​
Login / Signup
Li Li
Publication Activity (10 Years)
Years Active: 2007-2022
Publications (10 Years): 15
Top Topics
Trust Aware
Cognitive Radio
Secret Image
Ad Hoc Networks
Top Venues
CoRR
Wirel. Pers. Commun.
Signal Process.
ICDIP
</>
Publications
</>
Li Li
,
Ahmed A. Abd El-Latif
,
Sajad Jafari
,
Karthikeyan Rajagopal
,
Fahimeh Nazarimehr
,
Bassem Abd-El-Atty
Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold.
Sensors
22 (1) (2022)
Xiaoxiong Zhong
,
Xinghan Wang
,
Li Li
,
Yuanyuan Yang
,
Yang Qin
,
Tingting Yang
,
Bin Zhang
,
Weizhe Zhang
CL-ADMM: A Cooperative-Learning-Based Optimization Framework for Resource Management in MEC.
IEEE Internet Things J.
8 (10) (2021)
Xinghan Wang
,
Xiaoxiong Zhong
,
Li Li
,
Sheng Zhang
,
Renhao Lu
,
Tingting Yang
TOT: Trust aware opportunistic transmission in cognitive radio Social Internet of Things.
Comput. Commun.
162 (2020)
Xiaoxiong Zhong
,
Li Li
,
Sheng Zhang
,
Renhao Lu
ECOR: An Energy Aware Coded Opportunistic Routing for Cognitive Radio Social Internet of Things.
Wirel. Pers. Commun.
110 (1) (2020)
Li Li
,
M. Shamim Hossain
,
Ahmed A. Abd El-Latif
,
Mohammed F. Alhamid
Distortion less secret image sharing scheme for Internet of Things system.
Clust. Comput.
22 (Suppl 1) (2019)
Xiaoxiong Zhong
,
Renhao Lu
,
Li Li
,
Xinghan Wang
,
Yanbin Zheng
DSOR: A Traffic-Differentiated Secure opportunistic Routing with Game Theoretic Approach in MANETs.
ISCC
(2019)
Xinghan Wang
,
Xiaoxiong Zhong
,
Li Li
,
Renhao Lu
,
Yanbin Zheng
PSOGT: PSO and Game Theoretic Based Task Allocation in Mobile Edge Computing.
HPCC/SmartCity/DSS
(2019)
Xiaoxiong Zhong
,
Renhao Lu
,
Li Li
,
Sheng Zhang
ETOR: Energy and Trust Aware Opportunistic Routing in Cognitive Radio Social Internet of Things.
GLOBECOM
(2017)
Li Li
,
Bassem Abd-El-Atty
,
Ahmed A. Abd El-Latif
,
Ahmed Ghoneim
Quantum color image encryption based on multiple discrete chaotic systems.
FedCSIS
(2017)
Yang Qin
,
Xiaoxiong Zhong
,
Yuanyuan Yang
,
Li Li
,
Fangshan Wu
TCPJGNC: A transport control protocol based on network coding for multi-hop cognitive radio networks.
Comput. Commun.
79 (2016)
Li Li
,
Xiaoxiong Zhong
,
Yang Qin
A secure routing based on social trust in opportunistic networks.
ICCS
(2016)
Li Li
,
Yang Qin
,
Xiaoxiong Zhong
,
Hongbin Chen
An incentive aware routing for selfish opportunistic networks: A game theoretic approach.
WCSP
(2016)
Li Li
,
Yang Qin
,
Xiaoxiong Zhong
A Novel Routing Scheme for Resource-Constraint Opportunistic Networks: A Cooperative Multiplayer Bargaining Game Approach.
IEEE Trans. Veh. Technol.
65 (8) (2016)
Xiaoxiong Zhong
,
Renhao Lu
,
Li Li
Social-Based Broadcast in Cognitive Radio Networks: A Network Coding Perspective.
iThings/GreenCom/CPSCom/SmartData
(2016)
Yang Qin
,
Xiaoxiong Zhong
,
Yuanyuan Yang
,
Li Li
,
Yibin Ye
Combined channel assignment and network coded opportunistic routing in cognitive radio networks.
Comput. Electr. Eng.
52 (2016)
Yang Qin
,
Li Li
,
Xiaoxiong Zhong
,
Yuanyuan Yang
,
Choon Lim Gwee
A Cross-Layer QoS Design with Energy and Traffic Balance Aware for Different Types of Traffic in MANETs.
Wirel. Pers. Commun.
85 (3) (2015)
Xiaoxiong Zhong
,
Yang Qin
,
Yuanyuan Yang
,
Li Li
CROR: Coding-Aware Opportunistic Routing in Multi-Channel Cognitive Radio Networks.
CoRR
(2015)
Xiaoxiong Zhong
,
Yang Qin
,
Li Li
TCPNC-DGSA: Efficient Network Coding Scheme for TCP in Multi-hop Cognitive Radio Networks.
Wirel. Pers. Commun.
84 (2) (2015)
Xiaoxiong Zhong
,
Yang Qin
,
Li Li
Transport Protocols in Cognitive Radio Networks: A Survey.
CoRR
(2015)
Xiaoxiong Zhong
,
Yang Qin
,
Li Li
Capacity Analysis in Multi-Radio Multi-Channel Cognitive Radio Networks: A Small World Perspective.
CoRR
(2015)
Yang Qin
,
Li Li
,
Xiaoxiong Zhong
,
Yuanyuan Yang
,
Yibin Ye
Opportunistic routing with admission control in wireless ad hoc networks.
Comput. Commun.
55 (2015)
Xiaoxiong Zhong
,
Yang Qin
,
Li Li
Capacity Analysis in Multi-Radio Multi-Channel Cognitive Radio Networks: A Small World Perspective.
Wirel. Pers. Commun.
79 (3) (2014)
Yang Qin
,
Xiaoxiong Zhong
,
Yuanyuan Yang
,
Yanlin Li
,
Li Li
Joint channel assignment and opportunistic routing for maximizing throughput in cognitive radio networks.
GLOBECOM
(2014)
Xiaoxiong Zhong
,
Yang Qin
,
Yuanyuan Yang
,
Li Li
CROR: Coding-aware opportunistic routing in multi-channel cognitive radio networks.
GLOBECOM
(2014)
Yang Qin
,
Li Li
,
Hu Liu
GTR: A novel routing scheme based on game theory in opportunistic networks.
ICCC
(2014)
Ahmed A. Abd El-Latif
,
Li Li
,
Xiamu Niu
A new image encryption scheme based on cyclic elliptic curve and chaotic system.
Multim. Tools Appl.
70 (3) (2014)
Yang Qin
,
Xiaoxiong Zhong
,
Yuanyuan Yang
,
Yanlin Li
,
Li Li
Joint Channel Assignment and Opportunistic Routing for Maximizing Throughput in Cognitive Radio Networks.
CoRR
(2014)
Xiaoxiong Zhong
,
Yang Qin
,
Li Li
Transport Protocols in Cognitive Radio Networks: A Survey.
KSII Trans. Internet Inf. Syst.
8 (11) (2014)
Ahmed A. Abd El-Latif
,
Li Li
,
Ning Wang
,
Qi Han
,
Xiamu Niu
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces.
Signal Process.
93 (11) (2013)
Li Li
,
Ahmed A. Abd El-Latif
,
Xiamu Niu
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images.
Signal Process.
92 (4) (2012)
Liqun Zhao
,
Yang Qin
,
Maode Ma
,
Xiaoxiong Zhong
,
Li Li
QoS guaranteed resource block allocation algorithm in LTE downlink.
CHINACOM
(2012)
Ahmed A. Abd El-Latif
,
Li Li
,
Ning Wang
,
Qiong Li
,
Xiamu Niu
A new image encryption based on chaotic systems and singular value decomposition.
ICDIP
(2012)
Yang Qin
,
Xiaoxiong Zhong
,
Li Li
,
Zhenhua Su
,
Xuebing Li
A MAC protocol based on dynamic time adjusting in wireless MIMO networks.
CHINACOM
(2012)
Li Li
,
Ahmed A. Abd El-Latif
A novel secret image sharing scheme based on chaotic system.
ICDIP
(2012)
Xin He
,
Huiyun Jing
,
Xuefeng Bai
,
Li Li
,
Qi Han
,
Xiamu Niu
Saliency based SIFT keypoints filtration.
ICDIP
(2012)
Chuanjun Wang
,
Li Li
,
Xuefeng Bai
,
Xiamu Niu
A Novel Expression Deformation Model for 3D Face Recognition.
IEICE Trans. Inf. Syst.
(12) (2012)
Li Li
,
Ahmed A. Abd El-Latif
,
Xiamu Niu
Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]
Signal Process.
92 (9) (2012)
Ahmed A. Abd El-Latif
,
Li Li
,
Ning Wang
,
Xiamu Niu
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems.
IIH-MSP
(2011)
Li Li
,
Qi Han
,
Xiamu Niu
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network.
IIH-MSP
(2010)
Li Li
,
Jing Wu
,
Xiaowei Guo
,
Meng Li
,
Xiamu Niu
Framework for Windows Password Function Security Enhancement.
IIH-MSP
(2007)