Xidian Meeting Xidian Guide About Help Search Home Login Control Panel AddBookMark Li Hui's MessageBoard
Conference Paper

My ORCID:0000-0001-8310-7169

My DBLP: https://dblp.org/pid/l/HuiLi6.html

My Google Scholar: https://scholar.google.com/citations?user=oEcRS84AAAAJ

Selected Publication

2022

  1. Haoyang Wang, Kai Fan, Hongyan Chen, Qi Chen, Kuan Zhang, Fenghua Li, Hui Li, Yintang Yang, Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme, IEEE Transactions on Dependable and Secure Computing, Digital Object Identifier: 10.1109/TDSC.2022.3186999, paper link

  2. Xiaoguang Li, Haonan Yan, Gewei Zheng, Hui Li and Fenghua Li, Key-Value Data Collection with Distribution Estimation under Local Differential Privacy, Security and Communication Networks, 2022, accepted

  3. Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Zhe Liu, Hui LI, PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework, IEEE Transactions on Information Forensics & Security, vol.17, pp.2059-2073,2022, doi: 10.1109/TIFS.2022.3176191. paper link

  4. Jiaqi Zhao, HuiZhu, Fengwei Wang, Rongxing Lu, Hui Li, Jingwei Tu, JieShen,CORK: A privacy-preserving and lossless federated learning scheme for deep neural network, Information Sciences, Volume 603, July 2022, Pages 190-209

  5. Haonan Yan, Xiaoguang Li, Ziyao Guo, Hui Li, Fenghua Li, Xiaodong Lin, etal,ARCANE: An Efficient Architecture for Exact Machine Unlearning,IJCAI-2022

  6. Qi Xu;Hui Zhu;Yandong Zheng;Jiaqi Zhao;Rongxing Lu;Hui Li,An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services, IEEE Internet of Things Journal,2022,DOI:10.1109/JIOT.2022.3168661

  7. Jin CaoSheng LiRuhui MaYuxi HanYueyu ZhangHui Li, RPRIA: Reputation and PUF-based Remote Identity Attestation Protocol for Massive IoT Devices, IEEE Internet of Things Journal,2022, DOI: 10.1109/JIOT.2022.3164174

  8. Haonan Yan, Xiaoguang Li, Rui Dai, Hui Li, Xingwen Zhao and Fenghua Li, MARS: Automated Protocol Analysis Framework for Internet of Things, IEEE Internet of Things Journal, 2022, DOI:10.1109/JIOT.2022.3160296
  9. Cao Jin, Zhu Tong, Ma Ruhui, Guo Zhengyang, Zhang Yinghui, Li Hui, A Software-based Remote Attestation Scheme for Internet of Things Devices, IEEE Transactions on Dependable and Secure Computing,2022, DOI: 10.1109/TDSC.2022.3154887

  10. Xiongpeng RenJin CaoMaode MaHui LiYinghui Zhang,A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks, IEEE Internet of Things Journal,9(5):3642-3656. 2022, DOI:10.1109/JIOT.2021.3098224

  11. Xiaoguang Li, Haonan Yan, Zelei Cheng, Wenhai Sun and Hui Li, Protecting Regression Models with Personalized Local Differential Privacy, IEEE Transactions on Dependable and Secure Computing,DOI:10.1109/TDSC.2022.3144690

  12. J Tang, H Zhu, R Lu, X Lin, H Li, F Wang, DLP: Achieve Customizable Location Privacy with Deceptive Dummy Techniques in LBS Applications, IEEE Internet of Things Journal, 9(5): 6969-6984, 2022, DOI:10.1109/JIOT.2021.3115849

  13. Y Sun, J Cao, M Ma, Y Zhang, H Li, B Niu, Eap-ddba: Efficient anonymity proximity device discovery and batch authentication mechanism for massive d2d communication devices in 3gpp 5g hetnet, IEEE Transactions on Dependable and Secure Computing, 19(1):370-387, 2022, 10.1109/TDSC.2020.2989784

2021

  1. Kai Fan, Qi Chen, Ruidan Su, Kuan Zhang, Haoyang Wang, Hui Li, Yintang Yang, MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid with Cloud-Edge-End, IEEE Transactions on Cloud Computing, 2021.12
  2. J Tang, H Zhu, R Lu, X Lin, H Li, F Wang, DLP: Achieve Customizable Location Privacy with Deceptive Dummy Techniques in LBS Applications, IEEE Internet of Things Journal
  3. L Li, D Shi, R Hou, H Li, M Pan, Z Han, To talk or to work: Flexible communication compression for energy efficient federated learning over heterogeneous mobile edge devices, IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10
  4. Y Luo, H Li, R Ma, Z Guo, A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services, Security and Communication Networks 2021
  5. F Wang, H Zhu, R Lu, Y Zheng, H Li, A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent, Information Sciences 552, 183-200.
  6. H Yan, X Li, H Li, J Li, W Sun, F Li, Monitoring-based Differential Privacy Mechanism Against Query Flooding-based Model Extraction Attack, IEEE Transactions on Dependable and Secure Computing,2021
  7. B Niu, Q Li, H Wang, G Cao, F Li, H Li, A Framework for Personalized Location Privacy, IEEE Transactions on Mobile Computing
  8. B Zhao, K Fan, K Yang, Z Wang, H Li, Y Yang, Anonymous and Privacy-preserving Federated Learning with Industrial Big Data, IEEE Transactions on Industrial Informatics
  9. L Li, D Shi, X Zhang, R Hou, H Yue, H Li, M Pan, Privacy Preserving Participant Recruitment for Coverage Maximization in Location Aware Mobile Crowdsensing, IEEE Transactions on Mobile Computing

 

2020

  1. L Li, D Shi, R Hou, X Li, J Wang, H Li, M Pan, Data-driven optimization for cooperative edge service provisioning with demand uncertainty, IEEE Internet of Things Journal 8 (6), 4317-4328
  2. W Zhang, B Jiang, M Li, R Tandon, Q Liu, H Li, Aggregation-based location privacy: An information theoretic approach, Computers & Security 97, 101953
  3. F Wang, H Zhu, R Lu, Y Zheng, H Li, Achieve Efficient and Privacy-preserving Disease Risk Assessment over Multi-outsourced Vertical Datasets, IEEE Transactions on Dependable and Secure Computing
  4. BEN NIU, Y Chen, Z Wang, B Wang, H Li,Eclipse: preserving differential location privacy against long-term observation attacks, IEEE Transactions on Mobile Computing
  5. D Zhu, H Zhu, X Liu, H Li, F Wang, H Li, D Feng, CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN, Information Sciences 514, 244-262
  6. W Li, B Niu, J Cao, Y Luo, H Li, A personalized range‐sensitive privacy‐preserving scheme in LBSs, Concurrency and computation: practice and experience 32 (5), e5462
  7. J Cao, Z Yan, R Ma, Y Zhang, Y Fu, H Li, LSAA: a lightweight and secure access authentication scheme for both UE and mMTC devices in 5G networks, IEEE Internet of Things Journal 7 (6), 5329-5344
  8. K Fan, Q Pan, K Zhang, Y Bai, S Sun, H Li, Y Yang, A secure and verifiable data sharing scheme based on blockchain in vehicular social networks, IEEE Transactions on Vehicular Technology 69 (6), 5826-5835

 

2019

  1. R Ma, J Cao, D Feng, H Li, S He, FTGPHA: Fixed-trajectory group pre-handover authentication mechanism for mobile relays in 5G high-speed rail networks, IEEE transactions on vehicular technology 69 (2), 2126-2140
  2. F Li, H Li, B Niu, J Chen, Privacy computing: concept, computing framework, and future development trends, Engineering 5 (6), 1179-1192
  3. K Fan, S Sun, Z Yan, Q Pan, H Li, Y Yang, A blockchain-based clock synchronization Scheme in IoT, Future Generation Computer Systems 101, 524-533
  4. F Wang, H Zhu, X Liu, R Lu, J Hua, H Li, H Li, Privacy-preserving collaborative model learning scheme for E-healthcare, IEEE Access 7, 166054-166065 9         2019
  5. J Cao, M Ma, H Li, R Ma, Y Sun, P Yu, L Xiong, A survey on security aspects for 3GPP 5G networks, IEEE communications surveys & tutorials 22 (1), 170-195
  6. X Li, H Li, H Zhu, M Huang, The optimal upper bound of the number of queries for Laplace mechanism under differential privacy, Information Sciences 503, 219-237
  7. K Fan, H Xu, L Gao, H Li, Y Yang, Efficient and privacy preserving access control scheme for fog-enabled IoT, Future Generation Computer Systems 99, 134-142
  8. J Cao, P Yu, X Xiang, M Ma, H Li, Anti-quantum fast authentication and data transmission scheme for massive devices in 5G NB-IoT system, IEEE Internet of Things Journal 6 (6), 9794-9805
  9. J Cao, M Ma, Y Fu, H Li, Y Zhang, CPPHA: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets, IEEE transactions on dependable and secure computing
  10. F Khan, H Li,Ensuring trust and confidentiality for adaptive video streaming in ICN, Journal of Communications and Networks 21 (6), 539-547
  11. Y Li, Z Wang, Y Li, R Deng, B Chen, W Meng, H Li, A closer look tells more: a facial distortion based liveness detection for face authentication, Proceedings of the 2019 ACM Asia Conference on Computer and Communications
  12. J Cao, M Ma, Y Fu, H Li, Y Zhang, CPPHA: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets, IEEE transactions on dependable and secure computing
  13. R Ma, J Cao, D Feng, H Li, Y Zhang, X Lv, PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks, Ad Hoc Networks 87, 49-60
  14. F Li, Z Sun, A Li, B Niu, H Li, G Cao,Hideme: Privacy-preserving photo sharing on social networks,IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 154-162
  15. K Fan, S Zhu, K Zhang, H Li, Y Yang, A lightweight authentication scheme for cloud-based RFID healthcare systems, IEEE Network 33 (2), 44-49
  16. S Ding, J Cao, C Li, K Fan, H Li,A novel attribute-based access control scheme using blockchain for IoT, IEEE Access 7, 38431-38441

2018

  1. K Fan, J Wang, X Wang, H Li, Y Yang,Secure, efficient and revocable data sharing scheme for vehicular fogs,Peer-to-Peer Networking and Applications 11 (4), 766-777,2018
  2. K Fan, W Wang, W Jiang, H Li, Y Yang,Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV,Peer-to-Peer Networking and Applications 11 (4), 723-734,2018
  3. Q Han, C Li, H Li, Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things, Future Generation Computer Systems 83, 269-277,2018
  4. S Ding, C Li, H Li,A Novel Efficient Pairing-free CP-ABE Based on Elliptic Curve Cryptography for IoT,IEEE Access,2018
  5. K Fan, X Wang, K Suto, H Li, Y Yang,Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing,IEEE Network 32 (3), 52-57,2018
  6.  K Fan, W Jiang, H Li, Y Yang,Lightweight RFID Protocol for Medical Privacy Protection in IoT,IEEE Transactions on Industrial Informatics 14 (4), 1656-1665,2018
  7. X Liu, H Zhu, R Lu, H Li,Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification,Peer-to-Peer Networking and Applications 11 (2), 334-347,2018
  8. F Shan, H Li, F Li, Y Guo, B Niu,HAC: Hybrid Access Control for Online Social Networks,Security and Communication Networks 2018

----------------------------------------------------------------------------------------------------------------------------------------------

2015

  1. Kai Fan, Deng Hai, Lang  Wang, Hui Li, Yinyang Yang, Ciphertext retrieval in super-peer p2p network, GLOBECOM 2015
  2. Boyang Wang, Ming Li, Haitao Wang, Hui LI, Circular Range Search on Encrypted Spatial Data, IEEE CNS 2015
  3. Jin Cao ; Hui Li; Maode Ma ,  GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks, ICC 2015
  4. Jin Cao ; Hui Li ; MaodeMa ; Fenghua Li, UGHA:Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks ,ICC 2015
  5. Shunrong Jiang ; Xiaoyan Zhu; Ripei Hao; Haotian Chi; Hui Li ; Liangmin WangLightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare, ICC 2015
  6. Weihao Li ; Ben Niu; Hui Li; Fenghua Li, Privacy-Preserving Strategies in Service Quality Aware Location-Based Services, ICC 2015
  7. Wenhai Sun, Xuefeng Liu; Wenjing Lou,Thomas Hou, Hui Li, Catch You If You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data, IEEE INFOCOM 2015
  8. Ben Niu; Qinghua Li; Xiaoyan Zhu; Guohong Cao; Hui Li , Enhancing Privacy through Caching in Location-Based Services,  IEEE INFOCOM 2015
  9. Niu, Ben ; Zhu, XiaoyanLi, WeihaoLi, HuiWang, YingjuanLu, Zongqing  A personalized two-tier cloaking scheme for privacy-aware location-based services, ICNC 2015, p 94-98,March 26, 2015

2014

1.     Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ASIA CCS '14, Tokoyo, Japan

2.     Boyang Wang ; Ming Li ; Sherman S. M. Chow ; Hui Li, A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys, 2th IEEE Conference on Communications and Network Security, 2014.10, San FransicoUSA

3.     Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li. Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy, 10th International Conference on Security and Privacy in Communication NetworksBeijing, China

4.     Niu, Ben ;Zhu, Xiaoyan; WeihaoLiLi, Hui, EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs, IEEE MASS 2014, Philadelphia, USA,2014.10

5.     Niu, Ben ; Li, Qinghua; Zhu, Xiaoyan; Li, Hui, A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services, ICCCN, September 25, 2014, Shanghai, China

6.     Zhu, Hui ; Huang, Rong; Liu, Ximeng; Li, Hui, SPEMR: A new secure personal electronic medical record scheme with privilege separation, 2014 IEEE International Conference on Communications Workshops, ICC 2014, p 700-705, 2014,

7.     Zhu, Xiaoyan ; Chi, Haotian; Jiang, Shunrong; Lei, Xiaosan; Li, Hui, Using dynamic pseudo-IDs to protect privacy in location-based services, 2014 IEEE International Conference on Communications, ICC 2014, p 2307-2312, 2014,

8.     Zhu, Hui; Huang, Cheng; Li, Hui, MPPM: Malware propagation and prevention model in online SNS, 2014 IEEE International Conference on Communications Workshops, ICC 2014,Sydney, NSW, Australia

9.     Zhu, Xiaoyan; Liu, Jie; Jiang, Shunrong; Chen, Zengbao; Li, Hui, Efficient Weight-based Private Matching for proximity-based mobile social networks, 2014 IEEE International Conference on Communications, ICC 2014Sydney, NSW, Australia,2014

10.   Lai, Chengzhe;  Li, Hui; Lu, Rongxing; Jiang, Rong; Shen, Xuemin, SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks, 2014 IEEE International Conference on Communications, ICC 2014, p 1011-1016, 2014

11.   Niu B, Zhang Z, Li X and Li H, Privacy-Area Aware Dummy Generation Algorithms for Location-Based Services, in Proc. of IEEE ICC 2014

12.   Sun W, Yu S, Lou W, Hou T Y, and Li H, Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud, in Proc. of IEEE INFOCOM 2014

13.   Niu B, Li Q, Zhu X, Cao G and Li H, Achieving k-anonymity in Privacy-Aware Location-Based Services, in Proc. of IEEE INFOCOM 2014, Toronto, Canada

14.    Zhang, Yinghui ; Zheng, Dong; Chen, Xiaofeng; Li, Jin; Li, Hui, Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts, Lecture Notes in Computer Science, v 8782, p 259-273, 2014

2013

1.     Niu B, Zhu X, Lei X, Zhang W, and Li H, EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services, in Proc. of IEEE GLOBECOM 2013

2.     Niu B, Zhu X, Liu J, Li Z, and Li H, Weight-aware Private Matching Scheme for Proximity-Based Mobile Social Networks," in Proc. of IEEE GLOBECOM 2013

3.     Zhu X, Chi H, Niu B, Zhang W, Li Z, and Li H, Mobicache: When k-anonymity meets cache, in Proc. of IEEE GLOBECOM 2013

4.     Niu B, Zhu X, Zhang T, Chi H, and Li H, P-match: Priority-aware Friend Discovery for Proximity-Based Mobile Social Networks, in Proc. of IEEE MASS, pp.351-355, 2013

5.     Boyang Wang, Sherman S.M. Chow, Ming Li, Hui Li, Storing Shared Data on the Cloud via Security-Mediator, ICDCS 2013

6.     Boyang Wang, Hui Li, Ming Li, Privacy Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics, ICC 2013.

7.     Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Thomas Hou and Hui Li, Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, ASIACCS 2013

8.     Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong and Hui Li, Anonymous Attribute-Based Encryption Supporting Efficient Decryption Test,  ASIACCS 2013, distinguished paper award

9.     Boyang Wang, Baochun Li, Hui Li, Public Auditing for Shared Data with Efficient User Revocation in the Cloud, INFOCOM 2013, Apr.15-19, Turin, Italia.

10.   Ben Niu, Xiaoyan Zhu, Hui Li, An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems, IEEE WCNC 2013

11.   Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li, plus:$ Privacy-Preserving Pseudo-Location Updating System in Location-Based Services, IEEE WCNC 2013

2012

1.     Jin Cao, Maode Ma, Hui Li, Unified Handover Authentication between Heterogeneous Access Systems in LTE Networks, IEEE GlobeCom 2012, Dec.3-7, CA, USA

2.     Jin Cao, Maode Ma, Hui Li, A Group-based Authentication and Key Agreement for MTC in LTE Networks, IEEE GlobeCom 2012, Dec.3-7, CA, USA

3.     Boyang Wang, Baochun Li, Hui Li, Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks,IEEE GlobeCom 2012, Dec.3-7, CA, USA

4.     Zhao XingwenLi HuiCodes based tracing and revoking scheme with constant ciphertextLecture Notes in Computer Science, v 7496 LNCS, p318-335, 2012, Provable Security - 6th International Conference, ProvSec 2012, Proceedings

5.     Boyang Wang, Baochun Li, Hui Li, Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud, ACNS 2012, LNCS 7341, 507-525,June 26-29, Singapore

6.     Boyang Wang, Baochun Li, Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Cloud 2012, Honolulu, Hawaii, USA.June 24-29, 2012.

7.     Kai Fan, Libin Zhao, Xuemin Sherman Shen, Hui Li, Yintang Yang, Smart-blocking File Storage Method in Cloud Computing, IEEE ICCC 2012, Beijing, August 15-18, 2012.

2011

1.     Yinghui Zhang, Xiaofeng Chen, Hui Li, Jin Cao, Identity Based Construction for Secure and Efficient Handoff Authentication Schemes in Wireless Networks, The 2011 FTRA World Convergence Conference, Korea, DEC 12-15, 2011

2.     Sun, Yuhua; Wang, Zilong; Li, Hui; Yan, Tongjiang, On the cross-correlation of a ternary m-sequence of period 3<sup>4k</sup>-1 and its decimated sequence by (3<sup>2k</sup>+1)<sup>2</sup>/20, Proceedings of the 5th International Workshop on Signal Design and Its Applications in Communications, IWSDA'11, p 48-51,  2011,  EI 20121214883358

3.     Li, Zhanhu ; Fan, KaiLi, HuiConcurrent signature protocol on conic curve over ring Zn Source: 2011 International Conference on Electronics, Communications and Control, ICECC 2011 - Proceedings, p 194-197, 2011, EI 20114714544163

4.     Niu, Ben , Li, Hui; Zhu, Xiaoyan; Chao, Lv, Security analysis of some recent authentication protocols for RFID,  Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011, p 665-669, 2011,

2010

1.     Yong Wang, Hui Li and Xiyuan Wang. Performance Analysis of Optimal Antenna Scheme in Transmit Diversity Systems. The 6th International Conference on Natural Computation (ICNC'10), Yantai, August, 2010, Vol. 6, 2793-2797. EI 20104613380415

2.     Yong Wang, Hui Li. Full Rate and Full Diversity STBC in Decode-and-Forward Relay Systems. The 2010 International Conference on Communications and Intelligence Information Security, Nanning, October, 2010, 135-138.

3.     Can Mo, Hui Li, Hui Zhu, A steam pattern matching method for traffic analysis, ICST E-Forensics 2010, Shanghai

4.     Chao Lv; Maode Ma, Hui Li, Jianfeng Ma, A security enhanced authentication and key distribution protocol for wireless networks, in IEEE GLOBECOM 2010 Workshop on Web and Pervasive Security, 2010.12EI 20110913697828

5.     Chao Lv; Maode Ma, Hui Li, Jianfeng Ma, An Efficient Three-Party Authenticated Key Exchange Protocol with One-Time Key, INFOCOM IEEE Conference on Computer Communications Workshops , 2010

2009

1.     Zhou Yejun, Li Hui, Ma Jianfeng, Secure Error-Correction Network Coding in a Randomized SettingISA2009LNCS 5576pp570-577

2.     ZhuHui, LiHui, WangYumin. An Efficient Fast Authentication Protocol. IEEE 2009 International Conference on Computational Intelligence and Security. 2009, 12.

3.     Li, Xiaoqing, Li Hui, Ma Jianfeng and Zhang Weidong. An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks. The 5th International Conference on Information Assurance and Security, Volume II, pp. 287–290, 2009.

4.     Lv Chao, Li Hui, Ma Jianfeng. Analysis the Properties of TLS Based on Temporal Logic of Knowledge, The Fifth International Conference on Information Assurance and Security, 2009.

2008 and before

1.     Wang Ying, Li Hui, Du Xinjun, Wang Yumin, The design of optimal period interleaver, Proceedings-International Conference on Advanced Information Networking and Applications, AINA, Proceedings-22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, 2008, p 413-415

2.     Wang Ying, Du Xinjun, Li Hui, Zhu Xiaoyan, Tail-biting theory for turbo codes, IEEE Wireless and Microwave Technology Conference, WAMICON 2006, IEEE Wireless and Microwave Technology Conference, WAMICON 2006

3.     Li Hui, Shenqing, A Token Based Single Sign-on protocol, CIS 2005, Part II, LNAI 3802, Springer-Verlag 2005.12

4.     Wang Meng, Li Hui, Liu Zhijing, Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability,ICCNMC 2005, LNCS Springer Verlag 2005.8. 

Journal Paper

2015

  1. Niu, Ben;(Zhu, Xiaoyan; Li, Qinghua ; Chen, Jie; Li, Hui*, A novel attack to spatial cloaking schemes in location-based services, FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE,Vol.49,p125-132,2015
  2. Wang, Yong; Wu, Hao;Tang, Liyang; Li, Hui, The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,9(3):956-970,2015
  3. Lv, Xixiang ;  Mu, Yi; Li, Hui, Key management for Smart Grid based on asymmetric key-wrapping, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS,92(3): 498-512,2015
  4. Lai, Chengzhe; Li, Hui; Li, Xiaoqing; Cao, Jin, A novel group access authentication and key agreement protocol for machine-type communication, TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 26(3):414-431,2015
  5. Li, Chen; Chen, Le; Lu, Rongxing; Li, Hui, Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding", IEEE TRANSACTIONS ON COMPUTERS, 64(3): 882-883,2015
  6.  Zhu, Hui; Xue, Yingfang;Chen, Xiaofeng;Li, Qiang; Li, Hui, V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service, MOBILE INFORMATION SYSTEMS, 1-9,2015
  7.  Wang B, Li B, Li H, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, IEEE Transactions on Service Computing, 8(1): 92-106,2015

2014

  1. Sun W, Wang B, Cao N, Li M, Lou W, Y Hou Y, Li H,Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, IEEE Transactions on Parallel and Distributed Systems, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(11): 3025-3035, 2014
  2. Wang, Boyang; Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing, Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud, JOURNAL OF COMMUNICATIONS AND NETWORKS,16(6): 592-599
  3. Zhang, Yinghui; Chen, Xiaofeng; Li, Jin;Li, Hui, Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks, COMPUTER NETWORKS, 75:192-211,series A,2014
  4.  Li, Chen ; Lu, Rongxing;Li, Hui; Chen, Le;Li, Xiaoqing, Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding", IEEE COMMUNICATIONS LETTERS, 18(12): 2129-2132,2014
  5. Cao J, Ma M, Li H, Zhang Y,A Survey on Security Aspects for LTE and LTE-A Networks, IEEE Communications Surveys & Tutorials, Vol.16, No.1, pp.283-302, 2014
  6. Xiang, Xinyin ; Li, Hui; Wang, Mingyu; Liu, Zhenhua, Hidden attribute-based signcryption scheme for lattice, Security and Communication Networks, 11(7):1780-1787, 2014
  7. Wang B, Li B, Li H, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Transactions on Cloud Computing, 2(1): 43-56, 2014
  8. Lv X, Mu Y, Li H, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, 9(1): 5-13, 2014
  9. Chengzhe Lai ; Hui Li; Xiaohui Liang; Rongxing Lu; Kuan Zhang; Xuemin Shen, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet of Things Journal, 1(1): 46-57, 2014
  10. Wang, Boyang; Li, Hui; Liu, Xuefeng, SecureMatch: Privacy-preserving group matching in social networks for large groups, Journal of Computational Information Systems, 10(2):665-672, 2014
  11. Han, Qi ; Zhang, Yinghui; Chen, Xiaofeng; Li, Hui; Quan, Jiaxiang, Efficient and robust identity-based handoff authentication for EAP-based wireless networks, Concurrency Computation Practice and Experience, 26(8):1561-1573, 2014
  12.  Li, Xiaoqing ; Li, Hui; A survey on data dissemination in VANETs, CHINESE SCIENCE BULLETIN, 59(32): 4190-4200

2013

  1. Lv, Chao; Ma, Maode; Li, Hui; Ma, Jianfeng; Zhang, Yaoyu An novel three-party authenticated key exchange protocol using one-time key,Journal of Network and Computer Applications, v 36, n 1, p 498-503, January 2013
  2.  Lai C, Li H, Lu R, Shen XS ,SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks, Computer Networks, Vol.57, No.17, pp.3492-3510, 2013

2012

  1. Yinghui Zhang, Xiaofeng Chen, Hui Li, Key-Evolving Hierarchical ID-Based Signcryption, the Computer Journal, accepted, The Computer Journal (2012) doi: 10.1093/comjnl/bxs154 First published online: December 2, 2012,
  2. Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Chengzhe Lai, An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks , IEEE Transaction on Wireless Communication, Vol. 11, No. 10, 2012, pp 3644-3650
  3. Lv Xixiang, Li Hui, Wang Baocang, Group key agreement for secure group communication in dynamic peer systems, Journal of Parallel and Distributed Computing, v 72, n 10, p 1195-1200, October
  4. Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai, A simple and robust handover authentication between HeNB and eNB in LTE networks, Computer Networks, 56(8), 2012, 2119-2131
  5. Boyang Wang, Hui Li, Jin Cao, An efficient MAC scheme for secure network coding with probabilistic detection, Frontiers of Computer Science Volume 6, Number 4 (2012), 429-441
  6. C. Lv, M. Ma, H. Li, and J. Ma, A security enhanced authentication and key distribution protocol for wireless networks, Security and Communication Networks,  5(4):343-352 (2012),
  7. C. Lv, M. Ma, H. Li, J. Ma, and B.Niu Security enhancement of the communication efficient AUTHMAC_DH protocols, Security and Communication Networks ,5(6):674-680 (2012)
  8. Chengzhe Lai, Hui LiYueyu Zhang, Jin Cao: Security Issues on Machine to Machine Communications. KSII Transactions on Internet and Information Systems, 6(2): 198-514 (2012)
  9.  Chao LvHui LiJianfeng MaBen Niu: Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems. International Journal of Radio Frequency Identification Technology and Applications, 4(1):3-12 (2012)
  10.  Zhitu SuChunhui SunHui LiJianfeng Ma: A method for efficient parallel computation of Tate pairing.  International Journal of Grid and Utility Computing 3(1):43-52 (2012)

2011

  1.  Lv, Xixiang;Li, Hui; Wang, Baocang, Identity-based key distribution for mobile Ad Hoc networks, FRONTIERS OF COMPUTER SCIENCE IN CHINA vol. 5. No. 4, 442-447, 2011.12
  2.  Lv, Chao; Li, H; Ma, JF; Niu,B; Vulnerability Analysis of Elliptic Curve-Based RFID Protocol, CHINA COMMUNICATIONS,Vol.8,No.4, pp 153-158
  3.  Lai, ChengzheLi, HuiZhang, YueyuCao, Jin,A fast seamless handoff scheme between IEEE 802.11 and EPS networks using optimized proxy mobile IPv6,International Journal of Digital Content Technology and its Applications, v 5, n 8, p 81-91, 2011
  4.  Sun Chunhui, Li Hui, Yangyang, Chen Jie, Research on fault-electromagnetic attack on block cipher, Journal of Convergence Information Technology, Vol.6 No.11, 409-417 2011.
  5.  Su, Zhitu; Sun, Chunhui; Li, Hui; Ma, Jianfeng, Fast computation of tate pairing using elliptic curves with prime subgroup order of proth form, Advances in Information Sciences and Service Sciences, v 3, n 7, p 384-393, August 2011
  6. Lv, Chao, Li Hui, Ma, JianfengZhao, Meng, Security analysis of two recently proposed RFID authentication protocols, Frontiers of Computer Science in China, v 5, n 3, p 335-340, September 2011
  7. Yong Wang, Hui Li, Weidong Zhang. Design of Multiuser Intermediate Relay Safety Communication Based on Sharing Signals Subspace Beamforming. Advanced Science Letters, Vol.4., Mo.2, pp606-609, 2011.2.
  8.  Sun Yinxia, Li Hui, ID-based Signcryption KEM to Multiple Recipients, Chinese Journal of Electronics, Vol.20,No.2,317-322, 2011
  9. Yong Wang, Hui Li. A Novel Convex Optimization for Receive Antenna Selection. Applied Mechanics and Materials, v 186, p 611-615, 2011, New Trends and Applications of Computer-Aided Material and Engineering
  10. Lv, Chao; Li, Hui ; Ma, Jianfeng; Niu, Ben; Jiang, Haiyang,Security analysis of a privacy-preserving ECC-based grouping-proof protocol,Journal of Convergence Information Technology,v 6, n 3, p 113-119, March 2011
  11. Yong Wang, Hui Li and Xiyuan Wang. Robustness of Weighting Receive Antenna Selection Algorithm. Wireless Personal Communication, Vol.61,No.1, pp69-67, 2011

2010 and before

  1. Yong Wang, Hui Li. A Novel Antenna Selection Scheme for Amplify-and-Forward MIMO Relay Systems. Journal of Electromagnetic Waves and Applications, 2010, 24(11/12). 1530-1542.
  2. Xudong Zhu,  Hui Li,  Zhijing Liu, Behavior Clustering for Anomaly Detection, China Communications, 2010:7(6).
  3. Zhu Hui, Li Hui, Mo Can, A steam pattern matching method for traffic analysis , China Communication, 2010.No.6
  4.  Zhao bin, Kou Weidong, Li Hui, Dang Lanjun, Zhang Jun, Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,Information Sciences, v 180, n 23, p 4672-4684, 2010,
  5. Sun Yinxia,Li Hui,Short-ciphertext and BDH-based CCA2 secure certificateless encryption,Science China Information Science,2010, No.10, Vol.53 2005-2015
  6. Sun Yinxia, Li Hui. Efficient Signcryption between TPKC and IDPKC and Its Multi-Receiver Construction, Science China-Information Sciences, 2010.3
  7. Dang Lanjun, Kou Weidong, Li Hui, Zhang Junwei, Cao Xuefei, Zhao Bin, Fan Kai, Efficient ID-based Registration Protocol Featured with User Anonymity in Mobile IP Networks, IEEE Transaction on Wireless Communication, FEB,2010, VoL 9,No.2 pp594-604
  8. Xixiang Lv, Hui Li. ID-based authenticated group key agreement from bilinear maps. Front. Comput. Sci. China, 2010.2
  9. ZHOU Ye-jun, LI Hui, MA Jian-feng, Secure Network Coding Against the Contamination and Eavesdropping Adversaries, Chinese Journal of Electronics, 2009.7