Qinghua Li - Publications

Affiliations: 
2013 Computer Science and Engineering Pennsylvania State University, State College, PA, United States 

12 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Li A, Darling D, Li Q. PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones Arxiv: Cryptography and Security. 10-18. DOI: 10.1109/Pac.2018.00008  0.369
2016 Li Q, Cao G. Providing Privacy-Aware Incentives in Mobile Sensing Systems Ieee Transactions On Mobile Computing. 15: 1485-1498. DOI: 10.1109/Tmc.2015.2465375  0.584
2016 Zhao J, Zhuo X, Li Q, Gao W, Cao G. Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum Ieee Transactions On Mobile Computing. 15: 803-816. DOI: 10.1109/Tmc.2015.2439271  0.593
2016 Han S, Zhao S, Li Q, Ju C, Zhou W. PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance Ieee Transactions On Information Forensics and Security. 11: 1940-1955. DOI: 10.1109/Tifs.2015.2472369  0.373
2015 Gao W, Li Q, Cao G. Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation Ieee Transactions On Mobile Computing. 14: 714-727. DOI: 10.1109/Tmc.2014.2333756  0.576
2015 Li Q, Cao G. Privacy-preserving participatory sensing Ieee Communications Magazine. 53: 68-74. DOI: 10.1109/Mcom.2015.7180510  0.554
2015 Niu B, Zhu X, Li Q, Chen J, Li H. A novel attack to spatial cloaking schemes in location-based services Future Generation Computer Systems. 49: 125-132. DOI: 10.1016/J.Future.2014.10.026  0.352
2014 Li Q, Cao G, Porta TFL. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Ieee Transactions On Dependable and Secure Computing. 11: 115-129. DOI: 10.1109/Tdsc.2013.31  0.573
2013 Li Q, Gao W, Zhu S, Cao G. To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 10: 168-182. DOI: 10.1109/Tdsc.2012.84  0.572
2012 Gao W, Li Q, Zhao B, Cao G. Social-aware multicast in disruption-tolerant networks Ieee Acm Transactions On Networking. 20: 1553-1566. DOI: 10.1109/Tnet.2012.2183643  0.553
2012 Li Q, Cao G. Mitigating Routing Misbehavior in Disruption Tolerant Networks Ieee Transactions On Information Forensics and Security. 7: 664-675. DOI: 10.1109/Tifs.2011.2173195  0.56
2011 Li Q, Cao G. Multicast Authentication in the Smart Grid With One-Time Signature Ieee Transactions On Smart Grid. 2: 686-696. DOI: 10.1109/Tsg.2011.2138172  0.56
Show low-probability matches.