LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks F Li, J Wu 2009 6th annual IEEE communications society conference on sensor, mesh and …, 2009 | 202 | 2009 |
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets F Li, J Wu, A Srinivasan IEEE INFOCOM 2009, 2428-2436, 2009 | 198 | 2009 |
MOPS: Providing content-based service in disruption-tolerant networks F Li, J Wu 2009 29th IEEE international conference on distributed computing systems …, 2009 | 175 | 2009 |
Preserving privacy with probabilistic indistinguishability in weighted social networks Q Liu, G Wang, F Li, S Yang, J Wu IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016 | 162 | 2016 |
On maximizing the lifetime of wireless sensor networks using virtual backbone scheduling Y Zhao, J Wu, F Li, S Lu IEEE transactions on parallel and distributed systems 23 (8), 1528-1535, 2011 | 148 | 2011 |
A probabilistic voting-based filtering scheme in wireless sensor networks F Li, J Wu Proceedings of the 2006 international conference on Wireless communications …, 2006 | 142 | 2006 |
Trust evaluation in online social networks using generalized network flow W Jiang, J Wu, F Li, G Wang, H Zheng IEEE Transactions on Computers 65 (3), 952-963, 2015 | 137 | 2015 |
Mobility reduces uncertainty in MANETs F Li, J Wu IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 123 | 2007 |
Utility-based opportunistic routing in multi-hop wireless networks J Wu, M Lu, F Li 2008 The 28th International Conference on Distributed Computing Systems, 470-477, 2008 | 108 | 2008 |
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces W Peng, F Li, CT Huang, X Zou 2014 IEEE International Conference on Communications (ICC), 804-809, 2014 | 102 | 2014 |
CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks F Li, Y Yang, J Wu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 98 | 2010 |
Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs F Li, Y Yang, J Wu IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 40 …, 2009 | 93 | 2009 |
Outsourceable two-party privacy-preserving biometric authentication H Chun, Y Elmehdwi, F Li, P Bhattacharya, W Jiang Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 80 | 2014 |
Frame: An innovative incentive scheme in vehicular networks F Li, J Wu 2009 IEEE International Conference on Communications, 1-6, 2009 | 74 | 2009 |
A two-stage deanonymization attack against anonymized social networks W Peng, F Li, X Zou, J Wu IEEE Transactions on computers 63 (2), 290-303, 2012 | 71 | 2012 |
Uncertainty modeling and reduction in MANETs F Li, J Wu IEEE transactions on mobile computing 9 (7), 1035-1048, 2010 | 69 | 2010 |
VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones Y Zhao, J Wu, F Li, S Lu 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 57 | 2010 |
PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks F Li, A Srinivasan, J Wu International Journal of Security and Networks 3 (3), 173-182, 2008 | 54 | 2008 |
Outsourcing privacy-preserving social networks to a cloud G Wang, Q Liu, F Li, S Yang, J Wu 2013 Proceedings IEEE INFOCOM, 2886-2894, 2013 | 53 | 2013 |
Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method Y Sui, X Zou, EY Du, F Li IEEE Transactions on Computers 63 (4), 902-916, 2013 | 48 | 2013 |