Suivre
Qinghua Li
Titre
Citée par
Citée par
Année
Multicasting in delay tolerant networks: a social network perspective
W Gao, Q Li, B Zhao, G Cao
Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009
7102009
Routing in socially selfish delay tolerant networks
Q Li, S Zhu, G Cao
2010 Proceedings IEEE INFOCOM, 1-9, 2010
6922010
Achieving k-anonymity in privacy-aware location-based services
B Niu, Q Li, X Zhu, G Cao, H Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 754-762, 2014
5532014
Enhancing privacy through caching in location-based services
B Niu, Q Li, X Zhu, G Cao, H Li
2015 IEEE conference on computer communications (INFOCOM), 1017-1025, 2015
3082015
Multicast authentication in the smart grid with one-time signature
Q Li, G Cao
IEEE Transactions on Smart Grid 2 (4), 686-696, 2011
2092011
Providing Privacy-Aware Incentives for Mobile Sensing
Q Li, G Cao
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013
1592013
Efficient and privacy-aware data aggregation in mobile sensing
Q Li, G Cao, TF La Porta
IEEE Transactions on Dependable and Secure Computing 11 (2), 115-129, 2014
1422014
Social-aware multicast in disruption-tolerant networks
W Gao, Q Li, B Zhao, G Cao
IEEE/ACM Transactions on Networking 20 (5), 1553-1566, 2012
1412012
Mitigating routing misbehavior in disruption tolerant networks
Q Li, G Cao
IEEE transactions on information forensics and security 7 (2), 664-675, 2011
1322011
Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing
Q Li, G Cao
International Conference on Network Protocols (ICNP), 2012
1192012
Contact duration aware data replication in delay tolerant networks
X Zhuo, Q Li, W Gao, G Cao, Y Dai
2011 19th IEEE International Conference on Network Protocols, 236-245, 2011
1092011
A routing protocol for socially selfish delay tolerant networks
Q Li, W Gao, S Zhu, G Cao
Ad Hoc Networks 10 (8), 1619-1632, 2012
1082012
PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance
S Han, S Zhao, Q Li, CH Ju, W Zhou
IEEE Transactions on Information Forensics and Security 11 (9), 1940-1955, 2015
1012015
Social-based cooperative caching in DTNs: A contact duration aware approach
X Zhuo, Q Li, G Cao, Y Dai, B Szymanski, T La Porta
Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International …, 2011
952011
Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error
Q Li, G Cao
International Symposium on Privacy Enhancing Technologies Symposium, 60-81, 2013
942013
An overview of cyber-physical security of battery management systems and adoption of blockchain technology
T Kim, J Ochoa, T Faika, HA Mantooth, J Di, Q Li, Y Lee
IEEE Journal of Emerging and Selected Topics in Power Electronics 10 (1 …, 2020
872020
Providing efficient privacy-aware incentives for mobile sensing
Q Li, G Cao
Distributed Computing Systems (ICDCS), 2014 IEEE 34th International …, 2014
832014
A novel attack to spatial cloaking schemes in location-based services
B Niu, X Zhu, Q Li, J Chen, H Li
Future Generation Computer Systems 49, 125-132, 2015
672015
To lie or to comply: Defending against flood attacks in disruption tolerant networks
Q Li, W Gao, S Zhu, G Cao
IEEE Transactions on Dependable and Secure Computing 10 (3), 168-182, 2013
592013
Providing privacy-aware incentives in mobile sensing systems
Q Li, G Cao
IEEE Transactions on Mobile Computing 15 (6), 1485-1498, 2016
522016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20