Sledovať
Li Yang (杨力)
Li Yang (杨力)
Professor, School of Computer Science and Technology, Xidian University, China
Overená e-mailová adresa na: xidian.edu.cn - Domovská stránka
Názov
Citované v
Citované v
Rok
A trust-based collaborative filtering algorithm for E-commerce recommendation system
L Jiang, Y Cheng, L Yang, J Li, H Yan, X Wang
Journal of ambient intelligence and humanized computing 10, 3023-3034, 2019
2612019
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
Q Jiang, J Ma, G Li, L Yang
Wireless personal communications 68, 1477-1491, 2013
1382013
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma
Journal of Ambient Intelligence and Humanized Computing 9, 1061-1073, 2018
1162018
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm
L Yang, Y Qiao, Z Liu, J Ma, X Li
Soft Computing 22, 453-464, 2018
752018
An efficient ticket based authentication protocol with unlinkability for wireless access networks
Q Jiang, J Ma, G Li, L Yang
Wireless personal communications 77, 1489-1506, 2014
742014
Integrated authentication and key agreement framework for vehicular cloud computing
Q Jiang, J Ni, J Ma, L Yang, X Shen
IEEE Network 32 (3), 28-35, 2018
702018
A remotely keyed file encryption scheme under mobile cloud computing
L Yang, Z Han, Z Huang, J Ma
Journal of Network and Computer Applications 106, 90-99, 2018
632018
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
L Yang, J Ma, Q Jiang
Int. J. Netw. Secur. 14 (3), 156-163, 2012
462012
Online handwritten signature verification using feature weighting algorithm relief
L Yang, Y Cheng, X Wang, Q Liu
Soft Computing 22, 7811-7823, 2018
452018
On the control of opinion dynamics in social networks
Z Liu, J Ma, Y Zeng, L Yang, Q Huang, H Wu
Physica A: Statistical Mechanics and its Applications 409, 183-198, 2014
392014
Iot etei: End-to-end iot device identification method
F Yin, L Yang, Y Wang, J Dai
2021 IEEE conference on dependable and secure computing (DSC), 1-8, 2021
382021
A DNS tunneling detection method based on deep learning models to prevent data exfiltration
J Zhang, L Yang, S Yu, J Ma
Network and System Security: 13th International Conference, NSS 2019 …, 2019
382019
Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty
R Wan, L Ding, N Xiong, W Shu, L Yang
Human-centric Computing and Information Sciences 9, 1-21, 2019
362019
Identifying opinion leaders in social networks with topic limitation
L Yang, Y Tian, J Li, J Ma, J Zhang
Cluster Computing 20, 2403-2413, 2017
352017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism
H Lin, J Hu, Y Tian, L Yang, L Xu
Information Sciences 387, 238-253, 2017
272017
Robust two-factor authentication and key agreement preserving user privacy
Q Jiang, J Ma, G Li, L Yang
International Journal of Network Security 16 (3), 229-240, 2014
262014
SADUS: Secure data deletion in user space for mobile devices
L Yang, T Wei, F Zhang, J Ma
computers & security 77, 612-626, 2018
162018
Identifying IoT devices based on spatial and temporal features from network traffic
F Yin, L Yang, J Ma, Y Zhou, Y Wang, J Dai
Security and Communication Networks 2021 (1), 2713211, 2021
152021
Online handwritten signature verification based on the most stable feature and partition
L Yang, X Jin, Q Jiang
Cluster Computing 22, 1691-1701, 2019
152019
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection
L Yang, C Li, Y Cheng, S Yu, J Ma
Information Sciences 582, 529-546, 2022
132022
Systém momentálne nemôže vykonať operáciu. Skúste to neskôr.
Články 1–20