Privacy-preserving multi-keyword ranked search over encrypted cloud data N Cao, C Wang, M Li, K Ren, W Lou IEEE Transactions on parallel and distributed systems 25 (1), 222-233, 2013 | 2282 | 2013 |
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption M Li, S Yu, Y Zheng, K Ren, W Lou IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2012 | 1574 | 2012 |
Data security and privacy in wireless body area networks M Li, W Lou, K Ren IEEE Wireless communications 17 (1), 51-58, 2010 | 807 | 2010 |
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings M Li, S Yu, K Ren, W Lou Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010 | 690 | 2010 |
Authorized private keyword search over encrypted data in cloud computing M Li, S Yu, N Cao, W Lou Distributed Computing Systems (ICDCS), 2011 31st International Conference on …, 2011 | 574 | 2011 |
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 501 | 2013 |
Findu: Privacy-preserving personal profile matching in mobile social networks M Li, N Cao, S Yu, W Lou 2011 Proceedings IEEE INFOCOM, 2435-2443, 2011 | 330 | 2011 |
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li IEEE transactions on parallel and distributed systems 25 (11), 3025-3035, 2013 | 317 | 2013 |
Codeon: Cooperative popular content distribution for vehicular networks using symbol level network coding M Li, Z Yang, W Lou IEEE Journal on Selected Areas in Communications 29 (1), 223-235, 2010 | 249 | 2010 |
Storing shared data on the cloud via security-mediator B Wang, SSM Chow, M Li, H Li 2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013 | 243 | 2013 |
BANA: Body Area Network Authentication Exploiting Channel Characteristics L Shi, M Li, S Yu, J Yuan The fifth ACM Conference on Security and Privacy in Wireless and Mobile …, 2012 | 209 | 2012 |
Wireless federated learning with local differential privacy M Seif, R Tandon, M Li 2020 IEEE International Symposium on Information Theory (ISIT), 2604-2609, 2020 | 185 | 2020 |
Secure ad hoc trust initialization and key management in wireless body area networks M Li, S Yu, JD Guttman, W Lou, K Ren ACM Transactions on sensor Networks (TOSN) 9 (2), 1-35, 2013 | 150 | 2013 |
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index B Wang, Y Hou, M Li, H Wang, H Li Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 135 | 2014 |
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks Q Yan, M Li, T Jiang, W Lou, YT Hou 2012 Proceedings IEEE INFOCOM, 900-908, 2012 | 133 | 2012 |
Geometric range search on encrypted spatial data B Wang, M Li, H Wang IEEE Transactions on Information Forensics and Security 11 (4), 704-719, 2015 | 126 | 2015 |
Group device pairing based secure sensor association and key management for body area networks M Li, S Yu, W Lou, K Ren 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 125 | 2010 |
Privacy-preserving public auditing for shared cloud data supporting group dynamics B Wang, H Li, M Li 2013 IEEE International Conference on Communications (ICC), 1946-1950, 2013 | 123 | 2013 |
Toward privacy-assured and searchable cloud data storage services M Li, S Yu, K Ren, W Lou, YT Hou IEEE Network 27 (4), 56-62, 2013 | 108 | 2013 |
Jamming resilient communication using MIMO interference cancellation Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou IEEE Transactions on Information Forensics and Security 11 (7), 1486-1499, 2016 | 107 | 2016 |