Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks J Li, M Wen, T Zhang IEEE Internet of Things Journal 3 (3), 408-417, 2015 | 125 | 2015 |
Uni-perceiver v2: A generalist model for large-scale vision and vision-language tasks H Li, J Zhu, X Jiang, X Zhu, H Li, C Yuan, X Wang, Y Qiao, X Wang, ... Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 42 | 2023 |
Attention-YOLOV4: a real-time and high-accurate traffic sign detection algorithm Y Li, J Li, P Meng Multimedia Tools and Applications 82, 757-7582, 2023 | 39 | 2023 |
HYBRID‐CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN‐Based Smart Grid P Ding, J Li, L Wang, M Wen, Y Guan Security and communication networks 2020 (1), 8850550, 2020 | 32 | 2020 |
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs H Wang, L Wang, K Zhang, J Li, Y Luo IEEE Access 10, 15605-15618, 2022 | 31 | 2022 |
Unknown vulnerability risk assessment based on directed graph models: a survey W He, H Li, J Li IEEE Access 7, 168201-168225, 2019 | 23 | 2019 |
Big data storage security M Wen, S Yu, J Li, H Li, K Lu Big Data Concepts, Theories, and Applications, 237-255, 2016 | 20 | 2016 |
Efficient BiSRU combined with feature dimensionality reduction for abnormal traffic detection P Ding, J Li, M Wen, L Wang, H Li IEEE Access 8, 164414-164427, 2020 | 17 | 2020 |
Ensemble feature selection for improving intrusion detection classification accuracy W He, H Li, J Li Proceedings of the 2019 international conference on artificial intelligence …, 2019 | 13 | 2019 |
A data aggregation scheme with fine-grained access control for the smart grid M Wen, X Zhang, H Li, J Li 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 1-5, 2017 | 13 | 2017 |
AnoGLA: An efficient scheme to improve network anomaly detection Q Ding, J Li Journal of Information Security and Applications 66, 103149, 2022 | 12 | 2022 |
Toward efficient and effective bullying detection in online social network J Wu, M Wen, R Lu, B Li, J Li Peer-to-Peer networking and Applications 13 (5), 1567-1576, 2020 | 12 | 2020 |
Secure and verifiable multi-owner ranked-keyword search in cloud computing J Li, Y Lin, M Wen, C Gu, B Yin Wireless Algorithms, Systems, and Applications: 10th International …, 2015 | 11 | 2015 |
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs L Shen, L Wang, K Zhang, J Li, K Chen Journal of Systems Architecture 133, 102764, 2022 | 9 | 2022 |
An adversarial attack based on incremental learning techniques for unmanned in 6G scenes H Lv, M Wen, R Lu, J Li IEEE Transactions on Vehicular Technology 70 (6), 5254-5264, 2021 | 9 | 2021 |
An accurate ensemble forecasting approach for highly dynamic cloud workload with vmd and r-transformer S Zhou, J Li, K Zhang, M Wen, Q Guan IEEE Access 8, 115992-116003, 2020 | 9 | 2020 |
Achieve revocable access control for fog-based smart grid system S Chen, M Wen, R Lu, J Li, S Chen 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 1-7, 2019 | 9 | 2019 |
一种基于遗传算法的 DCT 域鲁棒水印技术 朱宁波, 李晋国 湖南大学学报: 自然科学版 38 (4), 77-82, 2011 | 8 | 2011 |
An effective intrusion detection model for class-imbalanced learning based on smote and attention mechanism X Jiao, J Li 2021 18th International Conference on Privacy, Security and Trust (PST), 1-6, 2021 | 5 | 2021 |
A bidirectional broadcasting authentication scheme for wireless sensor networks L Xu, M Wen, J Li 2015 IEEE Conference on Collaboration and Internet Computing (CIC), 200-204, 2015 | 5 | 2015 |