default search action
Jiliang Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Yuan Chang, Jiliang Li, Ning Lu, Wenbo Shi, Zhou Su, Weizhi Meng:
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids. IEEE Internet Things J. 11(2): 1990-2005 (2024) - [j26]Jiahui Li, Xiaogang Qi, Jiliang Li, Zhou Su, Yuan Su, Lifang Liu:
Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy, and Future Directions. IEEE Internet Things J. 11(11): 19121-19142 (2024) - [j25]Zhenyu Jiang, Jiliang Li, Qinnan Hu, Weizhi Meng, Witold Pedrycz, Zhou Su:
Scalable Graph-Aware Edge Representation Learning for Wireless IoT Intrusion Detection. IEEE Internet Things J. 11(16): 26955-26969 (2024) - [j24]Jiliang Li, Yuheng Wang, Yuan Su, Zhou Su, Yuyi Wang, Weizhi Meng, Yinghua Shen:
Delayed packing attack and countermeasure against transaction information based applications. Inf. Sci. 652: 119742 (2024) - [j23]Yifan Zhang, Jiliang Li, Zachary Karas, Aakash Bansal, Toby Jia-Jun Li, Collin McMillan, Kevin Leach, Yu Huang:
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization. Proc. ACM Softw. Eng. 1(FSE): 115-136 (2024) - [j22]Yuan Su, Jiliang Li, Jiahui Li, Zhou Su, Weizhi Meng, Hao Yin, Rongxing Lu:
Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems. IEEE Trans. Netw. Sci. Eng. 11(3): 2864-2875 (2024) - [j21]Yuan Su, Yuheng Wang, Jiliang Li, Zhou Su, Witold Pedrycz, Qinnan Hu:
Oracle Based Privacy-Preserving Cross-Domain Authentication Scheme. IEEE Trans. Sustain. Comput. 9(4): 602-614 (2024) - [c7]Shuxin Liu, Jiliang Li, Wei Ke, Hao Yin:
Multi-Attention Enhanced Discriminator for GAN-Based Anomalous Sound Detection. ICASSP 2024: 6715-6719 - [c6]Jiliang Li, Yifan Zhang, Zachary Karas, Collin McMillan, Kevin Leach, Yu Huang:
Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization. ICPC 2024: 47-51 - [i7]Yifan Zhang, Jiliang Li, Zachary Karas, Aakash Bansal, Toby Jia-Jun Li, Collin McMillan, Kevin Leach, Yu Huang:
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization. CoRR abs/2402.14096 (2024) - [i6]Jiliang Li, Yifan Zhang, Zachary Karas, Collin McMillan, Kevin Leach, Yu Huang:
Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization. CoRR abs/2402.14182 (2024) - [i5]Yuan Su, Yuan Lu, Jiliang Li, Yuyi Wang, Chengyi Dong, Qiang Tang:
Dumbo-MPC: Efficient Fully Asynchronous MPC with Optimal Resilience. IACR Cryptol. ePrint Arch. 2024: 1705 (2024) - [i4]Hao Cheng, Jiliang Li, Yizhong Liu, Yuan Lu, Weizhi Meng, Zhenfeng Zhang:
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 1761 (2024) - 2023
- [j20]Jiliang Li, Ziyi Zhao, Zhou Su, Weizhi Meng:
Gas-expensive patterns detection to optimize smart contracts. Appl. Soft Comput. 145: 110542 (2023) - [j19]Guangquan Xu, Hongfei Shao, Jingyi Cui, Hongpeng Bai, Jiliang Li, Guangdong Bai, Shaoying Liu, Weizhi Meng, Xi Zheng:
GenDroid: A query-efficient black-box android adversarial attack framework. Comput. Secur. 132: 103359 (2023) - [j18]Yuan Chang, Jiliang Li, Wenjuan Li:
2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids. J. Inf. Secur. Appl. 74: 103466 (2023) - [j17]Yuntao Wang, Zhou Su, Tom H. Luan, Jiliang Li, Qichao Xu, Ruidong Li:
SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework. IEEE Trans. Inf. Forensics Secur. 18: 5213-5228 (2023) - [j16]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. IEEE Trans. Inf. Forensics Secur. 18: 5964-5979 (2023) - [j15]Yuan Su, Jiliang Li, Yanping Li, Zhou Su:
Edge-Enabled: A Scalable and Decentralized Data Aggregation Scheme for IoT. IEEE Trans. Ind. Informatics 19(2): 1854-1862 (2023) - [j14]Ziyi Zhao, Jiliang Li, Zhou Su, Yuyi Wang:
GaSaver: A Static Analysis Tool for Saving Gas. IEEE Trans. Sustain. Comput. 8(2): 257-267 (2023) - [c5]Qiancun Zhao, Jiliang Li, Jianxiu Hao, Jianqun Ding, Xianwu Mi, Lijun Huang, Yungui Deng, Juxiang He:
Design and Implementation of Chua's Chaotic Circuit Based on an Active Inductor. ICEITSA 2023: 148-154 - [i3]Yuntao Wang, Zhou Su, Tom H. Luan, Jiliang Li, Qichao Xu, Ruidong Li:
SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework. CoRR abs/2305.08691 (2023) - [i2]Zixuan Wang, Jiliang Li, Yuntao Wang, Zhou Su, Shui Yu, Weizhi Meng:
Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks. CoRR abs/2309.00251 (2023) - 2022
- [j13]Yuntao Wang, Zhou Su, Jiliang Li, Ning Zhang, Kuan Zhang, Kim-Kwang Raymond Choo, Yiliang Liu:
Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks. IEEE Trans. Veh. Technol. 71(2): 1857-1874 (2022) - [c4]Yuheng Wang, Jiliang Li, Zhou Su, Yuyi Wang:
Arbitrage Attack: Miners of the World, Unite! Financial Cryptography 2022: 464-487 - [i1]Jin Guo, Zhen Han, Zhou Su, Jiliang Li, Volker Tresp, Yuyi Wang:
Continuous Temporal Graph Networks for Event-Based Graph Data. CoRR abs/2205.15924 (2022) - 2021
- [j12]Jiliang Li, Zhou Su, Deke Guo, Kim-Kwang Raymond Choo, Yusheng Ji:
PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things. IEEE Internet Things J. 8(17): 13183-13195 (2021) - [j11]Yuan Su, Yanping Li, Jiliang Li, Kai Zhang:
LCEDA: Lightweight and Communication-Efficient Data Aggregation Scheme for Smart Grid. IEEE Internet Things J. 8(20): 15639-15648 (2021) - [j10]Jiliang Li, Zhou Su, Deke Guo, Kim-Kwang Raymond Choo, Yusheng Ji, Huayan Pu:
Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services. IEEE Trans. Veh. Technol. 70(1): 742-753 (2021) - [c3]Liuyang Dong, Jiliang Li, Yanxing Li, Jing Ren, Shizhong Xu, Gang Sun, Victor Chang:
P2S2O: Pseudonymous Polling System for Small Organizations. IoTBDS 2021: 323-328 - 2020
- [j9]Minghui Dai, Jiliang Li, Zhou Su, Weiwei Chen, Qichao Xu, Shu Fu:
A Privacy Preservation Based Scheme for Task Assignment in Internet of Things. IEEE Trans. Netw. Sci. Eng. 7(4): 2323-2335 (2020) - [j8]Jiliang Li, Rui Xing, Zhou Su, Ning Zhang, Yilong Hui, Tom H. Luan, Hangguan Shan:
Trust Based Secure Content Delivery in Vehicular Networks: A Bargaining Game Theoretical Approach. IEEE Trans. Veh. Technol. 69(3): 3267-3279 (2020) - [j7]Jiliang Li, Minghui Dai, Zhou Su:
Energy-Aware Task Offloading in the Internet of Things. IEEE Wirel. Commun. 27(5): 112-117 (2020) - [c2]Minghui Dai, Zhou Su, Jiliang Li, Jian Zhou:
An Energy-Efficient Edge Offloading Scheme for UAV-Assisted Internet of Things. ICDCS 2020: 1293-1297
2010 – 2019
- 2019
- [j6]Jiliang Li, Yusheng Ji, Kim-Kwang Raymond Choo, Dieter Hogrefe:
CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles. IEEE Internet Things J. 6(6): 10332-10343 (2019) - [j5]JiLiang Li, WeiGuo Zhang, Vivek Dabra, Kim-Kwang Raymond Choo, Saru Kumari, Dieter Hogrefe:
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities. J. Netw. Comput. Appl. 134: 52-61 (2019) - 2018
- [j4]JiLiang Li, WeiGuo Zhang, Saru Kumari, Kim-Kwang Raymond Choo, Dieter Hogrefe:
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j3]JiLiang Li, Kim-Kwang Raymond Choo, WeiGuo Zhang, Saru Kumari, Joel J. P. C. Rodrigues, Muhammad Khurram Khan, Dieter Hogrefe:
EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks. Veh. Commun. 13: 104-113 (2018) - 2011
- [j2]Jiliang Li, Fan Zhang, Jake Y. Chen:
An integrated proteomics analysis of bone tissues in response to mechanical stimulation. BMC Syst. Biol. 5(S-3): S7 (2011)
2000 – 2009
- 2006
- [j1]Jun Hou, Xiangzhong Fang, Haibin Yin, Jiliang Li:
Constant Rate Control for Motion JPEG2000. IEICE Trans. Inf. Syst. 89-D(10): 2690-2692 (2006) - [c1]Jun Hou, Xiangzhong Fang, Jiliang Li, Haibin Yin, Songyu Yu:
Multi-Rate, Dynamic and Compliant Region of Interest Coding for JPEG2000. ICME 2006: 733-736
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint