


default search action
Guorui Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Guorui Li, Runxing Chang, Ying Wang, Cong Wang:
Dual-domain based backdoor attack against federated learning. Neurocomputing 623: 129424 (2025) - 2024
- [j21]Cong Wang
, Yaoming Wang
, Ying Yuan, Sancheng Peng
, Guorui Li
, Pengfei Yin:
Joint computation offloading and resource allocation for end-edge collaboration in internet of vehicles via multi-agent reinforcement learning. Neural Networks 179: 106621 (2024) - [j20]Yuanzhen Zhang
, Wenbo Li
, Fengrui Liu, Pengtao Chen, Haomin Zhu, Hai Li, Guorui Li, Kai Tao
, Wen-Ming Zhang
, Jian Xu
:
A Manta Ray-Inspired Fast-Swimming Soft Electrohydraulic Robotic Fish. IEEE Robotics Autom. Lett. 9(9): 8043-8050 (2024) - [j19]Junjie Huang, Guorui Li
, Qian Zhang, Qingmin Yu, Ting Li:
Adaptive Time-Frequency Segment Optimization for Motor Imagery Classification. Sensors 24(5): 1678 (2024) - [j18]Guorui Li
, Pengfei Xu
, Sancheng Peng
, Cong Wang
, Yi Cai
, Shui Yu
:
TTSR: Tensor-Train Subspace Representation Method for Visual Domain Adaptation. IEEE Trans. Knowl. Data Eng. 36(11): 7229-7241 (2024) - [j17]Cong Wang
, Xiaojuan Chai
, Sancheng Peng
, Ying Yuan
, Guorui Li
:
Deep Reinforcement Learning With Entropy and Attention Mechanism for D2D-Assisted Task Offloading in Edge Computing. IEEE Trans. Serv. Comput. 17(6): 3317-3329 (2024) - 2023
- [j16]Guorui Li
, Yajun Wu
, Cong Wang
, Sancheng Peng
, Jianwei Niu
, Shui Yu
:
The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things. IEEE Intell. Syst. 38(5): 45-55 (2023) - [c29]Ao Li
, Sinyin Chang
, Guorui Li
, Yuanhaur Chang
, Nathan Fisher
, Thidapat Chantem
:
Software and Behavior Diversification for Swarm Robotics Systems. MTD@CCS 2023: 33-36 - 2022
- [j15]Yijun Yuan, Yingcai Li, Guorui Li, Sheng Liu
:
Adaptive ground-roll attenuation using local nonlinear filtering. Comput. Geosci. 164: 105124 (2022) - [j14]Guorui Li
, Guang Guo, Sancheng Peng
, Cong Wang
, Shui Yu
, Jianwei Niu
, Jianli Mo:
Matrix Completion via Schatten Capped $p$p Norm. IEEE Trans. Knowl. Data Eng. 34(1): 394-404 (2022) - 2020
- [j13]Cong Wang
, Fanghui Zheng, Guangcong Zheng, Sancheng Peng, Zejie Tian, Yujia Guo, Guorui Li, Ying Yuan:
Modeling on virtual network embedding using reinforcement learning. Concurr. Comput. Pract. Exp. 32(23) (2020) - [c28]Guorui Li:
Urban Landscape Design Optimization Based on Interactive Genetic Algorithm. ATCI 2020: 1097-1102
2010 – 2019
- 2019
- [j12]Caleb Christianson, Christopher Bayag, Guorui Li, Saurabh Jadhav, Ayush Giri, Chibuike Agba, Tiefeng Li, Michael Thomas Tolley:
Jellyfish-Inspired Soft Robot Driven by Fluid Electrode Dielectric Organic Robotic Actuators. Frontiers Robotics AI 6: 126 (2019) - [j11]Ying Wang, Guorui Li, Sancheng Peng, Cong Wang, Ying Yuan:
A randomised Kaczmarz method-based matrix completion algorithm for data collection in wireless sensor networks. Int. J. Embed. Syst. 11(4): 440-451 (2019) - [j10]Guorui Li
, Jingsha He, Sancheng Peng
, Weijia Jia
, Cong Wang
, Jianwei Niu
, Shui Yu
:
Energy Efficient Data Collection in Large-Scale Internet of Things via Computation Offloading. IEEE Internet Things J. 6(3): 4176-4187 (2019) - 2018
- [j9]Ying Wang, Guorui Li:
An Iterative Hard Thresholding Algorithm based on Sparse Randomized Kaczmarz Method for Compressed Sensing. Int. J. Comput. Intell. Appl. 17(3): 1850015:1-1850015:16 (2018) - [j8]Guorui Li
, Haobo Chen, Sancheng Peng
, Xinguang Li, Cong Wang, Shui Yu
, Pengfei Yin:
A Collaborative Data Collection Scheme Based on Optimal Clustering for Wireless Sensor Networks. Sensors 18(8): 2487 (2018) - [c27]Shardrom Johnson, Lirong Zhang, Jun Zheng, Yuanchen Liu, Guorui Li, Xinlin Wu, Kaimin Shen:
Application Research on Virtualized Desktop Technology in Private Colleges and Universities of Art and Design. ICSAI 2018: 538-543 - [c26]Jiahui Lv, Kaimin Shen, Shardrom Johnson, Fan Chen, Guorui Li:
Application on Information Island with Information Visualization and Software Engineering. ICSAI 2018: 598-603 - [c25]Guorui Li, Haobo Chen, Sancheng Peng, Xinguang Li, Cong Wang, Pengfei Yin:
A Hybrid Data Collection Scheme for Wireless Sensor Networks Using Compressed Sensing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 619-626 - 2017
- [j7]Cong Wang, Guohua Liu, Sancheng Peng, Ying Yuan, Guorui Li, Cong Wan:
Virtual network embedding with pre-transformation and incentive convergence mechanism. Concurr. Comput. Pract. Exp. 29(14) (2017) - [c24]Li Tian, Guorui Li, Cong Wang:
A Data Reconstruction Algorithm Based on Neural Network for Compressed Sensing. CBD 2017: 291-295 - 2016
- [j6]Guorui Li, Ying Wang, Cong Wang, Yiying Liu:
Unbalanced Threshold Based Distributed Data Collection Scheme in Multisink Wireless Sensor Networks. Int. J. Distributed Sens. Networks 12(1): 8527312:1-8527312:12 (2016) - [c23]Cong Wang, Yuxuan Liu, Ying Yuan, Guorui Li, Qiaohong Wang:
A DPSO-Based Load Balancing Virtual Network Embedding Algorithm with Particle Initialization Strategy. ICSI (2) 2016: 306-313 - [c22]Guorui Li, Ying Wang, Cong Wang, Biao Luo:
MISTER: An Approximate Minimum Steiner Tree Based Routing Scheme in Wireless Sensor Networks. ICSI (2) 2016: 317-323 - 2015
- [j5]Guorui Li
, Jingsha He, Cong Wang:
A Three-Phase Top-|k| Query Based Distributed Data Collection Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 856507:1-856507:12 (2015) - 2014
- [c21]Guorui Li, Zhenhe Ma, Fengwen Wang:
An approximate l0 norm based signal reconstruction algorithm in the compressive sampling theory. iCAST 2014: 1-5 - [c20]Guorui Li, Ying Liu, Ying Wang:
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN. TrustCom 2014: 961-966 - 2013
- [j4]Guorui Li, Ying Wang:
Automatic ARIMA modeling-based data aggregation scheme in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 85 (2013) - [j3]Fengchun Tian, Jingwei Feng, Guorui Li, Lijun Dang, Xin Yin, Xiongwei Peng:
On-line Calibration of Semiconductor Gas Sensors Based on Prediction Model. J. Comput. 8(9): 2204-2208 (2013) - [c19]Guorui Li, Ying Wang:
Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks. CyberC 2013: 344-348 - [c18]Guorui Li, Ying Wang:
A Compressive Sensing Based Secure Data Transmission Scheme. GreenCom/iThings/CPScom 2013: 1272-1275 - 2012
- [j2]Guorui Li, Ying Wang, Cuirong Wang, Jingsha He
:
EMAP: An efficient mutual authentication protocol for passive RFID tags. Int. J. Autom. Comput. 9(1): 108-112 (2012) - [c17]Guorui Li, Ying Wang:
Differential Kullback-Leibler Divergence Based Anomaly Detection Scheme in Sensor Networks. CIT 2012: 966-970 - 2010
- [c16]Guorui Li, Ying Wang:
A Study on Secure RFID Mutual Authentication Scheme. GreenCom/CPSCom 2010: 706-710 - [c15]Guorui Li, Xiangdong Liu, Cuirong Wang:
A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks. ICNSC 2010: 554-558 - [c14]Guorui Li, Ying Wang, Jingsha He
:
Efficient Group Key Management Scheme in Wireless Sensor Networks. IITSI 2010: 411-415
2000 – 2009
- 2008
- [j1]Guorui Li, Jingsha He
, Yingfang Fu:
Group-based intrusion detection system in wireless sensor networks. Comput. Commun. 31(18): 4324-4332 (2008) - [c13]Yingfang Fu, Jingsha He
, Liangyu Luan, Rong Wang, Guorui Li:
A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks. COMPSAC 2008: 68-71 - [c12]Guorui Li, Jingsha He
, Yingfang Fu:
A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks. GPC Workshops 2008: 286-291 - [c11]Yingfang Fu, Jingsha He
, Rong Wang, Guorui Li:
Mutual Authentication in Wireless Mesh Networks. ICC 2008: 1690-1694 - [c10]Guorui Li, Jingsha He
, Yingfang Fu:
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. ICDCS Workshops 2008: 309-314 - [c9]Yingfang Fu, Jingsha He
, Liangyu Luan, Guorui Li, Rong Wang:
A Key Management Scheme Combined with Intrusion Detection for Mobile Ad Hoc Networks. KES-AMSTA 2008: 584-593 - 2007
- [c8]Guorui Li, Jingsha He, Yingfang Fu:
A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. AINA Workshops (2) 2007: 127-132 - [c7]Yingfang Fu, Jingsha He
, Guorui Li:
A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks. COMPSAC (2) 2007: 75-80 - [c6]Guorui Li, Jingsha He, Yingfang Fu:
Analysis of an Adaptive Key Selection Scheme in Wireless Sensor Networks. International Conference on Computational Science (4) 2007: 409-416 - [c5]Guorui Li, Jingsha He
, Yingfang Fu:
Secure Multiple Deployment in Wireless Sensor Networks. MobiQuitous 2007: 1-4 - 2006
- [c4]Guorui Li, Jingsha He
, Yingfang Fu:
A Hexagon-Based Key Predistribution Scheme in Sensor Networks. ICPP Workshops 2006: 175-180 - [c3]Yingfang Fu, Jingsha He, Guorui Li:
A Composite Key Management Scheme for Mobile Ad Hoc Networks. OTM Workshops (1) 2006: 575-584 - [c2]Guorui Li, Jingsha He, Yingfang Fu:
Key Predistribution in Sensor Networks. UIC 2006: 845-853 - [c1]Guorui Li, Jingsha He, Yingfang Fu:
Key Management in Sensor Networks. WASA 2006: 457-466
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 21:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint