发表论文
[1] Wang, Haoyang, Fan, Kai, Chen, Hongyan, Chen, Qi, Zhang, Kuan, Li, Fenghua, Li, Hui, Yang, Yintang. Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 20(3): 2578-2592, http://dx.doi.org/10.1109/TDSC.2022.3186999.[2] 尹沛捷, 李凤华, 牛犇, 罗海洋, 邝彬, 张玲翠. 面向版式文档的细粒度隐私操作控制方法. 通信学报[J]. 2023, 44(5): 94-109, http://lib.cqvip.com/Qikan/Article/Detail?id=7109856334.[3] Yaobing Xu, Yunchuan Guo, Mingjie Yu, 李凤华, Shoukun Guo, Liang Fang. Recommending Orchestration Plan for Space-Ground Integration Information Network: A Subgraph Matching Approach. The 20th IEEE International Conference on Ubiquitous Intelligence and Computingnull. 2023, [4] Likun Zhang, Yahong Chen, Ang Li, Binghui Wang, Yiran Chen, 李凤华, Jin Cao. Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation. IEEE Winter Conference on Applications of Computer Visionnull. 2023, [5] Xiaogang Cao, Fenghua Li, Kui Geng, Yingke Xie, Wenlong Kou. On-Demand Allocation of Cryptographic Computing Resource with Load Prediction. International Conference on Information and Communications Securitynull. 2023, [6] Mengyao Shi, 王竹, Tingting Peng, Fenghua Li. Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. SecureCommnull. 2023, [7] Ben Niu, Jingwei Sun, Yahong Chen, Likun Zhang, Jin Cao, Kui Geng, 李凤华. Evaluating the Impact of Adversarial Factors on Membership Inference Attacks. The 20th IEEE International Conference on Ubiquitous Intelligence and Computingnull. 2023, [8] Yan, Haonan, Li, Xiaoguang, Li, Hui, Li, Jiamin, Sun, Wenhai, Li, Fenghua. Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2022, 19(4): 2680-2694, http://dx.doi.org/10.1109/TDSC.2021.3069258.[9] Chaoyang Li, Fenghua Li, Mingjie Yu, Yunchuan Guo, Yitong Wen, 李子孚. Insider Threat Detection Using Generative Adversarial Graph Attention Networks. IEEE Global Communications Conferencenull. 2022, 2680-2685, https://ieeexplore.ieee.org/document/10001207.[10] 李凤华, 李晖, 牛犇, 邱卫东. 隐私计算的学术内涵与研究趋势. 网络与信息安全学报. 2022, 8(6): 1-8, http://lib.cqvip.com/Qikan/Article/Detail?id=7108770516.[11] Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, 李凤华. DP-Opt: Identify High Differential Privacy Violation by Optimization. Wireless Algorithms, Systems, and Applicationsnull. 2022, 406-416, https://link.springer.com/chapter/10.1007/978-3-031-19214-2_34#citeas.[12] Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo. Detecting conflict of heterogeneous access control policies. 数字通信与网络:英文版. 2022, 8(5): 664-679, http://lib.cqvip.com/Qikan/Article/Detail?id=7108678235.[13] Fanfan Hao, Zhu Wang, Mengyao Shi, Tingting Peng, Liang Fang, Fenghua Li. Inferring Attack Path in Networks With Periodic Topology Changes. The 19th IEEE International Conference on Ubiquitous Intelligence and Computing(UIC 2022)null. 2022, [14] 李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川. 泛在网络环境下隐蔽通道关键技术研究综述. 通信学报[J]. 2022, 43(4): 186-201, [15] 王瀚仪, 李效光, 毕文卿, 陈亚虹, 李凤华, 牛犇. “多级本地化差分隐私算法推荐框架”. 通信学报[J]. 2022, 43(8): 52-64, https://d.wanfangdata.com.cn/periodical/txxb202208005.[16] Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo. Detecting conflict of heterogeneous access control policies. DIGITAL COMMUNICATIONS AND NETWORKS[J]. 2022, http://dx.doi.org/10.1016/j.dcan.2022.09.002.[17] Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, 李子孚. Efficiently Constructing Topology of Dynamic Networks. IEEE International Conference on Trust, Security and Privacy in Computing and Communicationsnull. 2022, 44-51, https://ieeexplore.ieee.org/document/10063610.[18] Minqiu Tian, 李子孚, Fenghua Li, Jin Cao, Chao Guo. A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. IEEE International Conference on Trust, Security and Privacy in Computing and Communicationsnull. 2022, https://ieeexplore.ieee.org/document/10063678.[19] Wei Jin, Kui Geng, Mingjie Yu, Yunchuan Guo, Fenghua Li. Efficiently Managing Large-Scale Keys in HDFS. IEEE International Conference on High Performance Computing and Communications (HPCC 2021,CCF-C)[J]. 2021, [20] 诸天逸, 李凤华, 成林, 郭云川. 跨域访问控制技术研究. 网络与信息安全学报[J]. 2021, 7(1): 20-27, http://lib.cqvip.com/Qikan/Article/Detail?id=7104107921.[21] Ben Niu, Yahong Chen, Fenghua Li. AdaPDP: Adaptive Personalized Differential Privacy. IEEE Conference on Computer Communications(IEEE INFOCOM,CCF-A)null. 2021, [22] Yunchuan Guo, Xiyang Sun, Mingjie Yu, Fenghua Li, Kui Geng, 李子孚. Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach. IEEE International Conference on Computational Sciencenull. 2021, [23] 张玲翠, 许瑶冰, 李凤华, 房梁, 郭云川, 李子孚. 天地一体化信息网络安全动态赋能架构. 通信学报[J]. 2021, 42(9): 87-95, http://lib.cqvip.com/Qikan/Article/Detail?id=7105636535.[24] 张玲翠, 李凤华, 房梁, 郭云川, 李子孚. 基于区间决策图的威胁处置策略快速匹配. 通信学报[J]. 2021, 13-22, [25] Niu, Ben, Chen, Yahong, Wang, Boyang, Cao, Jin, Li, Fenghua, IEEE. Utility-aware Exponential Mechanism for Personalized Differential Privacy. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2020, [26] 王竹, 贺坤, 王新宇, 牛犇, 李凤华. Android设备中基于流量特征的隐私泄露评估方案. 通信学报[J]. 2020, 41(2): 155-164, http://lib.cqvip.com/Qikan/Article/Detail?id=7100926557.[27] Li, Fenghua, Yin, Peijie, Chen, Yahong, Niu, Ben, Li, Hui. Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE WIRELESS COMMUNICATIONS[J]. 2020, 27(3): 31-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000542963900007.[28] Fenghua Li, 李子孚, Liang Fang, Yongjun Li, Yaobing Xu, Yunchuan Guo. Securing instruction interaction for hierarchical management. Journal of Parallel and Distributed Computing[J]. 2020, 137: 91-103, [29] Yunchuan Guo, Han Zhang, 李子孚, Fenghua Li, Liang Fang, Lihua Yin, Jin Cao. Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?. IEEE International Conference on Communicationsnull. 2020, [30] Fenghua Li. A Framework to Preserve User Privacy for Machine Learning as a Service. IEEE Global Communications Conference. 2020, [31] 李凤华, 郭云川, 耿魁, 房梁, 李晖. 天地一体化信息网络安全动态赋能研究. 无线电通信技术[J]. 2020, 46(5): 561-570, [32] Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li. Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 2020: https://doaj.org/article/5dcd59e306d644d9822174e3584eb0ae.[33] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua. Exploiting location-related behaviors without the GPS data on smartphones. INFORMATION SCIENCES[J]. 2020, 527: 444-459, http://dx.doi.org/10.1016/j.ins.2019.05.052.[34] 李凤华, 张林杰, 陆月明, 耿魁, 郭云川. 天地网络安全保障技术研究. 天地一体化信息网络[J]. 2020, 1(1): 9-, http://lib.cqvip.com/Qikan/Article/Detail?id=7103338335.[35] 李凤华, 李晖. 新形势下理工门类学科建设内涵与学科评估导向. 网络与信息安全学报[J]. 2020, 6(1): 1-10, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=WXAQ202001001&v=MDk2NDRSN3FlWnVkdkZ5N2tWN3pJTWpYS2Y3RzRITkhNcm85RlpZUjhlWDFMdXhZUzdEaDFUM3FUcldNMUZyQ1U=.[36] Li, Fenghua, Li, Yongjun, Leng, Siyuan, Guo, Yunchuan, Geng, Kui, Wang, Zhen, Fang, Liang. Dynamic countermeasures selection for multi-path attacks. COMPUTERS & SECURITY[J]. 2020, 97: [37] Li Fenghua, Sun Zhe, Niu Ben, Cao Jin, Li Hui, IEEE. An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC)null. 2019, 390-394, [38] 李凤华, 李丁焱, 金伟, 王竹, 郭云川, 耿魁. 面向海量电子凭据的分层可扩展存储架构. 通信学报[J]. 2019, 40(5): 2019104-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001759.[39] Li Fenghua, Sun Zhe, Li Ang, Niu Ben, Li Hui, Cao Guohong, IEEE. HideMe: Privacy-Preserving Photo Sharing on Social Networks. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019)null. 2019, 154-162, [40] Guo, Yunchuan, Zhang, Han, Zhang, Lingcui, Fang, Liang, Li, Fenghua. A Game Theoretic Approach to Cooperative Intrusion Detection. JOURNAL OF COMPUTATIONAL SCIENCE[J]. 2019, 30: 118-126, [41] Fenghua Li, Hui Li, Ben Niu, Jinjun Chen. Privacy Computing: Concept, Computing Framework, and Future Development Trends. ENGINEERING[J]. 2019, 1179-1192, http://dx.doi.org/10.1016/j.eng.2019.09.002.[42] 李凤华, 李子孚, 李凌, 张铭, 耿魁, 郭云川. 复杂网络环境下面向威胁监测的采集策略精化方法. 通信学报[J]. 2019, 40(4): 49-61, http://lib.cqvip.com/Qikan/Article/Detail?id=7001754891.[43] 王新宇, 牛犇, 李凤华, 贺坤. APP隐私泄露风险评估与保护方案. 通信学报[J]. 2019, 40(5): 2019085-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001752.[44] 王震, 段晨健, 吴铤, 郭云川, 王竹, 李凤华. 基于Stackelberg攻防博弈的网络系统安全控制机制优化研究. 信息安全学报[J]. 2019, 101-115, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849574849484857.[45] 金伟, 余铭洁, 李凤华, 杨正坤, 耿魁. 支持高并发的Hadoop高性能加密方法研究. 通信学报[J]. 2019, 40(12): 29-40, http://lib.cqvip.com/Qikan/Article/Detail?id=7100688843.[46] Li, Fenghua, Li, Hui, Niu, Ben, Chen, Jinjun. Privacy Computing: Concept, Computing Framework, and Future Development Trends. ENGINEERING[J]. 2019, 5(6): 1179-1192, http://lib.cqvip.com/Qikan/Article/Detail?id=7101038540.[47] Fenghua Li, 李子孚, Weili Han, Ting Wu, Lihua Chen, Yunchuan Guo, Jinjun Chen. Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies. IEEE Internet of Things Journal[J]. 2019, 6(2): 1471-1483, https://www.webofscience.com/wos/woscc/full-record/WOS:000467564700021.[48] Yu, Pu, Cao, Jin, Ma, Maode, Li, Hui, Niu, Ben, Li, Fenghua, IEEE. Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2019, [49] Guo, Yunchuan, Wang, Xiao, Fang, Liang, Li, Yongjun, Li, Fenghua, Geng, Kui. Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach. International Conference on Computational Sciencenull. 2019, 11536: 590-603, [50] 李凤华, 李勇俊, 杨正坤, 张晗, 张玲翠. 不完全信息下的威胁处置效果模糊评估. 通信学报[J]. 2019, 40(4): 117-127, http://lib.cqvip.com/Qikan/Article/Detail?id=7001754897.[51] Yin, Lihua, Sun, Yanwei, Wang, Zhen, Guo, Yunchuan, Li, Fenghua, Fang, Binxing. Security Measurement for Unknown Threats Based on Attack Preferences. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://doaj.org/article/4ceb1a0ad9214e5f9fe1ba379a601e1f.[52] Yin, Lihua, Guo, Yunchuan, Li, Fenghua, Sun, Yanwei, Qian, Junyan, Vasilakos, Athanasios. A game-theoretic approach to advertisement dissemination in ephemeral networks. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2018, 21(2): 241-260, https://www.webofscience.com/wos/woscc/full-record/WOS:000425319200001.[53] Fenghua Li, Zhe Sun, Ben Niu, Yunchuan Guo, Ziwen Liu. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. 工程(英文)[J]. 2018, 4(1): 85-93, http://lib.cqvip.com/Qikan/Article/Detail?id=675171914.[54] Cao, Jin, Li, Hui, Ma, Maode, Li, Fenghua. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://doaj.org/article/e09e2b8cff7d45acbc78e05cb47ef42c.[55] He Yuanyuan, Ni Jianbing, Niu Ben, Li Fenghua, Shen Xuemin Sherman, IEEE. Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach. 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT)null. 2018, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000434872700025.[56] Fenghua Li. 2-MR: A Two-Phase MapReduce Approach for Incremental Replication. International Conference on Big data Technologies (ICBDT 2018). 2018, [57] Li Fenghua, Chen Yahong, Niu Ben, He Yuanyuan, Geng Kui, Cao Jin, IEEE. Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)null. 2018, [58] Liang, Jiao, Han, Weili, Guo, Zeqing, Chen, Yaoliang, Cao, Chang, Wang, Xiaoyang Sean, Li, Fenghua. DESC: enabling secure data exchange based on smart contracts. SCIENCE CHINA-INFORMATION SCIENCES. 2018, 61(4): http://lib.cqvip.com/Qikan/Article/Detail?id=675013659.[59] Fenghua Li. Privacy-preserving Partner Selection for Ride-sharing Services. IEEE Transactions on Vehicular Technology. 2018, [60] Fang Liang, Yin Lihua, Guo Yunchuan, Wang Zhen, Li Fenghua, IEEE. Resolving Access Conflicts: an Auction-based Incentive Approach. IEEE Military Communications Conferencenull. 2018, 52-57, [61] 李凤华, 陈天柱, 王震, 张林杰, 史国振, 郭云川. 复杂网络环境下跨网访问控制机制. 通信学报[J]. 2018, 39(2): 1-10, http://lib.cqvip.com/Qikan/Article/Detail?id=674606816.[62] Guo Yunchuan, Fang Liang, Geng Kui, Yin Lihua, Li Fenghua, Chen Lihua, IEEE. Real-time Data Incentives for IoT Searches. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2018, [63] Li Fenghua, Li Yongjun, Yang Zhengkun, Guo Yunchuan, Yin Lihua, Wang Zhen, IEEE. Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN)null. 2018, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000450116600099.[64] Guo, Yunchuan, Zhang, Han, Zhang, Lingcui, Fang, Liang, Li, Fenghua, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach. COMPUTATIONAL SCIENCE - ICCS 2018, PT Inull. 2018, 10860: 83-97, [65] Wang, Fengwei, Zhu, Hui, Liu, Ximeng, Lu, Rongxing, Li, Fenghua, Li, Hui, Zhang, Songnian. Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 67(11): 11084-11097, [66] 李凤华, 孙哲, 吕梦凡, 牛犇. 社交照片隐私保护机制研究进展. 信息安全学报[J]. 2018, 3(2): 41-61, http://lib.cqvip.com/Qikan/Article/Detail?id=675016901.[67] Li, Fenghua, Sun, Zhe, Niu, Ben, Guo, Yunchuan, Liu, Ziwen. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. ENGINEERING[J]. 2018, 4(1): 85-93, http://lib.cqvip.com/Qikan/Article/Detail?id=675171914.[68] He, Yuanyuan, Ni, Jianbing, Wang, Xinyu, Niu, Ben, Li, Fenghua, Shen, Xuemin. Privacy-Prese ving Partner Selection for Ride-Sharing Services. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 67(7): 5994-6005, http://dx.doi.org/10.1109/TVT.2018.2809039.[69] 张恩, 耿魁, 金伟, 李勇俊, 孙韵清, 李凤华. 抗隐蔽敌手的云外包秘密共享方案. 通信学报[J]. 2017, 38(5): 57-65, http://lib.cqvip.com/Qikan/Article/Detail?id=672290837.[70] Li Jing, Yin Lihua, Guo Yunchuan, Li Chao, Li Fenghua, Chen Lihua, Yan Z, Molva R, Mazurczyk W, Kantola R. A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NETWORK AND SYSTEM SECURITYnull. 2017, 10394: 486-496, [71] He, Yuanyuan, Zhang, Kuan, Wang, Hanyi, Li, Fenghua, Niu, Ben, Li, Hui, IEEE. Impact Factor-Based Group Recommendation Scheme with Privacy Preservation in MSNs. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2017, [72] Fenghua Li. Pricing Privacy Leakage in Location-Based Service. WASA. 2017, [73] Li, Fenghua, He, Yuanyuan, Niu, Ben, Li, Hui. Small-world: Secure friend matching over physical world and social networks. INFORMATION SCIENCES[J]. 2017, 387: 205-220, http://dx.doi.org/10.1016/j.ins.2016.09.057.[74] Sun, Yanwei, Yin, Lihua, Guo, Yunchuan, Li, Fenghua, Fang, Binxing, Ibrahim, S, Choo, KKR, Yan, Z, Pedrycz, W. Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017null. 2017, 10393: 313-327, [75] Fang, Liang, Yin, Lihua, Zhang, Qiaoduo, Li, Fenghua, Fang, Binxing, IEEE. Who is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [76] Li, Fenghua, Li, Zifu, Han, Weili, Wu, Ting, Chen, Lihua, Guo, Yunchuan, IEEE. Cyberspace-Oriented Access Control: Model and Policies. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC)null. 2017, 261-266, http://dx.doi.org/10.1109/DSC.2017.100.[77] Fenghua Li. SRAM: A State-Aware Risk Assessment Model for Intrusion Response. IEEE International Conference on Data Science in Cyberspace(DSC). 2017, [78] Fenghua Li. A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. International Conference on Cryptography, Security and Privacy. 2017, [79] Fenghua Li. Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. IEEE International Symposium on UbiSafe Computing(UbiSafe). 2017, [80] Zhang, En, Li, Fenghua, Niu, Ben, Wang, Yanchao. Server-aided private set intersection based on reputation. INFORMATION SCIENCES[J]. 2017, 387: 180-194, http://dx.doi.org/10.1016/j.ins.2016.09.056.[81] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua, IEEE. TrackU: Exploiting User's Mobility Behavior via WiFi List. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [82] 房梁, 殷丽华, 李凤华, 方滨兴. 基于谱聚类的访问控制异常权限配置挖掘机制. 通信学报[J]. 2017, 38(12): 63-72, [83] Li Fenghua, Liu Jiawen, Fang Liang, Niu Ben, Geng Kui, Li Hui, Ma L, Khreishah A, Zhang Y, Yan M. Pricing Privacy Leakage in Location-Based Services. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 406-418, [84] Fenghua Li. A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks. IEEE Wireless Communications and Network Conference. 2016, [85] Fenghua Li. Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information. International Conference on Computing, Networking and Communication. 2016, [86] 李凤华, 殷丽华, 吴巍, 张林杰, 史国振. 天地一体化信息网络安全保障技术研究进展及发展趋势. 通信学报[J]. 2016, 37(11): 156-168, http://lib.cqvip.com/Qikan/Article/Detail?id=670575717.[87] He, Yuanyuan, Li, Fenghua, Niu, Ben, Hua, Jiafeng, IEEE. Achieving Secure and Accurate Friend Discovery Based on Friend-of-Friend's Recommendations. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2016, 730-735, [88] Yin, Lihua, Fang Liang, Niu, Ben, Fang Binxing, Li Fenghua. Hunting Abnormal Configurations for Permission-Sensitive Role Mining. IEEE Military Communications Conferencenull. 2016, [89] 熊金波, 张媛媛, 李凤华, 李素萍, 任君, 姚志强. 云环境中数据安全去重研究进展. 通信学报[J]. 2016, 37(11): 169-180, http://lib.cqvip.com/Qikan/Article/Detail?id=670575718.[90] 李凤华, 李晖, 贾焰, 俞能海, 翁健. 隐私计算研究范畴及发展趋势. 通信学报[J]. 2016, 37(4): 2016078-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668597024.[91] Fenghua Li. Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends’ Recommendation. International Conference on Computing, Networking and Communication. 2016, [92] 李凤华, 王彦超, 殷丽华, 谢绒娜, 熊金波. 面向网络空间的访问控制模型. 通信学报[J]. 2016, 37(5): 2016109-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668940578.[93] Fenghua Li. Time Obfucation-Based Privacy-Preserving Scheme for Location-Based Services. IEEE Wireless Communications and Networking Conference(WCNC 2016). 2016, [94] Li, Fenghua, Wang, Yanchao, Xiong, Jinbo, Xie, Rongna, IEEE. Role and Time-based Access Control with Efficient Revocation for Cloud Storage. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016)null. 2016, 284-289, http://dx.doi.org/10.1109/DSC.2016.118.[95] 熊金波, 李凤华, 王彦超, 马建峰, 姚志强. 基于密码学的云数据确定性删除研究进展. 通信学报[J]. 2016, 37(8): 167-184, http://lib.cqvip.com/Qikan/Article/Detail?id=669887487.[96] Chen, Lingjiang, Zhou, Shuguang, Zhang, Qiaoduo, Li, Fenghua, Ma, M, Arrasmith, W, Li, P. An IPv6 Routing Lookup Algorithm Using Weight-balanced Tree based on Prefix Value for Virtual Router. FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONSnull. 2016, 9902: http://dx.doi.org/10.1117/12.2262546.[97] Liu, Yangxin, Zhang, Lingcui, Zhou, Shuguang, Li, Fenghua, Ma, M, Arrasmith, W, Li, P. A Network Monitor for HTTPS Protocol based on Proxy. FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONSnull. 2016, 9902: [98] Fenghua Li. Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage. INTERNATIONALCONFERENCEONCOMPUTINGNETWORKINGANDCOMMUNICATION. 2016, [99] 耿魁, 李凤华, 李维皓, 李晖, 牛犇, 谢绒娜. 基于代理的移动互联网隐私保护机制. 通信学报[J]. 2015, 36(11): 2015190-1, http://lib.cqvip.com/Qikan/Article/Detail?id=666750777.[100] 李凤华, 张翠, 牛犇, 李晖, 华佳烽, 史国振. 高效的轨迹隐私保护方案. 通信学报[J]. 2015, 36(12): 114-123, http://lib.cqvip.com/Qikan/Article/Detail?id=667180876.[101] 李昊星, 李凤华, 宋承根, 苏铓, 刘歆. 支持多关键字的可搜索公钥加密方案. 西安电子科技大学学报[J]. 2015, 42(5): 20-25, http://lib.cqvip.com/Qikan/Article/Detail?id=666355190.[102] Fenghua Li. Achieving Secure Friend Discovery in Social Strength-Aware PMSNs. IEEE Military Communications Conference. 2015, [103] Fenghua Li. UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks. Proceedings of the IEEE International Conference on Communications(ICC 2015). 2015, [104] Fenghua Li. Privacy-Preserving Strategies in Service Quality Aware Location-Based Services. IEEE International Conference on Communications. 2015, [105] Li, Haoxing, Li, Fenghua, Song, Chenggen, Yan, Yalong. Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS[J]. 2015, 9(7): 2719-2735, https://www.webofscience.com/wos/woscc/full-record/WOS:000358997000022.[106] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen. A full lifecycle privacy protection scheme for sensitive data in cloud computing. PEE. 2015, 8(6): http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=SSJD8CB50FA7F21B72501F314F5A031564E6&DbName=SSJDLAST&DbCode=SSJD&yx=&pr=&URLID=&bsm=.[107] 单芳芳, 李凤华, 谢绒娜, 熊金波, 王彦超. 面向多维数字媒体的访问控制机制. 通信学报[J]. 2015, 36(11): 2015201-1, http://lib.cqvip.com/Qikan/Article/Detail?id=666750780.[108] Wang Yanchao, Li Fenghua, Xiong Jinbo, Niu Ben, Shan Fangfang, IEEE. Achieving Lightweight and Secure Access Control in Multi-Authority Cloud. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1null. 2015, 459-466, http://dx.doi.org/10.1109/Trustcom.2015.407.[109] 万盛, 何媛媛, 李凤华, 牛犇, 李晖, 王新宇. 基于布隆过滤器的轻量级隐私信息匹配方案. 通信学报[J]. 2015, 36(12): 151-162, http://lib.cqvip.com/Qikan/Article/Detail?id=667180880.[110] Ma Zhuo, Li Fenghua, Ma Jianfeng, Ji Wenjiang. CL-TAP: An Efficient Certificate less Based Trusted Access Protocol for WLAN. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 23(1): 142-146, https://www.webofscience.com/wos/woscc/full-record/WOS:000330089800026.[111] Shi Guozhen, Su Mang, Li Fenghua, Lou Jiapeng, Huang Qiong, IEEE. A User-based Document Management Mechanism in Cloud. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS)null. 2014, 377-381, http://dx.doi.org/10.1109/CIS.2014.60.[112] 熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙, 李琦. 基于属性加密的组合文档安全自毁方案. 电子学报[J]. 2014, 42(2): 366-376, http://lib.cqvip.com/Qikan/Article/Detail?id=49029420.[113] 熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙. 面向网络内容隐私的基于身份加密的安全自毁方案. 计算机学报[J]. 2014, 37(1): 139-150, http://lib.cqvip.com/Qikan/Article/Detail?id=48544439.[114] Fenghua Li. A Reliable Supervision Model and Implementation for the Trading of Digital Works. 2014, [115] 孙文海, 李凤华, 王博洋, 李晖. 公共云存储服务数据安全及隐私保护技术综述. 计算机研究与发展[J]. 2014, 51(7): 1397-1409, http://lib.cqvip.com/Qikan/Article/Detail?id=50300259.[116] 李凤华. 一种抗隐蔽通道的网络隔离通信方案. 通信学报. 2014, [117] Mang Su, Fenghua Li, Zhi Tang, Yinyan Yu, Bo Zhou. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application. THE SCIENTIFIC WORLD JOURNAL[J]. 2014, 2014: https://doaj.org/article/f01fc45f05ea47569446b964c5aab829.[118] 苏铓, 李凤华, 史国振. 基于行为的多级访问控制模型. 计算机研究与发展[J]. 2014, 51(7): 1604-1613, http://lib.cqvip.com/Qikan/Article/Detail?id=50300280.[119] 李凤华, 谈苗苗, 樊凯, 耿魁, 赵甫. 抗隐蔽通道的网络隔离通信方案. 通信学报[J]. 2014, 35(11): 96-106, http://lib.cqvip.com/Qikan/Article/Detail?id=662973705.[120] 李晖, 李凤华, 曹进, 牛犇, 孙文海, 耿魁. 移动互联服务与隐私保护的研究进展. 通信学报[J]. 2014, 35(11): 1-11, http://lib.cqvip.com/Qikan/Article/Detail?id=662973695.[121] Fenghua Li. FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. 2013, [122] 熊金波, 姚志强, 马建峰, 李凤华, 李琦. 基于行为的结构化文档多级访问控制. 计算机研究与发展[J]. 2013, 50(7): 1399-1408, http://lib.cqvip.com/Qikan/Article/Detail?id=46273757.[123] Cao, Y, Zhao, X, Li, F, Yu, N, Alattar, AM, Memon, ND, Heitzenrater, CD. Video Steganography with Multi-path Motion Estimation. MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013null. 2013, 8665: [124] Fenghua Li. An improved attack on clock-controlled shift register based on hardware implementation. SCIENCE CHINA-INFORMATION SCIENCES. 2013, [125] Ma, Kede, Zhang, Weiming, Zhao, Xianfeng, Yu, Nenghai, Li, Fenghua. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2013, 8(3): 553-562, https://www.webofscience.com/wos/woscc/full-record/WOS:000318597400012.[126] Li Fenghua, Shi Guozhen, Zhang Jinghui, Li Li. An Action-based Access Control Model Implementation for MLS Information Systems. 2012, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=JKDZ201207001274&DbName=CPFD0914&DbCode=CPFD&yx=&pr=&URLID=&bsm=.[127] Shi Guozhen, Li Fenghua, Li Li, Shi Hanzhang. General Purpose Framework Designing for Network Security Test Devices Based on Multi-core Processor. 2012, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=JKDZ201207001044&DbName=CPFD0914&DbCode=CPFD&yx=&pr=&URLID=&bsm=.[128] Su, Mang, Li, Fenghua, Shi, Guozhen, Li, Li. An Action Based Access Control Model for Multi-level Security. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS[J]. 2012, 6(2): 359-366, [129] 欧庆于, 张焕国, 吴晓平, 李凤华, 罗芳. 基于亚稳态的QDI逻辑随机路径切换方法研究. 电子学报[J]. 2012, 40(10): 1996-2001, http://lib.cqvip.com/Qikan/Article/Detail?id=44147898.[130] Fenghua Li. Action Based Access Control Model for Multi-level Security (MLS). In Proceedings of the 2012 International Conference on Information Security and Assurance (ISA 2012). 2012,