Secure intelligent traffic light control using fog computing J Liu, J Li, L Zhang, F Dai, Y Zhang, X Meng, J Shen Future Generation Computer Systems 78, 817-824, 2018 | 195 | 2018 |
Blockchain based secure data sharing system for Internet of vehicles: A position paper L Zhang, M Luo, J Li, MH Au, KKR Choo, T Chen, S Tian Vehicular Communications 16, 85-93, 2019 | 149 | 2019 |
Privacy-preserving public auditing protocol for low-performance end devices in cloud J Li, L Zhang, JK Liu, H Qian, Z Dong IEEE Transactions on Information Forensics and Security 11 (11), 2572-2583, 2016 | 120 | 2016 |
Cryptographic solutions for cloud storage: Challenges and research opportunities L Zhang, H Xiong, Q Huang, J Li, KKR Choo, J Li IEEE Transactions on Services Computing 15 (1), 567-587, 2019 | 64 | 2019 |
Enabling robust and privacy-preserving resource allocation in fog computing L Zhang, J Li IEEE Access 6, 50384-50393, 2018 | 45 | 2018 |
Certificateless and identity-based authenticated asymmetric group key agreement L Zhang, Q Wu, B Qin, H Deng, J Li, J Liu, W Shi International Journal of Information Security 16, 559-576, 2017 | 21 | 2017 |
Security enhanced anonymous remote user authentication and key agreement for cloud computing Z Dong, L Zhang, J Li 2014 IEEE 17th International Conference on Computational Science and …, 2014 | 18 | 2014 |
Conditional Anonymous Authentication with Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles J Li, Y Li, C Cao, KY Lam IEEE Internet of Things Journal 9 (11), 8749 - 8762, 2022 | 17 | 2022 |
Improved Anonymous Broadcast Encryptions J Li, J Gong International Conference on Applied Cryptography and Network Security, 497-515, 2018 | 17* | 2018 |
Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol J Li, L Zhang Information Sciences 414, 187-202, 2017 | 16 | 2017 |
Light can be dangerous: Stealthy and effective physical-world adversarial attack by spot light LI Yufeng, Y Fengyu, LIU Qi, LI Jiangtao, CAO Chenhong Computers & Security 132, 103345, 2023 | 8 | 2023 |
Group signatures with decentralized tracing T Lu, J Li, L Zhang, KY Lam Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 8 | 2020 |
Towards fast and energy-efficient offloading for vehicular edge computing M Su, C Cao, M Dai, J Li, Y Li 2022 IEEE 28th International Conference on Parallel and Distributed Systems …, 2023 | 5 | 2023 |
In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing J Li, Z Song, Z Zhang, Y Li, C Cao IEEE Internet of Things Journal 11 (4), 6368 - 6383, 2024 | 4 | 2024 |
QoS-aware joint task scheduling and resource allocation in vehicular edge computing C Cao, M Su, S Duan, M Dai, J Li, Y Li Sensors 22 (23), 9340, 2022 | 4 | 2022 |
Liveear: An efficient and easy-to-use liveness detection system for voice assistants L Yue, C Cao, Y Li, J Li, Q Liu Journal of Physics: Conference Series 1871 (1), 012046, 2021 | 4 | 2021 |
Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting G Zhang, Q Liu, C Cao, J Li, Y Li Computers & Security 134, 103436, 2023 | 3 | 2023 |
WiDual: User Identified Gesture Recognition Using Commercial WiFi M Dai, C Cao, T Liu, M Su, Y Li, J Li 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet …, 2023 | 3 | 2023 |
Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles J Li, Z Song, Y Li, C Cao, Y He Security and Communication Networks 2021, 2021 | 3 | 2021 |
Privacy protection scheme for edge computing based on function encryption Y He, L Chen, Y Ni, Y Wang, J Li, Y Li 2021 International Conference on Networking and Network Applications (NaNA …, 2021 | 3 | 2021 |