Home

  Teaching

  Research

  Services

  Life

  Contact

  Bookmarks


 

PEER REVIEWED CONFERENCE PROCEEDING ARTICLES

 

C47

Tianchong Gao and Feng Li. PHDP: preserving persistent homology in differentially private graph publications. In Proceedings of IEEE INFOCOM 2019 - IEEE Conference on Computer Communications (INFOCOM 2019), Paris, France, 2019.

 

C46

Tianchong Gao and Feng Li. De-anonymization of dynamic online social networks via persistent structures. In Proceedings of 2019 IEEE International Conference on Communications (ICC), Shanghai, P.R. China, 2019.

 

C45

Tianchong Gao and Feng Li. Efficient content delivery via interest queueing. In Proceedings of 2019 IEEE International Conference on Communications (ICC), Shanghai, P.R. China, 2019.

 

C44

Tianchong Gao and Feng Li. Privacy-Preserving sketching for online social network data publication. In Proceedings of 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (SECON 2019), Boston, USA, 2019.

 

C43

Tyler Phillips, Xukai Zou, Feng Li, and Ninghui Li. "Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning." In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, pp. 141-146. ACM, 2019.

 

C42

EEB Martinez, B Oh, F Li, and X Luo, Evading deep neural network and random forest classifiers by generating adversarial samples, In Procs. Of International Symposium on Foundations and Practice of Security, Springer, 2018

 

 

C41

Tianchong Gao and Feng Li. Preserving graph utility in anonymized social networks? A study on the persistent homology. In The 14th International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2017), October 2017.

 

C40

T Phillips, X Zou, F Li. A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme. In The 14th International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2017), October 2017.

 

C39

Tianchong Gao, Feng Li, Yu Chen, and Xukai Zou. Preserving local differential privacy in online social networks. In Procs. of International Conference on Wireless Algorithms, Systems, and Applications, pages 393-405. Springer, 2017.

 

C38

Andrew Choliy, Feng Li, and Tianchong Gao. "Obfuscating function call topography to test structural malware detection against evasion attacks." In 2017 International Conference on Computing, Networking and Communications (ICNC), pp. 808-813. IEEE, 2017.

 

C37

Andrew Samuels, Feng Li, and Connie Justice. "Applying rating systems to challenge based cybersecurity education." In 2017 International Conference on Computing, Networking and Communications (ICNC), pp. 819-824. IEEE, 2017.

 

C36

M. Mohamed, Z. Li, H. Liu, Y. Chen, and F. Li, “Uber-in-Light: Unobtrusive Visible Light Communication Leveraging Complementary Color Channel,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2016.

 

 

C35

W. Peng, F. Li, and X. Zou, “Temporal Coverage Based Content Distribution in Heterogeneous Smart Device Networks”, in Proc. of IEEE Communication and Information Systems Security Symposium (ICC), 2015.

C34

F. Li, C. Huang, W. Peng, and J. Huang, “Feedback-based Smartphone Strategic Sampling in BYOD Security”, in Proc. of International Conference on Computer Communications and Networks (ICCCN), 2014.

C33

M. Rangwala, W. Peng, X. Zou and F. Li, “A Mutual Agreement Signature Scheme for Secure Data Provenance”, in Proc. of International Conference on Computer Communications and Networks (ICCCN), 2014.

C32

W. Peng, F. Li, C. Huang, and X. Zou, “A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces”, in Proc. of IEEE Communication and Information Systems Security Symposium (ICC), 2014.

C31

X. Zou, H. Li, Y. Sui, W. Peng, and F. Li, “Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2014.

C30

W. Peng, F. Li, K. Han, X. Zou, and J. Wu, “T-dominance: Prioritized Defense Deployment for BYOD Security”, in Proc. of IEEE Conference on Communications and Network Security (CNS), 2013.

C29

H. Li, Y. Sui, W. Peng, X. Zou, F. Li, “A Viewable E-voting Scheme for Environments with Conflict of Interest”, in Proc. of IEEE Conference on Communications and Network Security (CNS), 2013.

C28

G. Wang, Q. Liu, F. Li, S. Yang and J. Wu, "Outsourcing Privacy-Preserving Social Networks to a Cloud," accepted to appear in IEEE International Conference on Computer Communications (INFOCOM), April, 2013, (acceptance rate 17%).

C27

W. Peng, F. Li, X. Zou, and J. Wu, “The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links”. In Proc. of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2013.

C26

W. Chang, J. Wu, C. Tan, F. Li, “Sybil Defenses in Mobile Social Networks," in Proc. of IEEE Global Communications Conference (GLOBECOM), 2013.

C25

F. Li, W. Peng, C. Huang, and X. Zou, “Smartphone Strategic Sampling in Defending Enterprise Network Security,” in Proc. of IEEE Communication and Information Systems Security Symposium (ICC), 2013.

C24

Y. Sui, X. Zou, Y. Du and F. Li, “Secure and Privacy-preserving Biometrics based Active Authentication”, In Proc. of IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012.

C23

Y. Sui, X. Zou, F. Li, E. Du: Active User Authentication for Mobile Devices. In Proc. Of International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2012.

 

C22

W. Peng, F. Li, X. Zou and J. Wu, “A Privacy-Preserving Social-Aware Incentive System for Word-of-Mouth Advertisement Dissemination on Smart Mobile Devices,” in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012.

C21

W. Peng, F. Li, X. Zou and J. Wu, “Seed and Grow: An Attack Against Anonymized Social Networks,” in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012.

C20

Y. Wang, J. Wu, Z. Jiang, F. Li, “A Joint Replication-Migration-based Routing in Delay Tolerant Networks,” in Proc. of IEEE International Conference on Communications (ICC), 2012.

C19

W. Peng, F. Li, X. Zou and J. Wu, "Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks," in Proc. of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011.

C18

X. Zou, F. Maino, E. Bertino, Y. Sui, K. Wang, and F. Li, "A Clean and Efficient Approach to Weighted Multi-Secret Sharing, " in Proc. of the International Conference on Computer Communications and Networks (ICCCN), August, 2011.

C17

X. Zou, M. Qi, Y. Sui, and F. Li, "A New Scheme for Anonymous Secure Group Communication", accepted to in Proc. of 44th Hawaii International Conference on System Sciences (HICSS-44), January, 2011.

C16

F. Li, Y. Yang, J. Wu, and X. Zou, "Fuzzy Closeness-based Delegation Forwarding in Delay Tolerant Networks," in Proc. of IEEE International Conference on Networking, Architecture, and Storage (NAS), July, 2010.

C15

F. Li, Y. Yang, J. Wu, "CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks," in Proc. of the IEEE International Conference on Computer Communications (INFOCOM), March, 2010, (acceptance rate 17.5%).

C14

Y. Zhao, F. Li, J. Wu, and S. Lu, "VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones, " in Proc. of the IEEE International Conference on Computer Communications (INFOCOM), Mini-conference, March, 2010.

C13

F. Li and J. Wu, "LocalCom: A Community-based Epidemic Forwarding Scheme in Disruption-tolerant Networks," accepted to appear in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009, (acceptance rate 18.8%).

C12

F. Li and J. Wu, "MOPS: Providing Content-based Service in Disruption-tolerant Networks," accepted to appear in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), 2009, (acceptance rate 16%).

C11

F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets," accepted to appear in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2009, (acceptance rate 19%).

C10

F. Li and J. Wu, "FRAME: An Innovative Incentive Scheme in Vehicular Networks," accepted to appear in Proc. of IEEE International Conference on Communications (ICC), 2009.

C09

F. Li and J. Wu, "Hit and Run: A Bayesian Game between Malicious and Regular Nodes in MANETs," in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, (acceptance rate 21%).

C08

J. Wu, M. Lu, and F. Li, "Utility-Based Opportunistic Routing in Multi-hop Wireless Networks," in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), 2008, (acceptance rate 16%).

 

 

C07

A. Srinivasan, F. Li, and J. Wu, "A Novel CDS-based Reputation Monitoring System for Wireless Sensor Networks," accepted to appear in Proc. of the 1st International Workshop on Wireless Security and Privacy (WiSP) (in conjunction with ICDCS), 2008.

C06

A. Srinivasan, F. Li, J. Wu, M. Li, "CAGE: Clique-based Assignment of Group kEy," in Proc. of the Second International Conference on Communications and Networking (ChinaCom), 2007.

C05

F. Li and J. Wu, "Authentication Via Ambassadors: A Novel Authentication Mechanism in MANETs," in Proc. of Military Communications Conference (MILCOM), 2007.

C04

F. Li, A. Srinivasan, M. Lu, and J. Wu, "Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks," in Proc. of IEEE Global Communications Conference (GLOBECOM), 2007.

C03

F. Li and J. Wu, "Mobility Reduces Uncertainty in MANETs," in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2007, (acceptance rate 18%).

C02

M. Lu, F. Li, and J. Wu, "Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks," in Proc. of 20th Int'l Conf. on Parallel and Distributed Systems (ICPADS), 2006.

C01

F. Li and J. Wu, "A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks," in Proc. of ACM International Wireless Communications and Mobile Computing Conference (IWCMC) Computer and Network Security Symposium, 2006.

 

 

 

PEER REVIEWED JOURNAL ARTICLES & BOOK CHAPTERS

 

J19

Tianchong Gao, Feng Li, Yu Chen, and XuKai Zou. Local differential privately anonymizing online social networks under hrg-based model. IEEE Transactions on Computational Social Systems, 5(4):1009-1020, 2018.

 

J18

T. Gao, W. Peng, D. Sisodia, T. K. Saha, F. Li, and M. A. Hasan. Android malware detection via graphlet sampling. IEEE Transactions on Mobile Computing, 2018. ISSN 1536-1233. doi: 10:1109/TMC:2018:2880731.

 

J17

Tianchong Gao and Feng Li. Studying the utility preservation in social network anonymization via persistent homology. Computers & Security, 77:49-64, 2018.

 

J16

Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, and Jie Wu. 2017. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Transaction on Parallel and Distributed Systems 28, 5, 1417-1429, 2017.

 

J15

Xukai Zou, Huian Li, Feng Li, Wei Peng, and Yan Sui. Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election. Cryptography 1, no. 2: 13, 2017.

 

J14

Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, and Huanyang Zheng. Trust evaluation in online social networks using generalized network flow. IEEE Transactions on Computers 65, no. 3: 952-963, 2015.

 

J13

M. Rangwala, P. Zhang, X. Zou and F. Li, “A Taxonomy of Privilege Escalation Attacks in Android Applications”, in International Journal of Security and Networks (IJSN), Vol. 9, No. 1: 40-55, 2014.

J12

Y. Sui, X. Zou, Y. Du, and F. Li, “Design and Analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method”, IEEE Transactions on Computers, 63.4:902-916, 10.1109/TC.2013.25, Apr. 2014. 

J11

W. Peng, F. Li, and X. Zou, “Moving-target Defense for Cloud Infrastructure: Lessons from Botnets”, Book chapter, High Performance Semantic Cloud Auditing: 35-64, Editor: Keesook Han and Baek-Young Choi, Springer, 2014.

J10

W. Peng, F. Li, X. Zou and J. Wu, “A Two-stage De-anonymization Attack against Anonymized Social Networks”. IEEE Transactions on Computers, 63.2: 290-303, 10.1109/TC.2012.202, Feb. 2014.

J09

W. Peng, F. Li, X. Zou and J. Wu, “Behavioral Malware Detection in Delay Tolerant Networks”. IEEE Transactions on Parallel and Distributed Systems, 25.1: 53-63, 10.1109/TPDS.2013.27, Jan. 2014.

J08

F. Li, A. Srinivasan, and J. Wu, “Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks," IEICE Transactions 95-D (1):12-19, 2012.

J07

P. Adusumilli, Y. Sui, X. Zou, B. Ramamurthy, and F. Li, “A Key Distribution Scheme for Distributed Group with Authentication Capability,” International Journal of Performability Engineering 8(2):199-212, 2012.

 

J06

Y. Zhao, J. Wu, F. Li, and S. Lu, “On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling,” IEEE Transactions on Parallel and Distributed Systems, 23.8:1528-1535, August, 2012.

J05

F. Li, and J. Wu, "Uncertainty Modeling and Reduction in MANETs," IEEE Transactions on Mobile Computing 9.7:1035-1048. July, 2010. (TMC Impact factor: 1.72)

J04

F. Li, Y. Yang, and J. Wu, "Attack and Flee: Game Theory-based Analysis on Interactions among Nodes in MANETs," IEEE Transactions on Systems, Man, and Cybernetics--Part B: Cybernetics 40.3:612-622. June, 2010. (SMCB Impact factor: 1.35)

J03

A. Srinivasan, F. Li, J. Wu, and M. Li. "Clique-based Group Key Assignment in Wireless Sensor Networks," in International Journal of Security and Networks (IJSN), Vol. 3, No. 4: 226-239, 2008.

J02

F. Li, A. Srinivasan, and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," in International Journal of Security and Networks (IJSN), Vol. 3, No. 3: 173-182, 2008.

J01

M. Lu, F. Li, and J. Wu, "Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks," IEEE Transaction of Reliability 58.3:485-495. September, 2009.

 

FUNDED PROJECTS

Enhancing Undergraduate Experience in Mobile Cloud and Data Security

 

National Science Foundation (NSF), PI

$381,000

12/15/2018 - 11/30/2021

Highway End-of-Queue Alerting System Based on Probe Vehicle Data

 

Joint Transportation Research Program (JTRP), Co-PI

$110,786

07/01/2018-08/31/2019

Enhancing Undergraduate Experience in Mobile Cloud Security

 

National Science Foundation (NSF), PI

$360, 000

06/01/2016 - 05/31/2021

IUSE: Collaborative Project: Building Virtual Research, Interactive, Service, and Experiential Learning Modules for Cyber Security Education

 

National Science Foundation (NSF), PI

$287,159

09/01/2014- 08/31/2019

Collaborative Project: Building an Innovative Smartphone Virtual Laboratory Environment for Cyber-security Education and Training

 

National Science Foundation (NSF), PI

$103, 195

08/01/2013- 07/31/2016

Enhancing Undergraduate Experience in Mobile Computing Security

 

National Science Foundation (NSF), PI

$359,964

06/01/2013- 05/31/2016

Moving Cloud: Create Moving-target Defense in Cloud by Learning from Botnets

 

Northrop Grumman Cybersecurity Research Consortium, PI

$107,224

12/01/2012-08/31/2014

 

Copyright Feng Li 2009~2020, All rights reserved.