Follow
Na Li
Title
Cited by
Cited by
Year
Privacy preservation in wireless sensor networks: A state-of-the-art survey
N Li, N Zhang, SK Das, B Thuraisingham
Ad Hoc Networks 7 (8), 1501-1514, 2009
4302009
HUMS: an autonomous moving strategy for mobile sinks in data-gathering sensor networks
Y Bi, L Sun, J Ma, N Li, IA Khan, C Chen
EURASIP Journal on Wireless Communications and Networking 2007, 1-15, 2007
1692007
A trust-based framework for data forwarding in opportunistic networks
N Li, SK Das
Ad Hoc Networks 11 (4), 1497-1509, 2013
1552013
RADON: reputation-assisted data forwarding in opportunistic networks
N Li, SK Das
Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010
782010
Using data mules to preserve source location privacy in wireless sensor networks
M Raj, N Li, D Liu, M Wright, SK Das
Pervasive and Mobile Computing 11, 244-260, 2014
662014
Using data mules to preserve source location privacy in Wireless Sensor Networks
N Li, M Raj, D Liu, M Wright, S Das
ICDCN, 2012
66*2012
Fake news detection enhancement with data imputation
CMM Kotteti, X Dong, N Li, L Qian
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
552018
Preserving relation privacy in online social network data
N Li, N Zhang, S Das
IEEE Internet Computing 15 (3), 35-42, 2011
502011
DAR: An energy-balanced data-gathering scheme for wireless sensor networks
Y Bi, N Li, L Sun
Computer Communications 30 (14-15), 2812-2825, 2007
372007
A storage infrastructure for heterogeneous and multimedia data in the internet of things
M Di Francesco, N Li, M Raj, SK Das
2012 IEEE International Conference on Green Computing and Communications, 26-33, 2012
362012
Retrieving hidden friends: A collusion privacy attack against online friend search engine
Y Liu, N Li
IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018
292018
Relationship Privacy Preservation in Publishing Online Social Networks
N Li, N Zhang, SK Das
Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International …, 2011
292011
BoSS: a moving strategy for mobile sinks in wireless sensor networks
Y Bi, L Sun, N Li
International Journal of Sensor Networks 5 (3), 173-184, 2009
272009
Voice controlled smart mirror with multifactor authentication
AC Njaka, N Li, L Li
2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018
202018
Privacy Aware Display Strategy in Friend Search
N Li
IEEE International Conference on Communications (ICC), Communication and …, 2014
122014
A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks
M Di Francesco, N Li, L Cheng, M Raj, SK Das
2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011
62011
Efficiently discovering users connectivity with local information in online social networks
N Li, SK Das
Online Social Networks and Media 16, 100062, 2020
52020
An Advanced Collusion Attack against User Friendship Privacy in OSNs
Y Liu, N Li
Proceeding of the 40th IEEE Computer Society International Conference on …, 2016
52016
Facelock―A Labware for Teaching Photo Privacy in Online Social Networks Through Face Recognition
S Shormin, L Li, N Li
Journal of computing sciences in colleges 35 (7), 2020
22020
A labware for educating location privacy protection in location-based services
N Li, V Chava, L Li
Journal of Computing Sciences in Colleges 32 (4), 40-48, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20