Shan Cang Li
#167,663
Most Influential Person Now
Shan Cang Li's AcademicInfluence.com Rankings
Shan Cang Liengineering Degrees
Engineering
#7486
World Rank
#8862
Historical Rank
Electrical Engineering
#2343
World Rank
#2451
Historical Rank

Shan Cang Licomputer-science Degrees
Computer Science
#10205
World Rank
#10701
Historical Rank
Database
#7152
World Rank
#7400
Historical Rank

Download Badge
Engineering Computer Science
Shan Cang Li's Degrees
- PhD Electrical Engineering and Computer Sciences University of California, Berkeley
- Masters Electrical Engineering and Computer Sciences University of California, Berkeley
- Bachelors Electrical Engineering and Computer Sciences University of California, Berkeley
Why Is Shan Cang Li Influential?
(Suggest an Edit or Addition)Shan Cang Li's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- The internet of things: a survey (2015) (7517)
- Internet of Things in Industries: A Survey (2014) (3972)
- 5G Internet of Things: A survey (2018) (911)
- Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things (2013) (541)
- QoS-Aware Scheduling of Services-Oriented Internet of Things (2014) (243)
- Integration of hybrid wireless networks in cloud services oriented enterprise information systems (2012) (218)
- The Internet of Things: a security point of view (2016) (212)
- A decision support system for product design in concurrent engineering (2007) (178)
- Time-aware distributed service recommendation with privacy-preservation (2019) (135)
- An IoT-Oriented data placement method with privacy preservation in cloud environment (2018) (106)
- A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things (2014) (105)
- Lightweight cryptography methods (2017) (100)
- A Continuous Biomedical Signal Acquisition System Based on Compressed Sensing in Body Sensor Networks (2013) (83)
- Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks (2014) (82)
- IoT Forensics: Amazon Echo as a Use Case (2019) (79)
- Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing (2021) (70)
- Spatial-temporal data-driven service recommendation with privacy-preservation (2020) (69)
- Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment (2020) (68)
- Blockchain Enabled Industrial Internet of Things Technology (2019) (64)
- A long short‐term memory‐based model for greenhouse climate prediction (2021) (57)
- Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems (2019) (48)
- A Heuristic Offloading Method for Deep Learning Edge Services in 5G Networks (2019) (47)
- Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network (2016) (44)
- Robust Collaborative Filtering Recommendation With User-Item-Trust Records (2021) (44)
- Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems (2019) (42)
- A Secure and Anonymous Communicate Scheme over the Internet of Things (2022) (39)
- Securing the Internet of Things (2017) (38)
- Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques (2020) (38)
- Industrial wireless sensor networks 2016 (2017) (30)
- MIAEC: Missing Data Imputation Based on the Evidence Chain (2018) (29)
- Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems (2018) (29)
- QoS scheme for multimedia multicast communications over wireless mesh networks (2010) (27)
- Industrial Wireless Sensor Networks (2014) (27)
- Local Semidefinite Programming-Based Node Localization System for Wireless Sensor Network Applications (2014) (24)
- Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation (2019) (23)
- A Novel Manifold Learning Algorithm for Localization Estimation in Wireless Sensor Networks (2007) (21)
- An LSH-based Offloading Method for IoMT Services in Integrated Cloud-Edge Environment (2020) (20)
- Computational Intelligence Enabled Cybersecurity for the Internet of Things (2020) (17)
- Privacy-Preserving Federated Deep Learning for Cooperative Hierarchical Caching in Fog Computing (2021) (17)
- Privacy-preserving using homomorphic encryption in Mobile IoT systems (2021) (16)
- Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey (2021) (15)
- A general distributed consensus algorithm for wireless sensor networks (2012) (15)
- Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things (2020) (15)
- Local spatial obesity analysis and estimation using online social network sensors (2018) (15)
- A novel gait recognition analysis system based on body sensor networks for patients with parkinson's disease (2010) (15)
- A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model (2017) (15)
- Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets (2013) (14)
- Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities (2019) (14)
- Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System (2015) (14)
- Venue2Vec: An Efficient Embedding Model for Fine-Grained User Location Prediction in Geo-Social Networks (2020) (13)
- Managing cyber security risks in industrial control systems with game theory and viable system modelling (2014) (12)
- Lightweight Privacy-Preserving Scheme Using Homomorphic Encryption in Industrial Internet of Things (2021) (11)
- Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations (2016) (11)
- Multipath Routing for Video Streaming inWireless Mesh Networks (2011) (10)
- Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things (2019) (10)
- ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities (2021) (9)
- Editorial: Zero Trust based Internet of Things (2020) (9)
- Source nodes localisation algorithm for large-scale wireless sensor networks using self-organising isometric mapping (2010) (9)
- Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model (2020) (8)
- A novel conflict detection method for ABAC security policies (2021) (8)
- Efficient blind spectrum sensing for cognitive radio networks based on compressed sensing (2012) (8)
- Local experts finding using user comments in location‐based social networks (2019) (8)
- Introduction: Securing the Internet of Things (2017) (7)
- Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud (2020) (7)
- Security Requirements in IoT Architecture (2017) (7)
- Node localisation in wireless sensor network based on self-organising isometric embedding (2008) (7)
- A Stream Processing Framework Based on Linked Data for Information Collaborating of Regional Energy Networks (2021) (6)
- Symmetry Degree Measurement and its Applications to Anomaly Detection (2020) (6)
- Distributed Localization Based on Hessian Local Linear Embedding Algorithm in Wireless Sensor Networks (2007) (6)
- Forensic Analysis of Digital Images over Smart Devices and Online Social Networks (2018) (6)
- Influencing factors analysis in pear disease recognition using deep learning (2020) (6)
- Manifold learning-based automatic signal identification in cognitive radio networks (2012) (6)
- Security and Vulnerability in the Internet of Things (2017) (5)
- Intelligent algorithm for dynamic functional brain network complexity from CN to AD (2021) (5)
- Multi-scale skip-connection network for image super-resolution (2020) (5)
- A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks (2006) (5)
- Visual-Textual Sentiment Analysis Enhanced by Hierarchical Cross-Modality Interaction (2021) (5)
- IoT Node Authentication (2017) (5)
- Security in Enabling Technologies (2017) (5)
- An adaptive distributed localisation in wireless sensor network (2009) (4)
- Privacy Enhancing Techniques in the Internet of Things Using Data Anonymisation (2021) (4)
- Polychromatic set theory-based spectrum access in cognitive radios (2012) (4)
- Blockchain-Enabled User Authentication in Zero Trust Internet of Things (2021) (3)
- Development of a high performance Wireless Mesh Network for video streaming (2010) (3)
- Security Architecture in the Internet of Things (2017) (3)
- An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds (2021) (3)
- Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management (2018) (3)
- A Convolutional Neural Network for Image Super-Resolution Using Internal Dataset (2020) (3)
- Editorial: Smart Technologies Improve our Daily Lives (2019) (3)
- A novel scalable routing scheme based on Polychromatic Sets theory for wireless sensor networks (2010) (2)
- Modeling and Analyzing Concurrent Design Process for Manufacturing Enterprise Information Systems (2006) (2)
- Edge-Based Collaborative Training System for Artificial Intelligence-of-Things (2022) (2)
- On the Development of Automated Forensic Analysis Methods for Mobile Devices (2014) (2)
- The 5G/6G enabled Future Internet of Things (2020) (2)
- A3BAC: Attribute-Based Access Control Model with Anonymous Access (2021) (2)
- A Novel Color Image Watermarking Algorithm Based on Digital Signature (2019) (1)
- A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model (2019) (1)
- Trust and Trustworthy Computing (2014) (1)
- MTAL: A Novel Chinese Herbal Medicine Classification Approach with Mutual Triplet Attention Learning (2022) (1)
- Image Source Identification Using Convolutional Neural Networks in IoT Environment (2021) (1)
- Edge intelligence enabled Internet of Things (2020) (1)
- Machine Learning based Activity learning for Behavioral Contexts in Internet of Things (2020) (1)
- Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT (2019) (1)
- CHAPTER 4 IoT Node Authentication (2017) (1)
- Privacy, data assurance, security solutions for Internet of Things (PASS4IoT): Guest editorial (2018) (1)
- A distributed self-localization algorithm for wireless sensor networks (2010) (1)
- Social Relationships and Temp-Spatial Behaviors Based Community Discovery to Improve Cyber Security Practices (2019) (1)
- Efficient blind spectrum sensing for cognitive radio networks based on compressed sensing (2012) (1)
- Sensor Network Localization Based on Distance Reconstruction (2012) (1)
- Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment (2022) (1)
- Machine Learning Based Activity Learning for Behavioral Contexts in Internet of Things (IoT) (2020) (1)
- Microservices priority estimation for IoT platform based on analytic hierarchy process and fuzzy comprehensive method (2021) (1)
- Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT) (2018) (1)
- IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities (2020) (1)
- An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite-Assisted Internet of Things (2022) (0)
- Lightweight Encryption Algorithm Containing SPN Structure for IoT (2019) (0)
- Multi-Model Running Latency Optimization in an Edge Computing Paradigm (2022) (0)
- Infrastructure Networks Compressed Information samplingCompressed Distortion-Minimizing ControlRoutingMAC ProtocolPHY RoutingMAC ProtocolPHY Compressed Information ReconstructionCompressed Distortion-Minimizing ControlRoutingMAC ProtocolPHY (2013) (0)
- Machine Learning Based Activity Learning for Behavioral Contexts in Internet of Things (IoT) (2020) (0)
- The internet of things: a survey (2014) (0)
- A Formal Modeling Method based on CPN (2006) (0)
- Dancing with the sound in edge computing environments (2021) (0)
- Wireless Sensor Hierarchical Networks (2015) (0)
- Sensor Network Platform and Operating Systems (2015) (0)
- Implementation of Spectrum Sensing Techniques in Cognitive Radio Networks (2017) (0)
- Bandwidth calculation scheme to support cross-layer QoS framework for wireless mesh networks (2009) (0)
- Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud (2019) (0)
- AFormalModeling Methodbased onCPN (2006) (0)
- PUFDCA: A Zero-Trust-Based IoT Device Continuous Authentication Protocol (2022) (0)
- Editorial: Smart Technologies Improve our Daily (2020) (0)
- A high performance congestion control scheme for streaming transmission over wireless mesh networks (2010) (0)
- Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme (2022) (0)
- Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection (2022) (0)
- Security Solutions for Internet of Things ( PASS 4 IoT ) : Guest Editorial (2018) (0)
This paper list is powered by the following services: