Li, Nige
22  results:
Search for persons X
?
2

Design and Implementation of Identity Authentication Archit..:

, In: 2024 9th International Conference on Electronic Technology and Information Science (ICETIS),
Lu, Ziang ; Wang, Tengyan ; Liu, Xin. - p. 115-122 , 2024
 
?
3

An Intelligent Arrangement Method for New Distribution Netw..:

, In: Proceedings of International Conference on Artificial Intelligence and Communication Technologies (ICAICT 2023); Smart Innovation, Systems and Technologies,
Xu, Min ; Zhou, Aihua ; Shen, Xiaofeng... - p. 93-101 , 2024
 
?
4

Power terminal anomaly monitoring technology based on autoe..:

, In: Proceedings of the 2024 3rd International Conference on Networks, Communications and Information Technology,
Li, Yong ; Chen, Mu ; Li, NiGe.. - p. 39-43 , 2024
 
?
5

Containerization of the Security Application on Electric Po..:

, In: 2023 4th International Conference on Information Science, Parallel and Distributed Systems (ISPDS),
Wang, Tengyan ; Shao, Zhipeng ; Li, Nige. - p. 501-504 , 2023
 
?
6

Deep Learning Based Wireless Device Identification Using RF..:

, In: 2023 3rd International Conference on Neural Networks, Information and Communication Engineering (NNICE),
Lu, Ziang ; Wang, Tengyan ; Liu, Xin. - p. 385-390 , 2023
 
?
7

Research on Power Mobile Internet Security Situation Awaren..:

, In: Lecture Notes in Computer Science; Artificial Intelligence and Security,
Dai, Zaojian ; Li, Nige ; Li, Yong... - p. 507-519 , 2022
 
?
8

Control flow integrity check based on LBR register in power..:

, In: 2022 China International Conference on Electricity Distribution (CICED),
Li, Nige ; Zhou, Peng ; Wang, Tengyan. - p. 1211-1216 , 2022
 
?
9

Fine-Grained Access Control for Power Mobile Service Based ..:

, In: Lecture Notes in Computer Science; Artificial Intelligence and Security,
Li, Yong ; Chen, Lu ; Li, Nige... - p. 612-624 , 2022
 
?
10

Trust Evaluation Method Based on the Degree of Code Obfusca..:

, In: Lecture Notes in Computer Science; Smart Computing and Communication,
Chen, Lu ; Dai, Zaojian ; Li, Nige. - p. 164-174 , 2022
 
?
11

A Security Reinforcement Model for Edge Computing Facilitie..:

, In: Advances in Wireless Communications and Applications; Smart Innovation, Systems and Technologies,
Li, Nige ; Zhou, Peng ; Shao, Zhipeng. - p. 51-59 , 2022
 
?
12

Anomaly Detection and Blocking Based on Power IoT Sensing L..:

, In: 2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA),
Ma, Yuanyuan ; Li, Nige ; Teng, Ziyi. - p. 15-20 , 2022
 
?
13

A Load-Balancing Algorithm for Power Internet of Things Res..:

, In: Lecture Notes in Computer Science; Artificial Intelligence and Security,
Zhang, Mingming ; Mao, Jiaming ; Chen, Lu... - p. 563-574 , 2021
 
?
14

A Method of Multi-Information Perception Collection for Pow..:

, In: Advances in Intelligent Systems and Computing; Advancements in Mechatronics and Intelligent Robotics,
Xu, Min ; Yang, Jianhua ; Yang, Jian... - p. 265-270 , 2021
 
?
15

Building A Zero-trust Security Protection System in The Env..:

, In: 2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT),
Zeng, Rong ; Li, Nige ; Zhou, Xiaoming. - p. 557-560 , 2021
 
1-15