


Остановите войну!
for scientists:


default search action
Tongtong Li
Person information

- affiliation: Michigan State University, East Lansing, MI, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j61]Tongtong Li
, Jinxian Deng, Jian Ren
:
Security and Energy Efficiency: Breaking the Barriers of High Peak-to-Average Power Ratio and Disguised Jamming in NextG IoT System Design. IEEE Internet Things J. 10(3): 2658-2666 (2023) - [j60]Tongtong Li
, Anne Gelb, Yoonsang Lee:
Improving numerical accuracy for the viscous-plastic formulation of sea ice. J. Comput. Phys. 487: 112184 (2023) - [j59]Yaofang Zhang, Zibo Wang, Yingzhou Wang, Kuan Lin, Tongtong Li, Hongri Liu, Chao Li, Bailing Wang:
A risk assessment model for similar attack scenarios in industrial control system. J. Supercomput. 79(14): 15955-15979 (2023) - [c81]Yu Zheng, David C. Zhu, Jian Ren, Taosheng Liu, Karl Friston, Tongtong Li:
A Mathematical Model for Neuronal Activity and Brain Information Processing Capacity. ICASSP 2023: 1-5 - [c80]Jian Ren, Jian Li, Tongtong Li:
Optimal Codes for Distributed Storage. ICNC 2023: 42-46 - [c79]Tongtong Li, Jinxian Deng, Jian Ren:
Can We Have a Better System than OFDM? ICNC 2023: 383-387 - [i11]Tongtong Li, Anne Gelb, Yoonsang Lee:
A Structurally Informed Data Assimilation Approach for Nonlinear Partial Differential Equations. CoRR abs/2309.02585 (2023) - 2022
- [j58]Jian Ren
, Jian Li
, Tongtong Li
, Matt W. Mutka
:
Feasible Region of Secure and Distributed Data Storage in Adversarial Networks. IEEE Internet Things J. 9(11): 8980-8988 (2022) - [j57]Sergio Caucao
, Tongtong Li, Ivan Yotov:
A multipoint stress-flux mixed finite element method for the Stokes-Biot model. Numerische Mathematik 152(2): 411-473 (2022) - [j56]Ehab Zaghloul
, Tongtong Li
, Matt W. Mutka
, Jian Ren
:
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. IEEE Trans. Serv. Comput. 15(3): 1592-1605 (2022) - [i10]Tongtong Li, Anne Gelb, Yoonsang Lee
:
Improving numerical accuracy for the viscous-plastic formulation of sea ice. CoRR abs/2206.10061 (2022) - [i9]Tongtong Li, Sergio Caucao, Ivan Yotov:
An augmented fully-mixed formulation for the quasistatic Navier-Stokes-Biot model. CoRR abs/2209.02894 (2022) - 2021
- [j55]Hao Li, Junyao Hou, Ziyu Chen, Jingyu Zeng
, Yu Ni, Yayu Li, Xia Xiao, Yaqi Zhou, Ning Zhang, Deyu Long, Hongfei Liu, Luyu Yang, Xinyue Bai, Qun Li
, Tongtong Li, Dongxue Che, Leijie Li, Xiaodan Wang, Peng Zhang, Mingzhi Liao
:
FifBase: a comprehensive fertility-associated indicators factor database for domestic animals. Briefings Bioinform. 22(5) (2021) - [j54]Qiang Lin
, Chuangui Cao, Tongtong Li, Zhengxing Man, Yongchun Cao, Haijun Wang:
dSPIC: a deep SPECT image classification network for automated multi-disease, multi-lesion diagnosis. BMC Medical Imaging 21(1): 122 (2021) - [j53]Ehab Zaghloul
, Tongtong Li
, Jian Ren
:
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting. IEEE Internet Things J. 8(22): 16585-16597 (2021) - [j52]Qiang Lin, Tongtong Li, P. Mohamed Shakeel, R. Dinesh Jackson Samuel
:
Advanced artificial intelligence in heart rate and blood pressure monitoring for stress management. J. Ambient Intell. Humaniz. Comput. 12(3): 3329-3340 (2021) - [j51]Bo Gu
, Jianxun Liu, Huiyuan Xiong, Tongtong Li, Yuelong Pan:
ECPC-ICP: A 6D Vehicle Pose Estimation Method by Fusing the Roadside Lidar Point Cloud and Road Feature. Sensors 21(10): 3489 (2021) - 2020
- [j50]Tongtong Li, Wencai Zhao
:
Periodic Solution of a Neutral Delay Leslie Predator-Prey Model and the Effect of Random Perturbation on the Smith Growth Model. Complex. 2020: 8428269:1-8428269:15 (2020) - [j49]Ehab Zaghloul
, Tongtong Li
, Matt W. Mutka
, Jian Ren
:
Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J. 7(10): 10288-10313 (2020) - [j48]Yuan Liang
, Jian Ren
, Tongtong Li
:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. IEEE Trans. Inf. Forensics Secur. 15: 738-752 (2020) - [j47]Yuan Liang
, Tongtong Li
:
On the Discreteness of the Worst Jamming Distribution for SP-OFDM. IEEE Trans. Inf. Forensics Secur. 15: 2884-2897 (2020) - [j46]Jian Li
, Tongtong Li
, Jian Ren
:
Beyond the MDS Bound in Distributed Cloud Storage. IEEE Trans. Inf. Theory 66(7): 3957-3975 (2020) - [c78]Ehab Zaghloul, Tongtong Li, Jian Ren:
Anonymous and Coercion-Resistant Distributed Electronic Voting. ICNC 2020: 389-393 - [c77]Yuan Liang, Jian Ren, Tongtong Li:
Secure and Efficient OFDM System Design under Disguised Jamming. ICNC 2020: 394-399 - [i8]Tongtong Li, Xing Wang, Ivan Yotov:
Non-Newtonian and poroelastic effects in simulations of arterial flows. CoRR abs/2010.14072 (2020) - [i7]Tongtong Li, Ivan Yotov:
A mixed elasticity formulation for fluid-poroelastic structure interaction. CoRR abs/2011.00132 (2020) - [i6]Sergio Caucao, Tongtong Li, Ivan Yotov:
A multipoint stress-flux mixed finite element method for the Stokes-Biot model. CoRR abs/2011.01396 (2020)
2010 – 2019
- 2019
- [j45]Dongxiao Gu
, Tongtong Li, Xiaoyu Wang, Xuejie Yang, Zhangrui Yu:
Visualizing the intellectual structure and evolution of electronic health and telemedicine research. Int. J. Medical Informatics 130 (2019) - [c76]Yuan Liang, Yunhao Liu, Jian Ren, Tongtong Li:
Malicious Link Detection in Multi-Hop Wireless Sensor Networks. GLOBECOM 2019: 1-6 - [c75]Tongtong Li:
Application Experience of Human-Computer Interaction in Educational Management at Colleges and Universities. HCI (20) 2019: 428-443 - [c74]Ehab Zaghloul, Tongtong Li, Jian Ren:
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts. ICNC 2019: 375-379 - [c73]Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. ICNC 2019: 509-514 - [i5]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
$d$-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. CoRR abs/1904.11432 (2019) - [i4]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
Bitcoin and Blockchain: Security and Privacy. CoRR abs/1904.11435 (2019) - 2018
- [b1]Tongtong Li, Tianlong Song, Yuan Liang:
Wireless Communications under Hostile Jamming: Security and Efficiency. Springer 2018, ISBN 978-981-13-0820-8, pp. 1-219 - [j44]Zhe Wang
, Yuan Liang
, David C. Zhu
, Tongtong Li
:
The Relationship of Discrete DCM and Directed Information in fMRI-Based Causality Analysis. IEEE Trans. Mol. Biol. Multi Scale Commun. 4(1): 3-13 (2018) - [j43]Yuan Liang
, Tongtong Li
:
End-to-End Throughput in Multihop Wireless Networks With Random Relay Deployment. IEEE Trans. Signal Inf. Process. over Networks 4(3): 613-625 (2018) - [j42]Jian Li
, Tongtong Li, Jian Ren, Han-Chieh Chao:
Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks. Wirel. Commun. Mob. Comput. 2018: 3473910:1-3473910:13 (2018) - [c72]M. H. Afifi, Ehab Zaghloul, Tongtong Li, Jian Ren:
UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing. GLOBECOM 2018: 1-6 - [c71]Yuan Liang, Jian Ren, Tongtong Li:
The Worst Jamming Distribution for Securely Precoded OFDM. GLOBECOM 2018: 1-6 - [c70]Zhe Wang, Yu Zheng, Michael Jigo, Taosheng Liu, Jian Ren, Zhi Tian, Tongtong Li:
Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data. GLOBECOM 2018: 1-6 - [c69]Ehab Zaghloul, Tongtong Li, Jian Ren:
An Attribute-Based Distributed Data Sharing Scheme. GLOBECOM 2018: 1-6 - [c68]Kai Zhou
, Jian Ren, Tongtong Li:
Security and Privacy Enhancement for Outsourced Biometric Identification. GLOBECOM 2018: 1-5 - [c67]Yuan Liang, Yu Zheng, Jian Ren, Tongtong Li:
End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment. ICNC 2018: 513-517 - [c66]Tongtong Li, Dongxiao Gu
, Xiaoyu Wang, Changyong Liang:
Visualizing the Intellectual Structure of Electronic Health Research: A Bibliometric Analysis. ICSH 2018: 315-324 - 2017
- [j41]Run Tian
, Yuan Liang, Xuezhi Tan, Tongtong Li:
Overlapping User Grouping in IoT Oriented Massive MIMO Systems. IEEE Access 5: 14177-14186 (2017) - [j40]Di Tang, Tongtong Li, Jian Ren:
Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(3-4): 281-300 (2017) - [j39]Jian Li, Tongtong Li, Jian Ren
:
Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks. IEEE Trans. Inf. Theory 63(7): 4414-4429 (2017) - [j38]Mai Abdelhakim
, Yuan Liang, Tongtong Li:
Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis. IEEE Trans. Signal Inf. Process. over Networks 3(1): 172-186 (2017) - [c65]Run Tian, Yuan Liang, Tongtong Li:
Overlapping user grouping in IoT oriented massive MIMO systems. ICNC 2017: 255-259 - [c64]Tianlong Song, Yuan Liang, Tongtong Li:
Physical layer security of multiband communications under hostile jamming. ICNC 2017: 346-350 - [i3]Zhe Wang, Yu Zheng, David C. Zhu, Jian Ren, Tongtong Li:
Discrete Dynamic Causal Modeling and Its Relationship with Directed Information. CoRR abs/1709.06134 (2017) - 2016
- [j37]Yunfei Lv, Tongtong Li, Yongzhen Pei, Rong Yuan:
A complete analysis of the global dynamics of a diffusive predator and toxic prey model. Appl. Math. Comput. 291: 182-196 (2016) - [j36]Mai Abdelhakim
, Yuan Liang, Tongtong Li:
Mobile Coordinated Wireless Sensor Network: An Energy Efficient Scheme for Real-Time Transmissions. IEEE J. Sel. Areas Commun. 34(5): 1663-1675 (2016) - [j35]Jian Ren, Yun Li, Tingting Jiang, Tongtong Li:
Anonymous communication in overlay networks. Secur. Commun. Networks 9(3): 229-240 (2016) - [j34]Zhe Wang, Ahmed Alahmadi, David C. Zhu, Tongtong Li:
Causality Analysis of fMRI Data Based on the Directed Information Theory Framework. IEEE Trans. Biomed. Eng. 63(5): 1002-1015 (2016) - [j33]Tianlong Song
, Wayne E. Stark, Tongtong Li, Jitendra K. Tugnait:
Optimal Multiband Transmission Under Hostile Jamming. IEEE Trans. Commun. 64(9): 4013-4027 (2016) - [j32]Tianlong Song, Kai Zhou
, Tongtong Li
:
CDMA System Design and Capacity Analysis Under Disguised Jamming. IEEE Trans. Inf. Forensics Secur. 11(11): 2487-2498 (2016) - [c63]Yuan Liang, Tianlong Song, Tongtong Li:
Energy efficient multi-hop wireless backhaul in heterogeneous cellular networks. GlobalSIP 2016: 625-629 - [c62]Zhe Wang, Tianlong Song, Yuan Liang, Tongtong Li:
Error probability analysis for LDA-Bayesian based classification of Alzheimer's disease and normal control subjects. GlobalSIP 2016: 1156-1160 - [c61]Kai Zhou
, Tianlong Song, Jian Ren, Tongtong Li:
Robust CDMA receiver design under disguised jamming. ICASSP 2016: 2179-2183 - 2015
- [j31]Zhaoxi Fang, Tianlong Song, Tongtong Li:
Energy Harvesting for Two-Way OFDM Communications under Hostile Jamming. IEEE Signal Process. Lett. 22(4): 413-416 (2015) - [j30]Ahmed Alahmadi, Zhaoxi Fang, Tianlong Song, Tongtong Li:
Subband PUEA Detection and Mitigation in OFDM-Based Cognitive Radio Networks. IEEE Trans. Inf. Forensics Secur. 10(10): 2131-2142 (2015) - [j29]Di Tang, Tongtong Li, Jian Ren, Jie Wu:
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 960-973 (2015) - [c60]Mai Abdelhakim
, Zhaoxi Fang, Jian Ren, Tongtong Li:
Hybrid mobile access coordinated wireless sensor networks - Design and analysis. ChinaSIP 2015: 453-457 - [c59]Zhe Wang, Ahmed Alahmadi, David C. Zhu, Tongtong Li:
Brain functional connectivity analysis using mutual information. GlobalSIP 2015: 542-546 - [c58]Mai Abdelhakim
, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Reliable Communications over Multihop Networks under Routing Attacks. GLOBECOM 2015: 1-6 - [c57]Jian Li, Tongtong Li, Jian Ren:
Rate-matched regenerating code in hostile networks. ICC 2015: 5728-5732 - [i2]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS Bound in Distributed Cloud Storage. CoRR abs/1510.01292 (2015) - [i1]Jian Li, Tongtong Li, Jian Ren:
Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks. CoRR abs/1511.02378 (2015) - 2014
- [j28]Tianlong Song, Tongtong Li, Jitendra K. Tugnait
:
Spectrally Efficient Multicarrier Transmission With Message-Driven Subcarrier Selection. IEEE Trans. Commun. 62(7): 2444-2455 (2014) - [j27]Ahmed Alahmadi, Mai Abdelhakim
, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE Trans. Inf. Forensics Secur. 9(5): 772-781 (2014) - [j26]Mai Abdelhakim
, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. IEEE Trans. Parallel Distributed Syst. 25(4): 950-959 (2014) - [j25]Tongtong Li, Mai Abdelhakim
, Jian Ren:
N-Hop networks: a general framework for wireless systems. IEEE Wirel. Commun. 21(2): 98-105 (2014) - [c56]Ahmed Alahmadi, Tianlong Song, Tongtong Li:
Sub-band detection of primary user emulation attacks in OFDM-based cognitive radio networks. GlobalSIP 2014: 1165-1169 - [c55]Jian Li, Tongtong Li, Jian Ren:
Secure regenerating code. GLOBECOM 2014: 770-774 - [c54]Tianlong Song, Zhaoxi Fang, Jian Ren, Tongtong Li:
Precoding for OFDM under disguised jamming. GLOBECOM 2014: 3958-3963 - [c53]Mai Abdelhakim
, Jian Ren, Tongtong Li:
Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. GLOBECOM 2014: 4616-4621 - [c52]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS bound in distributed cloud storage. INFOCOM 2014: 307-315 - [c51]Tongtong Li, Zhangguo Yu
, Juan Chen, Yan Liu, Maoxing Zheng, Libo Meng, Gan Ma, Wen Zhang, Weimin Zhang, Qiang Huang:
Stability control for biped walking based on phase modification during double support period. ROBIO 2014: 1290-1295 - 2013
- [j24]Lei Zhang, Huahui Wang, Tongtong Li:
Anti-Jamming Message-Driven Frequency Hopping - Part I: System Design. IEEE Trans. Wirel. Commun. 12(1): 70-79 (2013) - [j23]Lei Zhang, Tongtong Li:
Anti-Jamming Message-Driven Frequency Hopping - Part II: Capacity Analysis Under Disguised Jamming. IEEE Trans. Wirel. Commun. 12(1): 80-88 (2013) - [c50]Jian Li, Tongtong Li, Jian Ren:
Combating network pollution attacks: A cascaded error-control coding approach. GLOBECOM 2013: 844-848 - [c49]Ahmed Alahmadi, Mai Abdelhakim
, Jian Ren, Tongtong Li:
Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. GLOBECOM 2013: 3229-3234 - [c48]Tianlong Song, Tongtong Li:
A highly efficient multi-carrier transmission scheme with message-driven idle subcarriers. GLOBECOM 2013: 3608-3613 - [c47]Mai Abdelhakim
, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Architecture design of mobile access coordinated wireless sensor networks. ICC 2013: 1720-1724 - [c46]Zhangguo Yu
, Yan Liu, Qiang Huang, Xuechao Chen, Wen Zhang, Jing Li, Gan Ma, Libo Meng, Tongtong Li, Weimin Zhang:
Design of a humanoid ping-pong player robot with redundant joints. ROBIO 2013: 911-916 - 2012
- [j22]Lei Zhang, Jian Ren, Tongtong Li:
Time-Varying Jamming Modeling and Classification. IEEE Trans. Signal Process. 60(7): 3902-3907 (2012) - [j21]Tongtong Li, Jian Ren, Xiaochen Tang:
Secure wireless monitoring and control systems for smart grid and smart home. IEEE Wirel. Commun. 19(3): 66-73 (2012) - [j20]Tingting Jiang, Tongtong Li, Jian Ren:
Toward secure cognitive communications in wireless networks. IEEE Wirel. Commun. 19(4): 82-88 (2012) - [c45]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:
Characterization of linear network coding for pollution detection. GLOBECOM 2012: 1066-1071 - [c44]Mai Abdelhakim
, Jian Ren, Tongtong Li:
Reliable OFDM system design under hostile multi-tone jamming. GLOBECOM 2012: 4290-4295 - [c43]Di Tang, Tongtong Li, Jian Ren:
Quantitative security and efficiency analysis of SEAR in wireless sensor networks. ICC 2012: 944-948 - [c42]Mai Abdelhakim
, Jian Ren, Tongtong Li:
Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper). WASA 2012: 206-217 - 2011
- [j19]Huahui Wang, Lei Zhang, Tongtong Li, Jitendra K. Tugnait
:
Spectrally Efficient Jamming Mitigation Based on Code-Controlled Frequency Hopping. IEEE Trans. Wirel. Commun. 10(3): 728-732 (2011) - [c41]Mai Abdelhakim
, Lei Zhang, Jian Ren, Tongtong Li:
Cooperative sensing in cognitive networks under malicious attack. ICASSP 2011: 3004-3007 - [c40]Mai Abdelhakim
, Leonard E. Lightfoot, Tongtong Li:
Reliable data fusion in wireless sensor networks under Byzantine attacks. MILCOM 2011: 810-815 - 2010
- [j18]Jian Ren, Yun Li, Tongtong Li:
SPM: Source Privacy for Mobile Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j17]Huahui Wang, Tongtong Li:
Stability Analysis of Hybrid ALOHA. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c39]Leonard E. Lightfoot, Lei Zhang, Tongtong Li:
Performance of QO-STBC-OFDM in partial-band noise jamming. CISS 2010: 1-6 - [c38]Huahui Wang, Leonard E. Lightfoot, Tongtong Li:
On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks. CISS 2010: 1-6 - [c37]Huahui Wang, Jian Ren, Tongtong Li:
Resource Allocation with Load Balancing for Cognitive Radio Networks. GLOBECOM 2010: 1-5 - [c36]Huahui Wang, Tongtong Li:
Code-controlled 3D frequency hopping for jamming mitigation. ICASSP 2010: 3466-3469 - [c35]Lei Zhang, Huahui Wang, Tongtong Li:
Jamming resistance reinforcement of message-driven frequency hopping. ICASSP 2010: 3974-3977 - [c34]Lei Zhang, Jian Ren, Tongtong Li:
A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping. WASA 2010: 235-244
2000 – 2009
- 2009
- [j16]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - [j15]Qi Ling, Tongtong Li:
Message-driven frequency hopping: Design and analysis. IEEE Trans. Wirel. Commun. 8(4): 1773-1782 (2009) - [c33]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems. EIT 2009: 260-265 - [c32]Lei Zhang, Jian Ren, Tongtong Li:
Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping. GLOBECOM 2009: 1-6 - [c31]Leonard E. Lightfoot, Tongtong Li:
Jamming mitigation using space-time coded collision-free frequency hopping. ICASSP 2009: 2717-2720 - [c30]Jian Ren, Yun Li, Tongtong Li:
Routing-Based Source-Location Privacy in Wireless Sensor Networks. ICC 2009: 1-5 - [c29]Lei Zhang, Jian Ren, Tongtong Li:
Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping. ICC 2009: 1-5 - [c28]Jian Ren, Yun Li, Tongtong Li:
Providing Source Privacy in Mobile Ad Hoc Networks. MASS 2009: 332-341 - [c27]