Login / Signup
Li Yang
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 30
Top Topics
Handwritten Signature Verification
Filtering Algorithm
Cloud Computing
Feature Weighting
Top Venues
Clust. Comput.
Wirel. Commun. Mob. Comput.
J. Netw. Comput. Appl.
Soft Comput.
</>
Publications
</>
Yuchen Wang
,
Xiaoguang Li
,
Li Yang
,
Jianfeng Ma
,
Hui Li
ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction.
IEEE Trans. Dependable Secur. Comput.
21 (3) (2024)
Li Yang
,
Xi Li
,
Zhuoru Ma
,
Lu Li
,
Neal N. Xiong
,
Jianfeng Ma
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios.
ACM Trans. Internet Techn.
23 (2) (2023)
Li Yang
,
Cheng Li
,
Teng Wei
,
Fengwei Zhang
,
Jianfeng Ma
,
Naixue Xiong
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J.
9 (12) (2022)
Huihui Guo
,
Li Yang
,
Zeyu Liu
UserRBPM: User Retweet Behavior Prediction with Graph Representation Learning.
Wirel. Commun. Mob. Comput.
2021 (2021)
Yifang Zhi
,
Li Yang
,
Gaolei Yang
,
Yuehong Zhang
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4.
SPDE
(2020)
Cheng Li
,
Li Yang
,
Jian-Feng Ma
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model.
Wirel. Commun. Mob. Comput.
2020 (2020)
Xiaojian Pang
,
Li Yang
,
Maozhen Liu
,
Jianfeng Ma
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone.
ACISP
(2019)
Yifang Zhi
,
Li Yang
,
Shui Yu
,
Jianfeng Ma
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
CSS (1)
(2019)
Li Yang
,
Xiaoyan Jin
,
Qi Jiang
Online handwritten signature verification based on the most stable feature and partition.
Clust. Comput.
22 (Suppl 1) (2019)
Yuting Cheng
,
Li Yang
,
Shui Yu
,
Jianfeng Ma
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
CANS
(2019)
Li Yang
,
Jiaxue Wang
,
Huihui Guo
,
Jianfeng Ma
An Automatic Crisis Information Recognition Model Based on BP Neural Network.
NaNA
(2019)
Chao Yang
,
Junwei Zhang
,
Jingjing Guo
,
Yu Zheng
,
Li Yang
,
Jianfeng Ma
Fingerprint Protected Password Authentication Protocol.
Secur. Commun. Networks
2019 (2019)
Li Yang
,
Yifang Zhi
,
Teng Wei
,
Shui Yu
,
Jianfeng Ma
Inference attack in Android Activity based on program fingerprint.
J. Netw. Comput. Appl.
127 (2019)
Liaoliang Jiang
,
Yuting Cheng
,
Li Yang
,
Jing Li
,
Hongyang Yan
,
Xiaoqin Wang
A trust-based collaborative filtering algorithm for E-commerce recommendation system.
J. Ambient Intell. Humaniz. Comput.
10 (8) (2019)
Jiacheng Zhang
,
Li Yang
,
Shui Yu
,
Jianfeng Ma
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
NSS
(2019)
Li Yang
,
Teng Wei
,
Fengwei Zhang
,
Jianfeng Ma
SADUS: Secure data deletion in user space for mobile devices.
Comput. Secur.
77 (2018)
Li Yang
,
Yuting Cheng
,
Xianmin Wang
,
Qiang Liu
Online handwritten signature verification using feature weighting algorithm relief.
Soft Comput.
22 (23) (2018)
Li Yang
,
Yafeng Qiao
,
Zhihong Liu
,
Jianfeng Ma
,
Xinghua Li
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput.
22 (2) (2018)
Li Yang
,
Ziyi Han
,
Zhengan Huang
,
Jianfeng Ma
A remotely keyed file encryption scheme under mobile cloud computing.
J. Netw. Comput. Appl.
106 (2018)
Qi Jiang
,
Jianbing Ni
,
Jianfeng Ma
,
Li Yang
,
Xuemin Shen
Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Netw.
32 (3) (2018)
Li Yang
,
Teng Wei
,
Jianfeng Ma
,
Shui Yu
,
Chao Yang
Inference Attack in Android Activity based on Program Fingerprint.
CNS
(2018)
Qi Jiang
,
Zhiren Chen
,
Bingyan Li
,
Jian Shen
,
Li Yang
,
Jianfeng Ma
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput.
9 (4) (2018)
Zhihong Liu
,
Jiajia Liu
,
Yong Zeng
,
Li Yang
,
Jianfeng Ma
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR
(2017)
Li Yang
,
Xiaoqin Wang
,
Yaping Tian
A Trusted Recommendation Scheme Based on the Improved Slope One Algorithm.
CSE/EUC (1)
(2017)
Ziyi Han
,
Li Yang
,
Qiang Liu
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing.
NaNA
(2017)
Hui Lin
,
Jia Hu
,
Youliang Tian
,
Li Yang
,
Li Xu
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci.
387 (2017)
Li Yang
,
Yaping Tian
,
Jin Li
,
Jianfeng Ma
,
Junwei Zhang
Identifying opinion leaders in social networks with topic limitation.
Clust. Comput.
20 (3) (2017)
Junwei Zhang
,
Jianfeng Ma
,
Chao Yang
,
Li Yang
Universally composable secure positioning in the bounded retrieval model.
Sci. China Inf. Sci.
58 (11) (2015)
Li Yang
,
Jianfeng Ma
,
Wenjing Lou
,
Qi Jiang
A delegation based cross trusted domain direct anonymous attestation scheme.
Comput. Networks
81 (2015)
Hui Lin
,
Jia Hu
,
Jianfeng Ma
,
Li Xu
,
Li Yang
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J.
58 (4) (2015)
Li Yang
,
Jianfeng Ma
,
Wei Wang
,
Chunjie Cao
Multi-domain Direct Anonymous Attestation Scheme from Pairings.
NSS
(2014)
Qi Jiang
,
Jianfeng Ma
,
Guangsong Li
,
Li Yang
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wirel. Pers. Commun.
77 (2) (2014)
Qi Jiang
,
Jianfeng Ma
,
Guangsong Li
,
Li Yang
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun.
68 (4) (2013)
Li Yang
,
Jianfeng Ma
,
Zhihong Liu
,
Ruofan Zheng
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
INCoS
(2012)
Li Yang
,
Jianfeng Ma
,
Qi Jiang
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
Int. J. Netw. Secur.
14 (3) (2012)
Li Yang
,
Jianfeng Ma
,
Junwei Zhang
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
CIS
(2010)