Lingjun Li
Lingjun Li
Ph. D. of Computer Science, Arizona State University
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Unobservable Re-authentication for Smartphones.
L Li, X Zhao, G Xue
NDSS, 2013
2662013
Checking in without worries: Location privacy in location based social networks
X Zhao, L Li, G Xue
INFOCOM, 2013 Proceedings IEEE, 3003-3011, 2013
392013
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao
Information Hiding, 224-235, 2008
392008
A statistical attack on a kind of word-shift text-steganography
L Li, L Huang, X Zhao, W Yang, Z Chen
Intelligent Information Hiding and Multimedia Signal Processing, 2008 …, 2008
342008
Steganalysis of synonym-substitution based natural language watermarking
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
19*2009
Authenticating strangers in online social networks
X Zhao, L Li, G Xue
International Journal of Security and Networks 6 (4), 237-248, 2011
162011
Detection of synonym-substitution modified articles using context information
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
Future Generation Communication and Networking, 2008. FGCN'08. Second …, 2008
142008
Near field authentication for smart devices
L Li, X Zhao, G Xue
INFOCOM, 2013 Proceedings IEEE, 375-379, 2013
122013
The Power of Whispering: Near Field Assertions via Acoustic Communications
L Li, G Xue, X Zhao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
A Proximity Authentication System for Smartphones
L Li, X Zhao, G Xue
Dependable and Secure Computing, IEEE Transactions on, 1, 2015
82015
Steganalysis on Character Substitution Using Support Vector Machine
X Zhao, L Huang, L Li, W Yang, Z Chen, Z Yu
Knowledge Discovery and Data Mining, 2009. WKDD 2009. Second International …, 2009
82009
Detection of word shift steganography in PDF document
L Lingjun, H Liusheng, Y Wei, Z Xinxin, Y Zhenshan, C Zhili
Proceedings of the 4th international conference on Security and privacy in …, 2008
82008
An identity authentication protocol in online social networks
L Li, X Zhao, G Xue
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
72012
An efficient privacy preserving location based service system
X Zhao, H Gao, L Li, H Liu, G Xue
Global Communications Conference (GLOBECOM), 2014 IEEE, 576-581, 2014
52014
Systems and methods for authenticating a user through an unobservable re-authentication system
L Li, X Zhao, G Xue
US Patent App. 14/476,364, 2014
5*2014
A lightweight system to authenticate smartphones in the near field without NFC chips
L Li, X Zhao, G Xue
Communications (ICC), 2013 IEEE International Conference on, 6391-6395, 2013
52013
Authenticating strangers in fast mixing online social networks
X Zhao, L Li, G Xue
Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, 1-5, 2011
52011
Efficient anonymous message submission
X Zhao, L Li, G Xue, GJ Ahn
IEEE Transactions on Dependable and Secure Computing, 2016
42016
Secure cloud-assisted location based reminder
X Zhao, L Li, G Xue
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
42013
Privacy Preserving Group Ranking
L Li, X Zhao, G Xue, G Silva
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International …, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20