A ciphertext-policy attribute-based encryption based on an ordered binary decision diagram L Li, T Gu, L Chang, Z Xu, Y Liu, J Qian IEEE access 5, 1137-1145, 2017 | 73 | 2017 |
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones N Zhang, Q Jiang, L Li, X Ma, J Ma Peer-to-Peer Networking and Applications 14, 3319-3332, 2021 | 28 | 2021 |
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain X Tang, C Guo, KKR Choo, Y Liu, L Li Computer Networks 200, 108540, 2021 | 25 | 2021 |
Knowledge-based interactive postmining of user-preferred co-location patterns using ontologies X Bao, T Gu, L Chang, Z Xu, L Li IEEE Transactions on Cybernetics 52 (9), 9467-9480, 2021 | 17 | 2021 |
Attacks and solutions for a two-factor authentication protocol for wireless body area networks CM Chen, Z Li, SA Chaudhry, L Li Security and Communication Networks 2021, 1-12, 2021 | 14 | 2021 |
Location privacy protection scheme for LBS in IoT H Li, X Xue, Z Li, L Li, J Xiong Wireless Communications and Mobile Computing 2021, 1-18, 2021 | 12 | 2021 |
Intrusion detection system based on improved abc algorithm with tabu search T Gu, H Chen, L Chang, L Li IEEJ Transactions on Electrical and Electronic Engineering 14 (11), 1652-1660, 2019 | 11 | 2019 |
Can we predict student performance based on tabular and textual data? Y Qu, F Li, L Li, X Dou, H Wang IEEE Access 10, 86008-86019, 2022 | 8 | 2022 |
Active learning empirical research on cross-version software defect prediction datasets F Li, Y Qu, J Ji, D Zhang, L Li International Journal of Performability Engineering 16 (4), 609, 2020 | 8 | 2020 |
EAFS: An efficient, accurate, and forward secure searchable encryption scheme supporting range search P Tian, C Guo, KKR Choo, Y Liu, L Li, L Yao IEEE Systems Journal 16 (2), 3450-3460, 2021 | 7 | 2021 |
A survey of researches on personalized bundle recommendation techniques M Li, X Bao, L Chang, Z Xu, L Li Machine Learning for Cyber Security: Third International Conference, ML4CS …, 2020 | 7 | 2020 |
The intrusion detection model based on parallel multi-artificial bee colony and support vector machine L Li, S Zhang, Y Zhang, L Chang, T Gu 2019 Eleventh International Conference on Advanced Computational …, 2019 | 7 | 2019 |
Do we need to pay technical debt in blockchain software systems? Y Qu, T Bao, X Chen, L Li, X Dou, M Yuan, H Wang Connection Science 34 (1), 2026-2047, 2022 | 5 | 2022 |
Empirical evaluation on the impact of class overlap for EEG-based early epileptic seizure detection Y Qu, X Chen, F Li, F Yang, J Ji, L Li IEEE Access 8, 180328-180340, 2020 | 5 | 2020 |
A ciphertext-policy attribute-based encryption based on Multi-valued decision diagram S Zhang, L Li, L Chang, T Gu, H Liu Intelligent Information Processing IX: 10th IFIP TC 12 International …, 2018 | 5 | 2018 |
An empirical study of gradient-based explainability techniques for self-admitted technical debt detection G Zhuang, Y Qu, L Li, X Dou, M Li Journal of Internet Technology 23 (3), 631-641, 2022 | 4 | 2022 |
An empirical study on gan-based traffic congestion attack analysis: A visualized method Y Li, Y Xiang, E Tong, W Niu, B Jia, L Li, J Liu, Z Han Wireless Communications and Mobile Computing 2020, 1-14, 2020 | 4 | 2020 |
Design and analysis of a provable secure two-factor authentication protocol for internet of things CM Chen, S Liu, X Li, S Kumari, L Li Security and Communication Networks 2022, 2022 | 3 | 2022 |
TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making Y Li, L Chang, L Li, X Bao, T Gu Security and Communication Networks 2021, 1-14, 2021 | 3 | 2021 |
Expressive ciphertext-policy attribute-based encryption scheme with fast decryption and constant-size secret keys L LI, T GU, L CHANG, Z XU, J QIAN 电子与信息学报 40 (7), 1661-1668, 2018 | 3 | 2018 |