Sign in
Jinguo Li
ORCID
Publication Activity (10 Years)
Years Active: 2011-2024
Publications (10 Years): 32
Top Topics
Authentication Scheme
Intrusion Detection
Sliding Window
Smart Grid
Top Venues
IEEE Access
Secur. Commun. Networks
VTC Fall
Multim. Tools Appl.
</>
Publications
</>
Yun Ni
,
Jinguo Li
,
Wenming Chang
,
Jifei Xiao
An LDP-Based Privacy-Preserving Longitudinal and Multidimensional Range Query Scheme in IoT.
IEEE Internet Things J.
11 (3) (2024)
Xiwen Wang
,
Kai Zhang
,
Jinguo Li
,
Mi Wen
,
Shengmin Xu
,
Jianting Ning
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J.
67 (1) (2024)
Jinguo Li
,
Yan Yan
,
Kai Zhang
,
Chunlin Li
,
Peichun Yuan
FPCNN: A fast privacy-preserving outsourced convolutional neural network with low-bandwidth.
Knowl. Based Syst.
283 (2024)
Runke Huang
,
Jinguo Li
Intrusion Detection based on Multi-measure Feature Selection and DSCA-BiLSTM in Fog Environment.
ICCBN
(2023)
Yingchun Chen
,
Jinguo Li
,
Naiwang Guo
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment.
Int. J. Inf. Sec.
22 (3) (2023)
Jianqiu Zeng
,
Kai Zhang
,
Liangliang Wang
,
Jinguo Li
FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system.
Multim. Tools Appl.
82 (24) (2023)
Chunlin Li
,
Jinguo Li
,
Kai Zhang
,
Yan Yan
,
Jianting Ning
Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy.
IEEE Trans. Cloud Comput.
11 (4) (2023)
Yi Li
,
Jinguo Li
,
Ping Meng
Attention-YOLOV4: a real-time and high-accurate traffic sign detection algorithm.
Multim. Tools Appl.
82 (5) (2023)
Lijian Liu
,
Jinguo Li
A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection.
TrustCom
(2022)
Leyan Shen
,
Liangliang Wang
,
Kai Zhang
,
Jinguo Li
,
Kefei Chen
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs.
J. Syst. Archit.
133 (2022)
Huiwen Wang
,
Liangliang Wang
,
Kai Zhang
,
Jinguo Li
,
Yiyuan Luo
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
IEEE Access
10 (2022)
Qingfeng Ding
,
Jinguo Li
AnoGLA: An efficient scheme to improve network anomaly detection.
J. Inf. Secur. Appl.
66 (2022)
Xubin Jiao
,
Jinguo Li
An Effective Intrusion Detection Model for Class-imbalanced Learning Based on SMOTE and Attention Mechanism.
PST
(2021)
Huanhuan Lv
,
Mi Wen
,
Rongxing Lu
,
Jinguo Li
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol.
70 (6) (2021)
Jiale Wu
,
Mi Wen
,
Rongxing Lu
,
Beibei Li
,
Jinguo Li
Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl.
13 (5) (2020)
Shaojing Zhou
,
Jinguo Li
,
Kai Zhang
,
Mi Wen
,
Qijie Guan
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access
8 (2020)
Pengpeng Ding
,
Jinguo Li
,
Liangliang Wang
,
Mi Wen
,
Yuyao Guan
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks
2020 (2020)
Jinguo Li
,
Mi Wen
,
Kai Zhang
Cloud-assisted secure and conjunctive publish/subscribe service in smart grids.
IET Inf. Secur.
14 (4) (2020)
Pengpeng Ding
,
Jinguo Li
,
Mi Wen
,
Liangliang Wang
,
Hongjiao Li
Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access
8 (2020)
Huanhuan Lv
,
Mi Wen
,
Rongxing Lu
,
Xuankai Wang
,
Jinguo Li
An Adversarial Attack with Fusion of Polarization for Unmanned Scenes.
VTC Fall
(2020)
Jinguo Li
,
Mi Wen
,
Kui Wu
,
Kejie Lu
,
Fengyong Li
,
Hongjiao Li
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl.
12 (4) (2019)
Xuankai Wang
,
Mi Wen
,
Jinguo Li
,
Zipeng Fu
,
Rongxing Lu
,
Kefei Chen
Adversarial attack against scene recognition system for unmanned vehicles.
ACM TUR-C
(2019)
Wenhao He
,
Hongjiao Li
,
Jinguo Li
Unknown Vulnerability Risk Assessment Based on Directed Graph Models: A Survey.
IEEE Access
7 (2019)
Shan Chen
,
Mi Wen
,
Rongxing Lu
,
Jinguo Li
,
Sijia Chen
Achieve Revocable Access Control for Fog-Based Smart Grid System.
VTC Fall
(2019)
Mi Wen
,
Xu Zhang
,
Hongwei Li
,
Jinguo Li
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid.
VTC Fall
(2017)
Fengyong Li
,
Mingquan Xin
,
Jinguo Li
,
Jiang Yu
Improved detection for copy-move forgery with multi-scale sliding windows.
ISPACS
(2017)
Jinguo Li
,
Mi Wen
,
Kejie Lu
,
Chunhua Gu
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks
9 (16) (2016)
Jinguo Li
,
Mi Wen
,
Tao Zhang
Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J.
3 (3) (2016)
Xiuxia Tian
,
Lisha Li
,
Jinguo Li
,
Hongjiao Li
,
Chunhua Gu
Secret Share Based Program Access Authorization Protocol for Smart Metering.
Int. J. Netw. Secur.
18 (6) (2016)
Jinguo Li
,
Mi Wen
,
Chunhua Gu
,
Hongwei Li
PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
ICC
(2016)
Jinguo Li
,
Yaping Lin
,
Mi Wen
,
Chunhua Gu
,
Bo Yin
Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
WASA
(2015)
Lin Xu
,
Mi Wen
,
Jinguo Li
A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks.
CIC
(2015)
Jinguo Li
,
Yaping Lin
,
Gang Wang
,
Rui Li
,
Bo Yin
Privacy and integrity preserving skyline queries in tiered sensor networks.
Secur. Commun. Networks
7 (7) (2014)
Ting Zhou
,
Yaping Lin
,
Wei Zhang
,
Sheng Xiao
,
Jinguo Li
Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks.
SecureComm
(2013)
Gang Wang
,
Yaping Lin
,
Jinguo Li
,
Xin Yao
A Multi-dimensional Packet Classification Algorithm Based on Hierarchical All-Match B+ Tree.
HPCC/EUC
(2013)
Aobo Pan
,
Yaping Lin
,
Wenjie Che
,
Zhiqiang You
,
Yonghe Liu
,
Jinguo Li
A comprehensive metering scheme for intellectual property protection during both after-sale and evaluation periods of IC design.
IEICE Electron. Express
10 (19) (2013)
Gang Wang
,
Yaping Lin
,
Rui Li
,
Jinguo Li
,
Xin Yao
,
Peng Liu
Towards Dynamic and Scalable High-Speed IP Address Lookup Based on B+ Tree.
IEICE Trans. Inf. Syst.
(9) (2012)
Yin Ma Fu
,
Jinguo Li
,
Weiwei Wu
,
Wei Li
,
Lijun Cai
Evaluation Method for Milling Machining Deformation of Thin-Walled Structures.
CSEE (3)
(2011)