default search action
Qi Li 0011
Person information
- affiliation: Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China
- affiliation (PhD 2014): Xidian University, School of Computer Science and Technology, Xi'an, China
Other persons with the same name
- Qi Li — disambiguation page
- Qi Li 0001 — Western Kentucky University, Department of Mathematics and Computer Science, Bowling Green, KY, USA (and 1 more)
- Qi Li 0002 — Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China (and 4 more)
- Qi Li 0003 — China Earthquake Administration, China (and 1 more)
- Qi Li 0004 — SUNY New Paltz, School of Business, NY, USA (and 3 more)
- Qi Li 0005 — Chinese Academy of Sciences, Institute of Automation, CAS Center for Excellence in Brain Science and Intelligence Technology, Beijing, China
- Qi Li 0006 — Tsinghua University, Institute of Data Science, Centre for Computational Mental Healthcare Research, Beijing, China
- Qi Li 0007 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Qi Li 0008 — Beijing Jiaotong University, Department of Mechanical Engineering, China (and 1 more)
- Qi Li 0009 — Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qi Li 0010 — National Grid UK, Electricity National Control Centre, Wokingham, UK (and 1 more)
- Qi Li 0012 — Iowa State University, Ames, IA, USA (and 2 more)
- Qi Li 0013 — Hong Kong University of Science and Technology, Hong Kong
- Qi Li 0014 — Rensselaer Polytechnic Institute, Department of Computer Science, Troy, NY USA (and 1 more)
- Qi Li 0015 — University of Pittsburgh, Department of Mechanical Engineering and Materials Science, PA, USA (and 1 more)
- Qi Li 0016 — University of Notre Dame, IN, USA
- Qi Li 0017 — Southeast University, Key Laboratory of Measurement and Control of Complex Systems of Engineering, Nanjing, China
- Qi Li 0018 — Zhejiang University, State Key Laboratory of Modern Optical Instrumentation, Hangzhou, China
- Qi Li 0019 — Partners HealthCare System, Clinical Informatics Research & Development, Boston, MA, USA
- Qi Li 0020 — University of Southern California, Center for Systems and Software Engineering, Los Angeles, CA, USA
- Qi Li 0021 — Hangzhou Normal University, Institute of Service Engineering, China (and 1 more)
- Qi Li 0022 — Beijing Institute of Technology, School of Software, China
- Qi Li 0023 — Chalmers University of Technology, Department of Microtechnology and Nanoscience, Gothenburg, Sweden
- Qi Li 0024 — China University of Petroleum (East China), College of Information and Control Engineering, Qingdao, China
- Qi Li 0025 — Shaoxing University, Department of Computer Science and Engineering, China (and 1 more)
- Qi Li 0026 — Xi'an Jiaotong University, School of Electrical Engineering, State Key Laboratory of Electrical Insulation and Power Equipment, China
- Qi Li 0027 — Harbin Institute of Technology (Weihai Campus), School of Automotive Engineering, China
- Qi Li 0028 — Changchun University of Science and Technology, School of Computer Science and Technology, China
- Qi Li 0029 — Dalian Maritime University, School of Information Science and Technology, China (and 1 more)
- Qi Li 0030 — Tianjin University, School of Electrical and Information Engineering, China
- Qi Li 0031 — Central South University, School of Information Science and Engineering, Changsha, China
- Qi Li 0032 — Zhongyuan University of Technology, School of Electronic and Information Engineering, Zhengzhou, China
- Qi Li 0033 — University of Guelph, School of Computer Science, Canada
- Qi Li 0034 — University of Science and Technology of China, Department of Computer Science and Technology, Hefei, China
- Qi Li 0035 — Virginia Commonwealth University, Computer Science Department, Richmond, VA, USA
- Qi Li 0036 — Xi'an Jiaotong University, School of Economics and Finance, China
- Qi Li 0037 — Dalian University of Technology, School of Control Science and Engineering, China
- Qi Li 0038 — Fuzhou University, College of Computer and Data Science, China
- Qi Li 0039 — University of Science and Technology of China, School of Computer Science and TechnologyHefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Rong Ma, Tao Feng, Jinbo Xiong, Qi Li, Youliang Tian:
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT. IEEE Internet Things J. 11(2): 1880-1892 (2024) - [j38]Haoyuan Fan, Qi Li, Jinbo Xiong, Rui Li, Wei Chen, Haiping Huang:
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update. IEEE Internet Things J. 11(9): 16887-16901 (2024) - [j37]Jinbo Xiong, Renwan Bi, Yuanyuan Zhang, Qi Li, Li Lin, Youliang Tian:
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives. IEEE Netw. 38(3): 41-47 (2024) - [c18]Lin Ge, Faliang Huang, Qi Li, Yihua Ye:
Modeling Sentiment-Speaker-Dependency for Emotion Recognition in Conversation. IJCNN 2024: 1-8 - 2023
- [j36]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Kim-Kwang Raymond Choo:
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles. IEEE Internet Things J. 10(3): 2314-2329 (2023) - [j35]Hancheng Gao, Haiping Huang, Lingyan Xue, Fu Xiao, Qi Li:
Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing. IEEE Internet Things J. 10(20): 18414-18425 (2023) - [j34]Mengnan Gao, Lifa Wu, Qi Li, Wei Chen:
Anomaly traffic detection in IoT security using graph neural networks. J. Inf. Secur. Appl. 76: 103532 (2023) - 2022
- [j33]Qi Li, Qianqian Zhang, Haiping Huang, Wei Zhang, Wei Chen, Huaqun Wang:
Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT. IEEE Internet Things J. 9(18): 16917-16927 (2022) - [j32]Haiping Huang, Zhao Yan, Xiong Tang, Fu Xiao, Qi Li:
Differential privacy protection scheme based on community density aggregation and matrix perturbation. Inf. Sci. 615: 167-190 (2022) - [j31]Qi Li, Bin Xia, Haiping Huang, Yinghui Zhang, Tao Zhang:
TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 18(5): 3437-3448 (2022) - [j30]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 24979-24990 (2022) - [j29]Wenming Wang, Haiping Huang, Fu Xiao, Qi Li, Lingyan Xue:
An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications. IEEE Trans. Veh. Technol. 71(9): 9830-9839 (2022) - [c17]Rong Ma, Tao Feng, Qi Li, Jinbo Xiong:
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT. GLOBECOM 2022: 4383-4388 - [c16]Bowen Deng, Lele Zheng, Ze Tong, Jing Gao, Tao Zhang, Qi Li:
OKV: Optimized Key-Value Data Collection with Local Differential Privacy. NaNA 2022: 421-426 - [c15]Tao Zhang, Bowen Deng, Lele Zheng, Ze Tong, Qi Li:
HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy. TrustCom 2022: 615-622 - 2021
- [j28]Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng:
Attribute-based Encryption for Cloud Computing Access Control: A Survey. ACM Comput. Surv. 53(4): 83:1-83:41 (2021) - [j27]Jinbo Xiong, Hui Liu, Biao Jin, Qi Li, Zhiqiang Yao:
A lightweight privacy protection scheme based on user preference in mobile crowdsensing. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j26]Wenming Wang, Haiping Huang, Fu Xiao, Qi Li, Lingyan Xue, Jiansheng Jiang:
Computation-transferable authenticated key agreement protocol for smart healthcare. J. Syst. Archit. 118: 102215 (2021) - [j25]Tao Zhang, Xiongfei Song, Lele Zheng, Yani Han, Kai Zhang, Qi Li:
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing. Secur. Commun. Networks 2021: 6679157:1-6679157:14 (2021) - [j24]Huaqun Wang, Debiao He, Anmin Fu, Qi Li, Qihua Wang:
Provable Data Possession with Outsourced Data Transfer. IEEE Trans. Serv. Comput. 14(6): 1929-1939 (2021) - 2020
- [j23]Wenming Wang, Haiping Huang, Qi Li, Fan He, Chao Sha:
Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks. IEEE Access 8: 25170-25183 (2020) - [j22]Qi Li, Yinghui Zhang, Tao Zhang, Haiping Huang, Yingjie He, Jinbo Xiong:
HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth. IEEE Access 8: 123430-123439 (2020) - [j21]Haiping Huang, Qinglong Huang, Fu Xiao, Wenming Wang, Qi Li, Ting Dai:
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains. Secur. Commun. Networks 2020: 8897282:1-8897282:17 (2020) - [j20]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Qi Li, Ximeng Liu, Zhiqiang Yao:
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT. IEEE Trans. Ind. Informatics 16(6): 4231-4241 (2020) - [j19]Qinglong Huang, Haiping Huang, Wenming Wang, Qi Li, Yuhan Wu:
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2020: 8888679:1-8888679:9 (2020)
2010 – 2019
- 2019
- [j18]Qi Li, Youliang Tian, Yinghui Zhang, Limin Shen, Jingjing Guo:
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing. IEEE Access 7: 131534-131542 (2019) - [j17]Qi Li, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang:
Fine-grained multi-authority access control in IoT-enabled mHealth. Ann. des Télécommunications 74(7-8): 389-400 (2019) - [j16]Huaqun Wang, Qihua Wang, Debiao He, Qi Li, Zhe Liu:
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks. IEEE Internet Things J. 6(2): 3676-3687 (2019) - [c14]Qi Li, Hui Zhu, Ziling Zhang, Rongxing Lu, Fengwei Wang, Hui Li:
Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm. ICC 2019: 1-6 - [c13]Rong Ma, Lei Chen, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing. ICII 2019: 227-232 - 2018
- [j15]Biao Jin, Dongshuo Jiang, Jinbo Xiong, Lei Chen, Qi Li:
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption. IEEE Access 6: 51140-51150 (2018) - [j14]Zuobin Ying, Lu Wei, Qi Li, Ximeng Liu, Jie Cui:
A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud. IEEE Access 6: 53698-53708 (2018) - [j13]Qi Li, Lizhi Huang, Ruo Mo, Haiping Huang, Hongbo Zhu:
Robust and Scalable Data Access Control in D2D Communications. IEEE Access 6: 58858-58867 (2018) - [j12]Qi Li, Hongbo Zhu, Zuobin Ying, Tao Zhang:
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud. Wirel. Commun. Mob. Comput. 2018: 1701675:1-1701675:12 (2018) - [c12]Minshen Wang, Jinbo Xiong, Rong Ma, Qi Li, Biao Jin:
A Novel Data Secure Deletion Scheme for Mobile Devices. ICCCN 2018: 1-8 - 2017
- [c11]Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li:
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure. ICICS 2017: 39-50 - [c10]Tao Zhang, Yongzhi Wang, Guangxia Li, Jingjing Guo, Qi Li:
Reputation Propagation for Web Service Composition: A Shapley Value Approach. NaNA 2017: 232-238 - [c9]Qi Li, Hongbo Zhu:
Multi-authority attribute-based access control scheme in mHealth cloud with unbounded attribute universe and decryption outsourcing. WCSP 2017: 1-7 - 2016
- [j11]Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen:
Secure, efficient and revocable multi-authority access control system in cloud storage. Comput. Secur. 59: 45-59 (2016) - [j10]Yinghui Zhang, Dong Zheng, Qi Li, Jin Li, Hui Li:
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur. Commun. Networks 9(16): 3688-3702 (2016) - 2015
- [j9]Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong:
Attribute Based Multisignature Scheme for Wireless Communications. Mob. Inf. Syst. 2015: 827320:1-827320:11 (2015) - [j8]Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Large universe decentralized key-policy attribute-based encryption. Secur. Commun. Networks 8(3): 501-509 (2015) - [j7]Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur. Commun. Networks 8(18): 4098-4109 (2015) - 2014
- [j6]Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun:
Trust-based service composition in multi-domain environments under time constraint. Sci. China Inf. Sci. 57(9): 1-16 (2014) - [j5]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu:
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model. IET Inf. Secur. 8(4): 217-223 (2014) - [j4]Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong:
Efficient attribute based sequential aggregate signature for wireless sensor networks. Int. J. Sens. Networks 16(3): 172-184 (2014) - [j3]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Jun Ma:
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud. KSII Trans. Internet Inf. Syst. 8(1): 282-304 (2014) - [j2]Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, Patrick S. Chen:
A Secure Data Self-Destructing Scheme in Cloud Computing. IEEE Trans. Cloud Comput. 2(4): 448-458 (2014) - 2013
- [j1]Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu:
Access control requirements for structured document in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 95-102 (2013) - [c8]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang:
PRAM: privacy preserving access management scheme in cloud services. SCC@ASIACCS 2013: 41-46 - [c7]Ximeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang:
Attribute Based Multi-signature Scheme in the Standard Model. CIS 2013: 738-742 - [c6]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme: An ABE Approach. HPCC/EUC 2013: 59-64 - [c5]Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi:
Service Composition in Multi-domain Environment under Time Constraint. ICWS 2013: 227-234 - [c4]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Qi Li:
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing. IDCS 2013: 238-251 - [c3]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma:
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. INCoS 2013: 51-57 - [c2]Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu:
Fully Secure Decentralized Key-Policy Attribute-Based Encryption. INCoS 2013: 220-225 - [c1]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme with Identity Based Encryption. INCoS 2013: 239-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint