Follow
Lingjun Li
Lingjun Li
Ph. D. of Computer Science, Arizona State University
Verified email at asu.edu - Homepage
Title
Cited by
Cited by
Year
Unobservable Re-authentication for Smartphones.
L Li, X Zhao, G Xue
NDSS, 2013
3252013
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao
Information Hiding, 224-235, 2008
522008
A statistical attack on a kind of word-shift text-steganography
L Li, L Huang, X Zhao, W Yang, Z Chen
Intelligent Information Hiding and Multimedia Signal Processing, 2008 …, 2008
422008
Checking in without worries: Location privacy in location based social networks
X Zhao, L Li, G Xue
INFOCOM, 2013 Proceedings IEEE, 3003-3011, 2013
412013
Steganalysis of synonym-substitution based natural language watermarking
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
22*2009
Detection of synonym-substitution modified articles using context information
Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu
Future Generation Communication and Networking, 2008. FGCN'08. Second …, 2008
192008
Steganalysis on Character Substitution Using Support Vector Machine
X Zhao, L Huang, L Li, W Yang, Z Chen, Z Yu
Knowledge Discovery and Data Mining, 2009. WKDD 2009. Second International …, 2009
172009
Authenticating strangers in online social networks
X Zhao, L Li, G Xue
International Journal of Security and Networks 6 (4), 237-248, 2011
162011
A Proximity Authentication System for Smartphones
L Li, X Zhao, G Xue
Dependable and Secure Computing, IEEE Transactions on, 1, 2015
152015
Near field authentication for smart devices
L Li, X Zhao, G Xue
INFOCOM, 2013 Proceedings IEEE, 375-379, 2013
122013
Detection of word shift steganography in PDF document
L Lingjun, H Liusheng, Y Wei, Z Xinxin, Y Zhenshan, C Zhili
Proceedings of the 4th international conference on Security and privacy in …, 2008
112008
Efficient anonymous message submission
X Zhao, L Li, G Xue, GJ Ahn
IEEE Transactions on Dependable and Secure Computing, 2016
92016
The Power of Whispering: Near Field Assertions via Acoustic Communications
L Li, G Xue, X Zhao
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
92015
Systems and methods for authenticating a user through an unobservable re-authentication system
L Li, X Zhao, G Xue
US Patent App. 14/476,364, 2014
7*2014
An identity authentication protocol in online social networks
L Li, X Zhao, G Xue
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
72012
An efficient privacy preserving location based service system
X Zhao, H Gao, L Li, H Liu, G Xue
Global Communications Conference (GLOBECOM), 2014 IEEE, 576-581, 2014
52014
A lightweight system to authenticate smartphones in the near field without NFC chips
L Li, X Zhao, G Xue
Communications (ICC), 2013 IEEE International Conference on, 6391-6395, 2013
52013
Text Information Hiding Detecting Algorithm Based on Statistics
Z CHEN, L HUANG, Z YU, L LI, W YANG
Journal of Chinese Computer Systems 12, 006, 2008
52008
RemindU: A secure and efficient location based reminder system
X Zhao, L Li, G Xue
Communications (ICC), 2014 IEEE International Conference on, 1005-1010, 2014
42014
Secure cloud-assisted location based reminder
X Zhao, L Li, G Xue
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20