发表论文
[1] 尹沛捷, 李凤华, 牛犇, 罗海洋, 邝彬, 张玲翠. 面向版式文档的细粒度隐私操作控制方法. 通信学报[J]. 2023, 第 3 作者44(5): 94-109, http://lib.cqvip.com/Qikan/Article/Detail?id=7109856334.[2] Ben Niu, Jingwei Sun, Yahong Chen, Likun Zhang, Jin Cao, Kui Geng, 李凤华. Evaluating the Impact of Adversarial Factors on Membership Inference Attacks. The 20th IEEE International Conference on Ubiquitous Intelligence and Computing. 2023, 第 1 作者[3] 李凤华, 李晖, 牛犇, 邱卫东. 隐私计算的学术内涵与研究趋势. 网络与信息安全学报. 2022, 第 3 作者8(6): 1-8, http://lib.cqvip.com/Qikan/Article/Detail?id=7108770516.[4] Niu, Ben, Chen, Yahong, Wang, Zhibo, li, Fenghua, Wang, Boyang, Li, Hui. Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2022, 第 1 作者21(1): 125-138, http://dx.doi.org/10.1109/TMC.2020.3000730.[5] Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, 李凤华. DP-Opt: Identify High Differential Privacy Violation by Optimization. Wireless Algorithms, Systems, and Applications. 2022, 第 1 作者406-416, https://link.springer.com/chapter/10.1007/978-3-031-19214-2_34#citeas.[6] 王瀚仪, 李效光, 毕文卿, 陈亚虹, 李凤华, 牛犇. “多级本地化差分隐私算法推荐框架”. 通信学报[J]. 2022, 第 6 作者43(8): 52-64, https://d.wanfangdata.com.cn/periodical/txxb202208005.[7] Niu, Ben, Li, Qinghua, Wang, Hanyi, Cao, Guohong, Li, Fenghua, Li, Hui. A Framework for Personalized Location Privacy. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2022, 第 1 作者21(9): 3071-3083, http://dx.doi.org/10.1109/TMC.2021.3055865.[8] Ben Niu, Yahong Chen, Fenghua Li. AdaPDP: Adaptive Personalized Differential Privacy. IEEE Conference on Computer Communications(IEEE INFOCOM,CCF-A). 2021, 第 1 作者 通讯作者 [9] Kang, Yilin, Liu, Yong, Niu, Ben, Wang, Weiping. Weighted distributed differential privacy ERM Convex and non-convex. COMPUTERS & SECURITY[J]. 2021, 第 3 作者106: http://dx.doi.org/10.1016/j.cose.2021.102275.[10] Ben Niu, Fenghua Li. A Framework for Personalized Location Privacy. IEEE Transactions on Mobile Computing(IEEE TMC,CCF-A)[J]. 2021, 第 1 作者[11] Niu, Ben, Chen, Yahong, Wang, Boyang, Cao, Jin, Li, Fenghua, IEEE. Utility-aware Exponential Mechanism for Personalized Differential Privacy. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2020, 第 1 作者[12] 王竹, 贺坤, 王新宇, 牛犇, 李凤华. Android设备中基于流量特征的隐私泄露评估方案. 通信学报[J]. 2020, 第 4 作者41(2): 155-164, http://lib.cqvip.com/Qikan/Article/Detail?id=7100926557.[13] Li, Fenghua, Yin, Peijie, Chen, Yahong, Niu, Ben, Li, Hui. Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE WIRELESS COMMUNICATIONS[J]. 2020, 第 4 作者 通讯作者 27(3): 31-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000542963900007.[14] Fenghua Li. A Framework to Preserve User Privacy for Machine Learning as a Service. IEEE Global Communications Conference. 2020, [15] Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li. Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 第 3 作者 通讯作者 2020: https://doaj.org/article/5dcd59e306d644d9822174e3584eb0ae.[16] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua. Exploiting location-related behaviors without the GPS data on smartphones. INFORMATION SCIENCES[J]. 2020, 第 3 作者 通讯作者 527: 444-459, http://dx.doi.org/10.1016/j.ins.2019.05.052.[17] Niu, Ben, Chen, Yahong, Zhang, Likun, Li, Fenghua, IEEE. Membership Inference Attacks against MemGuard. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS). 2020, 第 1 作者[18] Ma, Ruhui, Cao, Jin, Feng, Dengguo, Li, Hui, Niu, Ben, Li, Fenghua, Yin, Lihua, IEEE. A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2020, 第 5 作者[19] Li Fenghua, Sun Zhe, Niu Ben, Cao Jin, Li Hui, IEEE. An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC). 2019, 第 11 作者390-394, [20] 李凤华, 孙哲, 牛犇, 曹进, 李晖. 跨社交网络的隐私图片分享框架. 通信学报[J]. 2019, 第 3 作者40(7): 1-13, http://lib.cqvip.com/Qikan/Article/Detail?id=7002495979.[21] Li Fenghua, Sun Zhe, Li Ang, Niu Ben, Li Hui, Cao Guohong, IEEE. HideMe: Privacy-Preserving Photo Sharing on Social Networks. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019). 2019, 第 11 作者154-162, [22] Fenghua Li, Hui Li, Ben Niu, Jinjun Chen. Privacy Computing: Concept, Computing Framework, and Future Development Trends. ENGINEERING[J]. 2019, 第 3 作者1179-1192, http://dx.doi.org/10.1016/j.eng.2019.09.002.[23] 王新宇, 牛犇, 李凤华, 贺坤. APP隐私泄露风险评估与保护方案. 通信学报[J]. 2019, 第 2 作者40(5): 2019085-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001752.[24] FenghuaLi, HuiLi, BenNiu, JinjunChen. Privacy Computing: Concept, Computing Framework, and Future Development Trends. Engineering[J]. 2019, 第 3 作者5(6): 1179-1192, https://journal.hep.com.cn/engi/EN/10.1016/j.eng.2019.09.002.[25] Sun Yunqing, Cao Jin, Ma Maode, Li Hui, Niu Ben, Li Fenghua, IEEE. Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC). 2019, 第 5 作者425-431, [26] Yu, Pu, Cao, Jin, Ma, Maode, Li, Hui, Niu, Ben, Li, Fenghua, IEEE. Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2019, 第 5 作者[27] Luo Yurong, Cao Jin, Ma Maode, Li Hui, Niu Ben, Li Fenghua, IEEE. DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC). 2019, 第 5 作者418-424, [28] Xiong, Jinbo, Ren, Jun, Chen, Lei, Yao, Zhiqiang, Lin, Mingwei, Wu, Dapeng, Niu, Ben. Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT. IEEE INTERNET OF THINGS JOURNAL[J]. 2019, 第 7 作者6(2): 1530-1540, http://dx.doi.org/10.1109/JIOT.2018.2842773.[29] Fenghua Li. Privacy-preserving Partner Selection for Ride-sharing Services. IEEE Transactions on Vehicular Technology. 2018, [30] FenghuaLi, ZheSun, BenNiu, YunchuanGuo, ZiwenLiu. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. Engineering[J]. 2018, 第 3 作者 通讯作者 4(1): 85-93, https://journal.hep.com.cn/engi/EN/10.1016/j.eng.2018.02.003.[31] He, Yuanyuan, Ni, Jianbing, Wang, Xinyu, Niu, Ben, Li, Fenghua, Shen, Xuemin. Privacy-Prese ving Partner Selection for Ride-Sharing Services. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 第 4 作者 通讯作者 67(7): 5994-6005, http://dx.doi.org/10.1109/TVT.2018.2809039.[32] 李凤华, 孙哲, 吕梦凡, 牛犇. 社交照片隐私保护机制研究进展. 信息安全学报[J]. 2018, 第 4 作者3(2): 41-61, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180204&flag=1.[33] Fenghua Li, Zhe Sun, Ben Niu, Yunchuan Guo, Ziwen Liu. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. 工程(英文)[J]. 2018, 第 3 作者4(1): 85-93, http://lib.cqvip.com/Qikan/Article/Detail?id=675171914.[34] He Yuanyuan, Ni Jianbing, Niu Ben, Li Fenghua, Shen Xuemin Sherman, IEEE. Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach. 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT). 2018, 第 11 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000434872700025.[35] Li Fenghua, Chen Yahong, Niu Ben, He Yuanyuan, Geng Kui, Cao Jin, IEEE. Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2018, 第 3 作者[36] Fenghua Li. Pricing Privacy Leakage in Location-Based Service. WASA. 2017, [37] Li, Fenghua, He, Yuanyuan, Niu, Ben, Li, Hui. Small-world: Secure friend matching over physical world and social networks. INFORMATION SCIENCES[J]. 2017, 第 3 作者 通讯作者 387: 205-220, http://dx.doi.org/10.1016/j.ins.2016.09.057.[38] Cao, Jin, Ma, Maude, Li, Hui, Fu, Yulong, Niu, Ben, Li, Fenghua, IEEE. Trajectory Prediction-based Handover Authentication Mechanism for Mobile Relays in LTE-A High-Speed Rail Networks. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2017, 第 5 作者[39] Zhang, En, Li, Fenghua, Niu, Ben, Wang, Yanchao. Server-aided private set intersection based on reputation. INFORMATION SCIENCES[J]. 2017, 第 3 作者387: 180-194, http://dx.doi.org/10.1016/j.ins.2016.09.056.[40] Li Fenghua, Liu Jiawen, Fang Liang, Niu Ben, Geng Kui, Li Hui, Ma L, Khreishah A, Zhang Y, Yan M. Pricing Privacy Leakage in Location-Based Services. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017. 2017, 第 4 作者10251: 406-418, [41] Fenghua Li. A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks. IEEE Wireless Communications and Network Conference. 2016, [42] Fenghua Li. Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information. International Conference on Computing, Networking and Communication. 2016, [43] 万盛, 李凤华, 牛犇, 孙哲, 李晖. 位置隐私保护技术研究进展. 通信学报[J]. 2016, 第 3 作者37(12): 124-141, http://lib.cqvip.com/Qikan/Article/Detail?id=670960534.[44] Ben Niu, Xiaoyan Zhu, Xiaosan Lei, Weidong Zhang, Hui Li. EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services. GLOBECOM 2013 - 2013 IEEE Global Communications Conference : Volume 3 of 6 Pages 1747-2621.. 2016, 第 1 作者2139-2144, [45] Yin, Lihua, Fang Liang, Niu, Ben, Fang Binxing, Li Fenghua. Hunting Abnormal Configurations for Permission-Sensitive Role Mining. IEEE Military Communications Conference. 2016, 第 3 作者[46] Ben Niu. Obfuscation-Based Privacy-Preserving Scheme for Location-Based Services. IEEE Wireless Communications and Network Conference. 2016, 第 1 作者 通讯作者 [47] Ben Niu, Xiaoyan Zhu, Jie Liu, Zan Li, Hui Li. Weight-Aware Private Matching Scheme for Proximity-based Mobile Social Networks. GLOBECOM 2013 - 2013 IEEE Global Communications Conference : Volume 4 of 6 Pages 2622-3492.. 2016, 第 1 作者3170-3175, [48] Fenghua Li. Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends’ Recommendation. International Conference on Computing, Networking and Communication. 2016, [49] Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, Hui Li. MobiCache: When k-anonymity Meets Cache. GLOBECOM 2013 - 2013 IEEE Global Communications Conference : Volume 1 of 6 Pages 1-871.. 2016, 第 3 作者820-825, [50] Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li. Achieving k-anonymity in Privacy-Aware Location-Based Services. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications : Volume 1 of 3 Pages 1-951.. 2016, 第 1 作者754-762, [51] Fenghua Li. Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage. INTERNATIONALCONFERENCEONCOMPUTINGNETWORKINGANDCOMMUNICATION. 2016, [52] 耿魁, 李凤华, 李维皓, 李晖, 牛犇, 谢绒娜. 基于代理的移动互联网隐私保护机制. 通信学报[J]. 2015, 第 5 作者36(11): 2015190-1, http://lib.cqvip.com/Qikan/Article/Detail?id=666750777.[53] Niu Ben, Li Qinghua, Zhu Xiaoyan, Cao Guohong, Li Hui, IEEE. Enhancing Privacy through Caching in Location-Based Services. 2015IEEECONFERENCEONCOMPUTERCOMMUNICATIONSINFOCOM. 2015, 第 1 作者[54] Fenghua Li. Achieving Secure Friend Discovery in Social Strength-Aware PMSNs. IEEE Military Communications Conference. 2015, [55] 李凤华, 张翠, 牛犇, 李晖, 华佳烽, 史国振. 高效的轨迹隐私保护方案. 通信学报[J]. 2015, 第 3 作者36(12): 114-123, http://lib.cqvip.com/Qikan/Article/Detail?id=667180876.[56] Fenghua Li. Privacy-Preserving Strategies in Service Quality Aware Location-Based Services. IEEE International Conference on Communications. 2015, [57] Niu, Ben, Zhu, Xiaoyan, Li, Qinghua, Chen, Jie, Li, Hui. A novel attack to spatial cloaking schemes in location-based services. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2015, 第 1 作者49: 125-132, http://dx.doi.org/10.1016/j.future.2014.10.026.[58] 万盛, 何媛媛, 李凤华, 牛犇, 李晖, 王新宇. 基于布隆过滤器的轻量级隐私信息匹配方案. 通信学报[J]. 2015, 第 4 作者36(12): 151-162, http://lib.cqvip.com/Qikan/Article/Detail?id=667180880.[59] Ben Niu. A Personalized Two-Tier Cloaking Scheme for Privacy-Aware Location-Based Services. International Conference on Computing, Networking and Communications. 2015, 第 1 作者[60] Ben Niu. Achieving Lightweight and Secure Access Control in Multi-Authority Cloud(Best Paper Award). IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2015, 第 1 作者[61] Niu, Ben, Zhu, Xiaoyan, Chi, Haotian, Li, Hui. Privacy and Authentication Protocol for Mobile RFID Systems. WIRELESS PERSONAL COMMUNICATIONS[J]. 2014, 第 1 作者 通讯作者 77(3): 1713-1731, https://www.webofscience.com/wos/woscc/full-record/WOS:000338335200006.[62] Ben Niu. Are You Really My Friend? Exactly Spatio-temporal Matching Scheme in Privacy-Aware Mobile Social Networks. EAI International Conference on Security and Privacy in Communication Networks. 2014, 第 1 作者[63] Niu Ben, Zhang Zhengyan, Li Xiaoqing, Li Hui, Jamalipour A, Deng DJ. Privacy-Area Aware Dummy Generation Algorithms for Location-Based Services. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2014, 第 1 作者957-962, [64] Ben Niu. An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs. IEEE International Conference on Mobile Ad hoc and Sensor Systems. 2014, 第 1 作者[65] Ben Niu. A Pseudo-Location Updating System for Privacy-Preserving Location-Based Services. China Communications. 2014, 第 1 作者[66] 李晖, 李凤华, 曹进, 牛犇, 孙文海, 耿魁. 移动互联服务与隐私保护的研究进展. 通信学报[J]. 2014, 第 4 作者35(11): 1-11, http://lib.cqvip.com/Qikan/Article/Detail?id=662973695.[67] Ben Niu. A Fine-grained Spatial Cloaking Scheme for Privacy-aware Users in Location-Based Services. IEEE International Conference on Computer Communication and Networks. 2014, 第 1 作者[68] Niu Ben, Zhu Xiaoyan, Chi Haotian, Li Hui, IEEE. 3PLUS: Privacy-Preserving Pseudo-Location Updating System in Location-Based Services. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2013, 第 1 作者4564-4569, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000326048104112.[69] Niu Ben, Zhu Xiaoyan, Li Hui, IEEE. An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2013, 第 1 作者1864-1869, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000326048101165.[70] Niu, Ben, Zhu, Xiaoyan, Zhang, Tanran, Chi, Haotian, Li, Hui, IEEE. P-match: Priority-aware Friend Discovery for Proximity-based Mobile Social Networks. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013). 2013, 第 1 作者351-355,