Follow
Feng Li
Title
Cited by
Cited by
Year
LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks
F Li, J Wu
2009 6th annual IEEE communications society conference on sensor, mesh and …, 2009
2022009
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets
F Li, J Wu, A Srinivasan
IEEE INFOCOM 2009, 2428-2436, 2009
1982009
MOPS: Providing content-based service in disruption-tolerant networks
F Li, J Wu
2009 29th IEEE international conference on distributed computing systems …, 2009
1752009
Preserving privacy with probabilistic indistinguishability in weighted social networks
Q Liu, G Wang, F Li, S Yang, J Wu
IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016
1622016
On maximizing the lifetime of wireless sensor networks using virtual backbone scheduling
Y Zhao, J Wu, F Li, S Lu
IEEE transactions on parallel and distributed systems 23 (8), 1528-1535, 2011
1482011
A probabilistic voting-based filtering scheme in wireless sensor networks
F Li, J Wu
Proceedings of the 2006 international conference on Wireless communications …, 2006
1422006
Trust evaluation in online social networks using generalized network flow
W Jiang, J Wu, F Li, G Wang, H Zheng
IEEE Transactions on Computers 65 (3), 952-963, 2015
1372015
Mobility reduces uncertainty in MANETs
F Li, J Wu
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1232007
Utility-based opportunistic routing in multi-hop wireless networks
J Wu, M Lu, F Li
2008 The 28th International Conference on Distributed Computing Systems, 470-477, 2008
1082008
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
1022014
CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks
F Li, Y Yang, J Wu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
982010
Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs
F Li, Y Yang, J Wu
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 40 …, 2009
932009
Outsourceable two-party privacy-preserving biometric authentication
H Chun, Y Elmehdwi, F Li, P Bhattacharya, W Jiang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
802014
Frame: An innovative incentive scheme in vehicular networks
F Li, J Wu
2009 IEEE International Conference on Communications, 1-6, 2009
742009
A two-stage deanonymization attack against anonymized social networks
W Peng, F Li, X Zou, J Wu
IEEE Transactions on computers 63 (2), 290-303, 2012
712012
Uncertainty modeling and reduction in MANETs
F Li, J Wu
IEEE transactions on mobile computing 9 (7), 1035-1048, 2010
692010
VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones
Y Zhao, J Wu, F Li, S Lu
2010 Proceedings IEEE INFOCOM, 1-5, 2010
572010
PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
F Li, A Srinivasan, J Wu
International Journal of Security and Networks 3 (3), 173-182, 2008
542008
Outsourcing privacy-preserving social networks to a cloud
G Wang, Q Liu, F Li, S Yang, J Wu
2013 Proceedings IEEE INFOCOM, 2886-2894, 2013
532013
Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method
Y Sui, X Zou, EY Du, F Li
IEEE Transactions on Computers 63 (4), 902-916, 2013
482013
The system can't perform the operation now. Try again later.
Articles 1–20