Name
Affiliation
Papers
FENGHUA LI
Xidian Univ, Key Lab CNIS, Xian 710071, Peoples R China
86
Collaborators
Citations 
PageRank 
193
263
34.70
Referers 
Referees 
References 
699
1370
596
Search Limit
1001000
Title
Citations
PageRank
Year
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing00.342022
PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry00.342022
DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection00.342022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks10.352022
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack00.342022
A Framework for Personalized Location Privacy00.342022
ARCANE: An Efficient Architecture for Exact Machine Unlearning.00.342022
Scheduling Massive Camera Streams to Optimize Large-Scale Live Video Analytics00.342022
ARCANE: An Efficient Architecture for Exact Machine Unlearning00.342022
Efficiently Managing Large-Scale Keys in HDFS00.342021
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.10.372020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission10.342020
General Process Of Big Data Analysis And Visualisation00.342020
Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster00.342020
The Linear Geometry Structure of Label Matrix for Multi-label Learning.00.342020
Dynamic Countermeasures Selection for Multi-Path Attacks00.342020
Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs.00.342020
Privbus: A privacy-enhanced crowdsourced bus service via fog computing.30.372020
Utility-Aware Exponential Mechanism For Personalized Differential Privacy00.342020
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.00.342019
Incentive Mechanism For Cooperative Intrusion Response: A Dynamic Game Approach00.342019
Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario.40.362019
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System00.342019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet00.342019
On data visualization for securities investment fund analysis00.342019
Multi-Service Oriented Stream Data Synchronization Scheme For Multicore Cipher Chips00.342019
A game theoretic approach to cooperative intrusion detection.10.352019
Hierarchical Key Management Scheme with Multilevel Secure Access00.342019
An Extended Control Framework For Privacy-Preserving Photo Sharing Across Different Social Networks00.342019
Enhanced blockchain based key management scheme against key exposure attack00.342019
HideMe: Privacy-Preserving Photo Sharing on Social Networks40.422019
Combination Model of Heterogeneous Data for Security Measurement.00.342019
Privacy-Preserving Partner Selection for Ride-Sharing Services.60.452018
Selecting Combined Countermeasures For Multi-Attack Paths In Intrusion Response System00.342018
Security Measurement for Unknown Threats Based on Attack Preferences.10.362018
Photoplethysmography Based Psychological Stress Detection With Pulse Rate Variability Feature Differences And Elastic Net00.342018
Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach00.342018
Resolving Access Conflicts: An Auction-Based Incentive Approach00.342018
A game-theoretic approach to advertisement dissemination in ephemeral networks.10.362018
An Efficient Stream Data Processing Model for Multiuser Cryptographic Service00.342018
Privacy Computing: Concept, Computing Framework And Future Development Trends.20.382018
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services10.352018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.10.402018
Small-world: Secure friend matching over physical world and social networks.00.342017
A Privacy-Preserving Method for Photo Sharing in Instant Message Systems.10.352017
G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks00.342017
Cyberspace-Oriented Access Control: Model and Policies00.342017
Secure Transmission with Limited Feedback in MISOME Wiretap Channels00.342017
TrackU: Exploiting User's Mobility Behavior via WiFi List.00.342017
A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks.00.342017
  • 1
  • 2