发表论文
[1] Niu, Ben, Chen, Yahong, Wang, Zhibo, li, Fenghua, Wang, Boyang, Li, Hui. Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2022, 21(1): 125-138, [2] Siyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, Fenghua Li. DICOF:A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection. 27th IEEE Symposium on Computers and Communicationsnull. 2022, [3] 李凤华, 李超洋, 郭超, 李子孚, 房梁, 郭云川. 泛在网络环境下隐蔽通道关键技术研究综述. 通信学报[J]. 2022, 43(4): 186-201, http://lib.cqvip.com/Qikan/Article/Detail?id=7107065827.[4] Niu, Ben, Li, Qinghua, Wang, Hanyi, Cao, Guohong, Li, Fenghua, Li, Hui. A Framework for Personalized Location Privacy. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2022, 21(9): 3071-3083, [5] Chen, Lili, Wang, Zhen, Wu, Jintao, Guo, Yunchuan, Li, Fenghua, Li, Zifu. Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE. 2022, http://dx.doi.org/10.1002/cpe.6944.[6] Mingjie Yu, Fenghua Li, Nenghai Yu, Xiao Wang, Yunchuan Guo. Detecting conflict of heterogeneous access control policies. Digital Communications and Networks[J]. 2022, http://dx.doi.org/10.1016/j.dcan.2022.09.002.[7] Fenghua Li. Efficiently Managing Large-Scale Keys in HDFS. IEEE International Conference on High Performance Computing and Communications (HPCC 2021,CCF-C). 2021, [8] Ben Niu, Yahong Chen, Fenghua Li. AdaPDP: Adaptive Personalized Differential Privacy. IEEE Conference on Computer Communications(IEEE INFOCOM,CCF-A)null. 2021, [9] 诸天逸, 李凤华, 成林, 郭云川. 跨域访问控制技术研究. 网络与信息安全学报[J]. 2021, 7(1): 20-27, http://lib.cqvip.com/Qikan/Article/Detail?id=7104107921.[10] Fenghua Li. Resolving Policy Conflicts for Cross-Domain Access Control: A Double Auction Approach. Proceedings of ICCS. 2021, [11] 张玲翠, 许瑶冰, 李凤华, 房梁, 郭云川, 李子孚. 天地一体化信息网络安全动态赋能架构. 通信学报[J]. 2021, 42(9): 87-95, http://lib.cqvip.com/Qikan/Article/Detail?id=7105636535.[12] Niu, Ben, Chen, Yahong, Wang, Boyang, Cao, Jin, Li, Fenghua, IEEE. Utility-aware Exponential Mechanism for Personalized Differential Privacy. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2020, [13] 王竹, 贺坤, 王新宇, 牛犇, 李凤华. Android设备中基于流量特征的隐私泄露评估方案. 通信学报[J]. 2020, 41(2): 155-164, http://lib.cqvip.com/Qikan/Article/Detail?id=7100926557.[14] Li, Fenghua, Li, Zifu, Fang, Liang, Li, Yongjun, Xu, Yaobing, Guo, Yunchuan. Securing instruction interaction for hierarchical management. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING[J]. 2020, 137: 91-103, http://dx.doi.org/10.1016/j.jpdc.2019.10.010.[15] Li, Fenghua, Yin, Peijie, Chen, Yahong, Niu, Ben, Li, Hui. Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs. IEEE WIRELESS COMMUNICATIONS[J]. 2020, 27(3): 31-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000542963900007.[16] Guo, Yunchuan, Zhang, Han, Li, Zifu, Li, Fenghua, Fang, Liang, Yin, Lihua, Cao, Jin, IEEE. Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2020, [17] Fenghua Li. A Framework to Preserve User Privacy for Machine Learning as a Service. IEEE Global Communications Conference. 2020, [18] 李凤华, 郭云川, 耿魁, 房梁, 李晖. 天地一体化信息网络安全动态赋能研究. 无线电通信技术[J]. 2020, 46(5): 561-570, http://lib.cqvip.com/Qikan/Article/Detail?id=7102735098.[19] Hanyi Wang, Kun He, Ben Niu, Lihua Yin, Fenghua Li. Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. WIRELESS COMMUNICATIONS & MOBILE COMPUTING[J]. 2020, 2020: https://doaj.org/article/5dcd59e306d644d9822174e3584eb0ae.[20] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua. Exploiting location-related behaviors without the GPS data on smartphones. INFORMATION SCIENCES[J]. 2020, 527: 444-459, http://dx.doi.org/10.1016/j.ins.2019.05.052.[21] 李凤华, 张林杰, 陆月明, 耿魁, 郭云川. 天地网络安全保障技术研究. 天地一体化信息网络[J]. 2020, 1(1): 9-, http://lib.cqvip.com/Qikan/Article/Detail?id=7103338335.[22] 李凤华, 李晖. 新形势下理工门类学科建设内涵与学科评估导向. 网络与信息安全学报[J]. 2020, 6(1): 1-10, http://lib.cqvip.com/Qikan/Article/Detail?id=7101279056.[23] Li, Fenghua, Li, Yongjun, Leng, Siyuan, Guo, Yunchuan, Geng, Kui, Wang, Zhen, Fang, Liang. Dynamic countermeasures selection for multi-path attacks. COMPUTERS & SECURITY[J]. 2020, 97: http://dx.doi.org/10.1016/j.cose.2020.101927.[24] Li Fenghua, Sun Zhe, Niu Ben, Cao Jin, Li Hui, IEEE. An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. 2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC)null. 2019, 390-394, [25] Li Fenghua, Sun Zhe, Li Ang, Niu Ben, Li Hui, Cao Guohong, IEEE. HideMe: Privacy-Preserving Photo Sharing on Social Networks. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019)null. 2019, 154-162, [26] 李凤华, 李丁焱, 金伟, 王竹, 郭云川, 耿魁. 面向海量电子凭据的分层可扩展存储架构. 通信学报[J]. 2019, 40(5): 2019104-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001759.[27] Fenghua Li, Hui Li, Ben Niu, Jinjun Chen. Privacy Computing: Concept, Computing Framework, and Future Development Trends. Engineering[J]. 2019, 1179-1192, http://dx.doi.org/10.1016/j.eng.2019.09.002.[28] Guo, Yunchuan, Zhang, Han, Zhang, Lingcui, Fang, Liang, Li, Fenghua. A game theoretic approach to cooperative intrusion detection. JOURNAL OF COMPUTATIONAL SCIENCE[J]. 2019, 30: 118-126, http://dx.doi.org/10.1016/j.jocs.2018.11.003.[29] 李凤华, 李子孚, 李凌, 张铭, 耿魁, 郭云川. 复杂网络环境下面向威胁监测的采集策略精化方法. 通信学报[J]. 2019, 40(4): 49-61, http://lib.cqvip.com/Qikan/Article/Detail?id=7001754891.[30] 王新宇, 牛犇, 李凤华, 贺坤. APP隐私泄露风险评估与保护方案. 通信学报[J]. 2019, 40(5): 2019085-1, http://lib.cqvip.com/Qikan/Article/Detail?id=7002001752.[31] 王竹, 段晨健, 吴铤, 郭云川, 王竹, 李凤华. 基于Stackelberg攻防博弈的网络系统安全控制机制优化研究. 信息安全学报[J]. 2019, 101-115, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849574849484857.[32] Li, Fenghua, Li, Hui, Niu, Ben, Chen, Jinjun. Privacy Computing: Concept, Computing Framework, and Future Development Trends. ENGINEERING[J]. 2019, 5(6): 1179-1192, http://lib.cqvip.com/Qikan/Article/Detail?id=7101038540.[33] 金伟, 余铭洁, 李凤华, 杨正坤, 耿魁. 支持高并发的Hadoop高性能加密方法研究. 通信学报[J]. 2019, 40(12): 29-40, http://lib.cqvip.com/Qikan/Article/Detail?id=7100688843.[34] Li, Fenghua, Li, Zifu, Han, Weili, Wu, Ting, Chen, Lihua, Guo, Yunchuan, Chen, Jinjun. Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies. IEEE INTERNET OF THINGS JOURNAL[J]. 2019, 6(2): 1471-1483, https://www.webofscience.com/wos/woscc/full-record/WOS:000467564700021.[35] Yu, Pu, Cao, Jin, Ma, Maode, Li, Hui, Niu, Ben, Li, Fenghua, IEEE. Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2019, [36] Guo, Yunchuan, Wang, Xiao, Fang, Liang, Li, Yongjun, Li, Fenghua, Geng, Kui. Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach. COMPUTATIONAL SCIENCE - ICCS 2019, PT I[J]. 2019, 11536: 590-603, [37] 李凤华, 李勇俊, 杨正坤, 张晗, 张玲翠. 不完全信息下的威胁处置效果模糊评估. 通信学报[J]. 2019, 40(4): 117-127, http://lib.cqvip.com/Qikan/Article/Detail?id=7001754897.[38] Guo, Yunchuan, Zhang, Han, Zhang, Lingcui, Fang, Liang, Li, Fenghua, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach. COMPUTATIONAL SCIENCE - ICCS 2018, PT Inull. 2018, 10860: 83-97, [39] Li Fenghua, Li Yongjun, Yang Zhengkun, Guo Yunchuan, Yin Lihua, Wang Zhen, IEEE. Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN)null. 2018, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000450116600099.[40] Li, Fenghua, Sun, Zhe, Niu, Ben, Guo, Yunchuan, Liu, Ziwen. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. ENGINEERING[J]. 2018, 4(1): 85-93, http://lib.cqvip.com/Qikan/Article/Detail?id=675171914.[41] He, Yuanyuan, Ni, Jianbing, Wang, Xinyu, Niu, Ben, Li, Fenghua, Shen, Xuemin. Privacy-Prese ving Partner Selection for Ride-Sharing Services. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY[J]. 2018, 67(7): 5994-6005, https://www.webofscience.com/wos/woscc/full-record/WOS:000438907600036.[42] 李凤华, 孙哲, 吕梦凡, 牛犇. 社交照片隐私保护机制研究进展. 信息安全学报[J]. 2018, 3(2): 41-61, http://lib.cqvip.com/Qikan/Article/Detail?id=675016901.[43] Yin, Lihua, Sun, Yanwei, Wang, Zhen, Guo, Yunchuan, Li, Fenghua, Fang, Binxing. Security Measurement for Unknown Threats Based on Attack Preferences. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://doaj.org/article/4ceb1a0ad9214e5f9fe1ba379a601e1f.[44] Yin, Lihua, Guo, Yunchuan, Li, Fenghua, Sun, Yanwei, Qian, Junyan, Vasilakos, Athanasios. A game-theoretic approach to advertisement dissemination in ephemeral networks. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2018, 21(2): 241-260, https://www.webofscience.com/wos/woscc/full-record/WOS:000425319200001.[45] Fenghua Li, Zhe Sun, Ben Niu, Yunchuan Guo, Ziwen Liu. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users. 工程(英文)[J]. 2018, 4(1): 85-93, http://lib.cqvip.com/Qikan/Article/Detail?id=675171914.[46] Cao, Jin, Li, Hui, Ma, Maode, Li, Fenghua. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://doaj.org/article/e09e2b8cff7d45acbc78e05cb47ef42c.[47] He Yuanyuan, Ni Jianbing, Niu Ben, Li Fenghua, Shen Xuemin Sherman, IEEE. Privacy-preserving Ride Clustering for Customized-bus Sharing: A Fog-assisted Approach. 2018 16TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT)null. 2018, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000434872700025.[48] Fenghua Li. 2-MR: A Two-Phase MapReduce Approach for Incremental Replication. International Conference on Big data Technologies (ICBDT 2018). 2018, [49] Li Fenghua, Chen Yahong, Niu Ben, He Yuanyuan, Geng Kui, Cao Jin, IEEE. Achieving Personalized k-anonymity against Long-term Observation in Location-Based Services. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)null. 2018, [50] Liang, Jiao, Han, Weili, Guo, Zeqing, Chen, Yaoliang, Cao, Chang, Wang, Xiaoyang Sean, Li, Fenghua. DESC: enabling secure data exchange based on smart contracts. SCIENCE CHINA-INFORMATION SCIENCES. 2018, 61(4): http://lib.cqvip.com/Qikan/Article/Detail?id=675013659.[51] Fenghua Li. Privacy-preserving Partner Selection for Ride-sharing Services. IEEE Transactions on Vehicular Technology. 2018, [52] 李凤华, 陈天柱, 王震, 张林杰, 史国振, 郭云川. 复杂网络环境下跨网访问控制机制. 通信学报[J]. 2018, 39(2): 1-10, http://lib.cqvip.com/Qikan/Article/Detail?id=674606816.[53] Fang Liang, Yin Lihua, Guo Yunchuan, Wang Zhen, Li Fenghua, IEEE. Resolving Access Conflicts: an Auction-based Incentive Approach. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018)[J]. 2018, 52-57, [54] Guo Yunchuan, Fang Liang, Geng Kui, Yin Lihua, Li Fenghua, Chen Lihua, IEEE. Real-time Data Incentives for IoT Searches. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2018, [55] 张恩, 耿魁, 金伟, 李勇俊, 孙韵清, 李凤华. 抗隐蔽敌手的云外包秘密共享方案. 通信学报[J]. 2017, 38(5): 57-65, http://lib.cqvip.com/Qikan/Article/Detail?id=672290837.[56] Li Jing, Yin Lihua, Guo Yunchuan, Li Chao, Li Fenghua, Chen Lihua, Yan Z, Molva R, Mazurczyk W, Kantola R. A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. NETWORK AND SYSTEM SECURITYnull. 2017, 10394: 486-496, [57] He, Yuanyuan, Zhang, Kuan, Wang, Hanyi, Li, Fenghua, Niu, Ben, Li, Hui, IEEE. Impact Factor-Based Group Recommendation Scheme with Privacy Preservation in MSNs. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2017, [58] Fenghua Li. Pricing Privacy Leakage in Location-Based Service. WASA. 2017, [59] Li, Fenghua, He, Yuanyuan, Niu, Ben, Li, Hui. Small-world: Secure friend matching over physical world and social networks. INFORMATION SCIENCES[J]. 2017, 387: 205-220, http://dx.doi.org/10.1016/j.ins.2016.09.057.[60] Sun, Yanwei, Yin, Lihua, Guo, Yunchuan, Li, Fenghua, Fang, Binxing, Ibrahim, S, Choo, KKR, Yan, Z, Pedrycz, W. Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017null. 2017, 10393: 313-327, [61] Li, Fenghua, Li, Zifu, Han, Weili, Wu, Ting, Chen, Lihua, Guo, Yunchuan, IEEE. Cyberspace-Oriented Access Control: Model and Policies. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC)null. 2017, 261-266, http://dx.doi.org/10.1109/DSC.2017.100.[62] Fang, Liang, Yin, Lihua, Zhang, Qiaoduo, Li, Fenghua, Fang, Binxing, IEEE. Who is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [63] Fenghua Li. SRAM: A State-Aware Risk Assessment Model for Intrusion Response. IEEE International Conference on Data Science in Cyberspace(DSC). 2017, [64] Fenghua Li. A Privacy-Preserving Method for Photo Sharing in Instant Message Systems. International Conference on Cryptography, Security and Privacy. 2017, [65] Fenghua Li. Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. IEEE International Symposium on UbiSafe Computing(UbiSafe). 2017, [66] Zhang, En, Li, Fenghua, Niu, Ben, Wang, Yanchao. Server-aided private set intersection based on reputation. INFORMATION SCIENCES[J]. 2017, 387: 180-194, http://dx.doi.org/10.1016/j.ins.2016.09.056.[67] 房梁, 殷丽华, 李凤华, 方滨兴. 基于谱聚类的访问控制异常权限配置挖掘机制. 通信学报[J]. 2017, 38(12): 63-72, http://lib.cqvip.com/Qikan/Article/Detail?id=674243477.[68] Li, Fenghua, Wang, Xinyu, Niu, Ben, Li, Hui, Li, Chao, Chen, Lihua, IEEE. TrackU: Exploiting User's Mobility Behavior via WiFi List. GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCEnull. 2017, [69] Li Fenghua, Liu Jiawen, Fang Liang, Niu Ben, Geng Kui, Li Hui, Ma L, Khreishah A, Zhang Y, Yan M. Pricing Privacy Leakage in Location-Based Services. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017null. 2017, 10251: 406-418, [70] Fenghua Li. A Practical Group Matching Scheme for Privacy-Aware Users in Mobile Social Networks. IEEE Wireless Communications and Network Conference. 2016, [71] 李凤华, 殷丽华, 吴巍, 张林杰, 史国振. 天地一体化信息网络安全保障技术研究进展及发展趋势. 通信学报[J]. 2016, 37(11): 156-168, http://lib.cqvip.com/Qikan/Article/Detail?id=670575717.[72] Fenghua Li. Protection of Location Privacy in Continuous LBSs against Adversaries with Background Information. International Conference on Computing, Networking and Communication. 2016, [73] He, Yuanyuan, Li, Fenghua, Niu, Ben, Hua, Jiafeng, IEEE. Achieving Secure and Accurate Friend Discovery Based on Friend-of-Friend's Recommendations. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2016, 730-735, [74] Yin, Lihua, Fang Liang, Niu, Ben, Fang Binxing, LI Fenghua. Hunting Abnormal Configurations for Permission-Sensitive Role Mining. IEEE Military Communications Conference[J]. 2016, [75] 熊金波, 张媛媛, 李凤华, 李素萍, 任君, 姚志强. 云环境中数据安全去重研究进展. 通信学报[J]. 2016, 37(11): 169-180, http://lib.cqvip.com/Qikan/Article/Detail?id=670575718.[76] 李凤华, 李晖, 贾焰, 俞能海, 翁健. 隐私计算研究范畴及发展趋势. 通信学报[J]. 2016, 37(4): 2016078-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668597024.[77] Fenghua Li. Match-MORE: An Efficient Private Matching Scheme Using Friends-of-Friends’ Recommendation. International Conference on Computing, Networking and Communication. 2016, [78] 李凤华, 王彦超, 殷丽华, 谢绒娜, 熊金波. 面向网络空间的访问控制模型. 通信学报[J]. 2016, 37(5): 2016109-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668940578.[79] Fenghua Li. Time Obfucation-Based Privacy-Preserving Scheme for Location-Based Services. IEEE Wireless Communications and Networking Conference(WCNC 2016). 2016, [80] Chen, Lingjiang, Zhou, Shuguang, Zhang, Qiaoduo, Li, Fenghua, Ma, M, Arrasmith, W, Li, P. An IPv6 Routing Lookup Algorithm Using Weight-balanced Tree based on Prefix Value for Virtual Router. FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONSnull. 2016, 9902: http://dx.doi.org/10.1117/12.2262546.[81] Li, Fenghua, Wang, Yanchao, Xiong, Jinbo, Xie, Rongna, IEEE. Role and Time-based Access Control with Efficient Revocation for Cloud Storage. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016)null. 2016, 284-289, http://dx.doi.org/10.1109/DSC.2016.118.[82] 熊金波, 李凤华, 王彦超, 马建峰, 姚志强. 基于密码学的云数据确定性删除研究进展. 通信学报[J]. 2016, 37(8): 167-184, http://lib.cqvip.com/Qikan/Article/Detail?id=669887487.[83] Liu, Yangxin, Zhang, Lingcui, Zhou, Shuguang, Li, Fenghua, Ma, M, Arrasmith, W, Li, P. A Network Monitor for HTTPS Protocol based on Proxy. FOURTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONSnull. 2016, 9902: [84] Fenghua Li. Achieving Lightweight, Time-Specific and Secure Access Control in Cloud Storage. International Conference on Computing, Networking and Communication. 2016, [85] 耿魁, 李凤华, 李维皓, 李晖, 牛犇, 谢绒娜. 基于代理的移动互联网隐私保护机制. 通信学报[J]. 2015, 36(11): 2015190-1, http://lib.cqvip.com/Qikan/Article/Detail?id=666750777.[86] 李凤华, 张翠, 牛犇, 李晖, 华佳烽, 史国振. 高效的轨迹隐私保护方案. 通信学报[J]. 2015, 36(12): 114-123, http://lib.cqvip.com/Qikan/Article/Detail?id=667180876.[87] Fenghua Li. Achieving Secure Friend Discovery in Social Strength-Aware PMSNs. IEEE Military Communications Conference. 2015, [88] 李昊星, 李凤华, 宋承根, 苏铓, 刘歆. 支持多关键字的可搜索公钥加密方案. 西安电子科技大学学报[J]. 2015, 42(5): 20-25, http://lib.cqvip.com/Qikan/Article/Detail?id=666355190.[89] Fenghua Li. UGHA: Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks. Proceedings of the IEEE International Conference on Communications(ICC 2015). 2015, [90] Fenghua Li. Privacy-Preserving Strategies in Service Quality Aware Location-Based Services. IEEE International Conference on Communications. 2015, [91] Li, Haoxing, Li, Fenghua, Song, Chenggen, Yan, Yalong. Towards Smart Card Based Mutual Authentication Schemes in Cloud Computing. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS[J]. 2015, 9(7): 2719-2735, https://www.webofscience.com/wos/woscc/full-record/WOS:000358997000022.[92] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen. A full lifecycle privacy protection scheme for sensitive data in cloud computing. Pee. 2015, 8(6): http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=SSJD8CB50FA7F21B72501F314F5A031564E6&DbName=SSJDLAST&DbCode=SSJD&yx=&pr=&URLID=&bsm=.[93] 单芳芳, 李凤华, 谢绒娜, 熊金波, 王彦超. 面向多维数字媒体的访问控制机制. 通信学报[J]. 2015, 36(11): 2015201-1, http://lib.cqvip.com/Qikan/Article/Detail?id=666750780.[94] Wang Yanchao, Li Fenghua, Xiong Jinbo, Niu Ben, Shan Fangfang, IEEE. Achieving Lightweight and Secure Access Control in Multi-Authority Cloud. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1null. 2015, 459-466, http://dx.doi.org/10.1109/Trustcom.2015.407.[95] 万盛, 何媛媛, 李凤华, 牛犇, 李晖, 王新宇. 基于布隆过滤器的轻量级隐私信息匹配方案. 通信学报[J]. 2015, 36(12): 151-162, http://lib.cqvip.com/Qikan/Article/Detail?id=667180880.[96] Ma Zhuo, Li Fenghua, Ma Jianfeng, Ji Wenjiang. CL-TAP: An Efficient Certificate less Based Trusted Access Protocol for WLAN. CHINESE JOURNAL OF ELECTRONICS[J]. 2014, 23(1): 142-146, https://www.webofscience.com/wos/woscc/full-record/WOS:000330089800026.[97] Wang, Boyang, Li, Hui, Liu, Xuefeng, Li, Xiaoqing, Li, Fenghua. Preserving identity privacy on multi-owner cloud data during public verification. SECURITY AND COMMUNICATION NETWORKS[J]. 2014, 7(11): 2104-2113, https://www.webofscience.com/wos/woscc/full-record/WOS:000344322100035.[98] Shi Guozhen, Su Mang, Li Fenghua, Lou Jiapeng, Huang Qiong, IEEE. A User-based Document Management Mechanism in Cloud. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS)null. 2014, 377-381, http://dx.doi.org/10.1109/CIS.2014.60.[99] 熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙, 李琦. 基于属性加密的组合文档安全自毁方案. 电子学报[J]. 2014, 42(2): 366-376, http://lib.cqvip.com/Qikan/Article/Detail?id=49029420.[100] 熊金波, 姚志强, 马建峰, 李凤华, 刘西蒙. 面向网络内容隐私的基于身份加密的安全自毁方案. 计算机学报[J]. 2014, 37(1): 139-150, http://lib.cqvip.com/Qikan/Article/Detail?id=48544439.[101] Fenghua Li. A Reliable Supervision Model and Implementation for the Trading of Digital Works. 2014, [102] 孙文海, 李凤华, 王博洋, 李晖. 公共云存储服务数据安全及隐私保护技术综述. 计算机研究与发展[J]. 2014, 51(7): 1397-1409, http://lib.cqvip.com/Qikan/Article/Detail?id=50300259.[103] 李凤华. 一种抗隐蔽通道的网络隔离通信方案. 通信学报. 2014, [104] Mang Su, Fenghua Li, Zhi Tang, Yinyan Yu, Bo Zhou. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application. The Scientific World Journal[J]. 2014, 2014: https://doaj.org/article/f01fc45f05ea47569446b964c5aab829.[105] 李凤华, 谈苗苗, 樊凯, 耿魁, 赵甫. 抗隐蔽通道的网络隔离通信方案. 通信学报[J]. 2014, 35(11): 96-106, http://lib.cqvip.com/Qikan/Article/Detail?id=662973705.[106] 苏铓, 李凤华, 史国振. 基于行为的多级访问控制模型. 计算机研究与发展[J]. 2014, 51(7): 1604-1613, http://lib.cqvip.com/Qikan/Article/Detail?id=50300280.[107] 李晖, 李凤华, 曹进, 牛犇, 孙文海, 耿魁. 移动互联服务与隐私保护的研究进展. 通信学报[J]. 2014, 35(11): 1-11, http://lib.cqvip.com/Qikan/Article/Detail?id=662973695.[108] Fenghua Li. FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. In Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems. 2013, [109] 熊金波, 姚志强, 马建峰, 李凤华, 李琦. 基于行为的结构化文档多级访问控制. 计算机研究与发展[J]. 2013, 50(7): 1399-1408, http://lib.cqvip.com/Qikan/Article/Detail?id=46273757.[110] Cao, Y, Zhao, X, Li, F, Yu, N, Alattar, AM, Memon, ND, Heitzenrater, CD. Video Steganography with Multi-path Motion Estimation. MEDIA WATERMARKING, SECURITY, AND FORENSICS 2013null. 2013, 8665: [111] Fenghua Li. An improved attack on clock-controlled shift register based on hardware implementation. SCIENCE CHINA-INFORMATION SCIENCES. 2013, [112] Ma, Kede, Zhang, Weiming, Zhao, Xianfeng, Yu, Nenghai, Li, Fenghua. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2013, 8(3): 553-562, https://www.webofscience.com/wos/woscc/full-record/WOS:000318597400012.[113] Li Fenghua, Shi Guozhen, Zhang Jinghui, Li Li. An Action-based Access Control Model Implementation for MLS Information Systems. 2012, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=JKDZ201207001274&DbName=CPFD0914&DbCode=CPFD&yx=&pr=&URLID=&bsm=.[114] Shi Guozhen, Li Fenghua, Li Li, Shi Hanzhang. General Purpose Framework Designing for Network Security Test Devices Based on Multi-core Processor. 2012, http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=JKDZ201207001044&DbName=CPFD0914&DbCode=CPFD&yx=&pr=&URLID=&bsm=.[115] Su, Mang, Li, Fenghua, Shi, Guozhen, Li, Li. An Action Based Access Control Model for Multi-level Security. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS[J]. 2012, 6(2): 359-366, [116] 欧庆于, 张焕国, 吴晓平, 李凤华, 罗芳. 基于亚稳态的QDI逻辑随机路径切换方法研究. 电子学报[J]. 2012, 40(10): 1996-2001, http://lib.cqvip.com/Qikan/Article/Detail?id=44147898.[117] Fenghua Li. Action Based Access Control Model for Multi-level Security (MLS). In Proceedings of the 2012 International Conference on Information Security and Assurance (ISA 2012). 2012,