Follow
Hongjuan Li
Title
Cited by
Cited by
Year
Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks
H Li, K Lin, K Li
Computer Communications 34 (4), 591-597, 2011
1892011
Body area network security: a fuzzy attribute-based signcryption scheme
C Hu, N Zhang, H Li, X Cheng, X Liao
IEEE journal on selected areas in communications 31 (9), 37-46, 2013
1672013
Secure and efficient data communication protocol for wireless body area networks
C Hu, H Li, Y Huo, T Xiang, X Liao
IEEE Transactions on Multi-Scale Computing Systems 2 (2), 94-107, 2016
1572016
Channel quality prediction based on Bayesian inference in cognitive radio networks
X Xing, T Jing, Y Huo, H Li, X Cheng
2013 Proceedings IEEE Infocom, 1465-1473, 2013
1362013
Cooperative relay selection in cognitive radio networks
T Jing, S Zhu, H Li, X Xing, X Cheng, Y Huo, R Bie, T Znati
IEEE Transactions on Vehicular Technology 64 (5), 1872-1881, 2014
1102014
Cooperative relay selection in cognitive radio networks
TJ , Shixiang Zhu, Hongjuan Li, Xiuzhen Cheng, Yan Huo
INFOCOM, 175-179, 2013
110*2013
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks
H Li, X Xing, J Zhu, X Cheng, K Li, R Bie, T Jing
IEEE Transactions on Vehicular Technology 66 (1), 645-655, 2017
882017
Utility-based cooperative spectrum sensing scheduling in cognitive radio networks
H Li, X Cheng, K Li, X Xing, T Jing
2013 Proceedings IEEE INFOCOM, 165-169, 2013
882013
Optimal spectrum sensing interval in cognitive radio networks
X Xing, T Jing, H Li, Y Huo, X Cheng, T Znati
IEEE Transactions on parallel and Distributed Systems 25 (9), 2408-2417, 2013
552013
Robust collaborative spectrum sensing schemes for cognitive radio networks
H Li, X Cheng, K Li, C Hu, N Zhang, W Xue
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2190-2200, 2013
472013
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
H Li, K Li, W Qu, I Stojmenovic
ICA3PP, 2-13, 2014
362014
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
H Li, K Li, W Qu, I Stojmenovic
Future Generation Computer Systems 37, 108-116, 2014
362014
An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks
L Ju, H Li, Y Liu, W Xue, K Li, Z Chi
2010 Proceedings of the 5th International Conference on Ubiquitous …, 2010
342010
Detecting driver phone calls in a moving vehicle based on voice features
T Song, X Cheng, H Li, J Yu, S Wang, R Bie
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
202016
Perturbation-based private profile matching in social networks
R Li, H Li, X Cheng, X Zhou, K Li, S Wang, R Bie
IEEE Access 5, 19720-19732, 2017
112017
Efficient customized privacy preserving friend discovery in mobile social networks
H Li, X Cheng, K Li, Z Tian
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
112015
Secure friend discovery based on encounter history in mobile social networks.
HL Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen
Personal and Ubiquitous Computing 19 (7), 999-1009, 2015
102015
Secure Friend Discovery Based on Encounter History in Mobile Social Networks
HL , Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen
Identification, Information and Knowledge in the Internet of Things (IIKI …, 2014
10*2014
A practically optimized implementation of attribute based cryptosystems
C Hu, F Zhang, T Xiang, H Li, X Xiao, G Huang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
82014
A fast approach to unknown tag identification in large scale RFID systems
X Liu, K Li, Y Shen, G Min, B Xiao, W Qu, H Li
2013 22nd International Conference on Computer Communication and Networks …, 2013
82013
The system can't perform the operation now. Try again later.
Articles 1–20