发表论文
[1] 罗海洋, 邝彬, 郭守坤, 张玲翠, 牛犇, 李凤华. 基于双重存证的跨域流转多副本发现机制. 通信学报[J]. 2024, 第 6 作者45(2): 40-53, http://lib.cqvip.com/Qikan/Article/Detail?id=7111604671.[2] 张立坤, Jingwei Sun, 郭守坤, 李凤华, 曹进, 牛犇. Interpreting the Memorization in Deep Learning from Data Distribution. IEEE ICASSP. 2024, 第 4 作者null(null): [3] Lin Zhang, Yunchuan Guo, Siyuan Leng, Xiaogang Cao, Fenghua Li, Liang Fang. Cost-effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems. 24th International Conference on Computational Science. 2024, 第 5 作者null(null): [4] Siyuan Leng, Yunchuan Guo, Lin Zhang, Fanfan Hao, Xiaogang Cao, Fenghua Li, Wenlong Kou. Online and Collaboratively Mitigating Multi-Vector DDoS Attacks for Cloud-Edge Computing. 2024 IEEE International Conference on Communications. 2024, 第 6 作者null(null): [5] 田月池, 李凤华, 周泽峻, 孙哲, 郭守坤, 牛犇. 基于模糊影响图的差分隐私算法保护效果评估方法. 通信学报[J]. 2024, 第 2 作者null(null): [6] Wang, Haoyang, Fan, Kai, Chen, Hongyan, Chen, Qi, Zhang, Kuan, Li, Fenghua, Li, Hui, Yang, Yintang. Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 6 作者20(3): 2578-2592, http://dx.doi.org/10.1109/TDSC.2022.3186999.[7] 金伟, 李凤华, 周紫妍, 孙喜洋, 郭云川. 基于查询热度的密钥索引缓存. 网络与信息安全学报. 2023, 第 2 作者9(1): 83-91, http://lib.cqvip.com/Qikan/Article/Detail?id=7109184834.[8] 尹沛捷, 李凤华, 牛犇, 罗海洋, 邝彬, 张玲翠. 面向版式文档的细粒度隐私操作控制方法. 通信学报[J]. 2023, 第 2 作者44(5): 94-109, http://lib.cqvip.com/Qikan/Article/Detail?id=7109856334.[9] Yaobing Xu, Yunchuan Guo, Mingjie Yu, 李凤华, Shoukun Guo, Liang Fang. Recommending Orchestration Plan for Space-Ground Integration Information Network: A Subgraph Matching Approach. The 20th IEEE International Conference on Ubiquitous Intelligence and Computing. 2023, 第 4 作者[10] Likun Zhang, Yahong Chen, Ang Li, Binghui Wang, Yiran Chen, 李凤华, Jin Cao. Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation. IEEE Winter Conference on Applications of Computer Vision. 2023, 第 6 作者[11] Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou. On-Demand Allocation of Cryptographic Computing Resource with Load Prediction. International Conference on Information and Communications Security. 2023, 第 2 作者[12] Mengyao Shi, 王竹, Tingting Peng, Fenghua Li. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. SecureComm. 2023, 第 4 作者[13] Ben Niu, Jingwei Sun, Yahong Chen, Likun Zhang, Jin Cao, Kui Geng, 李凤华. Evaluating the Impact of Adversarial Factors on Membership Inference Attacks. The 20th IEEE International Conference on Ubiquitous Intelligence and Computing. 2023, 第 7 作者 通讯作者 [14] Ming Zhang, Zhe Sun, Hui Li, Ben Niu, Fenghua Li, Zixu Zhang, Yuhang Xie, Chunhao Zheng. Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing. IEEE Transactions on Dependable and Secure Computing[J]. 2023, 第 5 作者null(null): [15] Yan, Haonan, Li, Xiaoguang, Li, Hui, Li, Jiamin, Sun, Wenhai, Li, Fenghua. Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2022, 第 6 作者19(4): 2680-2694, http://dx.doi.org/10.1109/TDSC.2021.3069258.[16] Chaoyang Li, Fenghua Li, Mingjie Yu, Yunchuan Guo, Yitong Wen, 李子孚. Insider Threat Detection Using Generative Adversarial Graph Attention Networks. IEEE Global Communications Conference. 2022, 第 2 作者2680-2685, https://ieeexplore.ieee.org/document/10001207.[17] 李凤华, 李晖, 牛犇, 邱卫东. 隐私计算的学术内涵与研究趋势. 网络与信息安全学报. 2022, 第 1 作者8(6): 1-8, http://lib.cqvip.com/Qikan/Article/Detail?id=7108770516.[18] Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, 李凤华. DP-Opt: Identify High Differential Privacy Violation by Optimization. Wireless Algorithms, Systems, and Applications. 2022, 第 5 作者 通讯作者 406-416, https://link.springer.com/chapter/10.1007/978-3-031-19214-2_34#citeas.[19] Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo. Detecting conflict of heterogeneous access control policies. 数字通信与网络:英文版. 2022, 第 2 作者8(5): 664-679, http://lib.cqvip.com/Qikan/Article/Detail?id=7108678235.[20] Fanfan Hao, Zhu Wang, Mengyao Shi, Tingting Peng, Liang Fang, Fenghua Li. Inferring Attack Path in Networks With Periodic Topology Changes. The 19th IEEE International Conference on Ubiquitous Intelligence and Computing(UIC 2022). 2022, 第 6 作者[21] 李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川. 泛在网络环境下隐蔽通道关键技术研究综述. 通信学报[J]. 2022, 第 1 作者43(4): 186-201, [22] 王瀚仪, 李效光, 毕文卿, 陈亚虹, 李凤华, 牛犇. “多级本地化差分隐私算法推荐框架”. 通信学报[J]. 2022, 第 5 作者43(8): 52-64, https://d.wanfangdata.com.cn/periodical/txxb202208005.[23] Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo. Detecting conflict of heterogeneous access control policies. DIGITAL COMMUNICATIONS AND NETWORKS[J]. 2022, 第 2 作者 通讯作者 http://dx.doi.org/10.1016/j.dcan.2022.09.002.[24] Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, 李子孚. Efficiently Constructing Topology of Dynamic Networks. IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2022, 第 1 作者44-51, https://ieeexplore.ieee.org/document/10063610.[25] Minqiu Tian, 李子孚, Fenghua Li, Jin Cao, Chao Guo. A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2022, 第 3 作者https://ieeexplore.ieee.org/document/10063678.[26] Wei Jin, Kui Geng, Mingjie Yu, Yunchuan Guo, Fenghua Li. Efficiently Managing Large-Scale Keys in HDFS. IEEE International Conference on High Performance Computing and Communications (HPCC 2021,CCF-C)[J]. 2021, 第 5 作者 通讯作者 [27] 诸天逸, 李凤华, 成林, 郭云川. 跨域访问控制技术研究. 网络与信息安全学报[J]. 2021, 第 2 作者7(1): 20-27, http://lib.cqvip.com/Qikan/Article/Detail?id=7104107921.[28] Ben Niu, Yahong Chen, Fenghua Li. AdaPDP: Adaptive Personalized Differential Privacy. IEEE Conference on Computer Communications(IEEE INFOCOM,CCF-A). 2021, 第 3 作者 通讯作者 [29] 陈佩, 李凤华, 李子孚, 郭云川, 成林. 基于规则关联的安全数据采集策略生成. 网络与信息安全学报[J]. 2021, 第 2 作者7(5): 132-148, http://lib.cqvip.com/Qikan/Article/Detail?id=7105864571.[30] Yunchuan Guo, Xiyang Sun, Mingjie Yu, Fenghua Li, Kui Geng, 李子孚. Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach. IEEE International Conference on Computational Science. 2021, 第 4 作者[31] 何诗洋, 李晖, 李凤华. SM4算法的FPGA优化实现方法. 西安电子科技大学学报[J]. 2021, 第 3 作者48(3): 155-162, http://lib.cqvip.com/Qikan/Article/Detail?id=7104923138.[32] 张玲翠, 许瑶冰, 李凤华, 房梁, 郭云川, 李子孚. 天地一体化信息网络安全动态赋能架构. 通信学报[J]. 2021, 第 3 作者42(9): 87-95, http://lib.cqvip.com/Qikan/Article/Detail?id=7105636535.[33] 张玲翠, 李凤华, 房梁, 郭云川, 李子孚. 基于区间决策图的威胁处置策略快速匹配. 通信学报[J]. 2021, 第 2 作者13-22, [34] Niu, Ben, Chen, Yahong, Wang, Boyang, Cao, Jin, Li, Fenghua, IEEE. Utility-aware Exponential Mechanism for Personalized Differential Privacy. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2020, 第 5 作者 通讯作者 [35] 王竹, 贺坤, 王新宇, 牛犇, 李凤华. Android设备中基于流量特征的隐私泄露评估方案. 通信学报[J]. 2020, 第 5 作者41(2): 155-164, http://lib.cqvip.com/Qikan/Article/Detail?id=7100926557.[36] Fenghua Li, 李子孚, Liang Fang, Yongjun Li, Yaobing Xu, Yunchuan Guo. Securing instruction interaction for hierarchical management. Journal of Parallel and Distributed Computing[J]. 2020, 第 1 作者137: 91-103, [37] Li, Fenghua, Yin, Peijie, Chen, Yahong, Niu, Ben, Li, Hui. Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE WIRELESS COMMUNICATIONS[J]. 2020, 第 1 作者27(3): 31-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000542963900007.[38] Yunchuan Guo, Han Zhang, 李子孚, Fenghua Li, Liang Fang, Lihua Yin, Jin Cao. Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?. IEEE International Conference on Communications. 2020, 第 4 作者[39] 李凤华, 郭云川, 耿魁, 房梁, 李晖. 天地一体化信息网络安全动态赋能研究. 无线电通信技术[J]. 2020, 第 1 作者46(5): 561-570, [40] Fenghua Li. A Framework to Preserve User Privacy for Machine Learning as a Service. IEEE Global Communications Conference. 2020, 第 1 作者 通讯作者 [41] Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li. Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 第 5 作者2020: https://doaj.org/article/5dcd59e306d644d9822174e3584eb0ae.[42] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua. Exploiting location-related behaviors without the GPS data on smartphones. INFORMATION SCIENCES[J]. 2020, 第 1 作者527: 444-459, http://dx.doi.org/10.1016/j.ins.2019.05.052.[43] 李凤华, 张林杰, 陆月明, 耿魁, 郭云川. 天地网络安全保障技术研究. 天地一体化信息网络[J]. 2020, 第 1 作者1(1): 9, http://lib.cqvip.com/Qikan/Article/Detail?id=7103338335.[44] 李凤华, 李晖. 新形势下理工门类学科建设内涵与学科评估导向. 网络与信息安全学报[J]. 2020, 第 1 作者6(1): 1-10, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=WXAQ202001001&v=MDk2NDRSN3FlWnVkdkZ5N2tWN3pJTWpYS2Y3RzRITkhNcm85RlpZUjhlWDFMdXhZUzdEaDFUM3FUcldNMUZyQ1U=.[45] Li, Fenghua, Li, Yongjun, Leng, Siyuan, Guo, Yunchuan, Geng, Kui, Wang, Zhen, Fang, Liang. Dynamic countermeasures selection for multi-path attacks. COMPUTERS & SECURITY[J]. 2020, 第 1 作者97: [46] Li Fenghua, Sun Zhe, Niu Ben, Cao Jin, Li Hui, IEEE. An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC). 2019, 第 1 作者390-394, [47] 李凤华, 李丁焱, 金伟, 王竹, 郭云川, 耿魁. 面向海量电子凭据的分层可扩展存储架构. 通信学报[J]. 2019, 第 1 作者40(5): 2019104-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001759.[48] Li Fenghua, Sun Zhe, Li Ang, Niu Ben, Li Hui, Cao Guohong, IEEE. HideMe: Privacy-Preserving Photo Sharing on Social Networks. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019). 2019, 第 1 作者154-162, [49] Guo, Yunchuan, Zhang, Han, Zhang, Lingcui, Fang, Liang, Li, Fenghua. A Game Theoretic Approach to Cooperative Intrusion Detection. JOURNAL OF COMPUTATIONAL SCIENCE[J]. 2019, 第 5 作者 通讯作者 30: 118-126, [50] Fenghua Li, Hui Li, Ben Niu, Jinjun Chen. Privacy Computing: Concept, Computing Framework, and Future Development Trends. ENGINEERING[J]. 2019, 第 1 作者1179-1192, http://dx.doi.org/10.1016/j.eng.2019.09.002.[51] 李凤华, 李子孚, 李凌, 张铭, 耿魁, 郭云川. 复杂网络环境下面向威胁监测的采集策略精化方法. 通信学报[J]. 2019, 第 1 作者40(4): 49-61, http://lib.cqvip.com/Qikan/Article/Detail?id=7001754891.[52] 王新宇, 牛犇, 李凤华, 贺坤. APP隐私泄露风险评估与保护方案. 通信学报[J]. 2019, 第 3 作者40(5): 2019085-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001752.[53] 王震, 段晨健, 吴铤, 郭云川, 王竹, 李凤华. 基于Stackelberg攻防博弈的网络系统安全控制机制优化研究. 信息安全学报[J]. 2019, 第 6 作者4(1): 101-115, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190110&flag=1.[54] 金伟, 余铭洁, 李凤华, 杨正坤, 耿魁. 支持高并发的Hadoop高性能加密方法研究. 通信学报[J]. 2019, 第 3 作者40(12): 29-40, http://lib.cqvip.com/Qikan/Article/Detail?id=7100688843.[55] Li, Fenghua, Li, Hui, Niu, Ben, Chen, Jinjun. Privacy Computing: Concept, Computing Framework, and Future Development Trends. ENGINEERING[J]. 2019, 第 1 作者5(6): 1179-1192, https://journal.hep.com.cn/engi/EN/10.1016/j.eng.2019.09.002.[56] Fenghua Li, 李子孚, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo, Jinjun Chen. Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies. IEEE Internet of Things Journal[J]. 2019, 第 1 作者6(2): 1471-1483, https://www.webofscience.com/wos/woscc/full-record/WOS:000467564700021.[57] Yu, Pu, Cao, Jin, Ma, Maode, Li, Hui, Niu, Ben, Li, Fenghua, IEEE. Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2019, 第 6 作者[58] 李凤华, 李勇俊, 杨正坤, 张晗, 张玲翠. 不完全信息下的威胁处置效果模糊评估. 通信学报[J]. 2019, 第 1 作者40(4): 117-127, http://lib.cqvip.com/Qikan/Article/Detail?id=7001754897.[59] Guo, Yunchuan, Wang, Xiao, Fang, Liang, Li, Yongjun, Li, Fenghua, Geng, Kui. Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach. International Conference on Computational Science. 2019, 第 5 作者11536: 590-603, [60] Yin, Lihua, Sun, Yanwei, Wang, Zhen, Guo, Yunchuan, Li, Fenghua, Fang, Binxing. Security Measurement for Unknown Threats Based on Attack Preferences. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 5 作者https://doaj.org/article/4ceb1a0ad9214e5f9fe1ba379a601e1f.[61] 李凤华, 孙哲, 吕梦凡, 牛犇. 社交照片隐私保护机制硏究进展. 信息安全学报[J]. 2018, 第 1 作者3(2): 41-61, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=6202087&detailType=1.[62] Yin, Lihua, Guo, Yunchuan, Li, Fenghua, Sun, Yanwei, Qian, Junyan, Vasilakos, Athanasios. A game-theoretic approach to advertisement dissemination in ephemeral networks. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2018, 第 3 作者21(2): 241-260, http://dx.doi.org/10.1007/s11280-017-0432-6.[63] Fenghua Li, Zhe Sun, Ben Niu, Yunchuan Guo, Ziwen Liu. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. 工程(英文)[J]. 2018, 第 1 作者4(1): 85-93, http://lib.cqvip.com/Qikan/Article/Detail?id=675171914.[64] Cao, Jin, Li, Hui, Ma, Maode, Li, Fenghua. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 4 作者https://doaj.org/article/e09e2b8cff7d45acbc78e05cb47ef42c.[65] He Yuanyuan, Ni Jianbing, Niu Ben, Li Fenghua, Shen Xuemin Sherman, IEEE. Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach. 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT). 2018, 第 4 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000434872700025.[66] Fenghua Li. 2-MR: A Two-Phase MapReduce Approach for Incremental Replication. International Conference on Big data Technologies (ICBDT 2018). 2018, 第 1 作者[67] Li Fenghua, Chen Yahong, Niu Ben, He Yuanyuan, Geng Kui, Cao Jin, IEEE. Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2018, 第 1 作者[68] Liang, Jiao, Han, Weili, Guo, Zeqing, Chen, Yaoliang, Cao, Chang, Wang, Xiaoyang Sean, Li, Fenghua. DESC: enabling secure data exchange based on smart contracts. SCIENCE CHINA-INFORMATION SCIENCES. 2018, 第 7 作者61(4): http://lib.cqvip.com/Qikan/Article/Detail?id=675013659.[69] Fenghua Li. Privacy-preserving Partner Selection for Ride-sharing Services. IEEE Transactions on Vehicular Technology. 2018, 第 1 作者[70] Fang Liang, Yin Lihua, Guo Yunchuan, Wang Zhen, Li Fenghua, IEEE. Resolving Access Conflicts: an Auction-based Incentive Approach. IEEE Military Communications Conference. 2018, 第 5 作者 通讯作者 52-57, [71] 李凤华, 陈天柱, 王震, 张林杰, 史国振, 郭云川. 复杂网络环境下跨网访问控制机制. 通信学报[J]. 2018, 第 1 作者39(2): 1-10, http://lib.cqvip.com/Qikan/Article/Detail?id=674606816.[72] Guo Yunchuan, Fang Liang, Geng Kui, Yin Lihua, Li Fenghua, Chen Lihua, IEEE. Real-time Data Incentives for IoT Searches. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2018, 第 5 作者 通讯作者 [73] Guo, Yunchuan, Zhang, Han, Zhang, Lingcui, Fang, Liang, Li, Fenghua, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach. COMPUTATIONAL SCIENCE - ICCS 2018, PT I. 2018, 第 5 作者 通讯作者 10860: 83-97, [74] Li Fenghua, Li Yongjun, Yang Zhengkun, Guo Yunchuan, Yin Lihua, Wang Zhen, IEEE. Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN). 2018, 第 1 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000450116600099.[75] Wang, Fengwei, Zhu, Hui, Liu, Ximeng, Lu, Rongxing, Li, Fenghua, Li, Hui, Zhang, Songnian. Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 第 5 作者67(11): 11084-11097, http://dx.doi.org/10.1109/TVT.2018.2868869.[76] He, Yuanyuan, Ni, Jianbing, Wang, Xinyu, Niu, Ben, Li, Fenghua, Shen, Xuemin. Privacy-Prese ving Partner Selection for Ride-Sharing Services. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 第 5 作者67(7): 5994-6005, http://dx.doi.org/10.1109/TVT.2018.2809039.[77] 李凤华, 孙哲, 吕梦凡, 牛犇. 社交照片隐私保护机制研究进展. 信息安全学报[J]. 2018, 第 1 作者3(2): 41-61, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180204&flag=1.[78] FenghuaLi, ZheSun, BenNiu, YunchuanGuo, ZiwenLiu. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. Engineering[J]. 2018, 第 1 作者4(1): 85-93, https://journal.hep.com.cn/engi/EN/10.1016/j.eng.2018.02.003.[79] 张恩, 耿魁, 金伟, 李勇俊, 孙韵清, 李凤华. 抗隐蔽敌手的云外包秘密共享方案. 通信学报[J]. 2017, 第 6 作者38(5): 57-65, http://lib.cqvip.com/Qikan/Article/Detail?id=672290837.[80] Li Jing, Yin Lihua, Guo Yunchuan, Li Chao, Li Fenghua, Chen Lihua, Yan Z, Molva R, Mazurczyk W, Kantola R. A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NETWORK AND SYSTEM SECURITY. 2017, 第 5 作者10394: 486-496, [81] He, Yuanyuan, Zhang, Kuan, Wang, Hanyi, Li, Fenghua, Niu, Ben, Li, Hui, IEEE. Impact Factor-Based Group Recommendation Scheme with Privacy Preservation in MSNs. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2017, 第 4 作者[82] Li, Fenghua, He, Yuanyuan, Niu, Ben, Li, Hui. Small-world: Secure friend matching over physical world and social networks. INFORMATION SCIENCES[J]. 2017, 第 1 作者387: 205-220, http://dx.doi.org/10.1016/j.ins.2016.09.057.[83] Fenghua Li. Pricing Privacy Leakage in Location-Based Service. WASA. 2017, 第 1 作者[84] Sun, Yanwei, Yin, Lihua, Guo, Yunchuan, Li, Fenghua, Fang, Binxing, Ibrahim, S, Choo, KKR, Yan, Z, Pedrycz, W. Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017. 2017, 第 4 作者10393: 313-327, [85] Fang, Liang, Yin, Lihua, Zhang, Qiaoduo, Li, Fenghua, Fang, Binxing, IEEE. Who is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE. 2017, 第 4 作者[86] Li, Fenghua, Li, Zifu, Han, Weili, Wu, Ting, Chen, Lihua, Guo, Yunchuan, IEEE. Cyberspace-Oriented Access Control: Model and Policies. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC). 2017, 第 1 作者261-266, http://dx.doi.org/10.1109/DSC.2017.100.[87] Fenghua Li. SRAM: A State-Aware Risk Assessment Model for Intrusion Response. IEEE International Conference on Data Science in Cyberspace(DSC). 2017, 第 1 作者[88] Fenghua Li. A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. International Conference on Cryptography, Security and Privacy. 2017, 第 1 作者[89] Fenghua Li. Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. IEEE International Symposium on UbiSafe Computing(UbiSafe). 2017, 第 1 作者[90] Zhang, En, Li, Fenghua, Niu, Ben, Wang, Yanchao. Server-aided private set intersection based on reputation. INFORMATION SCIENCES[J]. 2017, 第 2 作者 通讯作者 387: 180-194, http://dx.doi.org/10.1016/j.ins.2016.09.056.[91] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua, IEEE. TrackU: Exploiting User's Mobility Behavior via WiFi List. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE. 2017, 第 1 作者[92] 房梁, 殷丽华, 李凤华, 方滨兴. 基于谱聚类的访问控制异常权限配置挖掘机制. 通信学报[J]. 2017, 第 3 作者38(12): 63-72, [93] Li Fenghua, Liu Jiawen, Fang Liang, Niu Ben, Geng Kui, Li Hui, Ma L, Khreishah A, Zhang Y, Yan M. Pricing Privacy Leakage in Location-Based Services. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 1 作者10251: 406-418, [94] Fenghua Li. A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks. IEEE Wireless Communications and Network Conference. 2016, 第 1 作者[95] 李凤华, 殷丽华, 吴巍, 张林杰, 史国振. 天地一体化信息网络安全保障技术研究进展及发展趋势. 通信学报[J]. 2016, 第 1 作者37(11): 156-168, http://lib.cqvip.com/Qikan/Article/Detail?id=670575717.[96] Fenghua Li. Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information. International Conference on Computing, Networking and Communication. 2016, 第 1 作者 通讯作者 [97] He, Yuanyuan, Li, Fenghua, Niu, Ben, Hua, Jiafeng, IEEE. Achieving Secure and Accurate Friend Discovery Based on Friend-of-Friend's Recommendations. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2016, 第 2 作者730-735, http://dx.doi.org/10.1109/ICC.2016.7510779.[98] Yin, Lihua, Fang Liang, Niu, Ben, Fang Binxing, Li Fenghua. Hunting Abnormal Configurations for Permission-Sensitive Role Mining. IEEE Military Communications Conference. 2016, 第 5 作者[99] 熊金波, 张媛媛, 李凤华, 李素萍, 任君, 姚志强. 云环境中数据安全去重研究进展. 通信学报[J]. 2016, 第 3 作者37(11): 169-180, http://lib.cqvip.com/Qikan/Article/Detail?id=670575718.[100] 李凤华, 李晖, 贾焰, 俞能海, 翁健. 隐私计算研究范畴及发展趋势. 通信学报[J]. 2016, 第 1 作者37(4): 2016078-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668597024.[101] Fenghua Li. Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends’ Recommendation. International Conference on Computing, Networking and Communication. 2016, 第 1 作者[102] 李凤华, 王彦超, 殷丽华, 谢绒娜, 熊金波. 面向网络空间的访问控制模型. 通信学报[J]. 2016, 第 1 作者37(5): 2016109-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668940578.[103] Fenghua Li. Time Obfucation-Based Privacy-Preserving Scheme for Location-Based Services. IEEE Wireless Communications and Networking Conference(WCNC 2016). 2016, 第 1 作者[104] Chen, Lingjiang, Zhou, Shuguang, Zhang, Qiaoduo, Li, Fenghua, Ma, M, Arrasmith, W, Li, P. An IPv6 Routing Lookup Algorithm Using Weight-balanced Tree based on Prefix Value for Virtual Router. FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS. 2016, 第 4 作者9902: http://dx.doi.org/10.1117/12.2262546.[105] Li, Fenghua, Wang, Yanchao, Xiong, Jinbo, Xie, Rongna, IEEE. Role and Time-based Access Control with Efficient Revocation for Cloud Storage. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016). 2016, 第 1 作者 通讯作者 284-289, http://dx.doi.org/10.1109/DSC.2016.118.[106] 熊金波, 李凤华, 王彦超, 马建峰, 姚志强. 基于密码学的云数据确定性删除研究进展. 通信学报[J]. 2016, 第 2 作者37(8): 167-184, http://lib.cqvip.com/Qikan/Article/Detail?id=669887487.[107] Liu, Yangxin, Zhang, Lingcui, Zhou, Shuguang, Li, Fenghua, Ma, M, Arrasmith, W, Li, P. A Network Monitor for HTTPS Protocol based on Proxy. FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS. 2016, 第 4 作者9902: [108] Fenghua Li. Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage. INTERNATIONALCONFERENCEONCOMPUTINGNETWORKINGANDCOMMUNICATION. 2016, 第 1 作者 通讯作者 [109] 耿魁, 李凤华, 李维皓, 李晖, 牛犇, 谢绒娜. 基于代理的移动互联网隐私保护机制. TONGXIN XUEBAO[J]. 2015, 第 2 作者36(11): 25-32, https://doaj.org/article/7bc4d8008d7445c19e1c6efaf7fdd510.[110] Fenghua Li. Achieving Secure Friend Discovery in Social Strength-Aware PMSNs. IEEE Military Communications Conference. 2015, 第 1 作者 通讯作者 [111] 李凤华, 张翠, 牛犇, 李晖, 华佳烽, 史国振. 高效的轨迹隐私保护方案. 通信学报[J]. 2015, 第 1 作者36(12): 114-123, http://lib.cqvip.com/Qikan/Article/Detail?id=667180876.[112] 李昊星, 李凤华, 宋承根, 苏铓, 刘歆. 支持多关键字的可搜索公钥加密方案. 西安电子科技大学学报[J]. 2015, 第 2 作者42(5): 20-25, http://lib.cqvip.com/Qikan/Article/Detail?id=666355190.[113] Fenghua Li. UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks. Proceedings of the IEEE International Conference on Communications(ICC 2015). 2015, 第 1 作者 通讯作者 [114] Fenghua Li. Privacy-Preserving Strategies in Service Quality Aware Location-Based Services. IEEE International Conference on Communications. 2015, 第 1 作者[115] Li, Haoxing, Li, Fenghua, Song, Chenggen, Yan, Yalong. Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS[J]. 2015, 第 2 作者 通讯作者 9(7): 2719-2735, https://www.webofscience.com/wos/woscc/full-record/WOS:000358997000022.[116] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen. A full lifecycle privacy protection scheme for sensitive data in cloud computing. PEE. 2015, 第 2 作者8(6): http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=SSJD8CB50FA7F21B72501F314F5A031564E6&DbName=SSJDLAST&DbCode=SSJD&yx=&pr=&URLID=&bsm=.[117] 单芳芳, 李凤华, 谢绒娜, 熊金波, 王彦超. 面向多维数字媒体的访问控制机制. TONGXIN XUEBAO[J]. 2015, 第 2 作者36(11): 52-60, https://doaj.org/article/9ae48e3eb24a4cc699db8962bbda34ca.[118] Wang Yanchao, Li Fenghua, Xiong Jinbo, Niu Ben, Shan Fangfang, IEEE. Achieving Lightweight and Secure Access Control in Multi-Authority Cloud. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1. 2015, 第 2 作者 通讯作者 459-466, http://dx.doi.org/10.1109/Trustcom.2015.407.[119] 万盛, 何媛媛, 李凤华, 牛犇, 李晖, 王新宇. 基于布隆过滤器的轻量级隐私信息匹配方案. 通信学报[J]. 2015, 第 3 作者36(12): 151-162, http://lib.cqvip.com/Qikan/Article/Detail?id=667180880.[120] Ma Zhuo, Li Fenghua, Ma Jianfeng, Ji Wenjiang. CL-TAP: An Efficient Certificate less Based Trusted Access Protocol for WLAN. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 第 2 作者23(1): 142-146, https://www.webofscience.com/wos/woscc/full-record/WOS:000330089800026.[121] Shi Guozhen, Su Mang, Li Fenghua, Lou Jiapeng, Huang Qiong, IEEE. A User-based Document Management Mechanism in Cloud. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS). 2014, 第 3 作者377-381, http://dx.doi.org/10.1109/CIS.2014.60.[122] 熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙, 李琦. 基于属性加密的组合文档安全自毁方案. 电子学报[J]. 2014, 第 4 作者42(2): 366-376, http://lib.cqvip.com/Qikan/Article/Detail?id=49029420.[123] 熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙. 面向网络内容隐私的基于身份加密的安全自毁方案. 计算机学报[J]. 2014, 第 4 作者37(1): 139-150, http://lib.cqvip.com/Qikan/Article/Detail?id=48544439.[124] Fenghua Li. A Reliable Supervision Model and Implementation for the Trading of Digital Works. 2014, 第 1 作者[125] 孙文海, 李凤华, 王博洋, 李晖. 公共云存储服务数据安全及隐私保护技术综述. 计算机研究与发展[J]. 2014, 第 2 作者51(7): 1397-1409, http://lib.cqvip.com/Qikan/Article/Detail?id=50300259.[126] 李凤华. 一种抗隐蔽通道的网络隔离通信方案. 通信学报. 2014, 第 1 作者[127] Mang Su, Fenghua Li, Zhi Tang, Yinyan Yu, Bo Zhou. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application. THE SCIENTIFIC WORLD JOURNAL[J]. 2014, 第 2 作者2014: https://doaj.org/article/f01fc45f05ea47569446b964c5aab829.[128] 李凤华, 谈苗苗, 樊凯, 耿魁, 赵甫. 抗隐蔽通道的网络隔离通信方案. 通信学报[J]. 2014, 第 1 作者35(11): 96-106, http://lib.cqvip.com/Qikan/Article/Detail?id=662973705.[129] 苏铓, 李凤华, 史国振. 基于行为的多级访问控制模型. 计算机研究与发展[J]. 2014, 第 2 作者51(7): 1604-1613, http://lib.cqvip.com/Qikan/Article/Detail?id=50300280.[130] 李晖, 李凤华, 曹进, 牛犇, 孙文海, 耿魁. 移动互联服务与隐私保护的研究进展. 通信学报[J]. 2014, 第 2 作者35(11): 1-11, http://lib.cqvip.com/Qikan/Article/Detail?id=662973695.[131] Fenghua Li. FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. 2013, 第 1 作者 通讯作者 [132] 熊金波, 姚志强, 马建峰, 李凤华, 李琦. 基于行为的结构化文档多级访问控制. 计算机研究与发展[J]. 2013, 第 4 作者50(7): 1399-1408, http://lib.cqvip.com/Qikan/Article/Detail?id=46273757.[133] Cao, Y, Zhao, X, Li, F, Yu, N, Alattar, AM, Memon, ND, Heitzenrater, CD. Video Steganography with Multi-path Motion Estimation. MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013. 2013, 8665: [134] Fenghua Li. An improved attack on clock-controlled shift register based on hardware implementation. SCIENCE CHINA-INFORMATION SCIENCES. 2013, 第 1 作者[135] Ma, Kede, Zhang, Weiming, Zhao, Xianfeng, Yu, Nenghai, Li, Fenghua. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2013, 第 5 作者8(3): 553-562, https://www.webofscience.com/wos/woscc/full-record/WOS:000318597400012.[136] Li Fenghua, Shi Guozhen, Zhang Jinghui, Li Li. An Action-based Access Control Model Implementation for MLS Information Systems. 2012, 第 1 作者http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=JKDZ201207001274&DbName=CPFD0914&DbCode=CPFD&yx=&pr=&URLID=&bsm=.[137] Shi Guozhen, Li Fenghua, Li Li, Shi Hanzhang. General Purpose Framework Designing for Network Security Test Devices Based on Multi-core Processor. 2012, 第 2 作者http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=JKDZ201207001044&DbName=CPFD0914&DbCode=CPFD&yx=&pr=&URLID=&bsm=.[138] Su, Mang, Li, Fenghua, Shi, Guozhen, Li, Li. An Action Based Access Control Model for Multi-level Security. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS[J]. 2012, 第 2 作者6(2): 359-366, [139] 欧庆于, 张焕国, 吴晓平, 李凤华, 罗芳. 基于亚稳态的QDI逻辑随机路径切换方法研究. 电子学报[J]. 2012, 第 4 作者40(10): 1996-2001, http://lib.cqvip.com/Qikan/Article/Detail?id=44147898.[140] Fenghua Li. Action Based Access Control Model for Multi-level Security (MLS). In Proceedings of the 2012 International Conference on Information Security and Assurance (ISA 2012). 2012, 第 1 作者