Name
Affiliation
Papers
QING-HUA LI
Huazhong University of Science & Technology, China
98
Collaborators
Citations 
PageRank 
147
1563
88.15
Referers 
Referees 
References 
3335
1861
1025
Search Limit
1001000
Title
Citations
PageRank
Year
Towards Automated Assessment of Vulnerability Exposures in Security Operations00.342021
A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange10.362021
Towards Uniform Point Density: Evaluation of an Adaptive Terrestrial Laser Scanner.00.342019
Optimal Data Collection of MP-MR-MC Wireless Sensors Network for Structural Monitoring.00.342018
Process Modeling and Monitoring With Incomplete Data Based on Robust Probabilistic Partial Least Square Method.00.342018
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud.00.342018
PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing.10.352018
Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming00.342018
Privacy-Preserving Multiparty Learning For Logistic Regression.00.342018
Hiding Critical Targets in Smart Grid Networks00.342018
PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones00.342018
Inferring Mobile Apps from Resource Usage Patterns00.342017
Secure and efficient outsourcing of large-scale nonlinear programming10.362017
Dual-channel supply chain decisions under asymmetric information with a risk-averse retailer80.532017
Access Control for Distributed Processing Systems: Use Cases and General Considerations00.342017
Deep learning-based data forgery detection in automatic generation control.00.342017
Discover Patterns and Mobility of Twitter Users - A Study of Four US College Cities.40.432017
Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense10.352017
Note on stratified L-ordered convergence structures.00.342016
Cognitive networking for next-G wireless communications00.342016
PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.120.572016
Decomposing Lidar Waveforms With Nonparametric Classification Methods00.342016
PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones50.392016
A Fuzzy Mean-Shift Approach to Lidar Waveform Decomposition.20.362016
Providing Privacy-Aware Incentives in Mobile Sensing Systems.120.662016
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation50.412015
The effects of flooding attacks on time-critical communications in the smart grid10.352015
Privacy-preserving participatory sensing.60.442015
Privacy-aware and trustworthy data aggregation in mobile sensing20.382015
A novel attack to spatial cloaking schemes in location-based services130.602015
Cell Detection In High Frequency Band Small Cell Networks20.382015
Enhancing Privacy Through Caching In Location-Based Services310.842015
Achieving k-anonymity in privacy-aware location-based services842.352014
Forwarding redundancy in opportunistic mobile networks: Investigation and elimination110.592014
Fast reference governors for second-order linear systems with constraints and an input time-delay.10.372014
A Novel Sink Mobility Off-Line Algorithm For Avoiding Energy Hole In Wireless Sensor Network00.342014
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services80.502014
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing351.132014
Providing Efficient Privacy-Aware Incentives for Mobile Sensing340.982014
Concurrent PLS-based process monitoring with incomplete input and quality measurements.00.342014
Minimum description length constrained LiDAR waveform decomposition00.342014
Online Fault Detection Of Hrg Based On An Improved Support Vector Machine00.342013
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error.130.632013
Autonomous integrated navigation for indoor robots utilizing on-line iterated extended rauch-tung-striebel smoothing20.452013
Wakeup Scheduling For Energy-Efficient Communication In Opportunistic Mobile Networks190.752013
Reference governor for second order constrained linear systems with small input time delays00.342013
Practical downlink transmission schemes for future LTE systems with many base-station antennas.30.672013
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks110.562013
iHEMS: An information-centric approach to secure home energy management161.152012
Efficient and privacy-preserving data aggregation in mobile sensing120.562012
  • 1
  • 2