [c15]Ke Li, Hui Wen, Hong Li, Hongsong Zhu, Limin Sun:
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 741-747 - [c14]Yu Chen, Hong Li, Yuan Ma, Zhiqiang Shi, Limin Sun:
Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval. WASA 2018: 53-65 - 2017
- [j6]Yan Hu, Weisong Shi, Hong Li, Xiaohui Hu:
Mitigating Data Sparsity Using Similarity Reinforcement-Enhanced Collaborative Filtering. ACM Trans. Internet Techn. 17(3): 31:1-31:20 (2017) - [j5]Feng Yi, Hong Li, Hongtao Wang, Limin Sun:
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. Wirel. Commun. Mob. Comput. 2017 (2017) - [c13]Bo Mei, Yinhao Xiao, Hong Li, Xiuzhen Cheng, Yunchuan Sun:
Inference attacks based on neural networks in social networks. HotWeb 2017: 10:1-10:6 - [c12]Yu Chen, Hong Li, Weiwei Zhao, Lin Zhang, Zhongjin Liu, Zhiqiang Shi:
IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares. IPCCC 2017: 1-8 - [c11]Bo Mei, Yinhao Xiao, Xiuzhen Cheng, Hong Li, Yunchuan Sun:
Personal Information Inference in Social Networks. PAC 2017: 196-197 - [c10]Ziye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li:
Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs. PAC 2017: 200-201 - [c9]Lin Zhang, Hong Li, Limin Sun, Zhiqiang Shi, Yunhua He:
Poster: Towards Fully Distributed User Authentication with Blockchain. PAC 2017: 202-203 - [c8]Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Limin Sun:
A Bitcoin Based Incentive Mechanism for Distributed P2P Applications. WASA 2017: 457-468 - [c7]Feng Yi, Hong Li, Hongtao Wang, Hui Wen, Limin Sun:
Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WASA 2017: 871-876 - 2016
- [j4]Shujun Li, Hong Li, Limin Sun:
Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization. EURASIP J. Wirel. Commun. Netw. 2016: 123 (2016) - [c6]Hong Li, Yunhua He, Xiuzhen Cheng, Limin Sun:
A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization. IIKI 2016: 525-529 - [c5]Hong Li, Yunhua He, Limin Sun, Xiuzhen Cheng, Jiguo Yu:
Side-channel information leakage of encrypted video stream in video surveillance systems. INFOCOM 2016: 1-9 - [c4]Hong Li, Cheng Zhang, Yunhua He, Xiuzhen Cheng, Yan Liu, Limin Sun:
An Enhanced Structure-Based De-anonymization of Online Social Networks. WASA 2016: 331-342 - 2015
- [j3]Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, Limin Sun:
Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11): 56-62 (2015) - 2014
- [j2]Wei Liu, Hong Li, Yongle Chen, Hongsong Zhu, Limin Sun:
LARES: latency-reduced neighbour discovery for contagious diseases prevention. Int. J. Ad Hoc Ubiquitous Comput. 16(1): 3-13 (2014) - [j1]Yunhua He, Limin Sun, Weidong Yang, Hong Li:
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c3]Yaowen Zheng, Hong Li, Zhiqiang Shi, Limin Sun:
Security of Cyber Physical System. CWSN 2014: 558-567 - [c2]Yunhua He, Limin Sun, Zhi Li, Hong Li, Xiuzhen Cheng:
An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. FOMC 2014: 11-18 - [c1]Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. INFOCOM 2014: 2337-2345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint