Hui Li
Hui Li
Professor, School of Cyber Engineering, Xidian University
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
SK-LSH: An Efficient Index Structure for Approximate Nearest Neighbor Search
Y Liu, J Cui, Z Huang, H Li, H Shen
PVLDB 7 (9), 2014
1022014
Conformity-aware Influence Maximization in Online Social Networks
H Li, SS Bhowmick, A Sun, J Cui
The VLDB Journal, 2014
652014
Sub1.5 nm Ultrathin CoP Nanosheet Aerogel: Efficient Electrocatalyst for Hydrogen Evolution Reaction at All pH Values
H Li, X Zhao, H Liu, S Chen, X Yang, C Lv, H Zhang, X She, D Yang
Small 14 (41), 1802824, 2018
592018
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
H Liu, X Li, H Li, J Ma, X Ma
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
572017
Casino: towards conformity-aware social influence analysis in online social networks
H Li, SS Bhowmick, A Sun
Proceedings of the 20th ACM international conference on Information and …, 2011
492011
Getreal: Towards realistic selection of influence maximization strategies in competitive networks
H Li, SS Bhowmick, J Cui, Y Gao, J Ma
Proceedings of the 2015 ACM SIGMOD international conference on management of …, 2015
402015
Preferential sites for the integration and disruption of human papillomavirus 16 in cervical lesions
H Li, Y Yang, R Zhang, Y Cai, X Yang, Z Wang, Y Li, X Cheng, X Ye, ...
Journal of Clinical Virology 56 (4), 342-347, 2013
402013
Efficient and privacy-preserving polygons spatial query framework for location-based services
H Zhu, F Liu, H Li
IEEE Internet of Things Journal 4 (2), 536-545, 2016
392016
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
K Zhang, H Li, J Ma, X Liu
Science China Information Sciences 61 (3), 1-13, 2018
332018
Adaptively Secure Ciphertext-Policy Attribute-Based Encryption with Dynamic Policy Updating
Z Ying, H Li, J Ma, J Zhang, J Cui
SCIENCE CHINA Information Sciences 59 (4), 1-15, 2016
322016
An Intelligent Movie Recommendation System through Group-level Sentiment Analysis in Microblogs
H Li, J Cui, B Shen, J Ma
Neurocomputing, 2016
312016
CINEMA: conformity-aware greedy algorithm for influence maximization in online social networks
H Li, SS Bhowmick, A Sun
Proceeding EDBT '13 Proceedings of the 16th International Conference on …, 2013
312013
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks
X Ma, J Ma, H Li, Q Jiang, S Gao
Future Generation Computer Systems 79, 82-94, 2018
282018
APPLET: A Privacy-Preserving framework for Location-Aware Recommender System
X Ma, H Li, J Ma, Q Jiang, S Gao, D Lu, N Xi
SCIENCE CHINA Information Sciences, 2016
282016
Backward Path Growth for Efficient Mobile Sequential Recommendation
J Huang, X Huangfu, H Sun, H Li, P Zhao, H Cheng, Q Song
IEEE Transactions on Knowledge and Data Engineering, 0
24*
The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems
D Liao, G Sun, H Li, H Yu, V Chang
Cluster Computing 20 (3), 2283-2297, 2017
222017
Social Influence Study in Online Networks: a Three Level Review
H Li, J Cui, J Ma
Journal of Computer Science and Technology, 2015
222015
PDLM: Privacy-preserving deep learning model on cloud with multiple keys
X Ma, J Ma, H Li, Q Jiang, S Gao
IEEE Transactions on Services Computing, 2018
202018
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
K Zhang, J Ma, J Liu, H Li
Sci. China Inf. Sci. 59 (9), 99105, 2016
202016
Protecting user trajectory in location-based services
D Liao, H Li, G Sun, V Anand
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
182015
系统目前无法执行此操作,请稍后再试。
文章 1–20