Na Li
Title
Cited by
Cited by
Year
Privacy preservation in wireless sensor networks: A state-of-the-art survey
N Li, N Zhang, SK Das, B Thuraisingham
Ad Hoc Networks 7 (8), 1501-1514, 2009
3622009
HUMS: an autonomous moving strategy for mobile sinks in data-gathering sensor networks
Y Bi, L Sun, J Ma, N Li, IA Khan, C Chen
EURASIP Journal on Wireless Communications and Networking 2007 (1), 064574, 2007
1512007
A trust-based framework for data forwarding in opportunistic networks
N Li, SK Das
Ad Hoc Networks 11 (4), 1497-1509, 2013
1302013
RADON: reputation-assisted data forwarding in opportunistic networks
N Li, SK Das
Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010
622010
Using data mules to preserve source location privacy in wireless sensor networks
M Raj, N Li, D Liu, M Wright, SK Das
Pervasive and Mobile Computing 11, 244-260, 2014
512014
Using data mules to preserve source location privacy in Wireless Sensor Networks
N Li, M Raj, D Liu, M Wright, S Das
ICDCN, 2012
51*2012
Preserving relation privacy in online social network data
N Li, N Zhang, S Das
IEEE Internet Computing 15 (3), 35-42, 2011
422011
A storage infrastructure for heterogeneous and multimedia data in the internet of things
M Di Francesco, N Li, M Raj, SK Das
2012 IEEE International Conference on Green Computing and Communications, 26-33, 2012
362012
DAR: An energy-balanced data-gathering scheme for wireless sensor networks
Y Bi, N Li, L Sun
Computer Communications 30 (14-15), 2812-2825, 2007
342007
Relationship Privacy Preservation in Publishing Online Social Networks
N Li, N Zhang, SK Das
Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International …, 2011
222011
BoSS: a moving strategy for mobile sinks in wireless sensor networks
Y Bi, L Sun, N Li
International Journal of Sensor Networks 5 (3), 173-184, 2009
212009
Privacy Aware Display Strategy in Friend Search
N Li
IEEE International Conference on Communications (ICC), Communication and …, 2014
72014
Voice controlled smart mirror with multifactor authentication
AC Njaka, N Li, L Li
2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018
62018
Retrieving hidden friends: A collusion privacy attack against online friend search engine
Y Liu, N Li
IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018
62018
Fake news detection enhancement with data imputation
CMM Kotteti, XI Dong, N Li, L Qian
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
62018
A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks
M Di Francesco, N Li, L Cheng, M Raj, SK Das
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
62011
An Advanced Collusion Attack against User Friendship Privacy in OSNs
Y Liu, N Li
Proceeding of the 40th IEEE Computer Society International Conference on …, 2016
32016
Facelock: a labware for teaching photo privacy in online social networks through face recognition
S Shormin, L Li, N Li
Journal of Computing Sciences in Colleges 35 (7), 88-97, 2020
2020
Efficiently discovering users connectivity with local information in online social networks
N Li, SK Das
Online Social Networks and Media 16, 100062, 2020
2020
IDEAL: An Interactive De-Anonymization System
N Li, R Murugesan, L Li, H Zheng
the 44th IEEE Computer Society Signature Conference on Computers, Software …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20