Follow
Li Yang (杨力)
Li Yang (杨力)
Professor, School of Computer Science and Technology, Xidian University, China
Verified email at xidian.edu.cn - Homepage
Title
Cited by
Cited by
Year
A trust-based collaborative filtering algorithm for E-commerce recommendation system
L Jiang, Y Cheng, L Yang, J Li, H Yan, X Wang
Journal of ambient intelligence and humanized computing 10, 3023-3034, 2019
2242019
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
Q Jiang, J Ma, G Li, L Yang
Wireless personal communications 68, 1477-1491, 2013
1372013
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma
Journal of Ambient Intelligence and Humanized Computing 9, 1061-1073, 2018
1082018
An efficient ticket based authentication protocol with unlinkability for wireless access networks
Q Jiang, J Ma, G Li, L Yang
Wireless personal communications 77, 1489-1506, 2014
722014
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm
L Yang, Y Qiao, Z Liu, J Ma, X Li
Soft Computing 22, 453-464, 2018
682018
Integrated authentication and key agreement framework for vehicular cloud computing
Q Jiang, J Ni, J Ma, L Yang, X Shen
IEEE Network 32 (3), 28-35, 2018
642018
A remotely keyed file encryption scheme under mobile cloud computing
L Yang, Z Han, Z Huang, J Ma
Journal of Network and Computer Applications 106, 90-99, 2018
622018
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
L Yang, J Ma, Q Jiang
Int. J. Netw. Secur. 14 (3), 156-163, 2012
462012
Online handwritten signature verification using feature weighting algorithm relief
L Yang, Y Cheng, X Wang, Q Liu
Soft Computing 22, 7811-7823, 2018
402018
Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty
R Wan, L Ding, N Xiong, W Shu, L Yang
Human-centric Computing and Information Sciences 9, 1-21, 2019
372019
Identifying opinion leaders in social networks with topic limitation
L Yang, Y Tian, J Li, J Ma, J Zhang
Cluster Computing 20, 2403-2413, 2017
342017
On the control of opinion dynamics in social networks
Z Liu, J Ma, Y Zeng, L Yang, Q Huang, H Wu
Physica A: Statistical Mechanics and its Applications 409, 183-198, 2014
332014
Iot etei: End-to-end iot device identification method
F Yin, L Yang, Y Wang, J Dai
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
282021
A DNS tunneling detection method based on deep learning models to prevent data exfiltration
J Zhang, L Yang, S Yu, J Ma
Network and System Security: 13th International Conference, NSS 2019 …, 2019
272019
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism
H Lin, J Hu, Y Tian, L Yang, L Xu
Information Sciences 387, 238-253, 2017
262017
Robust two-factor authentication and key agreement preserving user privacy
Q Jiang, J Ma, G Li, L Yang
International Journal of Network Security 16 (3), 229-240, 2014
262014
SADUS: Secure data deletion in user space for mobile devices
L Yang, T Wei, F Zhang, J Ma
computers & security 77, 612-626, 2018
162018
Direct anonymous attestation scheme in cross trusted domain for wireless mobile networks
杨力, 马建峰, 姜奇
Journal of Software 23 (5), 1260-1271, 2012
132012
Online handwritten signature verification based on the most stable feature and partition
L Yang, X Jin, Q Jiang
Cluster Computing 22, 1691-1701, 2019
122019
A delegation based cross trusted domain direct anonymous attestation scheme
L Yang, J Ma, W Lou, Q Jiang
Computer Networks 81, 245–257, 2015
122015
The system can't perform the operation now. Try again later.
Articles 1–20