A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram L Li, T Gu, L Chang, Z Xu, Y Liu, J Qian IEEE access 5, 1137-1145, 2017 | 76 | 2017 |
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones N Zhang, Q Jiang, L Li, X Ma, J Ma Peer-to-Peer Networking and Applications 14, 3319-3332, 2021 | 39 | 2021 |
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain X Tang, C Guo, KKR Choo, Y Liu, L Li Computer Networks 200, 108540, 2021 | 38 | 2021 |
Knowledge-based interactive postmining of user-preferred co-location patterns using ontologies X Bao, T Gu, L Chang, Z Xu, L Li IEEE Transactions on Cybernetics 52 (9), 9467-9480, 2021 | 28 | 2021 |
Attacks and Solutions for a Two‐Factor Authentication Protocol for Wireless Body Area Networks CM Chen, Z Li, SA Chaudhry, L Li Security and Communication Networks 2021 (1), 3116593, 2021 | 20 | 2021 |
Intrusion detection system based on improved abc algorithm with tabu search T Gu, H Chen, L Chang, L Li IEEJ Transactions on Electrical and Electronic Engineering 14 (11), 1652-1660, 2019 | 17 | 2019 |
Location privacy protection scheme for LBS in IoT H Li, X Xue, Z Li, L Li, J Xiong Wireless Communications and Mobile Computing 2021 (1), 9948543, 2021 | 16 | 2021 |
A survey of researches on personalized bundle recommendation techniques M Li, X Bao, L Chang, Z Xu, L Li Machine Learning for Cyber Security: Third International Conference, ML4CS …, 2020 | 14 | 2020 |
Can we predict student performance based on tabular and textual data? Y Qu, F Li, L Li, X Dou, H Wang IEEE Access 10, 86008-86019, 2022 | 12 | 2022 |
EAFS: An efficient, accurate, and forward secure searchable encryption scheme supporting range search P Tian, C Guo, KKR Choo, Y Liu, L Li, L Yao IEEE Systems Journal 16 (2), 3450-3460, 2021 | 8 | 2021 |
Active learning empirical research on cross-version software defect prediction datasets F Li, Y Qu, J Ji, D Zhang, L Li International Journal of Performability Engineering 16 (4), 609, 2020 | 8 | 2020 |
The intrusion detection model based on parallel multi-artificial bee colony and support vector machine L Li, S Zhang, Y Zhang, L Chang, T Gu 2019 Eleventh International Conference on Advanced Computational …, 2019 | 8 | 2019 |
Do we need to pay technical debt in blockchain software systems? Y Qu, T Bao, X Chen, L Li, X Dou, M Yuan, H Wang Connection Science 34 (1), 2026-2047, 2022 | 7 | 2022 |
An empirical study of gradient-based explainability techniques for self-admitted technical debt detection G Zhuang, Y Qu, L Li, X Dou, M Li Journal of Internet Technology 23 (3), 631-641, 2022 | 7 | 2022 |
TASC‐MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision‐Making Y Li, L Chang, L Li, X Bao, T Gu Security and Communication Networks 2021 (1), 5448397, 2021 | 6 | 2021 |
An Empirical Study on GAN‐Based Traffic Congestion Attack Analysis: A Visualized Method Y Li, Y Xiang, E Tong, W Niu, B Jia, L Li, J Liu, Z Han Wireless Communications and Mobile Computing 2020 (1), 8823300, 2020 | 6 | 2020 |
A ciphertext-policy attribute-based encryption based on Multi-valued decision diagram S Zhang, L Li, L Chang, T Gu, H Liu Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018 | 6 | 2018 |
Key research issues and related technologies in crowdsourcing data collection Y Li, L Chang, L Li, X Bao, T Gu Wireless Communications and Mobile Computing 2021 (1), 8745897, 2021 | 5 | 2021 |
Expressive ciphertext-policy attribute-based encryption scheme with fast decryption and constant-size secret keys L LI, T GU, L CHANG, Z XU, J QIAN 电子与信息学报 40 (7), 1661-1668, 2018 | 5 | 2018 |
A Review of Deep Learning-Based Methods for Road Extraction from High-Resolution Remote Sensing Images R Liu, J Wu, W Lu, Q Miao, H Zhang, X Liu, Z Lu, L Li Remote Sensing 16 (12), 2056, 2024 | 4 | 2024 |