default search action
Lili Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Lili Sun, Yandong Zheng, Rongxing Lu, Hui Zhu, Yonggang Zhang:
Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data. Inf. Sci. 662: 120253 (2024) - 2023
- [j29]Lili Sun, Yonggang Zhang, Yandong Zheng, Weiyu Song, Rongxing Lu:
Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud. IEEE Trans. Serv. Comput. 16(5): 3766-3781 (2023) - [c45]Yong Wang, Rui Wang, Xin Liu, Donglan Liu, Hao Zhang, Lei Ma, Fangzhe Zhang, Lili Sun, Zhenghao Li:
A Framework for TLS Implementation Vulnerability Testing in 5G. ACNS Workshops 2023: 284-298 - [c44]Yue Zhu, Zhenghao Li, Lili Sun, Li Gao:
Lightweight Multi-Role Recommendation System in TV live-streaming. BMSB 2023: 1-6 - [c43]Weiyu Song, Yonggang Zhang, Lili Sun, Yandong Zheng, Rongxing Lu:
Efficient and Privacy-Preserving Eclipse Query Over Encrypted Data. GLOBECOM 2023: 1-6 - [c42]Lili Sun, Yonggang Zhang, Yandong Zheng, Rongxing Lu, Hui Zhu:
PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud. ICC 2023: 1554-1559 - [c41]Rui Wang, Donglan Liu, Xin Liu, Lei Ma, Hao Zhang, Yong Wang, Zhenghao Li, Fangzhe Zhang, Lili Sun:
An ASN.1 UPER Encoding Based Fuzzing Method for Radio Resource Control Protocol. NaNA 2023: 268-273 - [c40]Xin Liu, Rui Wang, Yiliang Liu, Donglan Liu, Fangzhe Zhang, Lili Sun, Tom H. Luan:
Physical Layer Security Against Passive Eavesdropper in Digital Twin-Enabler Power Grid: An IRS-Assisted Approach. PIMRC 2023: 1-6 - [c39]Kun Wang, Ang Li, Xiaokun Wang, Lili Sun:
Study on Credit Risk Control by Variational Inference. WISE 2023: 801-809 - 2022
- [j28]Xiaogang Zhang, Lili Sun:
Research on the similarity between nodes with hypernymy/hyponymy relations based on IC and taxonomical structure. Int. Arab J. Inf. Technol. 19(3): 388-395 (2022) - [j27]Donglan Liu, Hao Zhang, Rui Wang, Fangzhe Zhang, Lili Sun, Xin Liu, Lei Ma:
A lightweight IoT firmware vulnerability detection scheme based on homology detection. J. High Speed Networks 28(4): 287-297 (2022) - [j26]Entao Wu, Hongchang Wang, Huaxiang Lu, Wenqi Zhu, Yifei Jia, Li Wen, Chi-Yeung Choi, Huimin Guo, Bin Li, Lili Sun, Guangchun Lei, Jialin Lei, Haifang Jian:
Unlocking the Potential of Deep Learning for Migratory Waterbirds Monitoring Using Surveillance Video. Remote. Sens. 14(3): 514 (2022) - [j25]Zhenzhen Cheng, Yong Zhang, Waqas Muhammad, Yunhe Hao, Yujie Tang, Lili Sun, Di Wang, Jintang Zhou, Ruizhe Wang, Yuangang Deng, Yunjia Li, Li Geng, Wen Han:
Temperature Compensation With Highly Integrated Ionization Sensor Array Used in Simultaneous Detection of Mixed Gases. IEEE Trans. Ind. Electron. 69(1): 911-920 (2022) - [c38]Lili Sun, Chenggang Wu, Zhe Wang, Yan Kang, Bowen Tang:
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines. COMPSAC 2022: 757-766 - 2021
- [j24]Huilian Fan, Yuanchang Zhong, Guangpu Zeng, Lili Sun:
Attributed network representation learning via improved graph attention with robust negative sampling. Appl. Intell. 51(1): 416-426 (2021) - [j23]Lili Sun, Xueyan Liu, Min Zhao, Bo Yang:
Interpretable Variational Graph Autoencoder with Noninformative Prior. Future Internet 13(2): 51 (2021) - [j22]Yuanchang Zhong, Lili Sun, Chenhao Ge, Huilian Fan:
HOG-ESRs Face Emotion Recognition Algorithm Based on HOG Feature and ESRs Method. Symmetry 13(2): 228 (2021) - [c37]Lizhong Hu, Lili Sun, Yong Zha, Min Chen, Lei Wu, Huai Cao:
Cross-Cultural Research on Consumer Decision Making of HNB Product Modeling Based on Eye Tracking. HCI (10) 2021: 288-299 - [c36]Lili Sun, Lizhong Hu, Lei Xiang, Xiuling Wang, Lei Wu, Huai Cao:
Influence of the Color and Logo Position of HNB Products on User Experience Based on Eye Tracking. HCI (17) 2021: 360-373 - [c35]Lili Sun, Lizhong Hu, Feng Zheng, Yue Sun, Huai Cao, Lei Wu:
Influence of HNB Product Packaging Health Warning Design on Risk Perception Based on Eye Tracking. HCI (17) 2021: 390-402 - 2020
- [j21]Li Zhou, Lili Sun, Zhaochan Li, Weipeng Li, Ning Cao, Russell Higgs:
Study on a storage location strategy based on clustering and association algorithms. Soft Comput. 24(8): 5499-5516 (2020)
2010 – 2019
- 2019
- [j20]Jin He, Yuanchang Zhong, Lili Sun, Xiaofan Zhang:
面向燃气调压应用的RBF人工智能控制策略 (RBF Artificial Intelligence Control Strategy for Gas Pressure Regulating Application). 计算机科学 46(6A): 138-141 (2019) - [c34]Sachula Meng, Zhihui Wang, Huixia Ding, Lili Sun, Delong Yang, Sai Wu, Xinzhi Cao, Xue Wang, Ying Wang, Yuanbin Chen:
Service-Aware Resource Allocation Based on RAN Slicing for Smart Grid. IMIS 2019: 373-384 - [c33]Md. Enamul Kabir, Lili Sun, Hua Wang:
Finding an Optimum Set of Roles in a CPAC Model. NaNA 2019: 27-33 - 2018
- [c32]Yulun Cheng, Lili Sun, Xiaoyun Liu:
User-Oriented Energy-Saving Offloading for Wireless Virtualization Aided Mobile Edge Computing. CSAE 2018: 51:1-51:5 - [c31]Lili Sun, Zhaochan Li, Ning Cao, Li Zhou:
Research on Application of Logistics Service Quality Management Based on Blockchain. ICA3PP (Workshops) 2018: 151-157 - [c30]Jing Liu, Zhaochan Li, Lili Sun, Jinlong Wang, Ning Cao:
Research on the Application of RFID Technology in Logistics Warehousing Management System. ICA3PP (Workshops) 2018: 158-164 - [c29]Pasupathy Vimalachandran, Yanchun Zhang, Jinli Cao, Lili Sun, Jianming Yong:
Preserving Data Privacy and Security in Australian My Health Record System: A Quality Health Care Implication. WISE (2) 2018: 111-120 - 2017
- [j19]Yiying Zhang, Kun Liang, Yeshen He, Yannian Wu, Xin Hu, Lili Sun:
The Channel Compressive Sensing Estimation for Power Line Based on OMP Algorithm. J. Electr. Comput. Eng. 2017: 2483586:1-2483586:8 (2017) - [j18]Laizhong Cui, Lili Sun, Xianghua Fu, Nan Lu, Guanjing Zhang:
Exploring A Trust Based Recommendation Approach for Videos in Online Social Network. J. Signal Process. Syst. 86(2-3): 207-219 (2017) - [c28]Lili Sun, Jinlong Wang, Russell Higgs, Cuinan Yang:
Analysis on the Application of Dense Storage Technology in Logistics Based on the IoT. CSE/EUC (2) 2017: 214-218 - [c27]Zhaochan Li, Lili Sun, Russell Higgs:
Research on, and Development of, Data Extraction and Data Cleaning Technology Based on the Internet of Things. CSE/EUC (2) 2017: 332-341 - [c26]Jing Liu, Lili Sun, Russell Higgs, Yuanyuan Zhang, Yan Huang:
The Electronic Commerce in the Era of Internet of Things and Big Data. CSE/EUC (2) 2017: 360-363 - [c25]Lili Sun, Jing Liu, Russell Higgs, Li Zhou:
Analysis on the Application of the Internet of Things Technology to Jingdong Mall's Supply Chain Management. CSE/EUC (2) 2017: 437-442 - [i1]Lili Sun, Jianming Yong, Jeffrey Soar:
Access control management for e-Healthcare in cloud environment. CoRR abs/1711.10553 (2017) - 2016
- [j17]Lili Sun, Yuxue Ren, Wenjie Gao:
Lower and upper bounds for the blow-up time for nonlinear wave equation with variable sources. Comput. Math. Appl. 71(1): 267-277 (2016) - [j16]Hua Wang, Xun Yi, Elisa Bertino, Lili Sun:
Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28(3): 600-615 (2016) - [c24]Lili Sun, Deyuan Zhang, Jun Cai:
Controlled assembly of nanosilver particles inside bacterial cell scaffold. NEMS 2016: 14-17 - 2014
- [j15]Lili Sun, Bin Guo, Wenjie Gao:
A lower bound for the blow-up time to a damped semilinear wave equation. Appl. Math. Lett. 37: 22-25 (2014) - [j14]Hua Wang, Lili Sun, Elisa Bertino:
Building access control policy model for privacy preserving and testing policy conflicting problems. J. Comput. Syst. Sci. 80(8): 1493-1503 (2014) - [j13]Lili Sun, Jianming Yong, Jeffrey Soar:
Access control management for e-Healthcare in cloud environment. EAI Endorsed Trans. Scalable Inf. Syst. 1(2): e3 (2014) - [c23]Lili Sun, Haixia Zhang, Dongmei Jiang:
Coefficients optimization in femtocell utility function for distributed utility-based SINR adaption algorithm. ICUFN 2014: 233-237 - 2013
- [j12]Xiaoxun Sun, Lili Sun:
Privacy Preserving Large-Scale Rating Data Publishing. EAI Endorsed Trans. Scalable Inf. Syst. 1(1): e3 (2013) - [c22]Lili Sun, Hua Wang, Elisa Bertino:
Role-based access control to outsourced data in could computing. ADC 2013: 119-128 - [c21]Ji Zhang, Hua Wang, Xiaohui Tao, Lili Sun:
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback. ICDE 2013: 1364-1367 - [c20]Svitlana Tumanova, Olga Irzak, Lili Sun, Shiri Margel, Eyal de Lara:
Octopus: efficient data intensive computing on virtualized datacenters. SYSTOR 2013: 3:1-3:11 - 2012
- [j11]Lili Sun, Hua Wang:
A purpose-based access control in native XML databases. Concurr. Comput. Pract. Exp. 24(10): 1154-1166 (2012) - [j10]Lili Sun, Hua Wang, Jeffrey Soar, Chunming Rong:
Purpose Based Access Control for Privacy Protection in E-Healthcare Services. J. Softw. 7(11): 2443-2449 (2012) - [j9]Hongbin Jiang, Meilin Bai, Peng Wei, Lili Sun, Ziyong Shen, Shimin Hou:
Half-Metallic Properties of Single-Walled Polymeric Manganese Phthalocyanine Nanotubes. Sensors 12(7): 8438-8446 (2012) - [c19]Lili Sun, Hua Wang, Jianming Yong, Guoxin Wu:
Semantic access control for cloud computing based on e-Healthcare. CSCWD 2012: 512-518 - 2011
- [j8]Xiaoxun Sun, Lili Sun, Hua Wang:
Extended k-anonymity models against sensitive attribute disclosure. Comput. Commun. 34(4): 526-535 (2011) - [j7]Lili Sun, Hua Wang:
Access control and authorization for protecting disseminative information in E-learning workflow. Concurr. Comput. Pract. Exp. 23(16): 2034-2042 (2011) - [c18]Yongrui Qin, Hua Wang, Lili Sun:
Cluster-Based Scheduling Algorithm for Periodic XML Data Broadcast in Wireless Environments. AINA Workshops 2011: 855-860 - [c17]Shigang Li, Shucai Yao, Haohu He, Lili Sun, Yi Chen, Yunfeng Peng:
Extending Synchronization Constructs in OpenMP to Exploit Pipeline Parallelism on Heterogeneous Multi-core. ICA3PP (2) 2011: 54-63 - [c16]Lili Sun, Minyong Shao, Min Wu:
Design and Implementation of Multimedia Online Courseware Based on XML/XSLT and JavaScript. ICICA (2) 2011: 456-462 - [c15]Lili Sun, Hua Wang:
A purpose based usage access control model for E-healthcare services. ICDKE 2011: 41-46 - [c14]Lili Sun, Hua Wang, Xiaohui Tao, Yanchun Zhang, Jing Yang:
Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems. TrustCom 2011: 250-257 - 2010
- [c13]Hua Wang, Lili Sun:
Trust-Involved Access Control in Collaborative Open Social Networks. NSS 2010: 239-246 - [c12]Lili Sun, Hua Wang, Raj Jururajin, Sri Sriprakash:
A Purpose Based Access Control in XML Databases System. NSS 2010: 486-493 - [c11]Hua Wang, Lili Sun, Vijay Varadharajan:
Purpose-Based Access Control Policies and Conflicting Analysis. SEC 2010: 217-228
2000 – 2009
- 2009
- [j6]Theodore J. Mock, Lili Sun, Rajendra P. Srivastava, Miklos A. Vasarhelyi:
An evidential reasoning approach to Sarbanes-Oxley mandated internal control risk assessment. Int. J. Account. Inf. Syst. 10(2): 65-78 (2009) - [j5]Lili Sun, Yan Li:
Using Usage Control to Access XML Databases. Int. J. Inf. Syst. Serv. Sect. 1(3): 32-44 (2009) - [j4]Lili Sun, Hua Wang, Jianming Yong:
Authorization Algorithms for Permission-Role Assignments. J. Univers. Comput. Sci. 15(9): 1782-1798 (2009) - [c10]Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang:
Privacy preserving on Radio Frequency Identification systems. CSCWD 2009: 674-679 - [c9]Xiaoxun Sun, Hua Wang, Lili Sun:
Extended K-Anonymity Models Against Attribute Disclosure. NSS 2009: 130-136 - 2008
- [j3]Lili Sun, Shuwei Tang, Yingfei Chang, Zhanliang Wang, Rongshun Wang:
Searching for stable hept-C62X2 (X = F, Cl, and Br): Structures and stabilities of heptagon-containing C62 halogenated derivatives. J. Comput. Chem. 29(16): 2631-2635 (2008) - [c8]Lili Sun, Yan Li:
XML and web services security. CSCWD 2008: 765-770 - [c7]Jun Xiao, Lili Sun, Shi Zhang:
Distance optimization based coverage control algorithm in mobile sensor network. SMC 2008: 3321-3325 - 2007
- [j2]Lili Sun, Prakash P. Shenoy:
Using Bayesian networks for bankruptcy prediction: Some methodological issues. Eur. J. Oper. Res. 180(2): 738-753 (2007) - [c6]Lili Sun, Hua Wang, Yan Li:
Protecting Disseminative Information in E-Learning. ICWL 2007: 554-565 - 2006
- [j1]Lili Sun, Rajendra P. Srivastava, Theodore J. Mock:
An Information Systems Security Risk Assessment Model Under the Dempster-Shafer Theory of Belief Functions. J. Manag. Inf. Syst. 22(4): 109-142 (2006) - 2005
- [c5]Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Authorization Algorithms for the Mobility of User-Role Relationship. ACSC 2005: 69-78 - [c4]Jinli Cao, Lili Sun, Hua Wang:
Towards Secure XML Document with Usage Control. APWeb 2005: 296-307 - [c3]Lili Sun, Yan Li:
XML undeniable signatures. CIMCA/IAWTIC 2005: 981-985 - 2004
- [c2]Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Anonymous Access Scheme for Electronic Services. ACSC 2004: 295-304 - [c1]Jinxue Xu, Lili Sun, Tianyou Chai, Dalong Tan:
High-order open and closed loop iterative learning control scheme with initial state learning. ICARCV 2004: 637-641
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint