Hui Li
Hui Li
Professor, School of Cyber Engineering, Xidian University
Verified email at - Homepage
Cited by
Cited by
SK-LSH: An Efficient Index Structure for Approximate Nearest Neighbor Search
Y Liu, J Cui, Z Huang, H Li, H Shen
PVLDB 7 (9), 2014
Conformity-aware Influence Maximization in Online Social Networks
H Li, SS Bhowmick, A Sun, J Cui
The VLDB Journal, 2014
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
H Liu, X Li, H Li, J Ma, X Ma
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
Casino: towards conformity-aware social influence analysis in online social networks
H Li, SS Bhowmick, A Sun
Proceedings of the 20th ACM international conference on Information and …, 2011
Sub‐1.5 nm Ultrathin CoP Nanosheet Aerogel: Efficient Electrocatalyst for Hydrogen Evolution Reaction at All pH Values
H Li, X Zhao, H Liu, S Chen, X Yang, C Lv, H Zhang, X She, D Yang
Small 14 (41), 1802824, 2018
Getreal: Towards realistic selection of influence maximization strategies in competitive networks
H Li, SS Bhowmick, J Cui, Y Gao, J Ma
Proceedings of the 2015 ACM SIGMOD international conference on management of …, 2015
An Intelligent Movie Recommendation System through Group-level Sentiment Analysis in Microblogs
H Li, J Cui, B Shen, J Ma
Neurocomputing, 2016
CINEMA: conformity-aware greedy algorithm for influence maximization in online social networks
H Li, SS Bhowmick, A Sun
Proceeding EDBT '13 Proceedings of the 16th International Conference on …, 2013
Adaptively Secure Ciphertext-Policy Attribute-Based Encryption with Dynamic Policy Updating
Z Ying, H Li, J Ma, J Zhang, J Cui
SCIENCE CHINA Information Sciences 59 (4), 1-15, 2016
The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems
D Liao, G Sun, H Li, H Yu, V Chang
Cluster Computing 20 (3), 2283-2297, 2017
APPLET: A Privacy-Preserving framework for Location-Aware Recommender System
X Ma, H Li, J Ma, Q Jiang, S Gao, D Lu, N Xi
SCIENCE CHINA Information Sciences, 2016
Backward Path Growth for Efficient Mobile Sequential Recommendation
J Huang, X Huangfu, H Sun, H Li, P Zhao, H Cheng, Q Song
IEEE Transactions on Knowledge and Data Engineering, 0
Social Influence Study in Online Networks: a Three Level Review
H Li, J Cui, J Ma
Journal of Computer Science and Technology, 2015
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
K Zhang, H Li, J Ma, X Liu
Science China Information Sciences 61 (3), 032102, 2018
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks
X Ma, J Ma, H Li, Q Jiang, S Gao
Future Generation Computer Systems 79, 82-94, 2018
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
K Zhang, J Ma, J Liu, H Li
Sci. China Inf. Sci. 59 (9), 99105, 2016
Blog cascade affinity: analysis and prediction
H Li, SS Bhowmick, A Sun
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
AffRank: Affinity‐driven ranking of products in online social rating networks
H Li, SS Bhowmick, A Sun
Journal of the American Society for Information Science and Technology 62 (7 …, 2011
A Real Linear and Parallel Multiple Longest Common Subsequences (MLCS) Algorithm
Y Li, H Li, T Duan, S Wang, Z Wang, Y Cheng
20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2016
Protecting user trajectory in location-based services
D Liao, H Li, G Sun, V Anand
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
The system can't perform the operation now. Try again later.
Articles 1–20