[2] Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu and Fangfang Shan, Achieving lightweight and secure access control in Multi-authority cloud, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , 2015. (TRUSTCOM2015) (Best Paper Award)
[3] Weihao Li, Ben Niu*, Hui Li, Fenghua Li. Privacy-preserving strategies in service quality aware location-based services. IEEE International Conference on Communications (ICC2015), London, UK. June. 8-12, 2015.
[4] Jin Cao, Hui Li, Maode Ma and Fenghua Li*. UGHA: uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. IEEE International Conference on Communications (ICC2015), London, UK. June. 8-12, 2015.
[5] Su Mang, Li Fenghua*, Shi Guozhen, Geng Kui, Xiong Jinbo, A user-centric data secure creation scheme in cloud computing, Chinese Journal of Electronics, to appear.
[6] Su Mang, Li Fenghua*, Tang Zhi, Yu Yinyan, Zhou Bo. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application [J]. The Scientific World Journal, 2014: 1-13.
[7] MA Zhuo*, LI Fenghua, MA Jianfeng and JI Wenjiang. CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN [J]. Chinese Journal of Electronics, 2014, 23(1): 142-146.
[8] Shi Guozhen, Shen Ying, Li Fenghua. Research on Credible Regulation Mechanism for the Trading of Digital Works. Proceedings of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Sep. 24-26, 2014, pp. 484-488.
[9] Boyand Wang*, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li. Preserving identity privacy on multi-owner cloud data during public verification[J]. Security and Communication Networks (SCN), 2014, 7(11): 2104-2113.
[10] MA Zhuo*, LI Fenghua, MA Jianfeng and JI Wenjiang. CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN[J]. Chinese Journal of Electronics, 2014, 23(1): 142-146.
[11] Su Mang, Li Fenghua*, Shi Guozhen. Action-Based Multi-level Access Control Model, Journal of Computer Research and Development, 2014, 51(7): 1604-1613.
[12] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao*, Patrick S. Chen. A full lifecycle privacy protection scheme for sensitive data in cloud computing [J]. Peer-to-Peer Networking and Applications (Peer-to-Peer Netw. Appl). June 20. 2014 .
[13] Shi Guozhen, Su Mang, Li Fenghua, Lou Jiapeng, Qiong Huang. A User-based Document Management Mechanism in Cloud, International Conference on Computational Intelligence and Security (CIS). Kunming, China. Nov. 15-16, 2014. pp. 377-381.
[14] Kede Ma*, Weiming Zhang, Xianfeng Zhao, Nenghai Yu, Fenghua Li. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8(3): 553-562.
[15] Xiaocheng Hu, Weiming Zhang*, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li. Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding[J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8(5): 779-788.
[16] Lei Li*, Xianghui Liu, Zheng Wang, Fenghua Li. An improved attack on clock-controlled shift registers based on hardware implementation[J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56(11): 1-10.
[17] Boyang Wang, Baochun Li, Hui Li and Fenghua Li. Certificateless public auditing for data integrity in the cloud. IEEE Conference on Communications and Network Security (CNS), Washington, United states. Oct. 14-16, 2013. pp. 136-144.
[18] Yun Cao, Xianfeng Zhao, Fenghua Li, Nenghai Yu. Video steganography with multipath motion estimation. Proceedings of SPIE-The International Society for Optical Engineering (Proc SPIE Int Soc Opt Eng), Burlingame, United states. Feb. 5-7, 2013, pp. 86650K1-6.
[19] SU Mang, SHI Guozhen, LI Fenghua, SHEN Ying, HUANG Qiong, WANG Miao-miao, Fine-grained description model and implementation of hypermedia document. Journal on Communications, 2013, 08, 34(z1): 223-229.
[20] Xiong Jinbo*, Yao Zhiqiang, Ma Jianfeng, Li Fenghua, Li Qi. Action-Based Multilevel Access Control for Structured Document. Journal of Computer Research and Development, 2013, 50(7): 1399-1408.
[21] LI Fenghua, SHI Guozhen, ZHANG Jinghui, LI Li. Application of action-based access control model to multilevel security information systems. COMPUTER ENGINEERING AND DESIGN. 2012, 33(1): 106 - 110.
[22] Fenghua Li*, Guozhen Shi, Jinghui Zhang, Li Li. An Action-Based Access Control Model Implementation for MLS Information Systems. International Conference on Computer Application and System Modeling (ICCASM), Shenyang, China. Jul. 27-29, 2012. pp. 1080-1083.
[23] QIU Qin*, TANG Zhi, LI Fenghua, YU Yinyan. A Personal DRM Scheme Based on Social Trust[J]. Chinese Journal of Electronics, 2012, 21(4): 719-724.
[24] Mang Su*, Fenghua Li, Guozhen Shi, Li Li. An Action Based Access Control Model for Multi-level Security [J]. International Journal of Security and Its Applications (Int. J. Secur. Appl), 2012, 6(2): 359-366.
[25] Li Fenghua*, Su Mang, Shi Guozhen, Ma Jianfeng. Research Status and Development Trends of Access Control Model. ACTA ELECTRONICA SINICA, 2012, 40(4): 805-813.
[26] Su Mang*, Li Fenghua, Shi Guozhen, Li Li. Representation model of structured document for multilevel security. Journal on Communications, 2012, 33(SUPPL1): 222 - 227.
[27] Fenghua Li, Wei Wang, Jianfeng Ma and Haoxin Su. Action-Based Access Control for Web Services. Journal of Information Assurance and Security, 2010, 05. 162 - 170.
[28] LI Fenghua*, YAN Junzhi, XIE Rongna, MA Jianfeng. Research on the Programming Language for Symmetric Cryptographic Algorithms[J]. Chinese Journal of Electronics, 2010, 19(2): 303-306.
[29] Junzhi YAN*, Jianfeng MA, Fenghua LI, SangJae Moon. Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks[J]. AD HOC & SENSOR WIRELESS NETWORKS, 2010, 10(2-3): 235-251.
[30] YAO Zhiqiang*, PAN Rijing, LI Fenghua, WENG Bin. A Mesh Partitioning Approach for 3D Mesh Oblivious Watermarking[J]. Chinese Journal of Electronics, 2010, 19(4): 651-655.
[31] Fenghua Li*, Wei Wang, Jianfeng Ma and Haoxin Su. Action-Based Access Control for Web Services. International Conference on Information Assurance and Security (IAS), Xi’an, China. Aug. 18-20, 2009. pp. 637-642.
[32] LI Fenghua*, WANG Wei, MA Jianfeng, LIU Hongyue. Access control model and its application for collaborative information systems[J]. Journal on Communications, 2008, 29(9): 116-123.
[33] LI Fenghua*, WANG Wei, MA Jianfeng and SangJae Moon. Action-Based Access Control model [J]. Chinese Journal of Electronics, 2008, 17(3): 396-401.
[34] LI Fenghua*, WANG Wei, MA Jianfeng , LIANG Xiaoyan. Action-Based Access Control Model and Administration of Actions. ACTA ELECTRONICA SINICA, 2008, 36(10): 1881-1890.