Articles with public access mandates - Hongjuan LiLearn more
Not available anywhere: 4
Secure and efficient data communication protocol for wireless body area networks
C Hu, H Li, Y Huo, T Xiang, X Liao
IEEE Transactions on multi-scale computing systems 2 (2), 94-107, 2016
Mandates: National Natural Science Foundation of China
Detecting driver phone calls in a moving vehicle based on voice features
T Song, X Cheng, H Li, J Yu, S Wang, R Bie
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Mandates: National Natural Science Foundation of China
Efficient customized privacy preserving friend discovery in mobile social networks
H Li, X Cheng, K Li, Z Tian
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
Mandates: National Natural Science Foundation of China
Secure friend discovery based on encounter history in mobile social networks.
HL Yingwen Chen, Xiuzhen Cheng, Keqiu Li, Dechang Chen
Personal and Ubiquitous Computing 19 (7), 999-1009, 2015
Mandates: National Natural Science Foundation of China
Available somewhere: 2
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks
H Li, K Li, W Qu, I Stojmenovic
Future Generation Computer Systems 37, 108-116, 2014
Mandates: National Natural Science Foundation of China
Perturbation-based private profile matching in social networks
R Li, H Li, X Cheng, X Zhou, K Li, S Wang, R Bie
IEEE Access 5, 19720-19732, 2017
Mandates: US National Science Foundation, National Natural Science Foundation of China
Publication and funding information is determined automatically by a computer program