Unobservable Re-authentication for Smartphones. L Li, X Zhao, G Xue NDSS, 2013 | 325 | 2013 |
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. Z Chen, L Huang, Z Yu, W Yang, L Li, X Zheng, X Zhao Information Hiding, 224-235, 2008 | 52 | 2008 |
A statistical attack on a kind of word-shift text-steganography L Li, L Huang, X Zhao, W Yang, Z Chen Intelligent Information Hiding and Multimedia Signal Processing, 2008 …, 2008 | 42 | 2008 |
Checking in without worries: Location privacy in location based social networks X Zhao, L Li, G Xue INFOCOM, 2013 Proceedings IEEE, 3003-3011, 2013 | 41 | 2013 |
Steganalysis of synonym-substitution based natural language watermarking Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu | 22* | 2009 |
Detection of synonym-substitution modified articles using context information Z Yu, L Huang, Z Chen, L Li, X Zhao, Y Zhu Future Generation Communication and Networking, 2008. FGCN'08. Second …, 2008 | 19 | 2008 |
Steganalysis on Character Substitution Using Support Vector Machine X Zhao, L Huang, L Li, W Yang, Z Chen, Z Yu Knowledge Discovery and Data Mining, 2009. WKDD 2009. Second International …, 2009 | 17 | 2009 |
Authenticating strangers in online social networks X Zhao, L Li, G Xue International Journal of Security and Networks 6 (4), 237-248, 2011 | 16 | 2011 |
A Proximity Authentication System for Smartphones L Li, X Zhao, G Xue Dependable and Secure Computing, IEEE Transactions on, 1, 2015 | 15 | 2015 |
Near field authentication for smart devices L Li, X Zhao, G Xue INFOCOM, 2013 Proceedings IEEE, 375-379, 2013 | 12 | 2013 |
Detection of word shift steganography in PDF document L Lingjun, H Liusheng, Y Wei, Z Xinxin, Y Zhenshan, C Zhili Proceedings of the 4th international conference on Security and privacy in …, 2008 | 11 | 2008 |
Efficient anonymous message submission X Zhao, L Li, G Xue, GJ Ahn IEEE Transactions on Dependable and Secure Computing, 2016 | 9 | 2016 |
The Power of Whispering: Near Field Assertions via Acoustic Communications L Li, G Xue, X Zhao Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 9 | 2015 |
Systems and methods for authenticating a user through an unobservable re-authentication system L Li, X Zhao, G Xue US Patent App. 14/476,364, 2014 | 7* | 2014 |
An identity authentication protocol in online social networks L Li, X Zhao, G Xue Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 7 | 2012 |
An efficient privacy preserving location based service system X Zhao, H Gao, L Li, H Liu, G Xue Global Communications Conference (GLOBECOM), 2014 IEEE, 576-581, 2014 | 5 | 2014 |
A lightweight system to authenticate smartphones in the near field without NFC chips L Li, X Zhao, G Xue Communications (ICC), 2013 IEEE International Conference on, 6391-6395, 2013 | 5 | 2013 |
Text Information Hiding Detecting Algorithm Based on Statistics Z CHEN, L HUANG, Z YU, L LI, W YANG Journal of Chinese Computer Systems 12, 006, 2008 | 5 | 2008 |
RemindU: A secure and efficient location based reminder system X Zhao, L Li, G Xue Communications (ICC), 2014 IEEE International Conference on, 1005-1010, 2014 | 4 | 2014 |
Secure cloud-assisted location based reminder X Zhao, L Li, G Xue Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 4 | 2013 |