


Остановите войну!
for scientists:
Xiong Li 0002
Person information

- affiliation: Hunan University of Science and Technology, Xiangtan, China
- affiliation (PhD 2012): Beijing University of Posts and Telecommunications, Department of Computer Science and Technology, China
Other persons with the same name
- Xiong Li — disambiguation page
- Xiong Li 0001
— SIMTech, Singapore (and 1 more)
- Xiong Li 0003
— Beijing Normal University, School of Mathematics Sciences, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j141]Zhuoqun Xia, Yichao Zhang
, Ke Gu
, Xiong Li
, Weijia Jia:
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System. IEEE Trans. Green Commun. Netw. 6(1): 313-328 (2022) - [j140]Yazhi Liu
, Qianqian Wu
, Jianwei Niu
, Xiong Li
, Zheng Song:
Imitation Learning Based Heavy-Hitter Scheduling Scheme in Software-Defined Industrial Networks. IEEE Trans. Ind. Informatics 18(6): 4254-4264 (2022) - [j139]Xiong Li
, Shanpeng Liu, Rongxing Lu
, Muhammad Khurram Khan
, Ke Gu
, Xiaosong Zhang
:
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Informatics 26(5): 2020-2031 (2022) - [j138]Ke Gu
, Wenbin Zhang, Xiong Li
, Weijia Jia:
Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. IEEE Trans. Netw. Serv. Manag. 19(1): 271-288 (2022) - 2021
- [j137]Shaobo Huang, Jinsong Gui, Tian Wang, Xiong Li
:
Joint mobile vehicle-UAV scheme for secure data collection in a smart city. Ann. des Télécommunications 76(9-10): 559-580 (2021) - [j136]Zisang Xu, Xiong Li, Jianbo Xu, Wei Liang, Kim-Kwang Raymond Choo
:
A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles. Comput. Electr. Eng. 95: 107409 (2021) - [j135]Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Ashok Kumar Das, Xiong Li, Norjihan Abdul Ghani, Sananda Bhattacharyya:
An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network. Comput. Commun. 177: 57-76 (2021) - [j134]Fan Wu
, Xiong Li
, Lili Xu, Pandi Vijayakumar
, Neeraj Kumar
:
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion. IEEE Syst. J. 15(1): 1120-1129 (2021) - [j133]Xiong Li
, Shanpeng Liu, Rongxing Lu
, Xiaosong Zhang
:
On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage. IEEE Trans. Big Data 7(6): 975-977 (2021) - [j132]Tian Liu, Fan Wu, Xiong Li
, Chaoyang Chen:
A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3): 317-329 (2021) - [j131]Jangirala Srinivas, Ashok Kumar Das
, Xiong Li
, Muhammad Khurram Khan
, Minho Jo
:
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems. IEEE Trans. Ind. Informatics 17(7): 4425-4436 (2021) - [j130]Xiong Li
, Jiawei Tan
, Anfeng Liu
, Pandi Vijayakumar
, Neeraj Kumar
, Mamoun Alazab
:
A Novel UAV-Enabled Data Collection Scheme for Intelligent Transportation System Through UAV Speed Control. IEEE Trans. Intell. Transp. Syst. 22(4): 2100-2110 (2021) - [j129]Zhuoqun Xia, Jingjing Tan, Ke Gu
, Xiong Li
, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. IEEE Trans. Netw. Sci. Eng. 8(2): 995-1008 (2021) - 2020
- [j128]Fan Wu, Xiong Li
, Lili Xu, Saru Kumari
, Dingbao Lin, Joel J. P. C. Rodrigues:
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann. des Télécommunications 75(7-8): 307-317 (2020) - [j127]Fan Wu, Xiong Li, Lili Xu, Saru Kumari
:
A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157: 38-44 (2020) - [j126]Dan Tang, Liu Tang, Rui Dai, Jingwen Chen, Xiong Li, Joel J. P. C. Rodrigues:
MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Gener. Comput. Syst. 106: 347-359 (2020) - [j125]Tianqi Zhou, Jian Shen, Xiong Li
, Chen Wang, Haowen Tan
:
Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix. Future Gener. Comput. Syst. 108: 1307-1313 (2020) - [j124]Dan Tang, Rui Dai, Liu Tang, Xiong Li:
Low-rate DoS attack detection based on two-step cluster analysis and UTR analysis. Hum. centric Comput. Inf. Sci. 10: 6 (2020) - [j123]Khalid Mahmood
, Aniqa Rehman
, Pradeep Chaudhary, Xiong Li, Fan Wu, Saru Kumari
:
Revised anonymous authentication protocol for adaptive client-server infrastructure. Int. J. Commun. Syst. 33(4) (2020) - [j122]Dhanasekaran Raghavan, Muthusamy Hariharan, Xiong Li:
Special issue on "Brain computing for healthcare and wellness applications". J. Ambient Intell. Humaniz. Comput. 11(3): 1045 (2020) - [j121]Shun Liu, Guosheng Huang, Jinsong Gui, Tian Wang, Xiong Li:
Energy-aware MAC protocol for data differentiated services in sensor-cloud computing. J. Cloud Comput. 9: 48 (2020) - [j120]Dharminder Dharminder, Dheerendra Mishra
, Xiong Li:
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services. J. Medical Syst. 44(1): 6:1-6:9 (2020) - [j119]Xiong Li
, Jieyao Peng
, Mohammad S. Obaidat
, Fan Wu
, Muhammad Khurram Khan
, Chaoyang Chen:
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Syst. J. 14(1): 39-50 (2020) - [j118]Xiong Li
, Tian Liu, Mohammad S. Obaidat
, Fan Wu
, Pandi Vijayakumar
, Neeraj Kumar
:
A Lightweight Privacy-Preserving Authentication Protocol for VANETs. IEEE Syst. J. 14(3): 3547-3557 (2020) - [j117]Wenying Zheng, Dengzhi Liu, Xiong Li
, Arun Kumar Sangaiah
:
Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing. Sustain. Comput. Informatics Syst. 28: 100237 (2020) - [j116]Xiong Li
, Shanpeng Liu, Rongxing Lu
:
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data". IEEE Trans. Inf. Forensics Secur. 15: 2881-2883 (2020) - [j115]Rui Guo, Xiong Li
, Dong Zheng, Yinghui Zhang:
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. J. Supercomput. 76(7): 4884-4903 (2020)
2010 – 2019
- 2019
- [j114]Chao-Yang Chen
, Yang Tang, Liang-Hong Wu, Ming Lu, Xi-Sheng Zhan, Xiong Li
, Cai-Lun Huang, Wei-Hua Gui:
Adaptive Neural-Network-Based Control for a Class of Nonlinear Systems With Unknown Output Disturbance and Time Delays. IEEE Access 7: 7702-7716 (2019) - [j113]Ting Li, Kaoru Ota
, Tian Wang, Xiong Li
, Zhiping Cai, Anfeng Liu
:
Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things. IEEE Access 7: 15292-15309 (2019) - [j112]Yingying Ren, Wei Liu, Tian Wang, Xiong Li
, Neal N. Xiong
, Anfeng Liu
:
A Collaboration Platform for Effective Task and Data Reporter Selection in Crowdsourcing Network. IEEE Access 7: 19238-19257 (2019) - [j111]Baixiang Huang, Wei Liu, Tian Wang, Xiong Li
, Houbing Song
, Anfeng Liu
:
Deployment Optimization of Data Centers in Vehicular Networks. IEEE Access 7: 20644-20663 (2019) - [j110]Mingfeng Huang, Wei Liu, Tian Wang, Houbing Song
, Xiong Li
, Anfeng Liu
:
A Queuing Delay Utilization Scheme for On-Path Service Aggregation in Services-Oriented Computing Networks. IEEE Access 7: 23816-23833 (2019) - [j109]Jin Li, Wei Liu, Tian Wang, Houbing Song
, Xiong Li
, Fang Liu, Anfeng Liu
:
Battery-Friendly Relay Selection Scheme for Prolonging the Lifetimes of Sensor Nodes in the Internet of Things. IEEE Access 7: 33180-33201 (2019) - [j108]Feihu Wang, Wei Liu, Tian Wang, Ming Zhao, Mande Xie
, Houbing Song
, Xiong Li
, Anfeng Liu
:
To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs. IEEE Access 7: 55983-56015 (2019) - [j107]Qiang Wang, Wei Liu, Tian Wang, Ming Zhao, Xiong Li
, Mande Xie
, Ming Ma, Guoping Zhang, Anfeng Liu
:
Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns. IEEE Access 7: 70212-70236 (2019) - [j106]Ting Shu, Wei Liu
, Tian Wang, Qingyong Deng
, Ming Zhao, Neal N. Xiong
, Xiong Li
, Anfeng Liu
:
Broadcast Based Code Dissemination Scheme for Duty Cycle Based Wireless Sensor Networks. IEEE Access 7: 105258-105286 (2019) - [j105]Xuemei Xiang, Wei Liu, Tian Wang, Mande Xie, Xiong Li
, Houbing Song
, Anfeng Liu, Guoping Zhang:
Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT. EURASIP J. Wirel. Commun. Netw. 2019: 168 (2019) - [j104]Lu Zhou, Xiong Li
, Kuo-Hui Yeh
, Chunhua Su, Wayne Chiu:
Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener. Comput. Syst. 91: 244-251 (2019) - [j103]Teng Xi, Ye Tian
, Xiong Li
, Hui Gao, Wendong Wang:
Pixel-wise depth based intelligent station for inferring fine-grained PM2.5. Future Gener. Comput. Syst. 92: 84-92 (2019) - [j102]Shaobo Zhang, Xiong Li
, Zhiyuan Tan
, Tao Peng, Guojun Wang:
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Gener. Comput. Syst. 94: 40-50 (2019) - [j101]Xiong Li
, Shanpeng Liu, Fan Wu
, Saru Kumari
, Joel J. P. C. Rodrigues
:
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications. IEEE Internet Things J. 6(3): 4755-4763 (2019) - [j100]Km. Renuka, Saru Kumari
, Xiong Li
:
Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare. J. Medical Syst. 43(5): 133:1-133:12 (2019) - [j99]Xiong Li
, Fan Wu
, Saru Kumari
, Lili Xu, Arun Kumar Sangaiah
, Kim-Kwang Raymond Choo
:
A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distributed Comput. 132: 242-249 (2019) - [j98]Logesh Ravi
, V. Subramaniyaswamy
, Vijayakumar Varadharajan
, Xiong Li
:
Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users. Mob. Networks Appl. 24(3): 1018-1033 (2019) - [j97]Marimuthu Karuppiah
, Ashok Kumar Das, Xiong Li
, Saru Kumari
, Fan Wu, Shehzad Ashraf Chaudhry
, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. Mob. Networks Appl. 24(3): 1046-1062 (2019) - [j96]Wankou Yang, Su-Jing Wang, Pritee Khanna
, Xiong Li
:
Pattern Recognition Techniques for Non Verbal Human Behavior (NVHB). Pattern Recognit. Lett. 125: 684-686 (2019) - [j95]Azeem Irshad
, Shehzad Ashraf Chaudhry
, Muhammad Sher, Bander A. Alzahrani
, Saru Kumari
, Xiong Li
, Fan Wu
:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - [j94]Fan Wu
, Lili Xu, Xiong Li
, Saru Kumari
, Marimuthu Karuppiah
, Mohammad S. Obaidat
:
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 13(3): 2830-2838 (2019) - [j93]Deepika Agarwal, Pitam Singh
, Xiong Li
, Saru Kumari
:
Optimality criteria for fuzzy-valued fractional multi-objective optimization problem. Soft Comput. 23(19): 9049-9067 (2019) - [j92]Pankaj Kumar Sa, Saru Kumari
, Vishnu Sharma, Xiong Li
, Arun Kumar Sangaiah
, SK Hafizul Islam:
Secure CLS and CL-AS schemes designed for VANETs. J. Supercomput. 75(6): 3076-3098 (2019) - 2018
- [j91]Yinbin Miao, Jianfeng Ma, Qi Jiang
, Xiong Li
, Arun Kumar Sangaiah
:
Verifiable keyword search over encrypted cloud data in smart city. Comput. Electr. Eng. 65: 90-101 (2018) - [j90]Marimuthu Karuppiah
, Xiong Li
, Ashok Kumar Das, Saru Kumari
, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 65: 261-264 (2018) - [j89]Xin Liao, Jiaojiao Yin, Sujin Guo, Xiong Li
, Arun Kumar Sangaiah
:
Medical JPEG image steganography based on preserving inter-block dependencies. Comput. Electr. Eng. 67: 320-329 (2018) - [j88]Fan Wu, Xiong Li
, Lili Xu, Saru Kumari
, Arun Kumar Sangaiah
:
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68: 107-118 (2018) - [j87]Marimuthu Karuppiah
, Xiong Li
, Ashok Kumar Das, Saru Kumari
, Qin Liu:
Introduction to the special section on Big data and IoT in e-healthcare. Comput. Electr. Eng. 70: 1092-1095 (2018) - [j86]Arun Kumar Sangaiah
, Oluwarotimi Williams Samuel, Xiong Li
, Mohamed Abdel-Basset, Haoxiang Wang:
Towards an efficient risk assessment in software projects-Fuzzy reinforcement paradigm. Comput. Electr. Eng. 71: 833-846 (2018) - [j85]Fan Wu
, Xiong Li
, Lili Xu, Arun Kumar Sangaiah
, Joel J. P. C. Rodrigues
:
Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices. IEEE Consumer Electron. Mag. 7(6): 38-44 (2018) - [j84]Ye Tian, Xiong Li
, Arun Kumar Sangaiah
, Edith C. H. Ngai, Zheng Song, Lanshan Zhang, Wendong Wang:
Privacy-preserving scheme in social participatory sensing based on Secure Multi-party Cooperation. Comput. Commun. 119: 167-178 (2018) - [j83]Javad Khodadoust
, Ali Mohammad Khodadoust, Xiong Li
, Saru Kumari
:
Design and implementation of a multibiometric system based on hand's traits. Expert Syst. Appl. 97: 303-314 (2018) - [j82]Khalid Mahmood, Shehzad Ashraf Chaudhry
, Husnain Naqvi, Saru Kumari
, Xiong Li
, Arun Kumar Sangaiah
:
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81: 557-565 (2018) - [j81]Fan Wu, Xiong Li
, Arun Kumar Sangaiah
, Lili Xu, Saru Kumari
, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 82: 727-737 (2018) - [j80]Xiong Li
, Jianwei Niu
, Saru Kumari
, Fan Wu, Kim-Kwang Raymond Choo
:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener. Comput. Syst. 83: 607-618 (2018) - [j79]Xiong Li
, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo
:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst. 84: 149-159 (2018) - [j78]Khalid Mahmood, Xiong Li
, Shehzad Ashraf Chaudhry
, Husnain Naqvi, Saru Kumari
, Arun Kumar Sangaiah
, Joel J. P. C. Rodrigues
:
Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure. Future Gener. Comput. Syst. 88: 491-500 (2018) - [j77]Hua Guo, Yandong Zheng, Xiong Li
, Zhoujun Li, Chunhe Xia:
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. Future Gener. Comput. Syst. 89: 713-721 (2018) - [j76]Xiong Li
, Jieyao Peng
, Jianwei Niu
, Fan Wu
, Junguo Liao, Kim-Kwang Raymond Choo
:
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things. IEEE Internet Things J. 5(3): 1606-1615 (2018) - [j75]Saru Kumari
, Marimuthu Karuppiah
, Ashok Kumar Das, Xiong Li
, Fan Wu, Vidushi Gupta:
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Humaniz. Comput. 9(3): 643-653 (2018) - [j74]Fan Wu
, Lili Xu, Saru Kumari
, Xiong Li
, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j73]Xiong Li
, Jianwei Niu, Saru Kumari
, Fan Wu, Arun Kumar Sangaiah
, Kim-Kwang Raymond Choo
:
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103: 194-204 (2018) - [j72]Zheng Xiao, Xiong Li
, Le Wang, Qiuwei Yang, Jiayi Du, Arun Kumar Sangaiah
:
Using convolution control block for Chinese sentiment analysis. J. Parallel Distributed Comput. 116: 18-26 (2018) - [j71]Saru Kumari
, Ashok Kumar Das, Xiong Li
, Fan Wu, Muhammad Khurram Khan
, Qi Jiang
, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j70]Xin Liao, Sujin Guo, Jiaojiao Yin, Huan Wang, Xiong Li
, Arun Kumar Sangaiah
:
New cubic reference table based image steganography. Multim. Tools Appl. 77(8): 10033-10050 (2018) - [j69]Azeem Irshad
, Muhammad Sher, Shehzad Ashraf Chaudhry
, Saru Kumari
, Arun Kumar Sangaiah
, Xiong Li
, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j68]Fan Wu, Lili Xu, Saru Kumari
, Xiong Li
:
An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 11(1): 1-20 (2018) - [j67]Yanjun Wang
, Qi Chen
, Lin Liu
, Xiong Li
, Arun Kumar Sangaiah
, Kai Li:
Systematic Comparison of Power Line Classification Methods from ALS and MLS Point Cloud Data. Remote. Sens. 10(8): 1222 (2018) - [j66]Tianqi Zhou, Jian Shen
, Xiong Li
, Chen Wang, Jun Shen:
Quantum Cryptography for the Future Internet and the Security Analysis. Secur. Commun. Networks 2018: 8214619:1-8214619:7 (2018) - [j65]Jing Li, Xiong Li
, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu:
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. 22(3): 707-714 (2018) - [j64]Pankaj Kumar Sa, Saru Kumari
, Vishnu Sharma, Arun Kumar Sangaiah
, Jianghong Wei
, Xiong Li
:
A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput. Informatics Syst. 18: 80-89 (2018) - [j63]Xiong Li
, Maged Hamada Ibrahim, Saru Kumari
, Rahul Kumar:
Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors. Telecommun. Syst. 67(2): 323-348 (2018) - [j62]Xiong Li
, Jianwei Niu
, Md. Zakirul Alam Bhuiyan
, Fan Wu
, Marimuthu Karuppiah
, Saru Kumari
:
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3599-3609 (2018) - [j61]Saru Kumari
, Marimuthu Karuppiah
, Ashok Kumar Das
, Xiong Li
, Fan Wu, Neeraj Kumar
:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12): 6428-6453 (2018) - [j60]Hua Guo, Chen Chen
, Ya Gao, Xiong Li
, Jiongchao Jin:
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers. Wirel. Commun. Mob. Comput. 2018: 3284324:1-3284324:14 (2018) - [c12]Shaobo Zhang, Qing Peng, Xiong Li
, Gengming Zhu, Jing Liao:
A Multi-Features Fusion Method Based on Convolutional Neural Network for Vehicle Recognition. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 946-953 - [p1]Wei Liang, Jing Long, Dafang Zhang, Xiong Li, Yin Huang:
Study on IP Protection Techniques for Integrated Circuit in IOT Environment. Internet of Everything 2018: 193-216 - 2017
- [j59]Jian Shen
, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, Xiong Li
:
Hierarchical Trust Level Evaluation for Pervasive Social Networking. IEEE Access 5: 1178-1187 (2017) - [j58]Fan Wu, Lili Xu, Saru Kumari
, Xiong Li
, Muhammad Khurram Khan
, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j57]Ruijie Zhang, Jian Shen, Fushan Wei, Xiong Li
, Arun Kumar Sangaiah
:
Medical image classification based on multi-scale non-negative sparse coding. Artif. Intell. Medicine 83: 44-51 (2017) - [j56]Xiong Li
, Jieyao Peng, Saru Kumari
, Fan Wu, Marimuthu Karuppiah
, Kim-Kwang Raymond Choo
:
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61: 238-249 (2017) - [j55]Fan Wu, Xiong Li
, Lili Xu, Saru Kumari
, Marimuthu Karuppiah
, Jian Shen:
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63: 168-181 (2017) - [j54]Xiong Li
, Maged Hamada Ibrahim, Saru Kumari
, Arun Kumar Sangaiah
, Vidushi Gupta, Kim-Kwang Raymond Choo
:
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Networks 129: 429-443 (2017) - [j53]Saru Kumari
, Ashok Kumar Das, Mohammad Wazid
, Xiong Li
, Fan Wu, Kim-Kwang Raymond Choo
, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j52]Saru Kumari
, Xiong Li
, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo
, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j51]Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, Tengrun Li:
An Improved DPA Attack on DES with Forth and Back Random Round Algorithm. Int. J. Netw. Secur. 19(2): 285-294 (2017) - [j50]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li:
Outsourced data modification algorithm with assistance of multi-assistants in cloud computing. Int. J. Sens. Networks 24(1): 62-73 (2017) - [j49]Fan Wu, Lili Xu, Saru Kumari
, Xiong Li
:
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1): 101-116 (2017) - [j48]Arun Kumar Sangaiah
, Marimuthu Karuppiah
, Xiong Li
:
Wireless and Mobile Networks: Security and Privacy Issues. J. Electr. Comput. Eng. 2017: 5174073:1-5174073:2 (2017) - [j47]SK Hafizul Islam, Ruhul Amin, G. P. Biswas, Mohammad Sabzinejad Farash
, Xiong Li
, Saru Kumari
:
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3): 311-324 (2017) - [j46]Fan Wu, Lili Xu, Saru Kumari
, Xiong Li
, Jian Shen, Kim-Kwang Raymond Choo
, Mohammad Wazid
, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j45]Fan Wu, Lili Xu, Saru Kumari
, Xiong Li
:
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim. Syst. 23(2): 195-205 (2017) - [j44]Nishant Doshi
, Saru Kumari
, Dheerendra Mishra
, Xiong Li
, Kim-Kwang Raymond Choo
, Arun Kumar Sangaiah
:
A password based authentication scheme for wireless multimedia systems. Multim. Tools Appl. 76(24): 25893-25918 (2017) - [j43]Fan Wu, Lili Xu, Saru Kumari
, Xiong Li
:
A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 10(1): 16-30 (2017) - [j42]Saru Kumari
, Shehzad Ashraf Chaudhry
, Fan Wu, Xiong Li
, Mohammad Sabzinejad Farash
, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 10(1): 92-105 (2017) - [j41]Xiong Li
, Arun Kumar Sangaiah
, Saru Kumari
, Fan Wu, Jian Shen, Muhammad Khurram Khan:
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers. Ubiquitous Comput. 21(5): 791-805 (2017) - [j40]Marimuthu Karuppiah
, Saru Kumari
, Xiong Li
, Fan Wu, Ashok Kumar Das, Muhammad Khurram Khan
, R. Saravanan
, Sayantani Basu:
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 93(2): 383-407 (2017) - [j39]