6 Publications
2019
Android Malware Detection via Graphlet Sampling
Gao, TianchongPeng, WeiSisodia, DevkishenSaha, Tanay KumarLi, Feng and Al Hasan, Mohammad
IEEE transactions on mobile computing. (pp. 2754-2767). IEEE. Dec 1, 2019. | Magazine Article
2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model
Gao, TianchongLi, FengChen, Yu and Zou, Xu Kai
IEEE transactions on computational social systems, vol. 5, (no. 4), pp. 1009-1020, Dec 2018. | Journal Article
 
Studying the utility preservation in social network anonymization via persistent homology
Gao, Tianchong and Li, Feng
Computers & security, vol. 77, pp. 49-64, Aug 2018. | Journal Article
2017
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks
Liu, QinLiu, QinWang, GuojunWang, GuojunLi, FengLi, FengYang, ShuhuiYang, ShuhuiWu, Jie and Wu, Jie
IEEE transactions on parallel and distributed systems, vol. 28, (no. 5), pp. 1417-1429, May 1, 2017. | Journal Article
2012
On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
Zhao, YaxiongZhao, YaxiongWu, JieWu, JieLi, FengLi, FengLu, Sanglu and Lu, Sanglu
IEEE Transactions on Parallel and Distributed Systems, vol. 23, (no. 8), pp. 1535, 2012-Aug.. | Journal Article
2009
Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks
Lu, Ming MingLu, MingmingLi, FengLi, FengWu, Jie and Wu, Jie
IEEE Transactions on Reliability, vol. 58, (no. 3), pp. 495, 2009-Sept.. | Journal Article