default search action
Long Li 0005
Person information
- affiliation: Guilin University of Electronic Technology, School of Electromechanical Engineering, China
Other persons with the same name
- Long Li — disambiguation page
- Long Li 0001 — University of Southern California, Department of Electrical Engineering, Los Angeles, CA, USA
- Long Li 0002 — China University of Mining and Technology, School of Environmental Science and Spatial Informatics, Xuzhou, China (and 1 more)
- Long Li 0003 — Xidian University, School of Electronic Engineering and the Collaborative Innovation Center of Information Sensing and Understanding, Xi'an, China (and 4 more)
- Long Li 0004 — Nanjing Normal University, College of Geographic Science, China
- Long Li 0006 — Inspur Group Company Limited, State Key Laboratory of High-End Server and Storage Technology, Jinan, China
- Long Li 0007 — University of Rennes 1, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yuanjing Hao, Long Li, Liang Chang, Tianlong Gu:
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs. Frontiers Comput. Sci. 18(2): 182814 (2024) - [j22]Heng Sun, Weilin Huang, Jian Weng, Zhiquan Liu, Weihua Tan, Zaobo He, Mingyang Chen, Biaobang Wu, Long Li, Xinyuan Peng:
CCID-CAN: Cross-Chain Intrusion Detection on CAN Bus for Autonomous Vehicles. IEEE Internet Things J. 11(15): 26146-26159 (2024) - [j21]Junyan Qian, Chuanfang Zhang, Zheng Wu, Hao Ding, Long Li:
Efficient topology reconfiguration for NoC-based multiprocessors: A greedy-memetic algorithm. J. Parallel Distributed Comput. 190: 104904 (2024) - [j20]Ruyi Liu, Junhong Wu, Wenyi Lu, Qiguang Miao, Huan Zhang, Xiangzeng Liu, Zixiang Lu, Long Li:
A Review of Deep Learning-Based Methods for Road Extraction from High-Resolution Remote Sensing Images. Remote. Sens. 16(12): 2056 (2024) - [j19]Shouhong Tan, Fengrui Hao, Tianlong Gu, Long Li, Ming Liu:
Collusive Model Poisoning Attack in Decentralized Federated Learning. IEEE Trans. Ind. Informatics 20(4): 5989-5999 (2024) - [j18]Ruyi Liu, Yi Liu, Wentian Xin, Qiguang Miao, Long Li:
Action Jitter Killer: Joint Noise Optimization Cascade for Skeleton-Based Action Recognition. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [c11]Fang Li, Yubin Qu, Chao Feng, Xianzhen Dou, Long Li:
A Fine-Grained Emotion Prediction Method Based on Large Language Models. QRS Companion 2024: 101-110 - 2023
- [j17]Long Li, Jianbo Huang, Liang Chang, Jian Weng, Jia Chen, Jingjing Li:
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services. Frontiers Comput. Sci. 17(5): 175814 (2023) - [j16]Xuemin Wang, Tianlong Gu, Xuguang Bao, Liang Chang, Long Li:
Individual fairness for local private graph neural network. Knowl. Based Syst. 268: 110490 (2023) - [j15]Xuan Feng, Tianlong Gu, Xuguang Bao, Long Li:
Behavior-Based Ethical Understanding in Chinese Social News. IEEE Trans. Affect. Comput. 14(3): 2349-2360 (2023) - 2022
- [j14]Yubin Qu, Fang Li, Long Li, Xianzhen Dou, Hongmei Wang:
Can We Predict Student Performance Based on Tabular and Textual Data? IEEE Access 10: 86008-86019 (2022) - [j13]Yiqin Luo, Yanpeng Sun, Liang Chang, Tianlong Gu, Chenzhong Bin, Long Li:
Considering Fine-Grained and Coarse-Grained Information for Context-Aware Recommendations. Comput. J. 65(3): 679-688 (2022) - [j12]Yubin Qu, Tie Bao, Xiang Chen, Long Li, Xianzhen Dou, Meng Yuan, Hongmei Wang:
Do we need to pay technical debt in blockchain software systems? Connect. Sci. 34(1): 2026-2047 (2022) - [j11]Pengxu Tian, Cheng Guo, Kim-Kwang Raymond Choo, Yining Liu, Long Li, Lin Yao:
EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search. IEEE Syst. J. 16(2): 3450-3460 (2022) - [j10]Xuguang Bao, Tianlong Gu, Liang Chang, Zhoubo Xu, Long Li:
Knowledge-Based Interactive Postmining of User-Preferred Co-Location Patterns Using Ontologies. IEEE Trans. Cybern. 52(9): 9467-9480 (2022) - [c10]Gengsen Huang, Wensheng Gan, Long Li, Tianlong Gu, Jiahui Chen:
Flexibly Mining Better Patterns. IEEE Big Data 2022: 6212-6221 - 2021
- [j9]Xinyu Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yining Liu, Long Li:
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput. Networks 200: 108540 (2021) - [j8]Yunhui Li, Liang Chang, Long Li, Xuguang Bao, Tianlong Gu:
TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making. Secur. Commun. Networks 2021: 5448397:1-5448397:14 (2021) - [j7]Hongtao Li, Xingsi Xue, Zhiying Li, Long Li, Jinbo Xiong:
Location Privacy Protection Scheme for LBS in IoT. Wirel. Commun. Mob. Comput. 2021: 9948543:1-9948543:18 (2021) - 2020
- [j6]Jiang Wu, Jianjun Xu, Xiankai Meng, Haoyu Zhang, Zhuo Zhang, Long Li:
Compilation Optimization Pass Selection Using Gate Graph Attention Neural Network for Reliability Improvement. IEEE Access 8: 150422-150434 (2020) - [j5]Yubin Qu, Xiang Chen, Fang Li, Fan Yang, Junxia Ji, Long Li:
Empirical Evaluation on the Impact of Class Overlap for EEG-Based Early Epileptic Seizure Detection. IEEE Access 8: 180328-180340 (2020) - [j4]Tianlong Gu, Bin Yuan, Yining Liu, Peng Wang, Long Li, Liang Chang:
An improved EAAP scheme for vehicular ad hoc networks. Int. J. Commun. Syst. 33(6) (2020) - [j3]Fang Li, Yubin Qu, Junxia Ji, Dejun Zhang, Long Li:
Active Learning Empirical Research on Cross-Version Software Defect Prediction Datasets. Int. J. Perform. Eng. 16(4): 609-617 (2020) - [j2]Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c9]Jianbo Huang, Liang Chang, Long Li, Xuguang Bao:
An Adaptive Dummy-based Mechanism to Protect Location Privacy in Smart Health Care System. CyberC 2020: 92-97 - [c8]Ying Fang, Tianlong Gu, Liang Chang, Long Li:
Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast Decryption. CyberC 2020: 98-106 - [c7]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom 2020: 321-328 - [c6]Miao Li, Xuguang Bao, Liang Chang, Zhoubo Xu, Long Li:
A Survey of Researches on Personalized Bundle Recommendation Techniques. ML4CS (2) 2020: 290-304 - [c5]Yunhao Yang, Long Li, Liang Chang, Tianlong Gu:
A Poisoning Attack Against the Recognition Model Trained by the Data Augmentation Method. ML4CS (2) 2020: 550-561 - [c4]Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec 2020: 120-131
2010 – 2019
- 2019
- [c3]Wenkai Wang, Liang Chang, Chenzhong Bin, Wen Xuan, Wei Chen, Long Li:
ESN-NER: entity storage network using attention mechanism for chinese NER. AIIPCC 2019: 41:1-41:8 - [c2]Long Li, Shaowei Zhang, Yongchao Zhang, Liang Chang, Tianlong Gu:
The Intrusion Detection Model based on Parallel Multi - Artificial Bee Colony and Support Vector Machine. ICACI 2019: 308-313 - 2018
- [c1]Shaowei Zhang, Long Li, Liang Chang, Tianlong Gu, Huadong Liu:
A Ciphertext-Policy Attribute-Based Encryption Based on Multi-valued Decision Diagram. Intelligent Information Processing 2018: 303-310 - 2017
- [j1]Long Li, Tianlong Gu, Liang Chang, Zhoubo Xu, Yining Liu, Junyan Qian:
A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram. IEEE Access 5: 1137-1145 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-18 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint