default search action
Qun Li 0001
Person information
- affiliation: College of William and Mary, Department of Computer Science, Williamsburg, VA, USA
- affiliation (PhD): Dartmouth College, Department of Computer Science, Hanover, NH, USA
Other persons with the same name
- Qun Li — disambiguation page
- Qun Li 0002 — Nanjing University of Posts and Telecommunications, School of Computer Science & Technology, Nanjing, China (and 2 more)
- Qun Li 0003 — Microsoft Corporation, Bellevue, WA, USA (and 2 more)
- Qun Li 0004 — National University of Defense Technology, College of Information System and Management, Changsha, China
- Qun Li 0005 — Nanjing University of Science and Technology, School of Computer Science and Engineering, Nanjing, China
- Qun Li 0006 — National University of Defense Technology, College of Systems Engineering, Changsha, China
- Qun Li 0007 — Sun Yat-sen University, School of Electronics and Information Technology, Guangzhou, China
- Qun Li 0008 — Fudan University, Institutes of Biomedical Sciences, Shanghai, China
- Qun Li 0009 — Polar Research Institute of China, Shanghai, China
- Qun Li 0010 — University of Szeged, Department of Physiology, Szeged, Hungary (and 1 more)
- Qun Li 0011 — Harbin Institute of Technology, Department of Computer Science, Shenzhen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Jindi Wu, Tianjie Hu, Qun Li:
Distributed Quantum Machine Learning: Federated and Model-Parallel Approaches. IEEE Internet Comput. 28(2): 65-72 (2024) - [j58]Tianjie Hu, Jindi Wu, Qun Li:
SurfaceNet: Fault-Tolerant Quantum Networks With Surface Codes. IEEE Netw. 38(1): 155-162 (2024) - [j57]Jindi Wu, Tianjie Hu, Qun Li:
Q-ID: Lightweight Quantum Network Server Identification Through Fingerprinting. IEEE Netw. 38(5): 146-152 (2024) - [j56]Wei Tong, Jiacheng Niu, Jingyu Hua, Qun Li, Sheng Zhong:
Scalable Differentially Private Model Publishing Via Private Iterative Sample Selection. IEEE Trans. Dependable Secur. Comput. 21(4): 2494-2506 (2024) - [c101]Tianjie Hu, Jindi Wu, Qun Li:
Quantum Network Routing Based on Surface Code Error Correction. ICDCS 2024: 1236-1247 - [c100]Yucen Gao, Xikai Wei, Hui Gao, Qun Li, Xiaofeng Gao, Guihai Chen:
Spherical Projection Based Clustering Algorithm for Cooperative Sweep Coverage in Crowdsourcing. ICWS 2024: 1266-1272 - [i9]Jindi Wu, Tianjie Hu, Qun Li:
Detecting Fraudulent Services on Quantum Cloud Platforms via Dynamic Fingerprinting. CoRR abs/2408.11203 (2024) - 2023
- [j55]Zeyi Tao, Qi Xia, Songqing Chen, Qun Li:
An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation. IEEE Trans. Cloud Comput. 11(2): 1733-1745 (2023) - [j54]Wei Tong, Yinggang Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 20(3): 2433-2449 (2023) - [j53]Wei Tong, Wenjie Chen, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage. IEEE Trans. Mob. Comput. 22(9): 5463-5478 (2023) - [j52]Qi Xia, Zeyi Tao, Qun Li, Songqing Chen:
Byzantine Tolerant Algorithms for Federated Learning. IEEE Trans. Netw. Sci. Eng. 10(6): 3172-3183 (2023) - [c99]Jindi Wu, Tianjie Hu, Qun Li:
MORE: Measurement and Correlation Based Variational Quantum Circuit for Multi-Classification. QCE 2023: 208-218 - [c98]Zeyi Tao, Jindi Wu, Qi Xia, Qun Li:
LAWS: Look Around and Warm-Start Natural Gradient Descent for Quantum Neural Networks. QSW 2023: 76-82 - [i8]Jindi Wu, Tianjie Hu, Qun Li:
MORE: Measurement and Correlation Based Variational Quantum Circuit for Multi-classification. CoRR abs/2307.11875 (2023) - [i7]Zeyi Tao, Jindi Wu, Qun Li:
Preconditioned Federated Learning. CoRR abs/2309.11378 (2023) - [i6]Tianjie Hu, Jindi Wu, Qun Li:
SurfaceNet: Fault-Tolerant Quantum Networks with Surface Codes. CoRR abs/2310.13628 (2023) - 2022
- [j51]Yutao Tang, Zhengrui Qin, Zhiqiang Lin, Yue Li, Shanhe Yi, Fengyuan Xu, Qun Li:
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS. IEEE Trans. Computers 71(12): 3349-3360 (2022) - [c97]Jindi Wu, Qun Li:
Poster: Scalable Quantum Convolutional Neural Networks for Edge Computing. SEC 2022: 307-309 - [c96]Yulong Tian, Xiaopeng Ke, Zeyi Tao, Shaohua Ding, Fengyuan Xu, Qun Li, Hao Han, Sheng Zhong, Xinyi Fu:
Privacy-Preserving and Robust Federated Deep Metric Learning. IWQoS 2022: 1-11 - [c95]Zili Zha, An Wang, Yang Guo, Qun Li, Kun Sun, Songqing Chen:
EZPath: Expediting Container Network Traffic via Programmable Switches. IFIP Networking 2022: 1-8 - [c94]Jindi Wu, Zeyi Tao, Qun Li:
wpScalable Quantum Neural Networks for Classification. QCE 2022: 38-48 - [i5]Zeyi Tao, Jindi Wu, Qi Xia, Qun Li:
LAWS: Look Around and Warm-Start Natural Gradient Descent for Quantum Neural Networks. CoRR abs/2205.02666 (2022) - [i4]Jindi Wu, Zeyi Tao, Qun Li:
Scalable Quantum Neural Networks for Classification. CoRR abs/2208.07719 (2022) - 2021
- [j50]Yutao Tang, Yue Li, Qun Li, Kun Sun, Haining Wang, Zhengrui Qin:
User input enrichment via sensing devices. Comput. Networks 196: 108262 (2021) - [j49]Sidi Lu, Weisong Shi, Qun Li:
The Emergence of Vehicle Computing. IEEE Internet Comput. 25(3): 18-22 (2021) - [j48]Qi Xia, Zeyi Tao, Qun Li:
Defenses Against Byzantine Attacks in Distributed Deep Neural Networks. IEEE Trans. Netw. Sci. Eng. 8(3): 2025-2035 (2021) - [j47]Yunlong Mao, Wenbo Hong, Heng Wang, Qun Li, Sheng Zhong:
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training. IEEE Trans. Parallel Distributed Syst. 32(7): 1777-1788 (2021) - [c93]Zeyi Tao, Qi Xia, Qun Li, Songqing Chen:
CE-SGD: Communication-Efficient Distributed Machine Learning. GLOBECOM 2021: 1-7 - [c92]Qi Xia, Qun Li:
QuantumFed: A Federated Learning Framework for Collaborative Quantum Training. GLOBECOM 2021: 1-6 - [c91]Wei Tong, Chang Xia, Jingyu Hua, Qun Li, Sheng Zhong:
Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates. ICDCS 2021: 808-818 - [c90]Zeyi Tao, Qi Xia, Qun Li:
Neuron Manifold Distillation for Edge Deep Learning. IWQoS 2021: 1-10 - [c89]Qi Xia, Zeyi Tao, Qun Li:
Defending Against Byzantine Attacks in Quantum Federated Learning. MSN 2021: 145-152 - [c88]Jindi Wu, Qi Xia, Qun Li:
Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices. MSN 2021: 191-198 - [c87]Qi Xia, Zeyi Tao, Qun Li:
ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning. SecureComm (1) 2021: 229-248 - [i3]Qi Xia, Qun Li:
QuantumFed: A Federated Learning Framework for Collaborative Quantum Training. CoRR abs/2106.09109 (2021) - 2020
- [c86]Winson Ye, Qun Li:
Open Questions for Next Generation Chatbots. SEC 2020: 346-351 - [c85]Winson Ye, Qun Li:
Chatbot Security and Privacy in the Age of Personal Assistants. SEC 2020: 388-393 - [c84]Yayuan Xiong, Fengyuan Xu, Sheng Zhong, Qun Li:
Escaping Backdoor Attack Detection of Deep Learning. SEC 2020: 431-445
2010 – 2019
- 2019
- [j46]Ed Novak, Zhuofan Tang, Qun Li:
Ultrasound Proximity Networking on Smart Mobile Devices for IoT Applications. IEEE Internet Things J. 6(1): 399-409 (2019) - [j45]Zeyi Tao, Qi Xia, Zijiang Hao, Cheng Li, Lele Ma, Shanhe Yi, Qun Li:
A Survey of Virtual Machine Management in Edge Computing. Proc. IEEE 107(8): 1482-1499 (2019) - [j44]Lele Ma, Shanhe Yi, Nancy J. Carter, Qun Li:
Efficient Live Migration of Edge Services Leveraging Container Layered Storage. IEEE Trans. Mob. Comput. 18(9): 2020-2033 (2019) - [j43]Weisong Shi, Tao Zhang, Qun Li:
Guest Editor's Introduction: Special Section on Fog/Edge Computing and Services. IEEE Trans. Serv. Comput. 12(5): 669-670 (2019) - [c83]Yutao Tang, Zhengrui Qin, Shanhe Yi, Qun Li:
Virtual machine migration for IoT applications. SEC 2019: 437-442 - [c82]Wei Tong, Bingbing Jiang, Fengyuan Xu, Qun Li, Sheng Zhong:
Privacy-Preserving Data Integrity Verification in Mobile Edge Computing. ICDCS 2019: 1007-1018 - [c81]Qi Xia, Zeyi Tao, Zijiang Hao, Qun Li:
FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks. IJCAI 2019: 4824-4830 - [c80]Zijiang Hao, Shanhe Yi, Qun Li:
Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud Applications. INFOCOM 2019: 2539-2547 - [c79]Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, Sheng Zhong:
Trojan Attack on Deep Generative Models in Autonomous Driving. SecureComm (1) 2019: 299-318 - [e3]Songqing Chen, Ryokichi Onishi, Ganesh Ananthanarayanan, Qun Li:
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019, Arlington, Virginia, USA, November 7-9, 2019. ACM 2019, ISBN 978-1-4503-6733-2 [contents] - 2018
- [j42]Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin:
Graphical passwords for older computer users. Int. J. Secur. Networks 13(4): 211-227 (2018) - [j41]Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Ed Novak, Sanglu Lu:
CamK: Camera-Based Keystroke Detection and Localization for Small Mobile Devices. IEEE Trans. Mob. Comput. 17(10): 2236-2251 (2018) - [c78]Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. CCS 2018: 1324-1337 - [c77]Yunlong Mao, Shanhe Yi, Qun Li, Jinghao Feng, Fengyuan Xu, Sheng Zhong:
Learning from Differentially Private Neural Activations with Edge Computing. SEC 2018: 90-102 - [c76]Zijiang Hao, Raymond Ji, Qun Li:
FastPay: A Secure Fast Payment Method for Edge-IoT Platforms using Blockchain. SEC 2018: 410-415 - [c75]Zijiang Hao, Shanhe Yi, Qun Li:
EdgeCons: Achieving Efficient Consensus in Edge Computing Networks. HotEdge 2018 - [c74]Zeyi Tao, Qun Li:
eSGD: Communication Efficient Distributed Deep Learning on the Edge. HotEdge 2018 - [c73]Yulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. INFOCOM 2018: 2726-2734 - [c72]Zhengrui Qin, Qun Li:
Household Electrical Load Scheduling Algorithms with Renewable Energy. WASA 2018: 387-399 - 2017
- [j40]Zijiang Hao, Ed Novak, Shanhe Yi, Qun Li:
Challenges and Software Architecture for Fog Computing. IEEE Internet Comput. 21(2): 44-53 (2017) - [j39]Cheng Li, Zhengrui Qin, Ed Novak, Qun Li:
Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks. IEEE Internet Things J. 4(5): 1156-1164 (2017) - [j38]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios. IEEE Trans. Mob. Comput. 16(7): 2065-2078 (2017) - [c71]Nancy J. Carter, Qun Li, Jiquo Yu:
Mining and analysis of public information for insight into personal fitness tracker reliability, operations and user performance. SmartIoT@SEC 2017: 11:1-11:6 - [c70]Lele Ma, Shanhe Yi, Qun Li:
Efficient service handoff across edge servers via docker container migration. SEC 2017: 11:1-11:13 - [c69]Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li:
LAVEA: latency-aware video analytics on edge computing platform. SEC 2017: 15:1-15:13 - [c68]Nancy J. Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin, Jiquo Yu:
Graphical passwords for older computer users. HotWeb 2017: 7:1-7:7 - [c67]Shanhe Yi, Zhengrui Qin, Nancy J. Carter, Qun Li:
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch. ICDCS 2017: 469-479 - [c66]Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li:
LAVEA: Latency-Aware Video Analytics on Edge Computing Platform. ICDCS 2017: 2573-2574 - [c65]Yifan Zhang, Yunxin Liu, Xuanzhe Liu, Qun Li:
Enabling accurate and efficient modeling-based CPU power estimation for smartphones. IWQoS 2017: 1-10 - [e2]Qun Li, Songqing Chen:
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley, CA, USA, October 12 - 14, 2017. ACM 2017, ISBN 978-1-4503-5527-8 [contents] - 2016
- [c64]Zijiang Hao, Qun Li:
Poster Abstract: EdgeStore: Integrating Edge Computing into Cloud-Based Storage Systems. SEC 2016: 115-116 - [c63]Zijiang Hao, Qun Li:
Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard. HotWeb 2016: 78-83 - [c62]Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li:
MobiPlay: a remote execution based record-and-replay tool for mobile applications. ICSE 2016: 571-582 - [c61]Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak:
AMIL: Localizing neighboring mobile devices through a simple gesture. INFOCOM 2016: 1-9 - [c60]Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM 2016: 1-9 - [c59]Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Edmund Novak, Sanglu Lu:
CamK: A camera-based keyboard for small mobile devices. INFOCOM 2016: 1-9 - [c58]Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li:
GlassGesture: Exploring head gesture interface of smart glasses. INFOCOM Workshops 2016: 1017-1018 - [c57]Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak:
AMIL: Localizing neighboring mobile devices through a simple gesture. INFOCOM Workshops 2016: 1027-1028 - 2015
- [j37]Lei Xie, Qun Li, Chuyu Wang, Xi Chen, Sanglu Lu:
Exploring the Gap between Ideal and Reality: An Experimental Study on Continuous Scanning with Mobile Reader in RFID Systems. IEEE Trans. Mob. Comput. 14(11): 2272-2285 (2015) - [j36]Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu:
Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems. IEEE Trans. Parallel Distributed Syst. 26(9): 2421-2433 (2015) - [j35]Yifan Zhang, Chiu C. Tan, Fengyuan Xu, Hao Han, Qun Li:
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs. IEEE Trans. Veh. Technol. 64(1): 378-385 (2015) - [c56]Shanhe Yi, Zijiang Hao, Zhengrui Qin, Qun Li:
Fog Computing: Platform and Applications. HotWeb 2015: 73-78 - [c55]Edmund Novak, Yutao Tang, Zijiang Hao, Qun Li, Yifan Zhang:
Physical media covert channels on smart mobile devices. UbiComp 2015: 367-378 - [c54]Zijiang Hao, Yutao Tang, Yifan Zhang, Edmund Novak, Nancy J. Carter, Qun Li:
SMOC: A secure mobile cloud computing platform. INFOCOM 2015: 2668-2676 - [c53]Shanhe Yi, Cheng Li, Qun Li:
A Survey of Fog Computing: Concepts, Applications and Issues. Mobidata@MobiHoc 2015: 37-42 - [c52]Shanhe Yi, Zhengrui Qin, Qun Li:
Security and Privacy Issues of Fog Computing: A Survey. WASA 2015: 685-695 - [e1]Qun Li, Dong Xuan:
Proceedings of the 2015 Workshop on Mobile Big Data, Mobidata@MobiHoc 2015, Hangzhou, China, June 21, 2015. ACM 2015, ISBN 978-1-4503-3524-9 [contents] - 2014
- [j34]Xiaojun Zhu, Qun Li, Weizhen Mao, Guihai Chen:
Online vector scheduling and generalized load balancing. J. Parallel Distributed Comput. 74(4): 2304-2309 (2014) - [j33]Yifan Zhang, Qun Li:
Exploiting ZigBee in Reducing WiFi Power Consumption for Mobile Devices. IEEE Trans. Mob. Comput. 13(12): 2806-2819 (2014) - [j32]Yifan Zhang, Gexin Yu, Qun Li, Haodong Wang, Xiaojun Zhu, Baosheng Wang:
Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks. IEEE/ACM Trans. Netw. 22(3): 889-902 (2014) - [j31]Hao Han, Yunxin Liu, Guobin Shen, Yongguang Zhang, Qun Li, Chiu C. Tan:
Design, Realization, and Evaluation of DozyAP for Power-Efficient Wi-Fi Tethering. IEEE/ACM Trans. Netw. 22(5): 1672-1685 (2014) - [j30]Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li:
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet. IEEE Trans. Veh. Technol. 63(8): 3927-3934 (2014) - [c51]Edmund Novak, Qun Li:
Near-pri: Private, proximity based location sharing. INFOCOM 2014: 37-45 - [c50]Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu:
Efficiently collecting histograms over RFID tags. INFOCOM 2014: 145-153 - [c49]Zhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov:
Preserving secondary users' privacy in cognitive radio networks. INFOCOM 2014: 772-780 - [c48]Wei Wei, Xiaojun Zhu, Qun Li:
LBSNSim: Analyzing and modeling location-based social networks. INFOCOM 2014: 1680-1688 - 2013
- [j29]Fu Xiao, Ruchuan Wang, Limin Sun, Qun Li, Hongwei Zhang, Liusheng Huang:
Selected Papers from "The 6th China Conference of Wireless Sensor Networks". Int. J. Distributed Sens. Networks 9 (2013) - [j28]Zhengrui Qin, Qun Li, Mooi Choo Chuah:
Defending against Unidentifiable Attacks in Electric Power Grids. IEEE Trans. Parallel Distributed Syst. 24(10): 1961-1971 (2013) - [j27]Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distributed Syst. 24(12): 2482-2491 (2013) - [j26]Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li:
SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. IEEE Trans. Parallel Distributed Syst. 24(12): 2492-2502 (2013) - [j25]Zhengrui Qin, Qun Li, George Hsieh:
Defending Against Cooperative Attacks in Cooperative Spectrum Sensing. IEEE Trans. Wirel. Commun. 12(6): 2680-2687 (2013) - [c47]Yifan Zhang, Chiu C. Tan, Qun Li:
CacheKeeper: a system-wide web caching service for smartphones. UbiComp 2013: 265-274 - [c46]Wei Wei, Harry Tian Gao, Fengyuan Xu, Qun Li:
Fast Mencius: Mencius with low commit latency. INFOCOM 2013: 881-889 - [c45]Yifan Zhang, Qun Li:
HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devices. INFOCOM 2013: 1366-1374 - [c44]Xiaojun Zhu, Fengyuan Xu, Edmund Novak, Chiu C. Tan, Qun Li, Guihai Chen:
Extracting secret key from wireless link dynamics in vehicular environments. INFOCOM 2013: 2283-2291 - [c43]Xiaojun Zhu, Qun Li, Guihai Chen:
APT: Accurate outdoor pedestrian tracking with smartphones. INFOCOM 2013: 2508-2516 - [c42]Lei Xie, Qun Li, Xi Chen, Sanglu Lu, Daoxu Chen:
Continuous scanning with mobile reader in RFID systems: an experimental study. MobiHoc 2013: 11-20 - [c41]Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, Qun Li:
Optimizing background email sync on smartphones. MobiSys 2013: 55-68 - [c40]Fengyuan Xu, Yunxin Liu, Qun Li, Yongguang Zhang:
V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics. NSDI 2013: 43-55 - 2012
- [j24]Haodong Wang, Qun Li:
Achieving distributed user access control in sensor networks. Ad Hoc Networks 10(3): 272-283 (2012) - [j23]Huda El Hag Mustafa, Xiaojun Zhu, Qun Li, Guihai Chen:
Efficient median estimation for large-scale sensor RFID systems. Int. J. Sens. Networks 12(3): 171-183 (2012) - [c39]Zhengrui Qin, Qun Li, Mooi Choo Chuah:
Unidentifiable Attacks in Electric Power Systems. ICCPS 2012: 193-202 - [c38]Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li:
SybilDefender: Defend against sybil attacks in large social networks. INFOCOM 2012: 1951-1959 - [c37]Wei Wei, Fengyuan Xu, Qun Li:
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. INFOCOM 2012: 2616-2620 - [c36]Hao Han, Yunxin Liu, Guobin Shen, Yongguang Zhang, Qun Li:
DozyAP: power-efficient Wi-Fi tethering. MobiSys 2012: 421-434 - [c35]Harry Gao, Robert Michael Lewis, Qun Li:
Location Proof via Passive RFID Tags. WASA 2012: 500-511 - [i2]Xiaojun Zhu, Qun Li, Weizhen Mao, Guihai Chen:
Online Vector Scheduling and Generalized Load Balancing. CoRR abs/1211.5729 (2012) - 2011
- [j22]Bo Sheng, Qun Li:
Verifiable Privacy-Preserving Sensor Network Storage for Range Query. IEEE Trans. Mob. Comput. 10(9): 1312-1326 (2011) - [j21]Lei Xie, Qun Li, Weizhen Mao, Jie Wu, Daoxu Chen:
Association Control for Vehicular WiFi Access: Pursuing Efficiency and Fairness. IEEE Trans. Parallel Distributed Syst. 22(8): 1323-1331 (2011) - [j20]Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, Sanglu Lu:
A Timing-Based Scheme for Rogue AP Detection. IEEE Trans. Parallel Distributed Syst. 22(11): 1912-1925 (2011) - [j19]Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li:
Public-key based access control in sensornet. Wirel. Networks 17(5): 1217-1234 (2011) - [c34]Hao Han, Fengyuan Xu, Chiu C. Tan, Yifan Zhang, Qun Li:
Defending against vehicular rogue APs. INFOCOM 2011: 1665-1673 - [c33]Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li:
IMDGuard: Securing implantable medical devices with the external wearable guardian. INFOCOM 2011: 1862-1870 - [c32]Yifan Zhang, Qun Li, Gexin Yu, Baosheng Wang:
ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks. INFOCOM 2011: 2471-2479 - 2010
- [j18]Harry Gao, Seth Utecht, Gregory Patrick, George Hsieh, Fengyuan Xu, Haodong Wang, Qun Li:
High Speed Data Routing in Vehicular Sensor Networks. J. Commun. 5(3): 181-188 (2010) - [j17]Chiu C. Tan, Bo Sheng, Haodong Wang, Qun Li:
Microsearch: A search engine for embedded devices used in pervasive computing. ACM Trans. Embed. Comput. Syst. 9(4): 43:1-43:29 (2010) - [j16]Bo Sheng, Qun Li, Weizhen Mao:
Optimize Storage Placement in Sensor Networks. IEEE Trans. Mob. Comput. 9(10): 1437-1450 (2010) - [j15]Haodong Wang, Chiu C. Tan, Qun Li:
Snoogle: A Search Engine for Pervasive Environments. IEEE Trans. Parallel Distributed Syst. 21(8): 1188-1202 (2010) - [j14]Chiu C. Tan, Bo Sheng, Qun Li:
Efficient techniques for monitoring missing RFID tags. IEEE Trans. Wirel. Commun. 9(6): 1882-1889 (2010) - [j13]Haodong Wang, Qun Li:
Achieving robust message authentication in sensor networks: a public-key based approach. Wirel. Networks 16(4): 999-1009 (2010) - [c31]Lei Xie, Bo Sheng, Chiu C. Tan, Hao Han, Qun Li, Daoxu Chen:
Efficient Tag Identification in Mobile RFID Systems. INFOCOM 2010: 1001-1009 - [c30]Bo Sheng, Qun Li, Weizhen Mao:
Efficient Continuous Scanning in RFID Systems. INFOCOM 2010: 1010-1018 - [c29]Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, Weizhen Mao, Sanglu Lu:
Counting RFID Tags Efficiently and Anonymously. INFOCOM 2010: 1028-1036 - [c28]Fengyuan Xu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
Designing a Practical Access Point Association Protocol. INFOCOM 2010: 1361-1369
2000 – 2009
- 2009
- [j12]Haodong Wang, Bo Sheng, Qun Li:
Privacy-aware routing in sensor networks. Comput. Networks 53(9): 1512-1529 (2009) - [j11]Chiu C. Tan, Haodong Wang, Sheng Zhong, Qun Li:
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks. IEEE Trans. Inf. Technol. Biomed. 13(6): 926-932 (2009) - [c27]Lei Xie, Qun Li, Weizhen Mao, Jie Wu, Daoxu Chen:
Achieving Efficiency and Fairness for Association Control in Vehicular Networks. ICNP 2009: 324-333 - [c26]Hao Han, Bo Sheng, Chiu C. Tan, Qun Li, Sanglu Lu:
A Measurement Based Rogue AP Detection Scheme. INFOCOM 2009: 1593-1601 - [c25]Zhong Ren, Chiu C. Tan, Dong Wang, Qun Li:
Experimental Study on Mobile RFID Performance. WASA 2009: 12-21 - [c24]Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang, Qun Li:
Experimental Study on Secure Data Collection in Vehicular Sensor Networks. WASA 2009: 22-31 - [c23]Donghua Deng, Qun Li:
Communication in Naturally Mobile Sensor Networks. WASA 2009: 295-304 - [i1]Wenguang Wang, Yongping Xu, Xin Chen, Qun Li, Weiping Wang:
High level architecture evolved modular federation object model. CoRR abs/0909.1364 (2009) - 2008
- [j10]Chiu C. Tan, Bo Sheng, Qun Li:
Secure and Serverless RFID Authentication and Search Protocols. IEEE Trans. Wirel. Commun. 7(4): 1400-1407 (2008) - [c22]Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li:
Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control. ICDCS 2008: 11-18 - [c21]Chiu C. Tan, Bo Sheng, Qun Li:
How to Monitor for Missing RFID tags. ICDCS 2008: 295-302 - [c20]Bo Sheng, Qun Li:
Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks. INFOCOM 2008: 46-50 - [c19]Haodong Wang, Chiu C. Tan, Qun Li:
Snoogle: A Search Engine for the Physical World. INFOCOM 2008: 1382-1390 - [c18]Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao:
Finding popular categories for RFID tags. MobiHoc 2008: 159-168 - [c17]Chiu C. Tan, Bo Sheng, Haodong Wang, Qun Li:
Microsearch: When Search Engines Meet Small Devices. Pervasive 2008: 93-110 - [c16]Chiu C. Tan, Haodong Wang, Sheng Zhong, Qun Li:
Body sensor network security: an identity-based cryptography approach. WISEC 2008: 148-153 - 2007
- [j9]Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang:
Cooperative Relay Service in a Wireless LAN. IEEE J. Sel. Areas Commun. 25(2): 355-368 (2007) - [j8]Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang:
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 18(3): 334-350 (2007) - [c15]Bo Sheng, Qun Li, Weizhen Mao, Wen Jin:
Outlier detection in sensor networks. MobiHoc 2007: 219-228 - [c14]Chiu C. Tan, Bo Sheng, Qun Li:
Severless Search and Authentication Protocols for RFID. PerCom 2007: 3-12 - 2006
- [j7]Haodong Wang, Bo Sheng, Qun Li:
Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Networks 1(3/4): 127-137 (2006) - [j6]Qun Li, Daniela Rus:
Global Clock Synchronization in Sensor Networks. IEEE Trans. Computers 55(2): 214-226 (2006) - [c13]Haodong Wang, Qun Li:
Distributed User Access Control in Sensor Networks. DCOSS 2006: 305-320 - [c12]Chiu C. Tan, Qun Li:
A Robust and Secure RFID-Based Pedigree System (Short Paper). ICICS 2006: 21-29 - [c11]Haodong Wang, Qun Li:
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). ICICS 2006: 519-528 - [c10]Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang:
Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency. INFOCOM 2006 - [c9]Bo Sheng, Qun Li, Weizhen Mao:
Data storage placement in sensor networks. MobiHoc 2006: 344-355 - 2005
- [j5]Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang:
A study on object tracking quality under probabilistic coverage in sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(1): 73-76 (2005) - [j4]Qun Li, Daniela Rus:
Navigation protocols in sensor networks. ACM Trans. Sens. Networks 1(1): 3-35 (2005) - [c8]Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang:
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications. DCOSS 2005: 228-243 - [c7]Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang:
Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks. IWQoS 2005: 107-122 - 2004
- [c6]Qun Li, Daniela Rus:
Global Clock Synchronization in Sensor Networks. INFOCOM 2004 - 2003
- [j3]Qun Li, Daniela Rus:
Communication in disconnected ad hoc networks using message relay. J. Parallel Distributed Comput. 63(1): 75-86 (2003) - [j2]Qun Li, Ronald A. Peterson, Michael DeRosa, Daniela Rus:
MobiCom poster: reactive behavior in self-reconfiguring sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(1): 56-58 (2003) - [j1]Javed A. Aslam, Qun Li, Daniela Rus:
Three power-aware routing algorithms for sensor networks. Wirel. Commun. Mob. Comput. 3(2): 187-208 (2003) - [c5]Qun Li, Javed A. Aslam, Daniela Rus:
Distributed Energy-conserving Routing Protocols. HICSS 2003: 301 - [c4]Qun Li, Michael DeRosa, Daniela Rus:
Distributed algorithms for guiding navigation across a sensor network. MobiCom 2003: 313-325 - 2002
- [c3]Qun Li, Daniela Rus:
Message relay in disconnected ad-hoc networks. MOBIWAC 2002: 14-21 - 2001
- [c2]Qun Li, Javed A. Aslam, Daniela Rus:
Online power-aware routing in wireless Ad-hoc networks. MobiCom 2001: 97-107 - 2000
- [c1]Qun Li, Daniela Rus:
Sending messages to mobile users in disconnected ad-hoc wireless networks. MobiCom 2000: 44-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint