Остановите войну!
for scientists:
default search action
Li Li 0015
- > Home > Persons > Li Li 0015
Publications
- 2022
- [j19]Li Li, Ahmed A. Abd El-Latif, Sajad Jafari, Karthikeyan Rajagopal, Fahimeh Nazarimehr, Bassem Abd-El-Atty:
Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. Sensors 22(1): 334 (2022) - 2021
- [j18]Xiaoxiong Zhong, Xinghan Wang, Li Li, Yuanyuan Yang, Yang Qin, Tingting Yang, Bin Zhang, Weizhe Zhang:
CL-ADMM: A Cooperative-Learning-Based Optimization Framework for Resource Management in MEC. IEEE Internet Things J. 8(10): 8191-8209 (2021) - 2020
- [j17]Xinghan Wang, Xiaoxiong Zhong, Li Li, Sheng Zhang, Renhao Lu, Tingting Yang:
TOT: Trust aware opportunistic transmission in cognitive radio Social Internet of Things. Comput. Commun. 162: 1-11 (2020) - [j16]Xiaoxiong Zhong, Li Li, Yuanping Zhang, Bin Zhang, Weizhe Zhang, Tingting Yang:
OODT: Obstacle Aware Opportunistic Data Transmission for Cognitive Radio Ad Hoc Networks. IEEE Trans. Commun. 68(6): 3654-3666 (2020) - [j15]Xiaoxiong Zhong, Li Li, Sheng Zhang, Renhao Lu:
ECOR: An Energy Aware Coded Opportunistic Routing for Cognitive Radio Social Internet of Things. Wirel. Pers. Commun. 110(1): 1-20 (2020) - [i6]Xiaoxiong Zhong, Li Li, Yuanping Zhang, Bin Zhang, Weizhe Zhang, Tingting Yang:
OODT: Obstacle Aware Opportunistic Data Transmission for Cognitive Radio Ad Hoc Networks. CoRR abs/2003.11761 (2020) - [i5]Xiaoxiong Zhong, Xinghan Wang, Li Li, Yuanyuan Yang, Yang Qin, Tingting Yang, Bin Zhang, Weizhe Zhang:
A Cooperative Learning Framework for Resource Management in MEC: An ADMM Perspective. CoRR abs/2003.12846 (2020) - 2019
- [j14]Li Li, M. Shamim Hossain, Ahmed A. Abd El-Latif, Mohammed F. Alhamid:
Distortion less secret image sharing scheme for Internet of Things system. Clust. Comput. 22(Suppl 1): 2293-2307 (2019) - [c18]Xinghan Wang, Xiaoxiong Zhong, Li Li, Renhao Lu, Yanbin Zheng:
PSOGT: PSO and Game Theoretic Based Task Allocation in Mobile Edge Computing. HPCC/SmartCity/DSS 2019: 2293-2298 - [c17]Xiaoxiong Zhong, Renhao Lu, Li Li, Xinghan Wang, Yanbin Zheng:
DSOR: A Traffic-Differentiated Secure opportunistic Routing with Game Theoretic Approach in MANETs. ISCC 2019: 1-6 - 2017
- [c16]Li Li, Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Ahmed Ghoneim:
Quantum color image encryption based on multiple discrete chaotic systems. FedCSIS 2017: 555-559 - [c15]Xiaoxiong Zhong, Renhao Lu, Li Li, Sheng Zhang:
ETOR: Energy and Trust Aware Opportunistic Routing in Cognitive Radio Social Internet of Things. GLOBECOM 2017: 1-6 - 2016
- [j13]Yang Qin, Xiaoxiong Zhong, Yuanyuan Yang, Li Li, Yibin Ye:
Combined channel assignment and network coded opportunistic routing in cognitive radio networks. Comput. Electr. Eng. 52: 293-306 (2016) - [j12]Yang Qin, Xiaoxiong Zhong, Yuanyuan Yang, Li Li, Fangshan Wu:
TCPJGNC: A transport control protocol based on network coding for multi-hop cognitive radio networks. Comput. Commun. 79: 9-21 (2016) - [j11]Li Li, Yang Qin, Xiaoxiong Zhong:
A Novel Routing Scheme for Resource-Constraint Opportunistic Networks: A Cooperative Multiplayer Bargaining Game Approach. IEEE Trans. Veh. Technol. 65(8): 6547-6561 (2016) - [c14]Li Li, Xiaoxiong Zhong, Yang Qin:
A secure routing based on social trust in opportunistic networks. ICCS 2016: 1-6 - [c13]Xiaoxiong Zhong, Renhao Lu, Li Li:
Social-Based Broadcast in Cognitive Radio Networks: A Network Coding Perspective. iThings/GreenCom/CPSCom/SmartData 2016: 441-444 - [c12]Li Li, Yang Qin, Xiaoxiong Zhong, Hongbin Chen:
An incentive aware routing for selfish opportunistic networks: A game theoretic approach. WCSP 2016: 1-5 - 2015
- [j10]Yang Qin, Li Li, Xiaoxiong Zhong, Yuanyuan Yang, Yibin Ye:
Opportunistic routing with admission control in wireless ad hoc networks. Comput. Commun. 55: 32-40 (2015) - [j9]Xiaoxiong Zhong, Yang Qin, Li Li:
TCPNC-DGSA: Efficient Network Coding Scheme for TCP in Multi-hop Cognitive Radio Networks. Wirel. Pers. Commun. 84(2): 1243-1263 (2015) - [j8]Yang Qin, Li Li, Xiaoxiong Zhong, Yuanyuan Yang, Choon Lim Gwee:
A Cross-Layer QoS Design with Energy and Traffic Balance Aware for Different Types of Traffic in MANETs. Wirel. Pers. Commun. 85(3): 1429-1449 (2015) - [i4]Xiaoxiong Zhong, Yang Qin, Yuanyuan Yang, Li Li:
CROR: Coding-Aware Opportunistic Routing in Multi-Channel Cognitive Radio Networks. CoRR abs/1501.02317 (2015) - [i3]Xiaoxiong Zhong, Yang Qin, Li Li:
Transport Protocols in Cognitive Radio Networks: A Survey. CoRR abs/1501.02869 (2015) - [i2]Xiaoxiong Zhong, Yang Qin, Li Li:
Capacity Analysis in Multi-Radio Multi-Channel Cognitive Radio Networks: A Small World Perspective. CoRR abs/1501.03601 (2015) - 2014
- [j7]Xiaoxiong Zhong, Yang Qin, Li Li:
Transport Protocols in Cognitive Radio Networks: A Survey. KSII Trans. Internet Inf. Syst. 8(11): 3711-3730 (2014) - [j6]Ahmed A. Abd El-Latif, Li Li, Xiamu Niu:
A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multim. Tools Appl. 70(3): 1559-1584 (2014) - [j5]Xiaoxiong Zhong, Yang Qin, Li Li:
Capacity Analysis in Multi-Radio Multi-Channel Cognitive Radio Networks: A Small World Perspective. Wirel. Pers. Commun. 79(3): 2209-2225 (2014) - [c11]Xiaoxiong Zhong, Yang Qin, Yuanyuan Yang, Li Li:
CROR: Coding-aware opportunistic routing in multi-channel cognitive radio networks. GLOBECOM 2014: 100-105 - [c10]Yang Qin, Xiaoxiong Zhong, Yuanyuan Yang, Yanlin Li, Li Li:
Joint channel assignment and opportunistic routing for maximizing throughput in cognitive radio networks. GLOBECOM 2014: 4592-4597 - [c9]Yang Qin, Li Li, Hu Liu:
GTR: A novel routing scheme based on game theory in opportunistic networks. ICCC 2014: 775-779 - [i1]Yang Qin, Xiaoxiong Zhong, Yuanyuan Yang, Yanlin Li, Li Li:
Joint Channel Assignment and Opportunistic Routing for Maximizing Throughput in Cognitive Radio Networks. CoRR abs/1404.3891 (2014) - 2013
- [j4]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu:
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11): 2986-3000 (2013) - 2012
- [j3]Chuanjun Wang, Li Li, Xuefeng Bai, Xiamu Niu:
A Novel Expression Deformation Model for 3D Face Recognition. IEICE Trans. Inf. Syst. 95-D(12): 3113-3116 (2012) - [j2]Li Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process. 92(4): 1069-1078 (2012) - [j1]Li Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]. Signal Process. 92(9): 2339-2340 (2012) - [c8]Liqun Zhao, Yang Qin, Maode Ma, Xiaoxiong Zhong, Li Li:
QoS guaranteed resource block allocation algorithm in LTE downlink. CHINACOM 2012: 425-429 - [c7]Yang Qin, Xiaoxiong Zhong, Li Li, Zhenhua Su, Xuebing Li:
A MAC protocol based on dynamic time adjusting in wireless MIMO networks. CHINACOM 2012: 530-535 - [c6]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qiong Li, Xiamu Niu:
A new image encryption based on chaotic systems and singular value decomposition. ICDIP 2012: 83343F - [c5]Li Li, Ahmed A. Abd El-Latif:
A novel secret image sharing scheme based on chaotic system. ICDIP 2012: 833412 - [c4]Xin He, Huiyun Jing, Xuefeng Bai, Li Li, Qi Han, Xiamu Niu:
Saliency based SIFT keypoints filtration. ICDIP 2012: 833415 - 2011
- [c3]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Xiamu Niu:
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. IIH-MSP 2011: 369-373 - 2010
- [c2]Li Li, Qi Han, Xiamu Niu:
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network. IIH-MSP 2010: 478-481 - 2007
- [c1]Li Li, Jing Wu, Xiaowei Guo, Meng Li, Xiamu Niu:
Framework for Windows Password Function Security Enhancement. IIH-MSP 2007: 269-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint