Privacy preservation in wireless sensor networks: A state-of-the-art survey N Li, N Zhang, SK Das, B Thuraisingham Ad Hoc Networks 7 (8), 1501-1514, 2009 | 445 | 2009 |
HUMS: an autonomous moving strategy for mobile sinks in data-gathering sensor networks Y Bi, L Sun, J Ma, N Li, IA Khan, C Chen EURASIP Journal on Wireless Communications and Networking 2007, 1-15, 2007 | 172 | 2007 |
A trust-based framework for data forwarding in opportunistic networks N Li, SK Das Ad Hoc Networks 11 (4), 1497-1509, 2013 | 158 | 2013 |
RADON: reputation-assisted data forwarding in opportunistic networks N Li, SK Das Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010 | 80 | 2010 |
Using data mules to preserve source location privacy in Wireless Sensor Networks N Li, M Raj, D Liu, M Wright, S Das ICDCN, 2012 | 65* | 2012 |
Fake news detection enhancement with data imputation CMM Kotteti, XI Dong, N Li, L Qian 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 62 | 2018 |
Preserving relation privacy in online social network data N Li, N Zhang, S Das IEEE Internet Computing 15 (3), 35-42, 2011 | 49 | 2011 |
DAR: An energy-balanced data-gathering scheme for wireless sensor networks Y Bi, N Li, L Sun Computer Communications 30 (14-15), 2812-2825, 2007 | 37 | 2007 |
A storage infrastructure for heterogeneous and multimedia data in the internet of things M Di Francesco, N Li, M Raj, SK Das 2012 IEEE International Conference on Green Computing and Communications, 26-33, 2012 | 36 | 2012 |
Retrieving hidden friends: A collusion privacy attack against online friend search engine Y Liu, N Li IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018 | 32 | 2018 |
Relationship Privacy Preservation in Publishing Online Social Networks N Li, N Zhang, SK Das Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International …, 2011 | 31 | 2011 |
BoSS: a moving strategy for mobile sinks in wireless sensor networks Y Bi, L Sun, N Li International Journal of Sensor Networks 5 (3), 173-184, 2009 | 27 | 2009 |
Voice controlled smart mirror with multifactor authentication AC Njaka, N Li, L Li 2018 IEEE International Smart Cities Conference (ISC2), 1-8, 2018 | 21 | 2018 |
Privacy Aware Display Strategy in Friend Search N Li IEEE International Conference on Communications (ICC), Communication and …, 2014 | 14 | 2014 |
An Advanced Collusion Attack against User Friendship Privacy in OSNs Y Liu, N Li Proceeding of the 40th IEEE Computer Society International Conference on …, 2016 | 6 | 2016 |
A framework for multimodal sensing in heterogeneous and multimedia wireless sensor networks M Di Francesco, N Li, L Cheng, M Raj, SK Das 2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011 | 6 | 2011 |
Efficiently discovering users connectivity with local information in online social networks N Li, SK Das Online Social Networks and Media 16, 100062, 2020 | 5 | 2020 |
CvTSRR: A Convolutional Vision Transformer Based Method for Social Relation Recognition S Shultana, L Li, N Li International Conference on Communications, Computing and Artificial …, 2023 | 2 | 2023 |
Facelock―A Labware for Teaching Photo Privacy in Online Social Networks Through Face Recognition S Shormin, L Li, N Li Journal of computing sciences in colleges 35 (7), 2020 | 2 | 2020 |
A labware for educating location privacy protection in location-based services N Li, V Chava, L Li Journal of Computing Sciences in Colleges 32 (4), 40-48, 2017 | 2 | 2017 |