Privacy preservation in wireless sensor networks: A state-of-the-art survey N Li, N Zhang, SK Das, B Thuraisingham Ad Hoc Networks 7 (8), 1501-1514, 2009 | 422 | 2009 |
HUMS: an autonomous moving strategy for mobile sinks in data-gathering sensor networks Y Bi, L Sun, J Ma, N Li, IA Khan, C Chen EURASIP Journal on Wireless Communications and Networking 2007, 1-15, 2007 | 166 | 2007 |
A trust-based framework for data forwarding in opportunistic networks N Li, SK Das Ad Hoc Networks 11 (4), 1497-1509, 2013 | 152 | 2013 |
RADON: reputation-assisted data forwarding in opportunistic networks N Li, SK Das Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010 | 76 | 2010 |
Using data mules to preserve source location privacy in wireless sensor networks M Raj, N Li, D Liu, M Wright, SK Das Pervasive and Mobile Computing 11, 244-260, 2014 | 64 | 2014 |
Using data mules to preserve source location privacy in Wireless Sensor Networks N Li, M Raj, D Liu, M Wright, S Das ICDCN, 2012 | 64* | 2012 |
Preserving relation privacy in online social network data N Li, N Zhang, S Das IEEE Internet Computing 15 (3), 35-42, 2011 | 47 | 2011 |
Fake news detection enhancement with data imputation CMM Kotteti, XI Dong, N Li, L Qian 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 44 | 2018 |
A storage infrastructure for heterogeneous and multimedia data in the internet of things M Di Francesco, N Li, M Raj, SK Das 2012 IEEE International Conference on Green Computing and Communications, 26-33, 2012 | 37 | 2012 |
DAR: An energy-balanced data-gathering scheme for wireless sensor networks Y Bi, N Li, L Sun Computer Communications 30 (14-15), 2812-2825, 2007 | 36 | 2007 |
Relationship Privacy Preservation in Publishing Online Social Networks N Li, N Zhang, SK Das Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International …, 2011 | 28 | 2011 |
BoSS: a moving strategy for mobile sinks in wireless sensor networks Y Bi, L Sun, N Li International Journal of Sensor Networks 5 (3), 173-184, 2009 | 26 | 2009 |
Retrieving hidden friends: A collusion privacy attack against online friend search engine Y Liu, N Li IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018 | 21 | 2018 |
Voice controlled smart mirror with multifactor authentication AC Njaka, N Li, L Li 2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018 | 19 | 2018 |
Privacy Aware Display Strategy in Friend Search N Li IEEE International Conference on Communications (ICC), Communication and …, 2014 | 11 | 2014 |
A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks M Di Francesco, N Li, L Cheng, M Raj, SK Das 2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011 | 6 | 2011 |
An Advanced Collusion Attack against User Friendship Privacy in OSNs Y Liu, N Li Proceeding of the 40th IEEE Computer Society International Conference on …, 2016 | 5 | 2016 |
Efficiently discovering users connectivity with local information in online social networks N Li, SK Das Online Social Networks and Media 16, 100062, 2020 | 4 | 2020 |
A labware for educating location privacy protection in location-based services N Li, V Chava, L Li Journal of Computing Sciences in Colleges 32 (4), 40-48, 2017 | 2 | 2017 |
A Web Application For Studying Collusion Attacks Through Friend Search Engine SS Malka, N Li, VM Doddapaneni, Y Liu, AK Pamulapati Proceeding of The 11th IEEE International Workshop on Security, Trust, and …, 2016 | 2 | 2016 |