Feng Li
Titre
Citée par
Citée par
Année
Localcom: A community-based epidemic forwarding scheme in disruption-tolerant networks
F Li, J Wu
2009 6th annual IEEE communications society conference on sensor, mesh and …, 2009
1942009
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets
F Li, J Wu, A Srinivasan
IEEE INFOCOM 2009, 2428-2436, 2009
1922009
MOPS: Providing content-based service in disruption-tolerant networks
F Li, J Wu
2009 29th IEEE international conference on distributed computing systems …, 2009
1732009
On maximizing the lifetime of wireless sensor networks using virtual backbone scheduling
Y Zhao, J Wu, F Li, S Lu
IEEE transactions on parallel and distributed systems 23 (8), 1528-1535, 2011
1362011
A probabilistic voting-based filtering scheme in wireless sensor networks
F Li, J Wu
Proceedings of the 2006 international conference on Wireless communications …, 2006
1322006
Preserving privacy with probabilistic indistinguishability in weighted social networks
Q Liu, G Wang, F Li, S Yang, J Wu
IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016
1212016
Mobility reduces uncertainty in MANETs
F Li, J Wu
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1202007
Trust evaluation in online social networks using generalized network flow
W Jiang, J Wu, F Li, G Wang, H Zheng
IEEE Transactions on Computers 65 (3), 952-963, 2015
1072015
Utility-based opportunistic routing in multi-hop wireless networks
J Wu, M Lu, F Li
2008 The 28th International Conference on Distributed Computing Systems, 470-477, 2008
1002008
CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks
F Li, Y Yang, J Wu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
902010
Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs
F Li, Y Yang, J Wu
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 40 …, 2009
802009
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
752014
Frame: An innovative incentive scheme in vehicular networks
F Li, J Wu
2009 IEEE International Conference on Communications, 1-6, 2009
732009
Uncertainty modeling and reduction in MANETs
F Li, J Wu
IEEE transactions on mobile computing 9 (7), 1035-1048, 2010
682010
Uncertainty modeling and reduction in MANETs
F Li, J Wu
IEEE transactions on mobile computing 9 (7), 1035-1048, 2010
682010
A two-stage deanonymization attack against anonymized social networks
W Peng, F Li, X Zou, J Wu
IEEE Transactions on Computers 63 (2), 290-303, 2012
562012
VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones
Y Zhao, J Wu, F Li, S Lu
2010 Proceedings IEEE INFOCOM, 1-5, 2010
552010
Outsourceable two-party privacy-preserving biometric authentication
H Chun, Y Elmehdwi, F Li, P Bhattacharya, W Jiang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
542014
PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
F Li, A Srinivasan, J Wu
International Journal of Security and Networks 3 (3), 173-182, 2008
522008
Outsourcing privacy-preserving social networks to a cloud
G Wang, Q Liu, F Li, S Yang, J Wu
2013 Proceedings IEEE INFOCOM, 2886-2894, 2013
412013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20