default search action
Li Yang 0005
Person information
- affiliation: Xidian University, School of Cyber Engineering, Xi'an, China
- affiliation (PhD 2010): Xidian University, Cryptography, Xi'an, China
Other persons with the same name
- Li Yang — disambiguation page
- Li Yang 0001 — University of Tennessee, Department of Computer Science, Chattanooga, TN, USA (and 1 more)
- Li Yang 0002 — Chongqing University, Bioengineering College, China
- Li Yang 0003 — Beijing Institute of Technology, School of Mechatronical Engineering, China (and 2 more)
- Li Yang 0004 — Beihang University, School of Reliability and Systems Engineering, Beijing, China
- Li Yang 0006 — Southwest Petroleum University, School of Computer Science, Chengdu, China
- Li Yang 0007 — University of Plymouth, UK
- Li Yang 0008 — Western Michigan University, Department of Computer Science, Kalamazoo, MI, USA
- Li Yang 0009 — University of North Carolina at Charlotte, NC, USA (and 1 more)
- Li Yang 0010 — University of Western Ontario, London, ON, Canada
- Li Yang 0011 — University of Alcalá, Alcalá de Henares, Madrid, Spain
- Li Yang 0012 — Hunan University, Changsha, Hunan, China (and 1 more)
- Li Yang 0013 — China Agricultural University, Beijing, China
- Li Yang 0014 — Beihang University, School of Electronic and Information Engineering, Beijing, China
- Li Yang 0015 — Insititute of Software, Chinese Academy of Sciences, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Pengbin Feng, Le Gai, Li Yang, Qin Wang, Teng Li, Ning Xi, Jian Feng Ma:
DawnGNN: Documentation augmented windows malware detection using graph neural network. Comput. Secur. 140: 103788 (2024) - [j26]Yuchen Wang, Xiaoguang Li, Li Yang, Jianfeng Ma, Hui Li:
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction. IEEE Trans. Dependable Secur. Comput. 21(3): 1139-1154 (2024) - [c16]Yuchen Wang, Xiaoguang Li, Li Yang, Lu Zhou, Jianfeng Ma, Hui Li:
Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models. ICME 2024: 1-6 - [c15]Anyuan Sang, Yuchen Wang, Li Yang, Junbo Jia, Lu Zhou:
Obfuscating Provenance-Based Forensic Investigations with Mapping System Meta-Behavior. RAID 2024: 248-262 - 2023
- [j25]Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jian-Feng Ma:
BejaGNN: behavior-based Java malware detection via graph neural network. J. Supercomput. 79(14): 15390-15414 (2023) - [j24]Li Yang, Xi Li, Zhuoru Ma, Lu Li, Neal N. Xiong, Jianfeng Ma:
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios. ACM Trans. Internet Techn. 23(2): 35:1-35:29 (2023) - 2022
- [j23]Li Yang, Cheng Li, Teng Wei, Fengwei Zhang, Jianfeng Ma, Naixue Xiong:
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices. IEEE Internet Things J. 9(12): 10093-10107 (2022) - [j22]Li Yang, Cheng Li, Yuting Cheng, Shui Yu, Jianfeng Ma:
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection. Inf. Sci. 582: 529-546 (2022) - [j21]Cheng Li, Li Yang, Shui Yu, Wenjing Qin, Jian Feng Ma:
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things. Inf. Sci. 612: 151-167 (2022) - [c14]Cheng Li, Li Yang, Shui Yu, Wenjing Qin, Jianfeng Ma:
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things. ICC 2022: 2792-2797 - 2021
- [j20]Huihui Guo, Li Yang, Zeyu Liu:
UserRBPM: User Retweet Behavior Prediction with Graph Representation Learning. Wirel. Commun. Mob. Comput. 2021: 4431416:1-4431416:17 (2021) - [c13]Wenjing Qin, Li Yang, Jianfeng Ma:
FedGR: A Lossless-Obfuscation Approach for Secure Federated Learning. GLOBECOM 2021: 1-6 - 2020
- [j19]Cheng Li, Li Yang, Jian-Feng Ma:
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model. Wirel. Commun. Mob. Comput. 2020: 8825623:1-8825623:16 (2020) - [c12]Yifang Zhi, Li Yang, Gaolei Yang, Yuehong Zhang:
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4. SPDE 2020: 50-64
2010 – 2019
- 2019
- [j18]Li Yang, Xiaoyan Jin, Qi Jiang:
Online handwritten signature verification based on the most stable feature and partition. Clust. Comput. 22(Suppl 1): 1691-1701 (2019) - [j17]Liaoliang Jiang, Yuting Cheng, Li Yang, Jing Li, Hongyang Yan, Xiaoqin Wang:
A trust-based collaborative filtering algorithm for E-commerce recommendation system. J. Ambient Intell. Humaniz. Comput. 10(8): 3023-3034 (2019) - [j16]Li Yang, Yifang Zhi, Teng Wei, Shui Yu, Jianfeng Ma:
Inference attack in Android Activity based on program fingerprint. J. Netw. Comput. Appl. 127: 92-106 (2019) - [j15]Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma:
Fingerprint Protected Password Authentication Protocol. Secur. Commun. Networks 2019: 1694702:1-1694702:12 (2019) - [c11]Xiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma:
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. ACISP 2019: 533-551 - [c10]Yuting Cheng, Li Yang, Shui Yu, Jianfeng Ma:
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation. CANS 2019: 392-411 - [c9]Yifang Zhi, Li Yang, Shui Yu, Jianfeng Ma:
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function. CSS (1) 2019: 73-88 - [c8]Li Yang, Jiaxue Wang, Huihui Guo, Jianfeng Ma:
An Automatic Crisis Information Recognition Model Based on BP Neural Network. NaNA 2019: 446-451 - [c7]Jiacheng Zhang, Li Yang, Shui Yu, Jianfeng Ma:
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration. NSS 2019: 520-535 - 2018
- [j14]Li Yang, Teng Wei, Fengwei Zhang, Jianfeng Ma:
SADUS: Secure data deletion in user space for mobile devices. Comput. Secur. 77: 612-626 (2018) - [j13]Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, Jianfeng Ma:
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Humaniz. Comput. 9(4): 1061-1073 (2018) - [j12]Li Yang, Ziyi Han, Zhengan Huang, Jianfeng Ma:
A remotely keyed file encryption scheme under mobile cloud computing. J. Netw. Comput. Appl. 106: 90-99 (2018) - [j11]Qi Jiang, Jianbing Ni, Jianfeng Ma, Li Yang, Xuemin Shen:
Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing. IEEE Netw. 32(3): 28-35 (2018) - [j10]Li Yang, Yafeng Qiao, Zhihong Liu, Jianfeng Ma, Xinghua Li:
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm. Soft Comput. 22(2): 453-464 (2018) - [j9]Li Yang, Yuting Cheng, Xianmin Wang, Qiang Liu:
Online handwritten signature verification using feature weighting algorithm relief. Soft Comput. 22(23): 7811-7823 (2018) - [c6]Li Yang, Teng Wei, Jianfeng Ma, Shui Yu, Chao Yang:
Inference Attack in Android Activity based on Program Fingerprint. CNS 2018: 1-9 - 2017
- [j8]Li Yang, Yaping Tian, Jin Li, Jianfeng Ma, Junwei Zhang:
Identifying opinion leaders in social networks with topic limitation. Clust. Comput. 20(3): 2403-2413 (2017) - [j7]Hui Lin, Jia Hu, Youliang Tian, Li Yang, Li Xu:
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism. Inf. Sci. 387: 238-253 (2017) - [c5]Li Yang, Xiaoqin Wang, Yaping Tian:
A Trusted Recommendation Scheme Based on the Improved Slope One Algorithm. CSE/EUC (1) 2017: 77-84 - [c4]Ziyi Han, Li Yang, Qiang Liu:
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing. NaNA 2017: 341-346 - [i1]Zhihong Liu, Jiajia Liu, Yong Zeng, Li Yang, Jianfeng Ma:
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty. CoRR abs/1712.05099 (2017) - 2015
- [j6]Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang:
Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11): 1-15 (2015) - [j5]Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang:
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks. Comput. J. 58(4): 656-667 (2015) - [j4]Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang:
A delegation based cross trusted domain direct anonymous attestation scheme. Comput. Networks 81: 245-257 (2015) - 2014
- [j3]Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang:
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wirel. Pers. Commun. 77(2): 1489-1506 (2014) - [c3]Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao:
Multi-domain Direct Anonymous Attestation Scheme from Pairings. NSS 2014: 566-573 - 2013
- [j2]Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang:
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 68(4): 1477-1491 (2013) - 2012
- [j1]Li Yang, Jianfeng Ma, Qi Jiang:
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. Int. J. Netw. Secur. 14(3): 156-163 (2012) - [c2]Li Yang, Jianfeng Ma, Zhihong Liu, Ruofan Zheng:
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation. INCoS 2012: 279-285 - 2010
- [c1]Li Yang, Jianfeng Ma, Junwei Zhang:
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms. CIS 2010: 334-338
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint