Follow
Ming Li
Title
Cited by
Cited by
Year
Privacy-preserving multi-keyword ranked search over encrypted cloud data
N Cao, C Wang, M Li, K Ren, W Lou
IEEE Transactions on parallel and distributed systems 25 (1), 222-233, 2013
22752013
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
M Li, S Yu, Y Zheng, K Ren, W Lou
IEEE transactions on parallel and distributed systems 24 (1), 131-143, 2012
15692012
Data security and privacy in wireless body area networks
M Li, W Lou, K Ren
IEEE Wireless communications 17 (1), 51-58, 2010
8032010
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
M Li, S Yu, K Ren, W Lou
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
6872010
Authorized private keyword search over encrypted data in cloud computing
M Li, S Yu, N Cao, W Lou
Distributed Computing Systems (ICDCS), 2011 31st International Conference on …, 2011
5722011
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
4982013
Findu: Privacy-preserving personal profile matching in mobile social networks
M Li, N Cao, S Yu, W Lou
2011 Proceedings IEEE INFOCOM, 2435-2443, 2011
3292011
Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking
W Sun, B Wang, N Cao, M Li, W Lou, YT Hou, H Li
IEEE transactions on parallel and distributed systems 25 (11), 3025-3035, 2013
3172013
Codeon: Cooperative popular content distribution for vehicular networks using symbol level network coding
M Li, Z Yang, W Lou
IEEE Journal on Selected Areas in Communications 29 (1), 223-235, 2010
2492010
Storing shared data on the cloud via security-mediator
B Wang, SSM Chow, M Li, H Li
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
2432013
BANA: Body Area Network Authentication Exploiting Channel Characteristics
L Shi, M Li, S Yu, J Yuan
The fifth ACM Conference on Security and Privacy in Wireless and Mobile …, 2012
2092012
Wireless federated learning with local differential privacy
M Seif, R Tandon, M Li
2020 IEEE International Symposium on Information Theory (ISIT), 2604-2609, 2020
1792020
Secure ad hoc trust initialization and key management in wireless body area networks
M Li, S Yu, JD Guttman, W Lou, K Ren
ACM Transactions on sensor Networks (TOSN) 9 (2), 1-35, 2013
1502013
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index
B Wang, Y Hou, M Li, H Wang, H Li
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1332014
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks
Q Yan, M Li, T Jiang, W Lou, YT Hou
2012 Proceedings IEEE INFOCOM, 900-908, 2012
1332012
Geometric range search on encrypted spatial data
B Wang, M Li, H Wang
IEEE Transactions on Information Forensics and Security 11 (4), 704-719, 2015
1252015
Group device pairing based secure sensor association and key management for body area networks
M Li, S Yu, W Lou, K Ren
2010 Proceedings IEEE INFOCOM, 1-9, 2010
1252010
Privacy-preserving public auditing for shared cloud data supporting group dynamics
B Wang, H Li, M Li
2013 IEEE International Conference on Communications (ICC), 1946-1950, 2013
1222013
Toward privacy-assured and searchable cloud data storage services
M Li, S Yu, K Ren, W Lou, YT Hou
IEEE Network 27 (4), 56-62, 2013
1072013
Jamming resilient communication using MIMO interference cancellation
Q Yan, H Zeng, T Jiang, M Li, W Lou, YT Hou
IEEE Transactions on Information Forensics and Security 11 (7), 1486-1499, 2016
1062016
The system can't perform the operation now. Try again later.
Articles 1–20