default search action
Guanjie Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Guanjie Li, Tom H. Luan, Xinghao Li, Jinkai Zheng, Chengzhe Lai, Zhou Su, Kuan Zhang:
Breaking Down Data Sharing Barrier of Smart City: A Digital Twin Approach. IEEE Netw. 38(1): 238-246 (2024) - [j4]Jinkai Zheng, Yao Zhang, Tom H. Luan, Phil K. Mu, Guanjie Li, Mianxiong Dong, Yuan Wu:
Digital Twin Enabled Task Offloading for IoVs: A Learning-Based Approach. IEEE Trans. Netw. Sci. Eng. 11(1): 659-672 (2024) - [c12]Chengzhe Lai, Xinwei Zhang, Haodi Zhang, Guanjie Li, Yong Yu, Dong Zheng:
GAN Augmentation-Based Continuous Authentication for Vehicular Digital Twin. ICC 2024: 5220-5225 - 2023
- [c11]Jun Xiang, Jianwen Xiang, Guanjie Li, Yongsheng Wang, Liping Lu:
A Hybrid Deep Learning Model Considering External Factors for Accurate Short-Term Traffic Flow Prediction. CNIOT 2023: 607-613 - [c10]Guanjie Li, Tom H. Luan, Jinkai Zheng, Chengzhe Lai, Zhou Su, Haixia Peng:
A Secure and Efficient Handover Authentication Based on Digital Twin in 5G-V2X. GLOBECOM 2023: 6231-6236 - [c9]Chengzhe Lai, Meng Li, Guanjie Li, Dong Zheng:
Efficient Group Authentication and Key Agreement Scheme for Vehicular Digital Twin. ICCC 2023: 1-6 - [c8]Guanjie Li, Tom H. Luan, Jinkai Zheng, Dihao Hu, Chengzhe Lai, Zhou Su, Haixia Peng:
Digital Twin-enabled Secure Charging Reservation for Electric Vehicle. ICCC 2023: 1-6 - [c7]Yaqi Yang, Jinkai Zheng, Guanjie Li, Tom H. Luan, Zhou Su, Mianxiong Dong:
A Game Theoretic Approach for Data Asset Protection in Metaverse. MetaCom 2023: 458-465 - [c6]Guanjie Li, Tom H. Luan, Zheng Li, Chengzhe Lai, Nan Cheng, Lina Zhu:
A Lightweight and Secure Three-Factor Access Authentication Scheme in Metaverse. MetaCom 2023: 488-495 - [c5]Jinkai Zheng, Guanjie Li, Wencong Wang, Tom H. Luan, Zhou Su, Mi Wen:
Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach. PIMRC 2023: 1-6 - 2022
- [j3]Guanjie Li, Chengzhe Lai, Rongxing Lu, Dong Zheng:
SecCDV: A Security Reference Architecture for Cybertwin-Driven 6G V2X. IEEE Trans. Veh. Technol. 71(5): 4535-4550 (2022) - [c4]Yu Zhang, Yuanpei Chang, Ying Xue, Jiajun Ma, Guanjie Li, Jiancun Zuo:
Radio signal modulation pattern recognition method. ICCCM 2022: 157-162 - 2021
- [j2]Chengzhe Lai, Guanjie Li, Dong Zheng:
SPSC: A secure and privacy-preserving autonomous platoon setup and communication scheme. Trans. Emerg. Telecommun. Technol. 32(9) (2021) - 2020
- [j1]Xiaofeng Wu, Guanjie Li, Jijun Zhou:
A Lightweight Secure Management Scheme for Energy Harvesting Dynamic Wireless Charging System. IEEE Access 8: 224729-224740 (2020) - [c3]Guanjie Li, Chengzhe Lai:
Platoon Handover Authentication in 5G-V2X : IEEE CNS 20 Poster. CNS 2020: 1-2
2010 – 2019
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint