3E-LDA: three enhancements to linear discriminant analysis Y Li, B Liu, Y Yu, H Li, J Sun, J Cui ACM Transactions on Knowledge Discovery from Data (TKDD) 15 (4), 1-20, 2021 | 21 | 2021 |
A Comprehensive Survey on Database Management System Fuzzing: Techniques, Taxonomy and Experimental Comparison X Gao, Z Liu, J Cui, H Li, H Zhang, K Wei, K Zhao arXiv preprint arXiv:2311.06728, 2023 | | 2023 |
A DAPP business data storage model based on blockchain and IPFS X Tang, H Guo, H Li, Y Yuan, J Wang, J Cheng Artificial Intelligence and Security: 7th International Conference, ICAIS …, 2021 | 9 | 2021 |
A lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks H Li, T Jing Wireless Communications and Mobile Computing 2019, 2019 | 25 | 2019 |
A Master-slave Multi-chain Vehicle Networking Architecture H Li, L Zou, T Jiang, D Liao, M Zhang, X Chen | | 2022 |
A personalized range‐sensitive privacy‐preserving scheme in LBSs W Li, B Niu, J Cao, Y Luo, H Li Concurrency and computation: practice and experience 32 (5), e5462, 2020 | 11 | 2020 |
A Real Linear and Parallel Multiple Longest Common Subsequences (MLCS) Algorithm Y Li, H Li, T Duan, S Wang, Z Wang, Y Cheng 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2016 | 19 | 2016 |
A Reusable and Single-interactive Model for Secure Approximate k-Nearest Neighbor Query in Cloud Y Peng, J Cui, H Li, J Ma Information Sciences, 2016 | 10 | 2016 |
A Study towards Application-driven Social Network Analysis. H Li, J Cui, B Shen J. Comput. 9 (1), 134-145, 2014 | 2 | 2014 |
A survey of blockchain-based crowd sensing incentive mechanism X Xu, J Cheng, J Liu, Y Yuan, H Li, VS Sheng International Conference on Artificial Intelligence and Security, 245-259, 2022 | 2 | 2022 |
A survey of consensus mechanism based on reputation model Y Li, J Cheng, H Li, Y Yuan, VS Sheng International Conference on Artificial Intelligence and Security, 208-221, 2022 | 2 | 2022 |
A survey on privacy protection of cross-chain J Wang, J Cheng, Y Yuan, H Li, VS Sheng International Conference on Artificial Intelligence and Security, 283-296, 2022 | 4 | 2022 |
a2RegInf: An Interactive System for Maximizing Influence within Arbitrary Number of Arbitrary Shaped Query Regions H Li, Q Yang, J Cui Proceedings of the Fifteenth ACM International Conference on Web Search and …, 2022 | | 2022 |
AA-FPP: Adaptive Adjustment Flight Path Planning M Zhang, Y Li, Z Qiu, D Liao, Y Li, H Li 2023 IEEE 23rd International Conference on Communication Technology (ICCT …, 2023 | | 2023 |
Achieving IoT data security based blockchain D Liao, H Li, W Wang, X Wang, M Zhang, X Chen Peer-to-peer networking and applications, 1-14, 2021 | 15 | 2021 |
Achieving privacy protection for crowdsourcing application in edge-assistant vehicular networking H Li, L Pei, D Liao, M Zhang, D Xu, X Wang Telecommunication Systems 75, 1-14, 2020 | 5 | 2020 |
Adaptively Secure Ciphertext-Policy Attribute-Based Encryption with Dynamic Policy Updating Z Ying, H Li, J Ma, J Zhang, J Cui SCIENCE CHINA Information Sciences 59 (4), 1-15, 2016 | 42 | 2016 |
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. K Zhang, J Ma, J Liu, H Li Sci. China Inf. Sci. 59 (9), 99105, 2016 | 30 | 2016 |
Addressing the hardness of k-facility relocation problem: A pair of approximate solutions H Wang, H Li, M Wang, J Cui Proceedings of the 30th ACM International Conference on Information …, 2021 | 2 | 2021 |
Affinity-driven blog cascade analysis and prediction H Li, SS Bhowmick, A Sun, J Cui Data mining and knowledge discovery 28 (2), 442-474, 2014 | 8 | 2014 |