scispace - formally typeset
T

Teng Li

Researcher at Xidian University

Publications -  35
Citations -  218

Teng Li is an academic researcher from Xidian University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 6, co-authored 23 publications receiving 113 citations.

Papers
More filters
Proceedings ArticleDOI

CDRep: Automatic Repair of Cryptographic Misuses in Android Applications

TL;DR: CDRep is a tool for automatically repairing cryptographic misuse defects in Android apps and is lightweight, the average runtime to generate a patch is merely 19.3 seconds and the size of a repaired app increases by only 0.667% on average.
Journal ArticleDOI

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification

TL;DR: This paper presents a system called DAPV, a system that can find single or collaborative malicious nodes and the paralyzed nodes which behave abnormally in MANETs and demonstrates the effectiveness of the approach by applying it to three scenarios.
Journal ArticleDOI

Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems

TL;DR: This work utilizes ciphertext-policy attribute-based encryption (CP-ABE) to achieve confidentiality and fine-grained access control for IoV data shared in cloud and fog and brings forward a concept of auditable user revocation for CP-ABe to adapt to the dynamic vehicle groups.
Journal ArticleDOI

Dlog: diagnosing router events with syslogs for anomaly detection

TL;DR: Dlog is presented which can automatically transform and compress such low-level and minimally structured syslog messages into meaningful and prioritized high-level network events that can be used in anomaly detection.
Journal ArticleDOI

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing

TL;DR: Wang et al. as mentioned in this paper proposed a hierarchical and time-sensitive CP-ABE scheme, which is characteristics of time sensitive data access control with scalability, revocability, and high efficiency.