Feng Li
Title
Cited by
Cited by
Year
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets
F Li, J Wu, A Srinivasan
IEEE INFOCOM 2009, 2428-2436, 2009
1782009
LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks
F Li, J Wu
2009 6th annual IEEE communications society conference on sensor, mesh and …, 2009
1772009
MOPS: Providing content-based service in disruption-tolerant networks
F Li, J Wu
2009 29th IEEE international conference on distributed computing systems …, 2009
1562009
A probabilistic voting-based filtering scheme in wireless sensor networks
F Li, J Wu
Proceedings of the 2006 international conference on Wireless communications …, 2006
1292006
On maximizing the lifetime of wireless sensor networks using virtual backbone scheduling
Y Zhao, J Wu, F Li, S Lu
IEEE transactions on parallel and distributed systems 23 (8), 1528-1535, 2011
1212011
Mobility reduces uncertainty in MANETs
F Li, J Wu
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1122007
Utility-based opportunistic routing in multi-hop wireless networks
J Wu, M Lu, F Li
2008 The 28th International Conference on Distributed Computing Systems, 470-477, 2008
952008
Cpmc: An efficient proximity malware coping scheme in smartphone-based mobile networks
F Li, Y Yang, J Wu
2010 Proceedings IEEE INFOCOM, 1-9, 2010
852010
Preserving privacy with probabilistic indistinguishability in weighted social networks
Q Liu, G Wang, F Li, S Yang, J Wu
IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016
732016
Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs
F Li, Y Yang, J Wu
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 40 …, 2009
702009
Frame: An innovative incentive scheme in vehicular networks
F Li, J Wu
2009 IEEE International Conference on Communications, 1-6, 2009
702009
Trust evaluation in online social networks using generalized network flow
W Jiang, J Wu, F Li, G Wang, H Zheng
IEEE Transactions on Computers 65 (3), 952-963, 2015
662015
Uncertainty modeling and reduction in MANETs
F Li, J Wu
IEEE transactions on mobile computing 9 (7), 1035-1048, 2010
612010
Uncertainty modeling and reduction in MANETs
F Li, J Wu
IEEE transactions on mobile computing 9 (7), 1035-1048, 2010
612010
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
572014
A two-stage deanonymization attack against anonymized social networks
W Peng, F Li, X Zou, J Wu
IEEE Transactions on Computers 63 (2), 290-303, 2012
522012
VBS: Maximum lifetime sleep scheduling for wireless sensor networks using virtual backbones
Y Zhao, J Wu, F Li, S Lu
2010 Proceedings IEEE INFOCOM, 1-5, 2010
522010
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks.
F Li, A Srinivasan, J Wu
IJSN 3 (3), 173-182, 2008
452008
Outsourcing privacy-preserving social networks to a cloud
G Wang, Q Liu, F Li, S Yang, J Wu
2013 Proceedings IEEE INFOCOM, 2886-2894, 2013
362013
Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method
Y Sui, X Zou, EY Du, F Li
IEEE Transactions on Computers 63 (4), 902-916, 2013
292013
The system can't perform the operation now. Try again later.
Articles 1–20