关注
Jiangtao Li
Jiangtao Li
在 shu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Secure intelligent traffic light control using fog computing
J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen
Future Generation Computer Systems 78, 817-824, 2018
1952018
Blockchain based secure data sharing system for Internet of vehicles: A position paper
L Zhang, M Luo, J Li, MH Au, KKR Choo, T Chen, S Tian
Vehicular Communications 16, 85-93, 2019
1492019
Privacy-preserving public auditing protocol for low-performance end devices in cloud
J Li, L Zhang, JK Liu, H Qian, Z Dong
IEEE Transactions on Information Forensics and Security 11 (11), 2572-2583, 2016
1202016
Cryptographic solutions for cloud storage: Challenges and research opportunities
L Zhang, H Xiong, Q Huang, J Li, KKR Choo, J Li
IEEE Transactions on Services Computing 15 (1), 567-587, 2019
642019
Enabling robust and privacy-preserving resource allocation in fog computing
L Zhang, J Li
IEEE Access 6, 50384-50393, 2018
452018
Certificateless and identity-based authenticated asymmetric group key agreement
L Zhang, Q Wu, B Qin, H Deng, J Li, J Liu, W Shi
International Journal of Information Security 16, 559-576, 2017
212017
Security enhanced anonymous remote user authentication and key agreement for cloud computing
Z Dong, L Zhang, J Li
2014 IEEE 17th International Conference on Computational Science and …, 2014
182014
Conditional Anonymous Authentication with Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles
J Li, Y Li, C Cao, KY Lam
IEEE Internet of Things Journal 9 (11), 8749 - 8762, 2022
172022
Improved Anonymous Broadcast Encryptions
J Li, J Gong
International Conference on Applied Cryptography and Network Security, 497-515, 2018
17*2018
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol
J Li, L Zhang
Information Sciences 414, 187-202, 2017
162017
Light can be dangerous: Stealthy and effective physical-world adversarial attack by spot light
LI Yufeng, Y Fengyu, LIU Qi, LI Jiangtao, CAO Chenhong
Computers & Security 132, 103345, 2023
82023
Group signatures with decentralized tracing
T Lu, J Li, L Zhang, KY Lam
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
82020
Towards fast and energy-efficient offloading for vehicular edge computing
M Su, C Cao, M Dai, J Li, Y Li
2022 IEEE 28th International Conference on Parallel and Distributed Systems …, 2023
52023
In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing
J Li, Z Song, Z Zhang, Y Li, C Cao
IEEE Internet of Things Journal 11 (4), 6368 - 6383, 2024
42024
QoS-aware joint task scheduling and resource allocation in vehicular edge computing
C Cao, M Su, S Duan, M Dai, J Li, Y Li
Sensors 22 (23), 9340, 2022
42022
Liveear: An efficient and easy-to-use liveness detection system for voice assistants
L Yue, C Cao, Y Li, J Li, Q Liu
Journal of Physics: Conference Series 1871 (1), 012046, 2021
42021
Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting
G Zhang, Q Liu, C Cao, J Li, Y Li
Computers & Security 134, 103436, 2023
32023
WiDual: User Identified Gesture Recognition Using Commercial WiFi
M Dai, C Cao, T Liu, M Su, Y Li, J Li
2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet …, 2023
32023
Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles
J Li, Z Song, Y Li, C Cao, Y He
Security and Communication Networks 2021, 2021
32021
Privacy protection scheme for edge computing based on function encryption
Y He, L Chen, Y Ni, Y Wang, J Li, Y Li
2021 International Conference on Networking and Network Applications (NaNA …, 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20