关注
Jinguo Li
Jinguo Li
Shanghai University of Electric Power
在 shiep.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks
J Li, M Wen, T Zhang
IEEE Internet of Things Journal 3 (3), 408-417, 2015
1252015
Uni-perceiver v2: A generalist model for large-scale vision and vision-language tasks
H Li, J Zhu, X Jiang, X Zhu, H Li, C Yuan, X Wang, Y Qiao, X Wang, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
422023
Attention-YOLOV4: a real-time and high-accurate traffic sign detection algorithm
Y Li, J Li, P Meng
Multimedia Tools and Applications 82, 757-7582, 2023
392023
HYBRID‐CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN‐Based Smart Grid
P Ding, J Li, L Wang, M Wen, Y Guan
Security and communication networks 2020 (1), 8850550, 2020
322020
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs
H Wang, L Wang, K Zhang, J Li, Y Luo
IEEE Access 10, 15605-15618, 2022
312022
Unknown vulnerability risk assessment based on directed graph models: a survey
W He, H Li, J Li
IEEE Access 7, 168201-168225, 2019
232019
Big data storage security
M Wen, S Yu, J Li, H Li, K Lu
Big Data Concepts, Theories, and Applications, 237-255, 2016
202016
Efficient BiSRU combined with feature dimensionality reduction for abnormal traffic detection
P Ding, J Li, M Wen, L Wang, H Li
IEEE Access 8, 164414-164427, 2020
172020
Ensemble feature selection for improving intrusion detection classification accuracy
W He, H Li, J Li
Proceedings of the 2019 international conference on artificial intelligence …, 2019
132019
A data aggregation scheme with fine-grained access control for the smart grid
M Wen, X Zhang, H Li, J Li
2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-5, 2017
132017
AnoGLA: An efficient scheme to improve network anomaly detection
Q Ding, J Li
Journal of Information Security and Applications 66, 103149, 2022
122022
Toward efficient and effective bullying detection in online social network
J Wu, M Wen, R Lu, B Li, J Li
Peer-to-Peer networking and Applications 13 (5), 1567-1576, 2020
122020
Secure and verifiable multi-owner ranked-keyword search in cloud computing
J Li, Y Lin, M Wen, C Gu, B Yin
Wireless Algorithms, Systems, and Applications: 10th International …, 2015
112015
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs
L Shen, L Wang, K Zhang, J Li, K Chen
Journal of Systems Architecture 133, 102764, 2022
92022
An adversarial attack based on incremental learning techniques for unmanned in 6G scenes
H Lv, M Wen, R Lu, J Li
IEEE Transactions on Vehicular Technology 70 (6), 5254-5264, 2021
92021
An accurate ensemble forecasting approach for highly dynamic cloud workload with vmd and r-transformer
S Zhou, J Li, K Zhang, M Wen, Q Guan
IEEE Access 8, 115992-116003, 2020
92020
Achieve revocable access control for fog-based smart grid system
S Chen, M Wen, R Lu, J Li, S Chen
2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-7, 2019
92019
一种基于遗传算法的 DCT 域鲁棒水印技术
朱宁波, 李晋国
湖南大学学报: 自然科学版 38 (4), 77-82, 2011
82011
An effective intrusion detection model for class-imbalanced learning based on smote and attention mechanism
X Jiao, J Li
2021 18th International Conference on Privacy, Security and Trust (PST), 1-6, 2021
52021
A bidirectional broadcasting authentication scheme for wireless sensor networks
L Xu, M Wen, J Li
2015 IEEE Conference on Collaboration and Internet Computing (CIC), 200-204, 2015
52015
系统目前无法执行此操作,请稍后再试。
文章 1–20