Semi‐selfish mining based on hidden Markov decision process T Li, Z Wang, G Yang, Y Cui, Y Chen, X Yu International Journal of Intelligent Systems 36 (7), 3596-3612, 2021 | 101 | 2021 |
Is semi‐selfish mining available without being detected? T Li, Z Wang, Y Chen, C Li, Y Jia, Y Yang International Journal of Intelligent Systems 37 (12), 10576-10597, 2022 | 83 | 2022 |
PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs Y Chen, J Sun, Y Yang, T Li, X Niu, H Zhou International Journal of Intelligent Systems 37 (2), 1204-1221, 2022 | 79 | 2022 |
Rational protocols and attacks in blockchain system T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang Security and Communication Networks 2020 (1), 8839047, 2020 | 76 | 2020 |
Randomness invalidates criminal smart contracts Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao Information Sciences 477, 291-301, 2019 | 50 | 2019 |
Dynamic multi-key FHE in asymmetric key setting from LWE Y Chen, S Dong, T Li, Y Wang, H Zhou IEEE Transactions on Information Forensics and Security 16, 5239-5249, 2021 | 45 | 2021 |
Optimal mixed block withholding attacks based on reinforcement learning Y Wang, G Yang, T Li, L Zhang, Y Wang, L Ke, Y Dou, S Li, X Yu International Journal of Intelligent Systems 35 (12), 2032-2048, 2020 | 43 | 2020 |
Socially-conforming cooperative computation in cloud networks T Li, BB Gupta, R Metere Journal of Parallel and Distributed Computing 117, 274-280, 2018 | 35 | 2018 |
Trust-based secure directed diffusion routing protocol in WSN X Yu, F Li, T Li, N Wu, H Wang, H Zhou Journal of Ambient Intelligence and Humanized Computing, 1-13, 2022 | 30 | 2022 |
Energy trading scheme based on consortium blockchain and game theory Y Chen, Y Li, Q Chen, X Wang, T Li, C Tan Computer Standards & Interfaces 84, 103699, 2023 | 28 | 2023 |
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices Y Wang, G Yang, T Li, F Li, Y Tian, X Yu Journal of Network and Computer Applications 161, 102641, 2020 | 28 | 2020 |
Privacy‐aware PKI model with strong forward security F Li, Z Liu, T Li, H Ju, H Wang, H Zhou International Journal of Intelligent Systems 37 (12), 10049-10065, 2022 | 26 | 2022 |
Dual attention guided multi-scale CNN for fine-grained image classification X Liu, L Zhang, T Li, D Wang, Z Wang Information Sciences 573, 37-45, 2021 | 26 | 2021 |
Impsuic: a quality updating rule in mixing coins with maximum utilities X Yu, Z Wang, Y Wang, F Li, T Li, Y Chen, Y Tian, X Yu International Journal of Intelligent Systems 36 (3), 1182-1198, 2021 | 20 | 2021 |
A blockchain-empowered authentication scheme for worm detection in wireless sensor network Y Chen, X Yang, T Li, Y Ren, Y Long Digital Communications and Networks, 2022 | 17 | 2022 |
BCEAD: A Blockchain‐Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest X Yang, Y Chen, X Qian, T Li, X Lv Security and Communication Networks 2021 (1), 9430132, 2021 | 16 | 2021 |
A blockchain index structure based on subchain query et al. Xing X, Chen Y, Li T Journal of Cloud Computing 10 (01), 1-11, 2021 | 16 | 2021 |
A brief survey on secure multi-party computing in the presence of rational parties Y Wang, T Li, H Qin, J Li, W Gao, Z Liu, Q Xu Journal of Ambient Intelligence and Humanized Computing 6, 807-824, 2015 | 16 | 2015 |
STSIIML: Study on token shuffling under incomplete information based on machine learning Y Wang, T Li, M Liu, C Li, H Wang International Journal of Intelligent Systems 37 (12), 11078-11100, 2022 | 15 | 2022 |
Adversarial behaviours in mixing coins under incomplete information Y Wang, A Bracciali, G Yang, T Li, X Yu Applied Soft Computing 96, 106605, 2020 | 12 | 2020 |