Author image not provided
 Li Xu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.54
Citation Count54
Publication count35
Publication years2006-2018
Available for download5
Average downloads per article139.00
Downloads (cumulative)695
Downloads (12 Months)46
Downloads (6 Weeks)8
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


35 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 35
Result page: 1 2

Sort by:

1
February 2018 Future Generation Computer Systems: Volume 79 Issue P1, February 2018
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

With the popularity of mobile social network, proximitydetection has become a fundamental service. For the traditional proximity detection methods, users need to upload their locations to a location server so that they can find their neighbors by calculating relative distances among them. It will cause significant privacy concerns when the ...
Keywords: Location privacy, Mobile social network, Proximity detection

2
November 2017 Computers and Electrical Engineering: Volume 64 Issue C, November 2017
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 0

A privacy-aware, secure and energy-aware green routing (PSGR) scheme was proposed.The PSGR defends against internal attacks and achieves strong privacy protection.The PSGR integrates a dynamic reputation mechanism and a key management protocol. Hybrid Wireless Mesh Networks (HWMNs) were proposed to address the challenges in wireless communications to support mobile applications ...
Keywords: Secure routing, Privacy protection, Hybrid wireless mesh networks, Energy efficiency, Software defined networks

3
October 2017 Wireless Personal Communications: An International Journal: Volume 96 Issue 4, October 2017
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

The converge-cast in wireless sensor networks (WSNs) is widely applied in many fields such as medical applications and the environmental monitoring. WSNs expect not only providing routing with high throughput but also achieving efficient energy saving. Network coding is one of the most promising techniques to reduce the energy consumption. ...
Keywords: Network coding, Wireless sensor networks, Converge-cast, Rate prediction, Connected dominating set

4
May 2017 Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications: An International Journal: Volume 387 Issue C, May 2017
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 2

As a promising next-generation computing paradigm, Mobile Cloud Computing (MCC) enables the large-scale collection and big data processing of personal private data. An important but often overlooked V of big data is data veracity, which ensures that the data used are trusted, authentic, accurate and protected from unauthorized access and ...
Keywords: Data veracity, Mechanism design, Reputation mechanism, Mobile cloud computing

5
November 2016 Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications: An International Journal: Volume 369 Issue C, November 2016
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 0

In mobile social networks (MSNs), the routing packet is forwarded from any user of in a group to any user of the other group until it reaches the destination group - the group where the destination is located. However, it is inevitable that malicious groups could compromise the quality and ...
Keywords: Reliable communication, Mobile social networks, Social feature, Trustworthiness, First-priority relation graph

6 published by ACM
March 2016 ICC '16: Proceedings of the International Conference on Internet of things and Cloud Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 10,   Downloads (Overall): 64

Full text available: PDFPDF
Proximity detection is a fundamental service in social network. Most of traditional proximity detection methods need users' locations for location server to find their neighbors by calculating relative distance among them. However, this mechanism has caused similarly serious concerns on the potential privacy leakage if server is untrusted. To solve ...
Keywords: Social network, access point, proximity detection, location privacy

7
March 2016 Theoretical Computer Science: Volume 618 Issue C, March 2016
Publisher: Elsevier Science Publishers Ltd.
Bibliometrics:
Citation Count: 1

Extra connectivity and conditional diagnosability are two crucial subjects for a multiprocessor system's ability to tolerate and diagnose faulty processors. The extra connectivity and the conditional diagnosability of many well-known multiprocessor systems have been widely investigated. In this paper, the relationship between the extra connectivity and the conditional diagnosability of ...
Keywords: Extra connectivity, Conditional diagnosability, Regular graphs, Reliability, Comparison model

8
December 2015 Ad Hoc Networks: Volume 35 Issue C, December 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

Mobile cloud computing (MCC) is an emerging technology that has gained ever-increasing popularity, which makes the generation and large-scale collection of private personal data possible. However, new security issues arise when MCC offers big data analytics and management services. In particular, there is an absence of fine-grained secure access control ...
Keywords: Access control, Reputation, Big data, Mechanism design, Mobile cloud computing

9
December 2015 International Journal of Ad Hoc and Ubiquitous Computing: Volume 20 Issue 4, December 2015
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 1

Like other types of wireless networks, wireless communication in wireless mesh networks WMNs is vulnerable to many malicious activities. Thus it is a must to protect wireless transmission by proper security measures. As a fundamental security technology, symmetric key pre-distribution has been widely studied to ensure the security of wireless ...

10
November 2015 Future Generation Computer Systems: Volume 52 Issue C, November 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 6

Mobile cloud computing (MCC) is gaining popularity due to anywhere anytime data access. However, at the same time it also introduces the new privacy and security threats that have become an obstacle to the widespread use and popularity of MCC. In this paper, we propose a reliable recommendation and privacy ...
Keywords: Privacy preserving, Security, Reputation mechanism, Mobile cloud computing

11
October 2015 Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications: An International Journal: Volume 318 Issue C, October 2015
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 1

In this paper, we propose a new type of digital signatures which is specifically designed for graph-based big data system. The properties of the proposed signatures are twofold. On one side it possesses the features of transitive signatures: One can sign a graph in such a way that, given two ...
Keywords: Big data, Privacy, Transitive signature, Universal designated verifier signature

12
October 2015 International Journal of Computational Science and Engineering: Volume 11 Issue 3, October 2015
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 4

In this paper, we present a novel coding scheme called separate coding SC for collecting all data continuously in wireless sensor networks with a mobile base station mBS. By separately encoding a certain number of data segments in a combined segment, and storing the combined segments in the corresponding buffers ...

13
September 2015 Telecommunications Systems: Volume 60 Issue 1, September 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

This paper studies two key challenges in wireless multi-hop network: resource utility and network throughput. Our solution is a multi-constrained optimization scheme based on cross-layer design and its cooperative mechanism. The proposed scheme incorporates the energy threshold in physical layer and the channel capacity in link layer, and integrates the ...
Keywords: Wireless multi-hop network, Bargaining game, Cross-layer design

14
March 2015 The Journal of Supercomputing: Volume 71 Issue 3, March 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1

Reduction of unnecessary energy consumption is becoming a major concern in green wireless sensor networks. Sleep scheduling is one of the efficient strategies to achieve energy saving. In this paper, we propose a novel scheme for the sleep scheduling, which is based on Decentralized Partially Observable Markov Decision Process (Dec-POMDP). ...
Keywords: Dec-POMDP, Wireless sensor networks, Quasi-Monte Carlo, Sleep scheduling, Upper bound

15
January 2015 Theoretical Computer Science: Volume 562 Issue C, January 2015
Publisher: Elsevier Science Publishers Ltd.
Bibliometrics:
Citation Count: 4

An interconnection network's diagnosability is an important measure of its self-diagnostic capability. The classical problems of fault diagnosis are explored widely. The conditional diagnosability is proposed by Lai et al. as a new measure of diagnosability, which can better measure the diagnosability of regular interconnection networks. The conditional diagnosability is ...
Keywords: System reliability, PMC model, Split-Star Networks, Conditional diagnosability, Strong diagnosability

16
November 2014 Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 73 Issue C, November 2014
Publisher: Elsevier North-Holland, Inc.
Bibliometrics:
Citation Count: 0

Due to the convenience of deployment and maintenance, wireless mesh networks (WMNs) have emerged as key techniques to support large-scale wireless coverage in both industrial and academic fields. Secure and seamless handoff is important to support mobility in WMNs. There are many existing works can be adopted to reduce the ...
Keywords: Fast handoff, Re-authentication, Wireless mesh networks, Lightweight, Ticket

17 published by ACM
September 2014 ACM Transactions on Sensor Networks (TOSN): Volume 11 Issue 1, November 2014
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 29,   Downloads (Overall): 167

Full text available: PDFPDF
In this article, we present a novel distributed separate coding (DSC) scheme for continuous data collection in wireless sensor networks with a mobile base station (mBS). By separately encoding a certain number of data segments in a combined segment and doing decoding-free data replacement in the buffers of each sensor ...
Keywords: Wireless sensor networks, success ratio of data collection, continuous data collection, distributed separate coding, mobile base station

18
February 2014 Security and Communication Networks: Volume 7 Issue 2, February 2014
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

A cognitive wireless mesh CogMesh network can provide network access for users mesh clients while holding the open spectrum-sharing feature. It combines the advantages of both cognitive radio networks and wireless mesh networks: high utilization of the scarce radio spectrum, ease of deployment, maintenance, and low cost. However, the unstable ...
Keywords: cognitive wireless mesh networks, proxy signature, fast handoff, re-authentication

19
January 2014 Future Generation Computer Systems: Volume 30 Issue C, January 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Wireless communication in wireless mesh networks (WMNs), like other types of wireless networks, is vulnerable to many malicious activities such as eavesdropping. As one of the fundamental security technologies, pairwise key establishment has been widely studied to secure wireless communication. In this paper, we propose a new matrix-based pairwise key ...
Keywords: Matrix, Pairwise key, Mesh clients, Mesh routers, Wireless mesh networks

20
January 2014 Future Generation Computer Systems: Volume 30, January, 2014
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Wireless communication in wireless mesh networks (WMNs), like other types of wireless networks, is vulnerable to many malicious activities such as eavesdropping. As one of the fundamental security technologies, pairwise key establishment has been widely studied to secure wireless communication. In this paper, we propose a new matrix-based pairwise key ...
Keywords: Wireless mesh networks, Matrix, Pairwise key, Mesh clients, Mesh routers



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us