Follow
Tongtong Li
Tongtong Li
Professor of ECE, Michigan State University
Verified email at egr.msu.edu - Homepage
Title
Cited by
Cited by
Year
The handbook of technology management: Supply chain management, marketing and advertising, and global management
JRTLH Bidgoli
1872010
Bitcoin and blockchain: Security and privacy
E Zaghloul, T Li, MW Mutka, J Ren
IEEE Internet of Things Journal 7 (10), 10288-10313, 2020
1612020
Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard
A Alahmadi, M Abdelhakim, J Ren, T Li
IEEE transactions on information forensics and security 9 (5), 772-781, 2014
1202014
Cost-aware secure routing (CASER) protocol design for wireless sensor networks
D Tang, T Li, J Ren, J Wu
IEEE Transactions on Parallel and Distributed Systems 26 (4), 960-973, 2014
1022014
Anti-jamming message-driven frequency hopping—Part I: System design
L Zhang, H Wang, T Li
IEEE transactions on wireless communications 12 (1), 70-79, 2012
962012
Blind detection of asynchronous CDMA signals in multipath channels using code-constrained inverse filter criterion
JK Tugnait, T Li
IEEE transactions on signal processing 49 (7), 1300-1309, 2001
682001
Secure wireless monitoring and control systems for smart grid and smart home
T Li, J Ren, X Tang
IEEE Wireless Communications 19 (3), 66-73, 2012
652012
Distributed detection in mobile access wireless sensor networks under byzantine attacks
M Abdelhakim, LE Lightfoot, J Ren, T Li
IEEE Transactions on Parallel and Distributed Systems 25 (4), 950-959, 2013
612013
How much do metamemory beliefs contribute to the font-size effect in judgments of learning?
X Hu, T Li, J Zheng, N Su, Z Liu, L Luo
PloS one 10 (11), e0142351, 2015
602015
Blind identification of the aortic pressure waveform from multiple peripheral artery pressure waveforms
G Swamy, Q Ling, T Li, R Mukkamala
American Journal of Physiology-Heart and Circulatory Physiology 292 (5 …, 2007
582007
Blind asynchronous multiuser CDMA receivers for ISI channels using code-aided CMA
JK Tugnait, T Li
IEEE Journal on Selected Areas in Communications 19 (8), 1520-1530, 2001
582001
Anti-jamming message-driven frequency hopping—Part II: Capacity analysis under disguised jamming
L Zhang, T Li
IEEE transactions on wireless communications 12 (1), 80-88, 2012
572012
Message-driven frequency hopping: Design and analysis
Q Ling, T Li
IEEE transactions on wireless communications 8 (4), 1773-1782, 2009
532009
An energy efficient link-layer security protocol for wireless sensor networks
LE Lighfoot, J Ren, T Li
2007 IEEE International Conference on Electro/Information Technology, 233-238, 2007
482007
Security and privacy of electronic health records: Decentralized and hierarchical data sharing using smart contracts
E Zaghloul, T Li, J Ren
2019 international conference on computing, networking and communications …, 2019
412019
On phy-layer security of cognitive radio: Collaborative sensing under malicious attacks
H Wang, L Lightfoot, T Li
2010 44th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2010
412010
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting
E Zaghloul, T Li, J Ren
IEEE Internet of Things Journal 8 (22), 16585-16597, 2021
372021
Classification of Alzheimer’s disease, mild cognitive impairment and normal control subjects using resting-state fMRI based network connectivity analysis
Z Wang, Y Zheng, DC Zhu, AC Bozoki, T Li
IEEE journal of translational engineering in health and medicine 6, 1-9, 2018
372018
Resource allocation with load balancing for cognitive radio networks
H Wang, J Ren, T Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
372010
Overlapping user grouping in IoT oriented massive MIMO systems
R Tian, Y Liang, X Tan, T Li
IEEE Access 5, 14177-14186, 2017
362017
The system can't perform the operation now. Try again later.
Articles 1–20