Secure data storage and recovery in industrial blockchain network environments W Liang, Y Fan, KC Li, D Zhang, JL Gaudiot IEEE Transactions on Industrial Informatics 16 (10), 6543 - 6552, 2020 | 195 | 2020 |
A Secure Fabric Blockchain-based Data Transmission Technique for Industrial Internet-of-Things W Liang, M Tang, J Long, X Peng, J Xu, KC Li IEEE Transactions on Industrial Informatics 15 (6), 3582-3592, 2019 | 185 | 2019 |
An Industrial Network Intrusion Detection Algorithm based on Multi-Feature Data Clustering Optimization Model W Liang, KC Li, J Long, X Kui, AY Zomaya IEEE Transactions on Industrial Informatics 16 (3), 2063-2071, 2020 | 161 | 2020 |
Deep reinforcement learning for resource protection and real-time detection in IoT environment W Liang, W Huang, J Long, K Zhang, KC Li, D Zhang IEEE Internet of Things Journal 7 (7), 6392-6401, 2020 | 143 | 2020 |
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System Mamta, BB Gupta, KC Li, VCM Leung, KE Psannis, S Yamaguchi IEEE/CAA J. Autom. Sinica 8 (12), 1877-1890, 2021 | 135 | 2021 |
Circuit Copyright Blockchain: Blockchain-based Homomorphic Encryption for IP Circuit Protection W Liang, D Zhang, X Lei, M Tang, KC Li, A Zomaya IEEE Transactions on Emerging Topics in Computing 9 (3), 1410-1420, 2021 | 133 | 2021 |
An intelligent/cognitive model of task scheduling for IoT applications in cloud computing environment S Basu, M Karuppiah, K Selvakumar, KC Li, SK Hafizul Islam, MM Hasan, ... Future Generation Computer Systems 88, 254-261, 2018 | 109 | 2018 |
Data fusion approach for collaborative anomaly intrusion detection in Blockchain-based systems W Liang, L Xiao, K Zhang, M Tang, D He, KC Li IEEE Internet of Things Journal 9 (16), 14741-14751, 2022 | 102 | 2022 |
Big data: Algorithms, analytics, and applications KC Li, H Jiang, LT Yang, A Cuzzocrea CRC Press, 2015 | 101 | 2015 |
A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection D Han, N Pan, KC Li IEEE Transactions on Dependable and Secure Computing 19 (1), 316-327, 2022 | 91 | 2022 |
A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles Z Xu, W Liang, KC Li, J Xu, H Jin Journal of Parallel and Distributed Computing 149, 29-39, 2021 | 91 | 2021 |
A secure and scalable storage system for aggregate data in IoT H Jiang, F Shen, S Chen, KC Li, YS Jeong Future Generation Computer Systems 49, 133-141, 2015 | 90 | 2015 |
Scaling up MapReduce-based big data processing on multi-GPU systems H Jiang, Y Chen, Z Qiao, TH Weng, KC Li Cluster Computing 18, 369-383, 2015 | 87 | 2015 |
Energy-aware task consolidation technique for cloud computing CH Hsu, SC Chen, CC Lee, HY Chang, KC Lai, KC Li, C Rong 2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 86 | 2011 |
A Double PUF-based RFID Identity Authentication Protocol in Service-Centric Internet of Things Environments W Liang, S Xie, J Long, KC Li, D Zhang, K Li Information Sciences 503, 129-147, 2019 | 81 | 2019 |
An intrusion detection approach based on improved deep belief network Q Tian, D Han, KC Li, X Liu, L Duan, A Castiglione Applied Intelligence 50, 3162–3178, 2020 | 76 | 2020 |
A Fast Defogging Image Recognition Algorithm based on Bilateral Hybrid Filtering W Liang, J Long, KC Li, J Xu, N Ma, X Lei ACM TOMM 17 (2), 42, 2021 | 74 | 2021 |
Decentralized overlay for federation of enterprise clouds R Ranjan, R Buyya Handbook of Research on Scalable Computing Technologies, 191-217, 2010 | 73 | 2010 |
Internet of Everything: Algorithms, methodologies, technologies and perspectives B Di Martino, KC Li, LT Yang, A Esposito Internet of things, 2017 | 59* | 2017 |
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey D Li, D Han, TH Weng, Z Zheng, H Li, H Liu, A Castiglione, KC Li Soft Computing 26, 4423–4440, 2022 | 57 | 2022 |