Fengjun Li
Fengjun Li
Email verificata su ku.edu - Home page
Citata da
Citata da
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 first IEEE international conference on smart grid communications, 327-332, 2010
Cyber-physical systems security—A survey
A Humayed, J Lin, F Li, B Luo
IEEE Internet of Things Journal 4 (6), 1802-1831, 2017
Secure and privacy-preserving information aggregation for smart grids
F Li, B Luo, P Liu
International Journal of Security and Networks 6 (1), 28-39, 2011
Preserving data integrity for smart grid data aggregation
F Li, B Luo
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
Stalking online: on user privacy in social networks
Y Yang, J Lutes, F Li, B Luo, P Liu
Proceedings of the second ACM conference on Data and Application Security …, 2012
New threats to health data privacy
F Li, X Zou, P Liu, JY Chen
BMC bioinformatics 12 (12), 1-7, 2011
In-broker access control: Towards efficient end-to-end performance of information brokerage systems
F Li, B Luo, P Liu, D Lee, P Mitra, WC Lee, CH Chu
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
Enforcing secure and privacy-preserving information brokering in distributed information sharing
F Li, B Luo, P Liu, D Lee, CH Chu
IEEE transactions on information forensics and security 8 (6), 888-900, 2013
Automaton segmentation: A new approach to preserve privacy in XML information brokering
F Li, B Luo, P Liu, D Lee, CH Chu
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Detecting false data injection in smart grid in-network aggregation
L Yang, F Li
2013 IEEE International Conference on Smart Grid Communications …, 2013
Trust-aware review spam detection
H Xue, F Li, H Seo, R Pluretti
2015 IEEE Trustcom/BigDataSE/ISPA 1, 726-733, 2015
Privacy-preserving data sharing in smart grid systems
L Yang, H Xue, F Li
2014 IEEE International Conference on Smart Grid Communications …, 2014
mtor: A multipath tor routing beyond bandwidth throttling
L Yang, F Li
2015 IEEE Conference on Communications and Network Security (CNS), 479-487, 2015
Detecting review spam: Challenges and opportunities
Y Ma, F Li
Collaborative Computing: Networking, Applications and Worksharing …, 2012
A multi-cloud based privacy-preserving data publishing scheme for the internet of things
L Yang, A Humayed, F Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Privacy preserving group linkage
F Li, Y Chen, B Luo, D Lee, P Liu
International Conference on Scientific and Statistical Database Management …, 2011
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields
Q Zhou, C Tian, H Zhang, J Yu, F Li
Information Sciences 512, 641-660, 2020
Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain
S Awan, F Li, B Luo, M Liu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Enhancing traffic analysis resistance for tor hidden services with multipath routing
L Yang, F Li
International Conference on Security and Privacy in Communication Systems …, 2015
A node-failure-resilient anonymous communication protocol through commutative path hopping
F Li, B Luo, P Liu, CH Chu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20