Follow
long li
long li
Guilin University of Electronic Technology
Verified email at guet.edu.cn
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram
L Li, T Gu, L Chang, Z Xu, Y Liu, J Qian
IEEE access 5, 1137-1145, 2017
732017
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
N Zhang, Q Jiang, L Li, X Ma, J Ma
Peer-to-Peer Networking and Applications 14, 3319-3332, 2021
282021
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain
X Tang, C Guo, KKR Choo, Y Liu, L Li
Computer Networks 200, 108540, 2021
252021
Knowledge-based interactive postmining of user-preferred co-location patterns using ontologies
X Bao, T Gu, L Chang, Z Xu, L Li
IEEE Transactions on Cybernetics 52 (9), 9467-9480, 2021
172021
Attacks and solutions for a two-factor authentication protocol for wireless body area networks
CM Chen, Z Li, SA Chaudhry, L Li
Security and Communication Networks 2021, 1-12, 2021
142021
Location privacy protection scheme for LBS in IoT
H Li, X Xue, Z Li, L Li, J Xiong
Wireless Communications and Mobile Computing 2021, 1-18, 2021
122021
Intrusion detection system based on improved abc algorithm with tabu search
T Gu, H Chen, L Chang, L Li
IEEJ Transactions on Electrical and Electronic Engineering 14 (11), 1652-1660, 2019
112019
Can we predict student performance based on tabular and textual data?
Y Qu, F Li, L Li, X Dou, H Wang
IEEE Access 10, 86008-86019, 2022
82022
Active learning empirical research on cross-version software defect prediction datasets
F Li, Y Qu, J Ji, D Zhang, L Li
International Journal of Performability Engineering 16 (4), 609, 2020
82020
EAFS: An efficient, accurate, and forward secure searchable encryption scheme supporting range search
P Tian, C Guo, KKR Choo, Y Liu, L Li, L Yao
IEEE Systems Journal 16 (2), 3450-3460, 2021
72021
A survey of researches on personalized bundle recommendation techniques
M Li, X Bao, L Chang, Z Xu, L Li
Machine Learning for Cyber Security: Third International Conference, ML4CS …, 2020
72020
The intrusion detection model based on parallel multi-artificial bee colony and support vector machine
L Li, S Zhang, Y Zhang, L Chang, T Gu
2019 Eleventh International Conference on Advanced Computational …, 2019
72019
Do we need to pay technical debt in blockchain software systems?
Y Qu, T Bao, X Chen, L Li, X Dou, M Yuan, H Wang
Connection Science 34 (1), 2026-2047, 2022
52022
Empirical evaluation on the impact of class overlap for EEG-based early epileptic seizure detection
Y Qu, X Chen, F Li, F Yang, J Ji, L Li
IEEE Access 8, 180328-180340, 2020
52020
A ciphertext-policy attribute-based encryption based on Multi-valued decision diagram
S Zhang, L Li, L Chang, T Gu, H Liu
Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018
52018
An empirical study of gradient-based explainability techniques for self-admitted technical debt detection
G Zhuang, Y Qu, L Li, X Dou, M Li
Journal of Internet Technology 23 (3), 631-641, 2022
42022
An empirical study on gan-based traffic congestion attack analysis: A visualized method
Y Li, Y Xiang, E Tong, W Niu, B Jia, L Li, J Liu, Z Han
Wireless Communications and Mobile Computing 2020, 1-14, 2020
42020
Design and analysis of a provable secure two-factor authentication protocol for internet of things
CM Chen, S Liu, X Li, S Kumari, L Li
Security and Communication Networks 2022, 2022
32022
TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making
Y Li, L Chang, L Li, X Bao, T Gu
Security and Communication Networks 2021, 1-14, 2021
32021
Expressive ciphertext-policy attribute-based encryption scheme with fast decryption and constant-size secret keys
L LI, T GU, L CHANG, Z XU, J QIAN
电子与信息学报 40 (7), 1661-1668, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20