Obserwuj
long li
long li
Guilin University of Electronic Technology
Zweryfikowany adres z guet.edu.cn
Tytuł
Cytowane przez
Cytowane przez
Rok
A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram
L Li, T Gu, L Chang, Z Xu, Y Liu, J Qian
IEEE access 5, 1137-1145, 2017
762017
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
N Zhang, Q Jiang, L Li, X Ma, J Ma
Peer-to-Peer Networking and Applications 14, 3319-3332, 2021
392021
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain
X Tang, C Guo, KKR Choo, Y Liu, L Li
Computer Networks 200, 108540, 2021
382021
Knowledge-based interactive postmining of user-preferred co-location patterns using ontologies
X Bao, T Gu, L Chang, Z Xu, L Li
IEEE Transactions on Cybernetics 52 (9), 9467-9480, 2021
282021
Attacks and Solutions for a Two‐Factor Authentication Protocol for Wireless Body Area Networks
CM Chen, Z Li, SA Chaudhry, L Li
Security and Communication Networks 2021 (1), 3116593, 2021
202021
Intrusion detection system based on improved abc algorithm with tabu search
T Gu, H Chen, L Chang, L Li
IEEJ Transactions on Electrical and Electronic Engineering 14 (11), 1652-1660, 2019
172019
Location privacy protection scheme for LBS in IoT
H Li, X Xue, Z Li, L Li, J Xiong
Wireless Communications and Mobile Computing 2021 (1), 9948543, 2021
162021
A survey of researches on personalized bundle recommendation techniques
M Li, X Bao, L Chang, Z Xu, L Li
Machine Learning for Cyber Security: Third International Conference, ML4CS …, 2020
142020
Can we predict student performance based on tabular and textual data?
Y Qu, F Li, L Li, X Dou, H Wang
IEEE Access 10, 86008-86019, 2022
122022
EAFS: An efficient, accurate, and forward secure searchable encryption scheme supporting range search
P Tian, C Guo, KKR Choo, Y Liu, L Li, L Yao
IEEE Systems Journal 16 (2), 3450-3460, 2021
82021
Active learning empirical research on cross-version software defect prediction datasets
F Li, Y Qu, J Ji, D Zhang, L Li
International Journal of Performability Engineering 16 (4), 609, 2020
82020
The intrusion detection model based on parallel multi-artificial bee colony and support vector machine
L Li, S Zhang, Y Zhang, L Chang, T Gu
2019 Eleventh International Conference on Advanced Computational …, 2019
82019
Do we need to pay technical debt in blockchain software systems?
Y Qu, T Bao, X Chen, L Li, X Dou, M Yuan, H Wang
Connection Science 34 (1), 2026-2047, 2022
72022
An empirical study of gradient-based explainability techniques for self-admitted technical debt detection
G Zhuang, Y Qu, L Li, X Dou, M Li
Journal of Internet Technology 23 (3), 631-641, 2022
72022
TASC‐MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision‐Making
Y Li, L Chang, L Li, X Bao, T Gu
Security and Communication Networks 2021 (1), 5448397, 2021
62021
An Empirical Study on GAN‐Based Traffic Congestion Attack Analysis: A Visualized Method
Y Li, Y Xiang, E Tong, W Niu, B Jia, L Li, J Liu, Z Han
Wireless Communications and Mobile Computing 2020 (1), 8823300, 2020
62020
A ciphertext-policy attribute-based encryption based on Multi-valued decision diagram
S Zhang, L Li, L Chang, T Gu, H Liu
Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018
62018
Key research issues and related technologies in crowdsourcing data collection
Y Li, L Chang, L Li, X Bao, T Gu
Wireless Communications and Mobile Computing 2021 (1), 8745897, 2021
52021
Expressive ciphertext-policy attribute-based encryption scheme with fast decryption and constant-size secret keys
L LI, T GU, L CHANG, Z XU, J QIAN
电子与信息学报 40 (7), 1661-1668, 2018
52018
A Review of Deep Learning-Based Methods for Road Extraction from High-Resolution Remote Sensing Images
R Liu, J Wu, W Lu, Q Miao, H Zhang, X Liu, Z Lu, L Li
Remote Sensing 16 (12), 2056, 2024
42024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20