Publications

Books: 


1. R. Li, and M. Ma, Eds., Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, ICTCE 2017, Osaka, Japan,  October 22 - 24, 2017. ACM 2017, ISBN 978-1-4503-5315-1


Book Chapter:


1. R. Li, Y. Owada, M. Ohnishi, and H. Harai, "Security for Regional Network Platform in IoT," Elsevier Big Data Analytics in Cyber-Physical Systems, pp.65-89, 2019. 


Journal Papers:


   102. Y. Wang, H. Wu, and R. Li, “Deep Graph Reinforcement Learning for Mobile Edge Computing: Challenges and Solutions,” IEEE Network. (Accepted)  [IF: 9.3]

   101. W. He, Y. Wang, M. Zhou, R. Li, L. Xie, and J. Cao, “A Robust Adaptive High-precision Entangled Photons Based Ranging System,” IEEE Transactions on Cognitive Communications and Networking. (Accepted)  [IF: 8.6]

   100. Y. Yin, Z. Sun, P. Ruan, R. Li, F. Duan, “Learned Distributed Image Compression with Decoder Side Information,” Digital Communications and Networks. (Accepted)   [IF: 7.9]

   99. H. Zeng, Z. Su, Q. Xu, and R. Li, “Security and Privacy in Space-Air-Ocean Integrated Unmanned Surface Vehicle Networks,” IEEE Network. (Accepted) [IF: 9.3]

   98. H. Nan, R. Li, X. Zhu, J. Ma, and K. Xue, “Spatio-Temporal Identity Multi-Graph Convolutional Network for Traffic Prediction in the Metaverse,” IEEE Journal on Selected Areas in Communications (JSAC), 2023. (Accepted)   [IF: 16.4]

   97. Y. Liu, Z. Su, Y. Xiang, H. Peng, W. Wang, and R. Li, “Zero Trust-Based Mobile Network Security Architecture,” IEEE Wireless Communications Magazine. (Accepted)  [IF: 12.9]

   96. S. Gilla, H. Wu, P. Patros, C. Ottaviani, P. Arora, V. Pujol, D. Haunschild, A. Parlikad, O. Cetinkaya, H. Lutfiyya, V. Stankovski, R. Li, Y. Dingm, J. Qadir, A. Abraham, S. Ghosh, H. Song, R. Sakellariou, O. Rana, J. Rodrigues, S. Kanhere, S. Dustdar, S. Uhlig, K. Ramamohanara and R. Buyya, “Modern computing: Vision and challenges,” Telematics and informatics Reports, 2024. (Accepted) [IF: 9.14]

   95. Y. Wang, Z. Su, Y. Pan, T. Luan, R. Li, S. Yu, “Social-Aware Clustered Federated Learning with Customized Privacy Preservation,” IEEE/ACM Transactions on Networking. (Accepted)

   94. H. Zeng, Z. Su, Q. Xu, and R. Li, “Security and Privacy in Space-Air-Ocean Integrated Unmanned Surface Vehicle Networks,” IEEE Network. (Accepted)  [IF: 9.3]

   93. L. Chen, K. Xue, J. Li, Z. Li, R. Li, N. Yu, Q. Sun, and J. Lu, “REDP: Reliable Entanglement Distribution Protocol Design for Large-scale Quantum Networks,” IEEE Journal on Selected Areas in Communications (JSAC), 2023. (Accepted)  [IF: 16.4]

   92. H. Nan, R. Li, X. Zhu, J. Ma, and D. Niyato, “An Efficient Data-driven Traffic Prediction Framework for Network Digital Twin,” IEEE Network. (Accepted)  [IF: 9.3]   

   91. R. Lu, R. Bai, R. Li, L. Zhu, M. Sun, F. Xiao, D. Wang, H. Wu, and Y. Ding, “A Novel Sequence-to-Sequence based Deep Learning Model for Multi-step Load Forecasting,” IEEE Transactions on Neural Networks and Learning Systems, 2023. (Accepted)  [IF: 14.255]

   90. X. Hu, Z. Shu, Z. Tong, G. Cheng, R. Li, and H. Wu, “Fine-grained Ethereum Behavior Identification via Encrypted Traffic Analysis with Serialized Backward Inference,” Elsevier Computer Networks, 2023. (Accepted)  [IF: 5.6]

   89. C. Tang, H. Wu, R. Li, C. Zhu, and J. Rodrigues, “A Systematic Exploration of Edge Computing-Enabled Metaverse,” IEEE Network, pp.10-17, vol. 37, issue 6, Nov. 2023. [IF: 9.3]  

   88. X. Hu, W. Gao, G. Cheng, R. Li, Y. Zhou, and H. Wu, “Towards Early and Accurate Network Intrusion Detection Using Graph Embedding," IEEE Transactions on Information Forensics & Security. (Accepted)    [IF: 6.8]  

   87.H. Zeng, Z. Su, Q. Xu, R. Li, Y. Wang, M. Dai, T. Luan, X. Sun, and D. Liu, “USV Fleet-Assisted Collaborative Computation Offloading for Smart Maritime Services: An Energy-Efficient Design,” IEEE Transactions on Vehicular Technology, DOI: 10.1109/TVT.2024.3359310, 2023. (Accepted)  [IF: 6.8]  

   86. W. He, Y. Wang, M. Zhou, R. Li, L. Xie, and Z. Su, “An Efficient and Robust Fusion Positioning System Based on Entangled Photons,” IEEE Journal on Selected Areas in Communications (JSAC), pp. 78 - 92, vol. 42, issue 1, Jan. 2024.    [IF: 16.4]

   85. Z. Li, K. Xue, J. Li, L. Chen, R. Li, Z. Wang, N. Yu, D. S.L. Wei, Q. Sun, and J. Lu, “Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions,” IEEE Communications Survey & Tutorials, pp. 2133-2189, vol. 25, issue 4, fourthquarter 2023.    [IF: 35.6]

   84. Z. Wang, J. Li, K. Xue, D. Wei, R. Li, N. Yu, Q. Sun, and J. Lu, “An Efficient Scheduling Scheme of Swapping and Purification Operations for End-to-End Entanglement Distribution in Quantum Networks,” IEEE Transactions on Network Science and Engineering, pp.380 - 391, vol. 11, issue 1, Jan.-Feb. 2024.   [IF: 6.6]

   83. X. Hu, H. Chen, M. Li, G. Cheng, R. Li, H. Wu, and Y. Yuan, “ReplaceDGA: BiLSTM based Adversarial DGA with High Anti-Detection Ability”, IEEE Transactions on Information Forensics & Security, pp.1963-1978, vol. 19, 2023.  [IF: 6.8]  

   82. Y. Wang, Z. Su, A. Benslimane, Q. Xu, M. Dai, and R. Li, "Collaborative Honeypot Defense in UAV Networks: A Learning-Based Game Approach," IEEE Transactions on Information Forensics & Security, 2023.  [IF: 6.8]  

   81. L. Chen, K. Xue, J. Li, R. Li, N. Yu, Q. Sun, and J. Lu, “Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks,” IEEE/ACM Transactions on Networking, pp. 368-381, vol. 32, issue 1, Feb. 2024.  

   80. Y. Wang, Z. Su, T. H. Luan, J. Li, Q. Xu, and R. Li, “SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework,” IEEE Transactions on Information Forensics and Security, pp. 5213 - 5228, vol. 18, 2023.    [IF: 6.8] 

   79. Z. Li, J. Li, K. Xue, D. S. L. Wei, R. Li, N. Yu, Q. Sun, and J. Lu, “Swapping-based Entanglement Routing Design for Congestion Mitigation in Quantum Networks,” IEEE Transactions on Network and Service Management, pp. 3999-4012, vol. 20, issue 4, Dec. 2023.    [IF: 5.3

   78. Y. Wang, Z. Su, Q. Xu, R. Li, T. H. Luan, and P. Wang, “A Secure and Intelligent Data Sharing Scheme for UAV-Assisted Disaster Rescue,” IEEE/ACM Transactions on Networking, pp. 2422-2438, vol. 31, issue 6, Dec. 2023. 

   77. X. Luo, K. Xue, J. Li, R. Li, D. Wei, “Make Rental Reliable: Blockchain-Based Network Slice Management Framework with SLA Guarantee,” IEEE Communications Magazine, pp.142-148, vol. 61, issue 7, July 2023.     [IF: 11.2

   76. Q. Xu, L. Zhao, Z. Su, D. Fang, and R. Li, “Secure Federated Learning in Quantum Autonomous Vehicular Networks”, IEEE Network, pp. 240-247, vol. 37, issue 6, Nov. 2023.  [IF: 9.3]  

   75. M. Wang, J. Li, K. Xue, R. Li, N. Yu, Y. Li, Y. Liu, Q. Sun, and J. Lu, “A Segment-based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks,” IEEE Communications Magazine, pp. 184-190, vol. 61, issue 12, Dec. 2023.   [IF: 11.2] 

   74. J. Han, K. Xue, J. Li, R. Zhuang, R. Li, R. Yu, G. Xue, and Q. Sun, “EdAR: An Experience-driven Multipath Scheduler for Seamless Handoff in Mobile Networks,” IEEE Transactions on Wireless Communications, pp.6839-6852, vol. 22, issue 10, Oct. 2023.  [IF: 10.4

   73. N. Zhao, B. Han, R. Li, J. Su, C. Zhou, "A Multivariate KPIs Anomaly Detection Framework with Dynamic Balancing Loss Training," IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2022.3224803, 2022.   [IF: 5.3] 

   72. L. Chen, K. Xue, J. Li, N. Yu, R. Li, Q. Sun, and J. Lu, “SimQN: a Network-layer Simulator for the Quantum Network Investigation,” IEEE Network, Jan. 2023.   [IF: 9.3]   

   71. R. Xing, Z. Su, T.H. Luan, and R. Li, “Deep-Learning-Driven Secure Offline Blockchain in a Cyber-Physical Social System,” IEEE Network, 36(6), 2022.   [IF: 9.3]   

   70. Y. Xing, K. Xue, Y. Zhang, J. Han, J. Li, D. Wei, R. Li, Q. Sun, and J. Lu, “A Stream-Aware MPQUIC Scheduler for HTTP Traffic in Mobile Networks,” IEEE Transactions on Wireless Communications, DOI: 10.1109/TWC.2022.3213638, 2022.    [IF: 10.4] 

   69. R. Li, P. Narang, M. Aelmans, G. Xue, P. Mueller, and G.-L. Long, “Guest Editorial: Quantuam Communications and Networking,” IEEE Network, 36(5), pp. 4-5, 2022.  [IF: 9.3] 

   68. Y. Cui, X. Xu, R. Li, Y. Pan, “Online Double Auction for Wireless Spectrum Allocation With General Conflict Graph,” IEEE Transactions on Vehicular Technology, vol. 71, issue 11, Nov. 2022.  [IF: 6.8]  

   67. R. Li, T. Hirayama, K. Xue, P. Ruan, and H. Asaeda, “CON: A Computation-Oriented Network for Efficient Edge Intelligence,” IEEE Network, 36 (5), 188-196, 2022.  [IF: 9.3] 

   66. Q. Xu, Z. Su, R. Li, “Security and Privacy in Artificial Intelligence-Enabled 6G,” IEEE Network, 36 (5), 188-196, 2022.   [IF: 9.3] 

   65. L. Chen, K. Xue, J. Li, N. Yu, R. Li, J. Liu, Q. Sun, J. Lu, “A Heuristic Remote Entanglement Distribution Algorithm on Memory-Limited Quantum Paths,” IEEE Transactions on Communications, vol. 70, issue 11, Nov. 2022   [IF: 8.3] 

   64. R. Xing, Z. Su, T. Luan, and R. Li, “Deep Learning Driven Secure Offline Blockchain in Cyber-Physical Social System,” IEEE Network, vol. 36, issue 6, Nov./Dec. 2022.   [IF: 9.3] 

   63. J. Li, M. Wang, K. Xue, R. Li, N. Yu, Q. Sun, and J. Lu, “Fidelity-Guaranteed Entanglement Routing in Quantum Networks,” IEEE Transactions on Communications, vol. 70, issue 10, October 2022.   [IF: 8.3] 

   62. R. Zhuang, J. Han, K. Xue, J. Li, D. Wei, R. Li, Q. Sun, and J. Lu, “Achieving Flexible and Lightweight Multipath Congestion Control through Online Learning,” IEEE Transactions on Network and Service Management, DOI: 10.1109/TNSM.2022.3208747, 2022.     [IF: 5.3] 

   61. P. Manzoni, R. Li, M. Zennaro, S. Figueria, “Guest Editorial Special Issue on Sustainable Solutions for the Internet of Things,” IEEE Internet of Things Journal, vol. 9, issue 10, May 15 2022.  [IF: 10.238]

   60. M. Dai, T. Luan, Z. Su, N. Zhang, Q. Xu, and R. Li, “Joint Channel Allocation and Data Delivery for UAV-Assisted Cooperative Transportation Communications in Post-Disaster Networks,” IEEE Intelligent Transportation Systems Transactions, vol. 23, issue 9, Sept. 2022.   [IF: 8.5

   59. X. Huang, K. Xue, Y. Xing, D. Hu, R. Li, and Q. Sun, “An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking,” Journal of Computer Science and Technology, vol. 37, no. 4, pp. 839–851, July 2022.

   58. R. Xing, Z. Su, T. H. Luan, Q. Xu, Y. Wang, and R. Li, “UAVs Aided Delay Tolerant Blockchain Secure Offline Transactions in Post-Disaster Vehicular Networks,” IEEE Transactions on Vehicular Technology, vol. 71, issue 11, November 2022.  [IF: 6.8]  

   57. J Chen, H Wu, R Li, P Jiao, “Green-Parallel Online Offloading for DSCI-Type Tasks in IoT-Edge Systems,” IEEE Transactions on Industrial Informatics, vol. 18, issue 11, Nov. 2022. [IF: 12.3 

   56. H. Tang, H. Wu, G. Qu, and R. Li, “Double Deep Q-Network based Dynamic Framing Offloading in Vehicular Edge Computing,” IEEE Transactions on Network Science and Engineering, DOI: 10.1109/TNSE.2022.3172794, 2022.   [IF: 6.6] (Highly Cited Paper)

   55. Z. Zhou, M. Shojafar, R. Li, and R. Tafazolli, “EVCT: An Efficient VM Deployment Algorithm for a Software-Defined Data Center in a Connected and Autonomous Vehicle Environment,” IEEE Transactions on Green Communications and Networking, vol. 6, issue 3, Sept.2022. 

   54. J. Li , Y. Deng , W. Sun , W. Li , R. Li, Q. Li , Z. Liu, “Resource Orchestration of Cloud-edge based Smart Grid Fault Detection,” ACM Transactions on Sensor Networks, vol. 18, issue 3, no. 46, pp 1–26, 2022.  (Highly Cited Paper)

   53. Z. Fadlullah, M. Fouda, K. Rabie, and R. Li, “Smart, Optimal, and Explainable Orchestration of Network Slices in 5G and Beyond Networks (Guest Editorial),” IEEE Wireless Communications, vol. 29, issue 1, Feb. 2022. 

   52. A. Lahmadi, E. Bertin, and R. Li, “BRAINS 2020 special issue: Blockchain research and applications for innovative networks and services (Guest Editorial),” International Journal of Network Management, 32(2), 2022. 

   51. M. Xie, H. Wu, and R. Li, “DNN Migration in IoTs: Emerging Technologies, Current Challenges and Open Research Directions,” IEEE Consumer Electronics Magazine, DOI: 10.1109/MCE.2022.3159348, 2022.  

   50. X. Hu, C. Zhu, G. Cheng, Guang, R. Li, H. Wu, and J. Gong, “A Deep Subdomain Adaptation Network with Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway,” IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2022.3160755, 2022.   [IF: 10.238]

   49. X. Hu, C. Zhu, Z. Tong, W. Gao, G. Cheng, R. Li, H. Wu, and J. Gong, “Identifying Ethereum Traffic Based on An Active Node Library and DEVp2p Features,” Future Generation Computer Systems, vol. 132, pp. 162-177, July 2022  [IF: 7.5]

   48. Y. Wang, Z. Su, N. Zhang, R. Li, “Mobile Wireless Rechargeable UAV Networks: Challenges and Solutions,” IEEE Communication Magazine, vol. 60, Issue 3, Mar. 2022.  [IF: 11.2] 

   47. Y. Wang, Z. Su, T. Luan, R. Li, and K. Zhang, "Federated Learning with Fair Incentives and Robust Aggregation for UAV-Aided Crowdsensing", IEEE Transactions on Network Science and Engineering. (Accepted)  [IF: 6.6]

   46. H. Tang, H. Wu, Y. Zhao, and R. Li, “Joint Computation Offloading and Resource Allocation under Task-Overflowed Situations in Mobile Edge Computing,” IEEE Transactions on Network and Service Management. (Accepted)   [IF: 5.3] 

   45. Z. Li, K. Xue, J. Li, N. Yu, D. Wei, and R. Li, “Connection-oriented and Connectionless Remote Entanglement Distribution Strategies in Quantum Networks,” IEEE Network, vol. 36, issue 6, 150-156, Nov./Dec. 2022.  [IF: 9.3]  

   44. Y. Wang, W. Chen, T. H. Luan, Z. Su, Q. Xu, R. Li, and N. Chen,“Task Offloading for Post-disaster Rescue in Unmanned Aerial Vehicles Networks” IEEE/ACM Transactions on Networking, vol. 30, issue 4, pp. 1525-1539, Aug. 2022. (Accepted)

   43. H. Wu, Z. Zhang, N. Wang, C. Tang, and R. Li, “MR-DRO: A Fast and Efficient Task Offloading Algorithm in Heterogeneous Edge/Cloud Computing Environments,” IEEE Internet of Things Journal. (Accepted)  [IF: 10.238]

   42. G. Qu, N. Cui, H. Wu, R. Li, and Y. Ding, “ChainFL: A Simulation Platform for Joint Federated Learning and Blockchain in Edge/Cloud Computing Environments,” IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2021.3117481, 2021. (Accepted)

41. M. Dai, Z. Su, R. Li, and S. Yu, “A SDN-Enabled Approach for Edge-Cloud Computing in Internet of Things,” IEEE Network. (Accepted)   [IF: 9.3]  

    40. M. Xue, H. Wu, R. Li, M. Xu and P. Jiao, “EosDNN: An Efficient Offloading Scheme for DNN Inference Acceleration in Local-Edge-Cloud Collaborative Environment,” IEEE Transactions on Green Communications and Networking, DOI: 10.1109/TGCN.2021.3111731, 2021. (Accepted)

39. L. Cui, Y. Qu, G. Xie, D. Zeng, R. Li, S. Shen, S. Yu, “Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures,” IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2021.3107783, 2021. (Accepted)

38. J. Tao, T. Han, and R. Li, “Deep Reinforcement Learning Based Scheme for Intrusion Detection in Aerial Computing Networks,” IEEE Network, vol. 35, issue 4, July/August 2021.   [IF: 9.3]  

37. G. Qu, H. Wu, R. Li, and P. Jiao, “DMRO: A Deep Meta Reinforcement Learning-based Task Offloading Framework for Edge-Cloud Computing,” IEEE Transactions on Network and Service Management, vol. 18, issue 3, Sept. 2021.   [IF: 5.3]  (Highly Cited Paper)

36. H. Ling, K. Xue, D. Wei, R. Li, “An Efficient Multi-user Multi-keyword Fuzzy Search Scheme over Encrypted Cloud Storage”, Journal of University of Science and Technology of China, vol. 51, issue 7, pp. 562 – 576, 2021.

35. Y. Xing, K. Xue, Y. Zhang, J. Han, J. Li, J. Liu, and R. Li, “A Low-Latency MPTCP Scheduler for Live Video Streaming in Mobile Networks,” IEEE Transactions on Wireless Communications, DOI: 10.1109/TWC.2021.3081498, 2021.   [IF: 10.4] 

34. P. Cong, Y. Zhang, Z. Liu, T. Baker, H. Tawfik, W. Wang, K. Xu, R. Li, and F. Li, “A Deep Reinforcement Learning-based Multi-Optimality Routing Scheme for Dynamic IoT Networks,” Elsevier Computer Networks, vol. 192, 19, June 2021. [IF: 5.6]

    33. D. Zeng, R. Li, Z. Zhou, R. Zhou, R. Langar, and M. Bhuiyan, “Editorial for Special Issue on Flexible Cloud and Edge for Internet-of-Things [Guest Editorial],” Trans. Emerg. Telecommun. Technol. 32(8), 2021.

32. Z. Su, M. Dai, Q. Xu, R. Li, and H. Zhang, “UAV Enabled Content Distribution for Internet of Connected Vehicles in 5G Heterogeneous Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, issue 8, Aug. 2021.

31. R. Li, K. Matsuzono, H. Asaeda, and X. Fu, “Achieving High Throughput for Heterogeneous Networks with Consecutive Caching and Adaptive Retrieval,” IEEE Transactions on Network Science and Engineering, vol. 7, issue 4, Oct.-Dec. 2020.  [IF: 6.6]

30. R. Li, K.-C. Leung, M. Nogueira, T. Taleb, and J. Wu, “Smart Systems and Intelligent Networking Powered with Big Data Analytics [Guest Editorial],” IEEE Transactions on Network Science and Engineering. [IF: 6.6]

29. W. Li, Z. Su, R. Li, K. Zhang, and Y. Wang, “Blockchain Based Data Security for Artificial Intelligence Applications Beyond 5G Networks,” IEEE Network, vol. 34, issue 6, Nov./Dec. 2020.   [IF: 9.3]  

28. R. Li, H. Song, J. Cao, P. Barnaghi, J. Li, C. Mavromoustakis, "Big Data Intelligent Networking [Guest Editorial]," IEEE Network, July/Aug. 2020.  [IF: 9.3]  

27. H. Zhu, Y. Li, R. Li, J. Li, Z. You, and H. Song, “SEDMDroid: An enhanced stacking ensemble of deep learning framework for Android malware detection,” IEEE Transactions on Network Science and Engineering, 10.1109/TNSE.2020.2996379, 2020.   [IF: 6.6]

26. W. Li , Z. Su, R. Li, K. Zhang, and Q. Xu, “Abnormal Crowd Traffic Detection with Crowdsourcing-based RSS Fingerprint Position in Heterogeneous Communications Networks,” IEEE Transactions on Network Science and Engineering. (Accepted)  [IF: 6.6]

25. Y. Qu, J. Zhang, R. Li, X. Zhang, X. Zhai, and S. Yu,  “Generative Adversarial Networks Enhanced Location Privacy in 5G Networks,” SCIENCE CHINA Information Sciences. (Accepted)

24. M. Dai, Z. Su, R. Li, Y. Wang, J. Ni, and D. Fang, “An Edge-Driven Security Framework for Intelligent Internet of Things,” IEEE Network. (Accepted)  [IF: 9.3]  

23. Z. Su, M. Dai, Q. Xu, R. Li, and Shu Fu, “Q-learning Based Spectrum Access for Content Delivery in Mobile Networks,” IEEE Transactions on Cognitive Communications and Networking, DOI: 10.1109/TCCN.2020.2971688, 2020. [IF: 8.000]

22. X. Hu, S. Zheng, G. Zhang, L. Zhao, G. Cheng, J. Gong, R. Li, “An on-demand off-path cache exploration based multipath forwarding strategy,” Elsevier Computer Networks, vol. 166, January 2020. [IF: 5.6]

21. R. Li, and H. Asaeda, "A Blockchain-based Data Lifecycle Protection Framework for Information-Centric Network," IEEE Communications Magazine, vol. 57, no. 6, pp. 20-25, June 2019.  [IF: 11.2] 

20. H. Asaeda, A. Ooka, and K. Matsuzono, and R. Li, " Cefore: Software Platform Enabling Content-Centric Networking and Beyond," IEICE Transactions on Communications, vol.E102-B, no.9, pp.1792-1803, 2019.

19. X. Lu, Z. Chen, L. Wang, R. Li, and C. Zhai, “RF-Drone: Multi-tag System for RF-ID Enables Drone Tracking in GPS-denied Environments,” IEICE Transactions on Communications, vol. E102-B, no.10, pp.1941-1950, 2019.

18. J. Xu, D. Bian, C. Wang, G. Zhang, and R. Li, “Satellite Constellation Based on High Elevation Angle for Broadband LEO Constellation Satellite Communication System,” IEICE Transactions on Communications, vol. E102-B, no.10, pp.1960-1966, 2019.

17. R. Li, and H. Asaeda, "MWBS: An Efficient Many-to-Many Wireless Big Data Delivery Scheme," IEEE Transactions on Big Data, DOI: 10.1109/TBDATA.2018.2878584, 2018.  [IF: 5.670]

16. R. Li, H. Asaeda, and J. Wu, "DCAuth: Data-Centric Authentication for Secure In-Network Big-Data Retrieval," IEEE Transactions on Network Science and Engineering, DOI: 10.1109/TNSE.2018.2872049, 2018.   [IF: 6.6]

15. X. Fu, D. Kutscher, S. Misra, and R. Li, "Information-Centric Networking Security [Guest Editorial]," IEEE Communications Magazine, Nov. 2018.  [IF: 11.2] 

14. R. Li, H. Asaeda, J. Li, and X. Fu, "A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing," Elsevier Digital Communications and Networks, vol. 3, issue 4, pp. 226-235, Nov. 2017. 

13. R. Li, H. Asaeda, and J. Li, "A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT," IEEE Internet of Things Journal, vol. 4, issue 3, pp. 791-803, June 2017.  [IF: 10.238] 

12. R. Li, H. Harai, and H. Asaeda, "An Aggregatable Name-Based Routing for Energy-Efficient Data Sharing in Big Data Era," IEEE Access, vol. 3, pp. 955--966, July 2015. [IF: 4.098]

11. H. Yue, L. Guo, R. Li, H. Asaeda, and Y. Fang, "DataClouds: Enabling Community-based Data-Centric Servcies over Internet of Things," IEEE Internet of Things Journal, vol. 1, issue 5, pp. 472-482, Oct. 2014.  [IF: 10.238]

10. R. Li, J. Li, and H. Asaeda, "A Hybrid Trust Management Framework for Wireless Sensor and Actuator Networks in Cyber-Physical Systems," IEICE Trans. on Information and Systems, vol. E97-D, no. 10, pp. 2586-2596, Oct. 2014. 

9. H. Asaeda, R. Li, and N. Choi, "Container-Based Unified Testbed for Information-Centric Networking," IEEE Network Magazine, vol. 28, issue 6, pp. 60-66, Nov. 2014.  [IF: 9.3]  

8. V. P. Kafle, R. Li, D. Inoue, and H. Harai, "Design and Implementation of Security for HIMALIS Architecture of Future Networks," IEICE Trans. on Communications, vol. E96-D, No.2, Feb. 2013.  

7. R. Li, and M. Inoue, “Secure Sensor Sharing Framework for Mobile and  Sensor Access Platform Network,” IEICE Trans. On Communications, vol. E94-B, no. 6, pp. 1565-1576, June 2011.

6. M. Inoue, M. Ohinishi, C. Peng, R. Li, and Y. Owada, “NerveNet: A Regional Platform Network for Context-Aware Services with Sensors and Actuators,” IEICE Trans. On Communications, vol. E94-B, no.3, pp. 618-629, Mar. 2011.

5. R. Li, and J. Li, “Requirements and Design for Neutral Trust Management Framework in Unstructured Networks,” The Journal of Super Computing, DOI 10.1007/s11227-010-0502-3, Nov. 2010. [IF: 2.16]

4. J. Li, R. Li, and J. Kato, “Future Trust Management Framework for Mobile Ad Hoc Networks,” IEEE Communications Magazine, Vol. 46, no.4, pp. 108-114, Apr. 2008.  [IF: 11.2] 

3. R. Li, J. Li, K. Wu, Y. Xiao, and L.-J. Xie, "An Enhanced Fast Handover Scheme with Low Latency for Mobile IPv6," IEEE Transactions on Wireless Communications, vol.7, issue 1, pp. 334-342, January, 2008.  [IF: 10.4] 

2. R. Li, J. Li, and H.-H. Chen, “DKMS: Distributed Hierarchical Access Control for Multimedia Networks, ” International Journal of Security and Networks, Vol. 2, no. 1/2, 2007.

1. R. Li, J. Li, P. Liu and H.-H. Chen, “On Demand Public-Key Management for Mobile Ad Hoc Networks,” Wiley's Journal of Wireless Communications and Mobile Computing, Vol. 6, no. 3, pp. 295-306, May, 2006.

 

International Conference Papers:

 


72. C. Song, B. Han, R. Li, X. Han, C. Liu and J. Su, “Aquilas: Adaptive QoS-oriented Multipath Packet Scheduler with Hierarchical Intelligence for QUIC,” 43rd IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2024). (Accepted)

71. T. Takakubo, R. Li, H. Nan, Q. Jin, Z. Su, and H. Wu, “ECPAS: A Blockchain-based E-Commerce Price Auditing System,” IEEE ICC 2024. (Accepted)

70. H. Liu, Y. Wang, Z. Su, Z. Wang, Y. Pan, and R. Li, “TRACEGADGET: Detecting and Tracing Network Level Attack Through Federal Provenance Graph,” IEEE ICC 2024. (Accepted)

69. H. Jiang, S. Wang, C. Tang, H. Wu, and R. Li, “Reschedulable Task Allocation Strategy in Cloud-Edge-End Cooperative Mobile Crowd Sensing,” IEEE ICC 2024. (Accepted)

68C. Tang; Y. Ding, S. Xiao, H. Wu, and R. Li, “Joint Optimization of Service Caching Task Offloading and Resource Allocation in Cloud-Edge Cooperative Network,” IEEE ICC 2024. (Accepted)

67. J. Han, K. Xue, W. Wang, R. Li, Q. Sun, and J. Lu, “RateMP: Optimizing Bandwidth Utilization with High Burst Tolerance in Data Center Networks,” IEEE International Conference on Computer Communications (IEEE INFOCOM 2024), 2024. (Accepted)   [acceptance ratio: 19.6%]

66. K. Fan, H. Wu, and R. Li, “Codecs for DNA-based Data Storage Systems with Multiple Constraints for Internet of Things,” IEEE Globecom 2023, 2023. (Accepted) 

65. L. Xie, Z. Su, N. Chen, and R. Li, “Differential Privacy-Based Incentive Scheme for App-Assisted Mobile Edge Crowdsensing,” IEEE Globecom 2023, 2023. (Accepted) 

64. X. Hu, Y. Shi, G. Cheng, R. Li, H. Wu, and G. Wang, “Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism,” IEEE Globecom 2023, 2023. (Accepted) 

63. Y. Xie, J. Zhao, B. Zhu, J. Li, R. Li, and K. Xue, “Achieving Privacy-Preserving Outsourced SVM Training with Non-linear Kernel,” IEEE Globecom 2023, 2023. (Accepted) 

62. Q. Jiang, Z. Xu, X. Luo, X. Zhang, K. Xue, and R. Li, “AcCrowd: Blockchain-based Crowdsourcing with Worker Anonymity and Payment Correctness,” IEEE Globecom 2023, 2023. (Accepted)

61. L. Yuan, Z. Zhong, Y. Lim, and R. Li, “Study of Quantum Error Corrected Fidelity Routing Design for Quantum Networks,” European Wireless (EW 2023), Rome, Italy, Oct. 2023. (Accepted) 

60. X. Han, B. Han, R. Li, and X. Ji, “MARS: An Adaptive Multi-Agent DRL-based Scheduler for Multipath QUIC in Dynamic Networks,” IEEE/ACM International Symposium on Quality of Service (IEEE/ACM IWQoS 2023). (Accepted)   [acceptance ratio: 23.48%]

59. K. Ding, J. Yang, J. Han, B. Wang, R. Li, and K. Xue, “RPBV: Reputation-Based Probabilistic Batch Verification Scheme for Named Data Networking,” IEEE/ACM International Symposium on Quality of Service (IEEE/ACM IWQoS 2023). (Accepted)    [acceptance ratio: 23.48%]

58. Z. Xu, X. Luo, K. Xue, D. Wei and R. Li, “SeRedact: Secure and Efficient Redactable Blockchain with Verifiable Modification,” 42nd IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2023). (Accepted)    [acceptance ratio: 18.9%]

57. Y. Liu, J. Han, K. Xue, R. Li and J. Li, “L2BM: Switch Buffer Management for Hybrid Traffic in Data Center Networks,” 42nd IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2023). (Accepted)   [acceptance ratio: 18.9%]

56. S. Fukumoto, R. Li, and Z. Su, “Performance Investigations on Integrating Federated Learning with Future Networks,” IEEE ICC 2023. (Accepted)

55. X. Hu, B. Lin, G. Cheng, R. Li, H. Wu, “Detecting Cryptomining Traffic over an Encrypted Proxy Based on K-S Test,” IEEE ICC 2023. (Accepted)

54. J. Yang, H. Zhou, R. Li, J. Zhang, and R. Chen, “Covert Communication by Exploiting a Full-Duplex Cognitive Receiver in CR network,” IEEE ICC 2023. (Accepted)

53. X. Hu, N. Li, G. Cheng, R. Li, Hua Wu, “A Novel Darknet Traffic Classification Method based on Knowledge Graph with Dynamic Embedding Learning,” IEEE ICC 2023. (Accepted)

52. Y. Wang, Z. Su, Y. Pan, A. Benslimane, Y. Liu, T. H. Luan, and R. Li, “Trade Privacy for Utility: A Learning-Based Privacy Pricing Game in Federated Learning,” IEEE ICC 2023. (Accepted)

51. X. Hu, Y. Gao, G. Cheng, H. Wu, and R. Li, “A Learning-based Honeypot Game for Collaborative Defense in UAV Networks,” IEEE Globecom 2022, Dec. 2022.

50. X. Hu, Y. Gao, G. Cheng, H. Wu, and R. Li, “An Adversarial Learning-based Tor Malware Traffic Detection Model,” IEEE Globecom 2022, Dec. 2022.

49. R. Cong, Y. Liu, Y. Wang, K. Tago, R. Li, H. Asaeda, and Q. Jin, “Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE,” Human-Computer Interaction International (HCII 2022), 2022.

48. X. Ji, B. Han, R. Li, C. Xu, and Y. Li, “ACCeSS: Adaptive QoS-aware Congestion Control for Multipath TCP,” IEEE/ACM International Symposium on Quality of Service (IEEE/ACM IWQoS 2022), 2022. [acceptance ratio: 24.3 %]

47. H. Zeng, R. Li, Z. Su, Q. Xu, M. Dai, T. H. Luan, Y. Wang, D. Liu, X. Sun, “Collaborative Computation Offloading for UAVs and USV Fleets in Communication Networks,” International Wireless Communications and Mobile Computing Conference (IWCMC 2022), May 30-June 3, 2022. 

46. X. Luo, Z. Xu, K. Xue, Q. Jiang, R. Li and D. Wei, “ScalaCert: Scalability-Oriented PKI with Redactable Consortium Blockchain Enabled ``On-Cert'' Certificate Revocation,” 42nd IEEE International Conference on Distributed Computing Systems (IEEE ICDCS 2022), 2022. [acceptance ratio: 19.7%]

45. H. Yamanaka, Y. Teranishi, Y. Hayamizu, A. Ooka, K. Matsuzono, R. Li, and H. Asaeda, “User-centric In-network Caching Mechanism for Off-chain Storage with Blockchain,” IEEE ICC 2022, May 2022.

44. R. Xing, Z. Su, T. Luan, Q. Xu, Y. Wang, R. Li, and A. Benslimane, “UAVs Assisted Secure Blockchain Offline Transactions for V2V Charging Among Electric Vehicles in Disaster Area,” IEEE ICC 2022, May 2022.

43. X. Hu, M. Li, G. Cheng, R. Li, H. Wu, and J. Gong, “Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples,” IEEE ICC 2022, May 2022.

42. R. Cong, Y. Liiu, K. Tago, R. Li, H. Asaeda, and Q. Jin, “Individual-Initiated Auditable Access Control for Privacy-Preserved IoT Data Sharing with Blockchain,” IEEE ICC 2021 the 3rd International Workshop on Data Driven Intelligence for Networks and Systems, 2021, May 2021.

41. R. Li, H. Asaeda, “FSCC: Flexible Smart Contract Interaction with Access Control for Blockchain,” IEEE ICC 2021, 2021. 

40. P. Cong, Y. Zhang, W. Wang, K. Xu, R. Li, and F. Li, “A Deep Reinforcement Learning-based Routing Scheme with Two Modes for Dynamic Networks,” IEEE ICC 2021, 2021. 

39. Q. Xu, Z. Su, R. Li, K. Asatani, “Game Theoretical Secure Bandwidth Allocation in UAV-assisted Heterogeneous Networks,” IEEE ICC 2021, 2021.

38. S. Gao, S. Yao, and R. Li, “Transferable Adversarial Defense by Fusing Reconstruction Learning and Denoising Learning,” IEEE INFOCOM BigSecurity 2021, 2021. 

37. Y. Wang, Z. Su, Q. Xu, R. Li, H. Luan, "Lifesaving with RescueChain: Energy-Efficient and Partition-Tolerant Blockchain Based Secure Information Sharing for UAV-Aided Disaster Rescue," IEEE International Conference on Computer Communications (IEEE INFOCOM 2021), 2021.  [acceptance ratio: 19.7%]

36. X. Huang, K. Xue, Y. Xing, D. Hu, R. Li, Q. Sun, “FSDM: Fast Recovery Saturation Attack Detection and Mitigation Framework in SDN,” The 17th IEEE International Conference on Mobile Ad-Hoc and Smart Systems (IEEE MASS 2020), 2020. 

35. Z. Su, M. Dai, Q. Xu, and R. Li, “A Novel Resource Allocation Scheme With Unmanned Aerial Vehicles in Disaster Relief Networks,” 2020 IEEE/CIC International Conference on Communications in China (ICCC 2000), 2020. 

34. X. Hu, J. Yin, S. Zheng, R. Li, G. Cheng, and J. Gong, “Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission,” IEEE Global Communications Conference 2020 (IEEEE GLOBECOM 2020), Dec. 2020. 

33. Y. Wang, Z. Su, N. Zhang, A. Benslimane, R. Li, and Y. Wang, “Security-Aware Resource Sharing in Software Defined Air-Ground Integrated Networks: A Game Approach,” IEEE Global Communications Conference 2020 (IEEE GLOBECOM 2020), Dec. 2020. 

32. X. Hu, J. Yin, S. Zheng, R. Li, G. Cheng, and J. Gong, “A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN,” IEEE Global Communications Conference 2020 (IEEE GLOBECOM 2020), Dec. 2020.

31. W. Chen, Z. Su, Q. Xu, T. Luan, and R. Li,“VFC-Based Cooperative UAV Computation Task Offloading for Post-disaster Rescue,” IEEE International Conference on Computer Communications (IEEE INFOCOM 2020), July 2020.   [acceptance ratio: 19.1%]

30. R. Li, and H. Asaeda, “DIBN: A Decentralized Information-Centric Blockchain Network,” IEEE Global Communications Conference 2019 (IEEE GLOBECOM 2019), Hawaii, USA, Dec. 2019.

29. G. Cheng, X. Zhao, X. Hu, S. Zheng, H. Wu, R. Li, and C. Fan, “Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View,” The ICDCS workshop on network meets intelligent computations (NMIC 2019), July 2019.

28. X. Hu, S. Zheng, J. Gong, G. Cheng, G. Zhang, R. Li, “Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking,” The 14th International Conference on Future Internet Technologies (CFI 2019), June 2019.

27. R. Li, K. Matsuzono, H. Asaeda, and X. Fu, "Consecutive Caching and Adaptive Retrieval for In-Network Big Data Sharing," IEEE International Conference on Communications (IEEE ICC 2018), Kansas, USA, May 2019. 

26. R. Li, and H. Asaeda, "Secure In-Network Big Data Provision with Suspension Chain Model," IEEE Conference on Computer Communications workshop on BigSecurity 2018, Honolulu, Apr. 2018.

25. R. Li, H. Asaeda, J. Li, and X. Fu, "A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT," IEEE International Conference on Communications (IEEE ICC 2017), Paris, 2017. 

24. R. Li, H. Asaeda, and K. Moessner, “Optimized Root Selection Algorithm for Many-to-Many Communications in ICN,”  The 11th International Conference on Future Internet Technologies (CFI 2016), June 15-17 2016.

23. S. Fu, J. Li, R. Li, and Y. Ji, “A Game Theory based Vertical Handoff Scheme for Wireless Heterogeneous Networks,” The IEEE 10th International Conference on Mobile Ad-hoc and Sensor Networks (MSN-2014), pp. 220-227, 2014.

22. R. Li, K. Morioka, Y. Owada, M. Ohishi, and H. Harai, “Design and Implementation of A Proactive Distributed Authentication Framework (PDAF),” IEEE International Conference on Network Protocols 2013 (ICNP 2013) workshop on Secure Network Protocol, Oct. 2013.

21. R. Li, H. Asaeda, “A Community-Oriented Route Coordination Using Information Centric Networking Approach,” The 38th IEEE Conference on Local Computer Networks (LCN 2013), Oct. 2013.

20. F. Ganz, R. Li, P. Barnaghi, and H. Harai, “A Resource Mobility Scheme for Service Continuity in the Internet of Things,” IEEE International Conference on Internet of Things 2012 (iThings 2012), Nov. 2012.

19. R. Li, Ved P. Kafle, and H. Harai, “A Proactive Scheme for Securing ID/Locator Split Architecture,” IEEE International Conference on Network Protocols 2012 (ICNP 2012) workshop on Secure Network Protocol, Oct. 2012.

18. Ved P. Kafle, R. Li, H. Tazaki, and H. Harai, “Network Mobility Management in HIMALIS Architecture of Future Networks,” IEEE Globecom 2012 workshop, The 4th IEEE International Workshop on Mobility Management in the Networks of the Future World (MobiWorld 2012), 2012.

17. R. Li, and H. Harai, “ANBR: An Aggregatable Named based Routing for Information-Centric Network,” 9th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT 2012), Chile, Nov. 5-9, 2012.

16. R. Li, M. Ohnishi, Y. Owada, and H. Harai, “PDAF: Proactive Distributed Authentication Framework for Regional Network,” The 7th Asia Joint Conference on Information Security (AsiaJCIS 2012), Tokyo, Japan, Aug. 9-10, 2012.  

15. R. Li, and H. Harai, “A Scalable Named Information Network Architecture (NINA),” NDN hand-on research workshop, Seoul National University, Mar. 19-21, 2012.

14. Ved P. Kafle, R. Li, D. Inoue, and H. Harai, “An Integrated Security Scheme for ID/Locator Split Architecture of Future Network,” International Conference on Communications 2012 (ICC 2012) workshop on Future Network (FutureNet V), June 2012.

13. R. Li, M. Inoue, and Hiroaki Harai, “Scalable Named Information Network,” World Telecommunications Congress (WTC 2012), Mar. 5-6, 2012.  

12. R. Li, and M. Inoue, “Secure Sensor Sharing Framework through Unbundling Sensor Owners and Service Providers,” The 26th International Technical Conference on Circuits/Systems,

Computers and Communications (ITC-CSCC 2011), pp. 65-68, June 19-22, 2011.

11. R. Li, and M. Inoue, “Framework Design for Secure Sensor Sharing,” International Conference on Communications 2011 (ICC 2011) workshop on Future Network (FutureNet IV), June 5-9, 2011.

10. R. Li, M. Ohnishi, C. Peng, V. Kafle, and M. Inoue, “Capacity Determination for Deployment of Managed Mesh Networks,” The 20th Personal, Indoor and Mobile Radio Communications Symposium 2009 (PIMRC’09), Sept. 13-19, 2009. 

9. R. Li, J. Li, “Towards Neutral Trust Management Framework in Unstructured Networks,” The 2009 IEEE International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-09), Oct. 12-14, 2009, Macau, China.   

8. R. Li, J. Li, P. Liu, and J. Kato, “A Novel Hybrid Trust Management Framework for MANETs,” International Workshop on Next Generation Network Architecture, in conjunction with ICDCS 2009, June 22, 2009, Montreal, Canada.

7. W. Wei, W. Wang, and R. Li, “Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology,” 2008 IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008)APSCC, Dec. 9-12, 2008, Yilan, Taiwan.

6. W. Wei, Y. Qi, W. Wang, R. Li, Y. Shi, Y. Gu, “Variant Rate Based Cross Layer Time Frame Scheduling in Wireless Sensor Networks,” the 2008 IEEE Wireless Telecommunications Symposium (IEEE WTS 2008), Pomona, California, USA, April 24-26 , 2008

5. R. Li, J. Li, P. Liu and H.-H. Chen, “An Objective Trust Management Framework for Mobile Ad Hoc Networks,” 2007 IEEE 65th Vehicular Technology Conference VTC 2007 Spring (IEEE VTC 2007 Spring), 23 C 25 April 2007, Dublin, Ireland.

4. R. Li and J. Li, “An Enhanced Fast Handover Scheme for Mobile IPv6,” International Wireless Communications and Mobile Computing Conference (IWCMC 2006), July 3 - 6, 2006, Vancouver, Canada.

3. R. Li, J. Li, and H.-H. Chen, “Analysis and Design of Distributed Hierarchical Access Control for Multimedia Networks,” Proceedings of the IEEE 2005 Global Communications Conference (IEEE GlobeCom 2005), Nov. 28 - Dec. 2, 2005, St. Louis, MO, USA.

2. R. Li, J. Li and H. Kameda, “Distributed Hierarchical Access Control for Secure Group Communications,” in 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05), LNCS 3169, pp. 539-548, Zhangjiajie, China, 2005.

1. R. Li, J. Li, H. Kameda and P. Liu, “Localized Public-Key Management for Mobile Ad Hoc Networks,” Proceedings of the IEEE 2004 Global Communications Conference (IEEE GlobeCom 2004), Nov. 29 - Dec. 3, 2004, Dallas, Texas, USA.


Standardization (IETF Internet Drafts):

 

1. C. Wang, A. Rahman, R. Li, M. Aelmans, and K. Chakraborty, “Applications and Use Cases for the Quantum Internet,” Internet Draft, Feb. 2020. [ver. 05, 06, 07, 08, 09, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19] https://tools.ietf.org/html/draft-wang-qirg-quantum-internet-use-cases-05, 06, 07, 08, 09, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19. 

2. R. Li, and H. Asaeda, "Requirements for Key Management Schemes in Content-Centric Networking/Named Data Networking," Internet Draft, (work-in-progress) Mar. 2018. [ver. 00]

3. R. Li, and H. Asaeda, "HopAuth: Hop-by-Hop Authentication with Suspension Chain Model," IETF ICNRG, Mar. 29, 2019.

4. R. Li, and H. Asaeda, “Hop-by-Hop Authentication in Content-Centric Networking/Named Data Networking,” Internet Draft, July 2019. [ver. 00] (work-in-progress) https://tools.ietf.org/html/draft-li-icnrg-hopauth-00

5. R. Li, and H. Asaeda, “Hop-by-Hop Authentication in Content-Centric Networking/Named Data Networking,” Internet Draft, Nov. 2019. [ver. 01] https://tools.ietf.org/html/draft-li-icnrg-hopauth-01

6. C. Wang, A. Rahman, and R. Li, “Applications and Use Cases for the Quantum Internet,” Internet Draft, Feb. 2020. [ver. 02] https://tools.ietf.org/html/draft-wang-qirg-quantum-internet-use-cases-02 

7. R. Li, and H. Asaeda, “Hop-by-Hop Authentication in Content-Centric Networking/Named Data Networking,” Internet Draft, Mar. 2020. [ver. 02] https://tools.ietf.org/html/draft-li-icnrg-hopauth-02

8. C. Wang, A. Rahman, and R. Li, “Applications and Use Cases for the Quantum Internet,” Internet Draft, Feb. 2020. [ver. 02, 03, 04] https://tools.ietf.org/html/draft-wang-qirg-quantum-internet-use-cases-02 03, 04. 

9. C. Wang, A. Rahman, R. Li, and M. Aelmans, “Applications and Use Cases for the Quantum Internet,” Quantum Internet Research Group Working Group Draft, Feb. 2020. [ver. 00] https://datatracker.ietf.org/doc/draft-irtf-qirg-quantum-internet-use-cases/?include_text=1



Keynotes and Invited Talks:

 

1. “Data Life-Cycle Protection for Ubiquitous Data Sharing,” IEICE Network Systems Kenkyukai, April 16, 2020.

2. “Blockchain Meets In-Network Big Data Sharing,” 2020 5th International Conference on Big Data and Computing, May 28-30 2020.

3. “Blockchain for/with Information-Centric Network,” IEICE Digital Service Platform Technology Kenkyukai, Dec. 26, 2019.

4. “Data-Centric Security for In-Network Big Data Sharing,” 2018 International Conference on Big Data and Machine Learning (BDML 2018), Nov. 24, 2018. 

5. “Information Centric Network for Internet of Things,” the 3rd International Symposium on Big Data and Networking (BDN2017), Aizu, Japan, Nov. 26-27, 2017. 

6. “Information-Centric Network Security and Experiments,” 2017 International Conference on Telecommunications and Communication Engineering (ICTCE 2017), Oct. 22-24, 2017.

7. “A Distributed Authentication and Authorization Scheme for In-Network Big Data Sharing,” APSCIT 2017 Annual Meeting, July 30, 2017.

               and etc.


Technical Reports:

 

     37. 田中歩武, 李 睿棟, 大和田泰伯, “災害救護のための情報指向動的ネットワークに関する研究,” IEICE ICN Technical Report, Aug. 22, 2023.

     36. 中橋徳子, 李 睿棟, “車車間通信におけるブロックチェーンに基づく階層的な信頼性評価方法,” IEICE SeMI Technical Report, Jan. 21, 2022.

     35. 福本 駿, 李 睿棟, “連合学習におけるストラグラーによる影響 に関する研究,” IEICE SeMI Technical Report, Jan. 21, 2022.

     34. 平山智己, 李 睿棟, “分散型機械学習に向けた名前ベース学習ネットワーク,” IEICE SeMI Technical Report, Jan. 21, 2022.

33. R. Li, and H. Asaeda, "DataTrust: A Data-Centric Any-to-Any Authentication Scheme," IEICE IA Technical Report, Mar. 5, 2018. 

32. R. Li, and H. Asaeda, "DPD-ICIoT: A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT," IEICE IA Technical Report, A2016-85, Jan. 27, 2017. 

31. R. Li, and H. Asaeda, "Community-Oriented Information Centric Network," NICT Journal, vol.61, no.2, pp.127-132, 2015.

30. R. Li,  and H.Asaeda, “Toward the Implementation of Community-oriented Cyber Physical Systems,” IEICE ICN Technical Report, July 3 2015.   

29. R. Li, K. Matsuzono, and H.Asaeda, “A Survey on Mobility Management for Information-Centric Network,” IEICE MoNA Technical Report, Jan. 2015. 

28. R. Li, and H.Asaeda, “Community-Oriented Communication Using Information-Centric Network Approach,” IEICE IN Technical Report, June 2013.

27. R. Li, V. P. Kafle, and M. Inoue, “ITU-T IoT Standardization Progress,” IoT.est General Assembly, May 13-17, Osanabrueck, Germany, 2013.

26. Ruidong Li, Kazuyuki Morioka, Yasunori Owada, Masaaki Ohishi, and Hiroaki Harai, “Implementation and Experiments of Proactive Distributed Authentication Framework over Regional Network,”IEICE IN Technical Report, Apr. 2013.

25. R. Li, and H. Harai, “NINA: A Named Information Network Architecture,” University of Tsukuba, July 12, 2012.

24. R. Li, Ved P. Kafle and H. Harai, “Self-Protectable Secure Name Mapping System (S2NMS),” IEICE Technical Report, ICSS 2011-42, pp. 17-24, Tokyo, Mar. 16, 2012.

23. R. Li, Ved P. Kafle, and M. Inoue, “ITU-T Standardization Activities on IoT,” 3rd IoT.est General Assembly, May 30-31, Bucharest, Romania, 2012.

22. Ved P. Kafle, R. Li, D. Inoue, and H. Harai, “Integrated Security Approach for ID/Locator Split-based Network,” IEICE Technical Report, IN2011-198, pp. 365-370, Miyazaki, Mar. 9, 2012.

21. R. Li, Masaaki Ohnishi, Yasunori Owada, and H. Harai, “Proactive Distributed Authentication Framework (PDAF) for Regional Network,” IEICE Technical Report, IN 2011-100, pp. 43-48, Fukuoka, Nov. 18, 2011.

20. R. Li, Ved P. Kafle and H. Harai, “Proactive Trustworthy ID/Locator Separation Framework (PTISF),” IEICE Technical Report, IN 2011-91, pp. 69-74, Osaka, Oct. 21, 2011.

19. R. Li, and H. Harai, “Named Information Network,” IEICE Technical Report, NS 2011-81, pp. 127-132, Sendai, Sept. 2, 2011.

18. R. Li, and M. Inoue, “A Proposal of Trustworthy Information-Oriented Network (TION),” IEICE Technical Report, IN 2010-190, pp. 277-282, Okinawa, Mar. 4, 2011.

17. (Invited Talk) M. Inoue, M. Ohnishi, R. Li, and Y. Owada, “A Network Integrating Wireless Multihop and Distributed Information Processing, ” IEICE Technical Report, RCS/MoMuC/SR workshop, pp.67-74, Mar. 3, 2011.

16. R. Li, and M. Inoue, “A Comparative Survey on Information-Centric Network,” IEICE Technical Report, IN 2010-139, pp 121-126, Osaka, Jan. 21, 2011.

15. R. Li, and M. Inoue, “Secure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers,” IEICE Technical Report, MoMuC 2010-36, pp 77-82, Fukuoka, Sept. 9-10, 2010.

14. R. Li, Ved P. Kafle, and M. Inoue, “Trust, Security, Privacy in IoT.est,” 1st IoT.est General Assembly, Oct. , Surrey, U. K., 2010.

13. R. Li, and M. Inoue, “S3F: Secure Sensor Sharing in NerveNet,” Forum on Information Technology 2010 (FIT 2010), L-037, Fukuoka, Sept. 7-9, 2010.

12. M. Inoue, V. Kafle, T. Umezawa, M. Ohnishi, R. Li, and Y. Owada, “Research Status for Mobile Access Network Architecture –NerveNet & ID/Locator Separation,” IEICE NWGN Workshop 2010, Kakojima, Aug. 16-17, 2010.

11. M. Inoue, M. Ohnishi, Y. Owada, R. Li, T. Umezawa, V. Kafle, and H. Morino, “NerveNet: Distributed Wireless Regional Network for Sensor Information Dissemination,” the 4th New Generation Network Workshop, Koganei, Tokyo, June. 23, 2010.

10. R. Li, M. Inoue, “Trustable Network Concept for Diverse Interests Accommodation in New Generation Network (NWGN),” IEICE General Conference, Mar. 2010.

9. C. Peng, M. Ohnishi, and R. Li, M. Inoue, “A New Algorithm on Finding Multiple Disjoint Paths for Reliable Wireless Mesh Networking,” IEICE General Conference, Mar. 2010.

8. C. Peng, M. Ohnishi, R. Li, and M. Inoue, “Cost-Effective Base Station Layout Algorithms for Multiple-cell Networks,”IEICE Mobile Communication Workshop, Yokosuka Research Park, Mar. 3-6, 2010.

7. R. Li, M. Inoue, “Study on Trust & Security Goals and Requirements for New Generation Network (NWGN),” IEICE Technical Report, NWGN, Nov. 12, 2009.

6. R.. Li, J. Li, “Invited Talk: Security Architecture Establishment and Mobility Management for Information Networks,” IPSJ Technical Report, Vol.2009-MBL-50 No.10, Sept. 11, 2009.

5. R. Li, M. Ohnishi, C. Peng, Ved P. Kafle, and M. Inoue, “On Capacity Analysis of Managed Mesh Network,” IEICE Technical Report, AN2009-4, pp.17-22, May 22, 2009.

4. R. Li, M. Ohnishi, C. Peng, and M. Inoue, “Queueing Analysis on Capacity of Community Mesh Network,” IEICE General Conference, Mar. 2009.

3. M. Ohnishi, R. Li, C. Peng, and M. Inoue, “A Study on the Wireless Mesh Network Performance Model Based on the Base Stations’ Topology,” IEICE General Conference, Mar. 2009.

2. M. Ohnishi, R. Li, C. Peng, and M. Inoue, “A Study on the Performance Evaluation Model of Wireless Mesh Networks,” IEICE Technical Report, AN2008-45, pp.93-98, Oct. 15, 2008.

1. D. Hiroki, R. Li, “A Development of WEB Environment Simulator for Mobile Ad hoc Network,” System Development Project Technical Report, Tsukuba University,   pp. 17-25, 2006.

 

Patents:

 

1. R. Li, and M. Inoue, “Flexible Secure Sensor Sharing Framework (S3F),” JP patent number: 5548952.

2. R. Li, M. Inoue, and H. Harai, “Information Name-Integrated Registration and Retrieval Method over Cacheable Network,” JP patent number: 5831927, Nov. 2015.

3. R. Li, V. Kafle, and H. Harai, “Proactive Trustworthy ID/Locator Separation Framework (PTISF),” JP patent number: 5780648, July 2015.

4. R. Li, V. Kafle, and H. Harai, “Self-Protectable Secure Name Mapping System (S2NMS),” JP patent number: 5807912, Sept. 2015.