scispace - formally typeset
N

Na Li

Researcher at Prairie View A&M University

Publications -  38
Citations -  952

Na Li is an academic researcher from Prairie View A&M University. The author has contributed to research in topics: Medicine & Biology. The author has an hindex of 12, co-authored 27 publications receiving 861 citations. Previous affiliations of Na Li include University of Texas at Arlington & Northwest Missouri State University.

Papers
More filters
Journal ArticleDOI

Privacy preservation in wireless sensor networks: A state-of-the-art survey

TL;DR: Two main categories of privacy-preserving techniques for protecting two types of private information, data-oriented and context-oriented privacy, respectively are reviewed, and a number of important open challenges for future research are discussed.
Journal ArticleDOI

HUMS: An Autonomous Moving Strategy for Mobile Sinks in Data-Gathering Sensor Networks

TL;DR: In this paper, an autonomous moving strategy for the mobile sinks in data-gathering applications is proposed that cannot only extend network lifetime notably but also provides scalability and topology adaptability.
Journal ArticleDOI

A trust-based framework for data forwarding in opportunistic networks

TL;DR: A trust-based framework to more accurately evaluate an encounter's delivery competency is designed, which can be flexibly integrated with a large family of existing data forwarding protocols designed for OppNets.
Proceedings ArticleDOI

RADON: reputation-assisted data forwarding in opportunistic networks

TL;DR: A reputation-based framework to more accurately evaluate an encounter's competency of delivering data, which can be integrated with a large family of existing data forwarding protocols in opportunistic networks and effectively improves the network performance against "black hole" attacks.
Journal ArticleDOI

Preserving Relation Privacy in Online Social Network Data

TL;DR: Through a taxonomy that categorizes techniques according to the degree of user identity exposure, the authors examine the ways that existing approaches compromise relation privacy and offer more secure alternatives.