关注
Hui Li
Hui Li
Professor, School of Computer Science and Technology, Xidian University
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
年份
3E-LDA: three enhancements to linear discriminant analysis
Y Li, B Liu, Y Yu, H Li, J Sun, J Cui
ACM Transactions on Knowledge Discovery from Data (TKDD) 15 (4), 1-20, 2021
212021
A Comprehensive Survey on Database Management System Fuzzing: Techniques, Taxonomy and Experimental Comparison
X Gao, Z Liu, J Cui, H Li, H Zhang, K Wei, K Zhao
arXiv preprint arXiv:2311.06728, 2023
2023
A DAPP business data storage model based on blockchain and IPFS
X Tang, H Guo, H Li, Y Yuan, J Wang, J Cheng
Artificial Intelligence and Security: 7th International Conference, ICAIS …, 2021
92021
A lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks
H Li, T Jing
Wireless Communications and Mobile Computing 2019, 2019
252019
A Master-slave Multi-chain Vehicle Networking Architecture
H Li, L Zou, T Jiang, D Liao, M Zhang, X Chen
2022
A personalized range‐sensitive privacy‐preserving scheme in LBSs
W Li, B Niu, J Cao, Y Luo, H Li
Concurrency and computation: practice and experience 32 (5), e5462, 2020
112020
A Real Linear and Parallel Multiple Longest Common Subsequences (MLCS) Algorithm
Y Li, H Li, T Duan, S Wang, Z Wang, Y Cheng
20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2016
192016
A Reusable and Single-interactive Model for Secure Approximate k-Nearest Neighbor Query in Cloud
Y Peng, J Cui, H Li, J Ma
Information Sciences, 2016
102016
A Study towards Application-driven Social Network Analysis.
H Li, J Cui, B Shen
J. Comput. 9 (1), 134-145, 2014
22014
A survey of blockchain-based crowd sensing incentive mechanism
X Xu, J Cheng, J Liu, Y Yuan, H Li, VS Sheng
International Conference on Artificial Intelligence and Security, 245-259, 2022
22022
A survey of consensus mechanism based on reputation model
Y Li, J Cheng, H Li, Y Yuan, VS Sheng
International Conference on Artificial Intelligence and Security, 208-221, 2022
22022
A survey on privacy protection of cross-chain
J Wang, J Cheng, Y Yuan, H Li, VS Sheng
International Conference on Artificial Intelligence and Security, 283-296, 2022
42022
a2RegInf: An Interactive System for Maximizing Influence within Arbitrary Number of Arbitrary Shaped Query Regions
H Li, Q Yang, J Cui
Proceedings of the Fifteenth ACM International Conference on Web Search and …, 2022
2022
AA-FPP: Adaptive Adjustment Flight Path Planning
M Zhang, Y Li, Z Qiu, D Liao, Y Li, H Li
2023 IEEE 23rd International Conference on Communication Technology (ICCT …, 2023
2023
Achieving IoT data security based blockchain
D Liao, H Li, W Wang, X Wang, M Zhang, X Chen
Peer-to-peer networking and applications, 1-14, 2021
152021
Achieving privacy protection for crowdsourcing application in edge-assistant vehicular networking
H Li, L Pei, D Liao, M Zhang, D Xu, X Wang
Telecommunication Systems 75, 1-14, 2020
52020
Adaptively Secure Ciphertext-Policy Attribute-Based Encryption with Dynamic Policy Updating
Z Ying, H Li, J Ma, J Zhang, J Cui
SCIENCE CHINA Information Sciences 59 (4), 1-15, 2016
422016
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
K Zhang, J Ma, J Liu, H Li
Sci. China Inf. Sci. 59 (9), 99105, 2016
302016
Addressing the hardness of k-facility relocation problem: A pair of approximate solutions
H Wang, H Li, M Wang, J Cui
Proceedings of the 30th ACM International Conference on Information …, 2021
22021
Affinity-driven blog cascade analysis and prediction
H Li, SS Bhowmick, A Sun, J Cui
Data mining and knowledge discovery 28 (2), 442-474, 2014
82014
系统目前无法执行此操作,请稍后再试。
文章 1–20