Xuran Li - Publications

Affiliations: 
2012-2018 Information Technology Macau University of Science and Technology 

9 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Li X, Tao B, Dai HN, Imran M, Wan D, Li D. Is blockchain for Internet of Medical Things a panacea for COVID-19 pandemic? Pervasive and Mobile Computing. 75: 101434. PMID 34121966 DOI: 10.1016/j.pmcj.2021.101434  0.658
2020 Li X, Dai HN, Wang Q, Imran M, Li D, Imran MA. Securing Internet of Medical Things with Friendly-jamming schemes. Computer Communications. 160: 431-442. PMID 32834198 DOI: 10.1016/j.comcom.2020.06.026  0.741
2020 Wang Q, Dai H, Li X, Shukla MK, Imran M. Artificial noise aided scheme to secure UAV-assisted Internet of Things with wireless power transfer Computer Communications. 164: 1-12. DOI: 10.1016/J.COMCOM.2020.09.017  0.689
2018 Li X, Wang Q, Dai HN, Wang H. A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack. Sensors (Basel, Switzerland). 18. PMID 29904003 DOI: 10.3390/S18061938  0.715
2016 Li X, Dai HN, Wang H, Xiao H. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors (Basel, Switzerland). 16. PMID 27886154 DOI: 10.3390/S16121987  0.738
2016 Wang Q, Dai HN, Li X, Wang H, Xiao H. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks. Sensors (Basel, Switzerland). 16. PMID 27213379 DOI: 10.3390/S16050721  0.705
2016 Li X, Wang H, Dai HN, Wang Y, Zhao Q. An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things Mobile Information Systems. 2016. DOI: 10.1155/2016/4313475  0.711
2015 Wang Y, Dai HN, Wang Q, Li X, Zhao Q, Cheang CF. Local connectivity of wireless networks with directional antennas Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. 2015: 1481-1486. DOI: 10.1109/PIMRC.2015.7343532  0.661
2015 Li X, Xu J, Dai HN, Zhao Q, Cheang CF, Wang Q. On modeling eavesdropping attacks in wireless networks Journal of Computational Science. 11: 196-204. DOI: 10.1016/J.Jocs.2014.10.006  0.733
Show low-probability matches.