Follow
Huaxin Li
Title
Cited by
Cited by
Year
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, XS Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
2132016
Privacy leakage via de-anonymization and aggregation in heterogeneous social networks
H Li, Q Chen, H Zhu, D Ma, H Wen, XS Shen
IEEE Transactions on Dependable and Secure Computing 17 (2), 350-362, 2017
832017
Demographics inference through Wi-Fi network traffic analysis
H Li, Z Xu, H Zhu, D Ma, S Li, K Xing
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on …, 2016
532016
Detecting vehicle anomaly in the edge via sensor consistency and frequency characteristic
F Guo, Z Wang, S Du, H Li, H Zhu, Q Pei, Z Cao, J Zhao
IEEE Transactions on Vehicular Technology 68 (6), 5618-5628, 2019
482019
Demographic information inference through meta-data analysis of Wi-Fi traffic
H Li, H Zhu, D Ma
IEEE Transactions on Mobile Computing 17 (5), 1033-1047, 2017
422017
Dynamic traffic feature camouflaging via generative adversarial networks
J Li, L Zhou, H Li, L Yan, H Zhu
2019 IEEE Conference on Communications and Network Security (CNS), 268-276, 2019
382019
Poster: Intrusion detection system for in-vehicle networks using sensor correlation and integration
H Li, L Zhao, M Juliato, S Ahmed, MR Sastry, LL Yang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
372017
Automated and personalized privacy policy extraction under GDPR consideration
C Chang, H Li, Y Zhang, S Du, H Cao, H Zhu
Wireless Algorithms, Systems, and Applications: 14th International …, 2019
302019
POSTER: LocMask: A Location Privacy Protection Framework in Android System
Q Xiao, J Chen, L Yu, H Li, H Zhu, M Li, K Ren
2014 ACM SIGSAC Conference on Computer and Communications Security, 1526-1528, 2014
202014
Who leaks my privacy: Towards automatic and association detection with gdpr compliance
Q Jia, L Zhou, H Li, R Yang, S Du, H Zhu
Wireless Algorithms, Systems, and Applications: 14th International …, 2019
192019
Analyzing and preventing data privacy leakage in connected vehicle services
H Li, D Ma, B Medjahed, YS Kim, P Mitra
SAE International Journal of Advances and Current Practices in Mobility 1 …, 2019
122019
Detecting vehicle anomaly by sensor consistency: An edge computing based mechanism
Z Wang, F Guo, Y Meng, H Li, H Zhu, Z Cao
2018 IEEE Global Communications Conference (GLOBECOM), 1-7, 2018
82018
Hybrid de-anonymization across real-world heterogeneous social networks
H Li, Q Chen, H Zhu, D Ma
Proceedings of the ACM Turing 50th Celebration Conference-China, 1-7, 2017
82017
Secure and privacy-preserving data collection mechanisms for connected vehicles
H Li, D Ma, B Medjahed, Q Wang, YS Kim, P Mitra
SAE Technical Paper, 2017
82017
De-anonymizing social networks: Using user interest as a side-channel
S Lai, H Li, H Zhu, N Ruan
2015 IEEE/CIC International Conference on Communications in China (ICCC), 2015
82015
Who moved my cheese: Towards automatic and fine-grained classification and modeling Ad network
J Liu, J Liu, H Li, H Zhu, N Ruan, D Ma
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
62016
Data privacy in the emerging connected mobility services: architecture, use cases, privacy risks, and countermeasures
H Li, D Ma, B Medjahed, YS Kim, P Mitra
SAE International Journal of Transportation Cybersecurity and Privacy 2 (11 …, 2019
22019
Anomaly detection in a controller area network
LL Yang, H Li, L Zhao, M Juliato, S Ahmed, MR Sastry
US Patent 11,012,409, 2021
2021
Developing Advanced Privacy Protection Mechanisms for Connected Automotive User Experiences
H Li
2018
The system can't perform the operation now. Try again later.
Articles 1–19