Segui
Lingjun Li
Lingjun Li
Ph. D. of Computer Science, Arizona State University
Email verificata su asu.edu - Home page
Titolo
Citata da
Citata da
Anno
Unobservable Re-authentication for Smartphones.
L Li, X Zhao, G Xue
NDSS, 2013
3202013
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao
Information Hiding, 224-235, 2008
482008
A statistical attack on a kind of word-shift text-steganography
L Li, L Huang, X Zhao, W Yang, Z Chen
Intelligent Information Hiding and Multimedia Signal Processing, 2008 …, 2008
422008
Checking in without worries: Location privacy in location based social networks
X Zhao, L Li, G Xue
INFOCOM, 2013 Proceedings IEEE, 3003-3011, 2013
402013
Steganalysis of synonym-substitution based natural language watermarking
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
21*2009
Detection of synonym-substitution modified articles using context information
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
Future Generation Communication and Networking, 2008. FGCN'08. Second …, 2008
172008
Authenticating strangers in online social networks
X Zhao, L Li, G Xue
International Journal of Security and Networks 6 (4), 237-248, 2011
162011
A Proximity Authentication System for Smartphones
L Li, X Zhao, G Xue
Dependable and Secure Computing, IEEE Transactions on, 1, 2015
142015
Steganalysis on Character Substitution Using Support Vector Machine
X Zhao, L Huang, L Li, W Yang, Z Chen, Z Yu
Knowledge Discovery and Data Mining, 2009. WKDD 2009. Second International …, 2009
142009
Near field authentication for smart devices
L Li, X Zhao, G Xue
INFOCOM, 2013 Proceedings IEEE, 375-379, 2013
122013
Detection of word shift steganography in PDF document
L Lingjun, H Liusheng, Y Wei, Z Xinxin, Y Zhenshan, C Zhili
Proceedings of the 4th international conference on Security and privacy in …, 2008
102008
The Power of Whispering: Near Field Assertions via Acoustic Communications
L Li, G Xue, X Zhao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
Efficient anonymous message submission
X Zhao, L Li, G Xue, GJ Ahn
IEEE Transactions on Dependable and Secure Computing, 2016
72016
An identity authentication protocol in online social networks
L Li, X Zhao, G Xue
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
72012
Systems and methods for authenticating a user through an unobservable re-authentication system
L Li, X Zhao, G Xue
US Patent App. 14/476,364, 2014
6*2014
A lightweight system to authenticate smartphones in the near field without NFC chips
L Li, X Zhao, G Xue
Communications (ICC), 2013 IEEE International Conference on, 6391-6395, 2013
52013
An efficient privacy preserving location based service system
X Zhao, H Gao, L Li, H Liu, G Xue
Global Communications Conference (GLOBECOM), 2014 IEEE, 576-581, 2014
42014
RemindU: A secure and efficient location based reminder system
X Zhao, L Li, G Xue
Communications (ICC), 2014 IEEE International Conference on, 1005-1010, 2014
42014
Secure cloud-assisted location based reminder
X Zhao, L Li, G Xue
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
42013
Privacy Preserving Group Ranking
L Li, X Zhao, G Xue, G Silva
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International …, 2012
42012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20