
Home

Teaching

Research

Services

Life

Contact

Bookmarks

|
|
PEER REVIEWED CONFERENCE PROCEEDING ARTICLES
C47
|
Tianchong Gao and Feng Li. PHDP: preserving persistent
homology in differentially private graph publications. In Proceedings of IEEE
INFOCOM 2019 - IEEE Conference on Computer Communications (INFOCOM 2019),
Paris, France, 2019.
|
C46
|
Tianchong Gao and Feng Li. De-anonymization of dynamic
online social networks via persistent structures. In Proceedings of 2019
IEEE International Conference on Communications (ICC), Shanghai, P.R.
China, 2019.
|
C45
|
Tianchong Gao and Feng Li. Efficient content delivery via
interest queueing. In Proceedings of 2019 IEEE International Conference
on Communications (ICC), Shanghai, P.R. China, 2019.
|
C44
|
Tianchong Gao and Feng Li. Privacy-Preserving sketching
for online social network data publication. In Proceedings of 2019 16th
Annual IEEE International Conference on Sensing, Communication, and
Networking (SECON) (SECON 2019), Boston, USA, 2019.
|
C43
|
Tyler Phillips, Xukai Zou, Feng Li, and Ninghui Li.
"Enhancing Biometric-Capsule-based Authentication and Facial
Recognition via Deep Learning." In Proceedings of the 24th ACM
Symposium on Access Control Models and Technologies, pp. 141-146. ACM,
2019.
|
C42
|
EEB Martinez, B Oh, F Li, and X Luo, Evading deep neural network and
random forest classifiers by generating adversarial samples,
In Procs. Of International Symposium on Foundations and Practice of
Security, Springer, 2018
|
C41
|
Tianchong Gao and Feng Li. Preserving graph utility in
anonymized social networks? A study on the persistent homology. In The
14th International Conference on Mobile Ad-hoc and Sensor Systems (IEEE
MASS 2017), October 2017.
|
C40
|
T Phillips, X Zou, F Li. A Cancellable and
Privacy-Preserving Facial Biometric Authentication Scheme. In The 14th
International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS
2017), October 2017.
|
C39
|
Tianchong Gao, Feng Li, Yu Chen, and Xukai Zou. Preserving
local differential privacy in online social networks. In Procs. of International Conference on Wireless Algorithms,
Systems, and Applications, pages 393-405. Springer, 2017.
|
C38
|
Andrew Choliy, Feng Li, and
Tianchong Gao. "Obfuscating function call topography to test
structural malware detection against evasion attacks." In 2017
International Conference on Computing, Networking and Communications
(ICNC), pp. 808-813. IEEE, 2017.
|
C37
|
Andrew Samuels, Feng Li, and Connie Justice.
"Applying rating systems to challenge based cybersecurity
education." In 2017 International Conference on Computing,
Networking and Communications (ICNC), pp. 819-824. IEEE, 2017.
|
C36
|
M. Mohamed, Z. Li, H. Liu, Y. Chen, and F. Li,
“Uber-in-Light: Unobtrusive Visible Light Communication Leveraging
Complementary Color Channel,” in Proc. of IEEE International
Conference on Computer Communications (INFOCOM), 2016.
|
|
|
C35
|
W. Peng, F. Li, and X. Zou, “Temporal Coverage Based
Content Distribution in Heterogeneous Smart Device Networks”, in
Proc. of IEEE Communication and Information Systems Security Symposium
(ICC), 2015.
|
C34
|
F. Li, C. Huang, W. Peng, and J. Huang,
“Feedback-based Smartphone Strategic Sampling in BYOD Security”,
in Proc. of International Conference on Computer Communications and
Networks (ICCCN), 2014.
|
C33
|
M. Rangwala, W. Peng, X. Zou and F. Li, “A Mutual
Agreement Signature Scheme for Secure Data Provenance”, in Proc. of
International Conference on Computer Communications and Networks (ICCCN),
2014.
|
C32
|
W. Peng, F. Li, C. Huang, and X. Zou, “A
Moving-target Defense Strategy for Cloud-based Services with
Heterogeneous and Dynamic Attack Surfaces”, in Proc. of IEEE
Communication and Information Systems Security Symposium (ICC), 2014.
|
C31
|
X. Zou, H. Li, Y. Sui, W. Peng, and F. Li, “Assurable, Transparent, and Mutual Restraining
E-voting Involving Multiple Conflicting Parties,” in Proc. of IEEE
International Conference on Computer Communications (INFOCOM), 2014.
|
C30
|
W. Peng, F. Li, K. Han, X. Zou, and J. Wu,
“T-dominance: Prioritized Defense Deployment for BYOD
Security”, in Proc. of IEEE Conference on Communications and
Network Security (CNS), 2013.
|
C29
|
H. Li, Y. Sui, W. Peng, X. Zou, F. Li, “A Viewable
E-voting Scheme for Environments with Conflict of Interest”, in
Proc. of IEEE Conference on Communications and Network Security (CNS),
2013.
|
C28
|
G. Wang, Q. Liu, F. Li, S. Yang and J. Wu,
"Outsourcing Privacy-Preserving Social Networks to a Cloud,"
accepted to appear in IEEE International Conference on Computer
Communications (INFOCOM), April, 2013, (acceptance rate 17%).
|
C27
|
W. Peng, F. Li, X. Zou, and J. Wu, “The Virtue of
Patience: Offloading Topical Cellular Content through Opportunistic
Links”. In Proc. of IEEE International Conference on Mobile Ad-hoc
and Sensor Systems (MASS), 2013.
|
C26
|
W. Chang, J. Wu, C. Tan, F. Li, “Sybil Defenses in
Mobile Social Networks," in Proc. of IEEE Global Communications
Conference (GLOBECOM), 2013.
|
C25
|
F. Li, W. Peng, C. Huang, and X. Zou, “Smartphone
Strategic Sampling in Defending Enterprise Network Security,” in
Proc. of IEEE Communication and Information Systems Security Symposium
(ICC), 2013.
|
C24
|
Y. Sui, X. Zou, Y. Du and F. Li, “Secure and
Privacy-preserving Biometrics based Active Authentication”, In
Proc. of IEEE International Conference on Systems, Man, and Cybernetics
(SMC), 2012.
|
C23
|
Y. Sui, X. Zou, F. Li, E. Du: Active User Authentication
for Mobile Devices. In Proc. Of International Conference on Wireless
Algorithms, Systems, and Applications (WASA), 2012.
|
C22
|
W. Peng, F. Li, X. Zou and J. Wu, “A
Privacy-Preserving Social-Aware Incentive System for Word-of-Mouth
Advertisement Dissemination on Smart Mobile Devices,” in Proc. of
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc
Communications and Networks (SECON), 2012.
|
C21
|
W. Peng, F. Li, X. Zou and J. Wu, “Seed and Grow: An
Attack Against Anonymized Social Networks,” in Proc. of IEEE
Communications Society Conference on Sensor, Mesh and Ad Hoc
Communications and Networks (SECON), 2012.
|
C20
|
Y. Wang, J. Wu, Z. Jiang, F. Li, “A Joint
Replication-Migration-based Routing in Delay Tolerant Networks,” in
Proc. of IEEE International Conference on Communications (ICC), 2012.
|
C19
|
W. Peng, F. Li, X. Zou and J. Wu, "Behavioral
Detection and Containment of Proximity Malware in Delay Tolerant
Networks," in Proc. of the 8th IEEE International Conference on
Mobile Ad-hoc and Sensor Systems (MASS), October 2011.
|
C18
|
X. Zou, F. Maino, E. Bertino, Y.
Sui, K. Wang, and F. Li, "A Clean and Efficient Approach to Weighted
Multi-Secret Sharing, " in Proc. of the International Conference on
Computer Communications and Networks (ICCCN), August, 2011.
|
C17
|
X. Zou, M. Qi, Y. Sui, and F. Li, "A New Scheme for
Anonymous Secure Group Communication", accepted to in Proc. of 44th
Hawaii International Conference on System Sciences (HICSS-44), January,
2011.
|
C16
|
F. Li, Y. Yang, J. Wu, and X. Zou, "Fuzzy
Closeness-based Delegation Forwarding in Delay Tolerant Networks,"
in Proc. of IEEE International Conference on Networking, Architecture,
and Storage (NAS), July, 2010.
|
C15
|
F. Li, Y. Yang, J. Wu, "CPMC: An Efficient Proximity
Malware Coping Scheme in Smartphone-based Mobile Networks," in Proc.
of the IEEE International Conference on Computer Communications
(INFOCOM), March, 2010, (acceptance rate 17.5%).
|
C14
|
Y. Zhao, F. Li, J. Wu, and S. Lu, "VBS: Maximum
Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual
Backbones, " in Proc. of the IEEE International Conference on
Computer Communications (INFOCOM), Mini-conference, March, 2010.
|
C13
|
F. Li and J. Wu, "LocalCom: A Community-based Epidemic Forwarding
Scheme in Disruption-tolerant Networks," accepted
to appear in Proc. of IEEE Communications Society Conference on Sensor,
Mesh and Ad Hoc Communications and Networks (SECON), 2009, (acceptance
rate 18.8%).
|
C12
|
F. Li and J. Wu, "MOPS: Providing
Content-based Service in Disruption-tolerant Networks,"
accepted to appear in Proc. of IEEE International Conference on
Distributed Computing Systems (ICDCS), 2009, (acceptance rate 16%).
|
C11
|
F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole
Attacks in Disruption-Tolerant Networks using Encounter Tickets,"
accepted to appear in Proc. of IEEE International Conference on Computer
Communications (INFOCOM), 2009, (acceptance rate 19%).
|
C10
|
F. Li and J. Wu, "FRAME: An
Innovative Incentive Scheme in Vehicular Networks,"
accepted to appear in Proc. of IEEE International Conference on
Communications (ICC), 2009.
|
C09
|
F. Li and J. Wu, "Hit and Run: A
Bayesian Game between Malicious and Regular Nodes in MANETs,"
in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad
Hoc Communications and Networks (SECON), 2008, (acceptance rate 21%).
|
C08
|
J. Wu, M. Lu, and F. Li, "Utility-Based Opportunistic Routing in
Multi-hop Wireless Networks," in Proc. of IEEE
International Conference on Distributed Computing Systems (ICDCS), 2008,
(acceptance rate 16%).
|
|
|
C07
|
A. Srinivasan, F. Li, and J. Wu, "A Novel CDS-based Reputation Monitoring
System for Wireless Sensor Networks," accepted to appear in
Proc. of the 1st International Workshop on Wireless Security and Privacy
(WiSP) (in conjunction with ICDCS), 2008.
|
C06
|
A. Srinivasan, F. Li, J. Wu, M. Li, "CAGE: Clique-based Assignment of Group kEy," in Proc. of the Second
International Conference on Communications and Networking (ChinaCom), 2007.
|
C05
|
F. Li and J. Wu, "Authentication
Via Ambassadors: A Novel Authentication Mechanism in MANETs,"
in Proc. of Military Communications Conference (MILCOM), 2007.
|
C04
|
F. Li, A. Srinivasan, M. Lu, and J. Wu, "Uncertainty Mitigation for Utility-Oriented
Routing in Wireless Ad Hoc Networks," in Proc. of IEEE
Global Communications Conference (GLOBECOM), 2007.
|
C03
|
F. Li and J. Wu, "Mobility Reduces
Uncertainty in MANETs," in Proc. of IEEE International
Conference on Computer Communications (INFOCOM), 2007, (acceptance rate
18%).
|
C02
|
M. Lu, F. Li, and J. Wu, "Incentive Compatible Cost- and
Stability-Based Routing in Ad Hoc Networks," in Proc. of
20th Int'l Conf. on Parallel and Distributed Systems (ICPADS), 2006.
|
C01
|
F. Li and J. Wu, "A Probabilistic
Voting-Based Filtering Scheme in Wireless Sensor Networks,"
in Proc. of ACM International Wireless Communications and Mobile
Computing Conference (IWCMC) Computer and Network Security Symposium,
2006.
|
PEER REVIEWED
JOURNAL ARTICLES & BOOK CHAPTERS
J19
|
Tianchong Gao, Feng Li, Yu Chen, and XuKai
Zou. Local differential privately anonymizing online social networks
under hrg-based model. IEEE Transactions on
Computational Social Systems, 5(4):1009-1020, 2018.
|
J18
|
T. Gao, W. Peng, D. Sisodia, T. K. Saha,
F. Li, and M. A. Hasan. Android malware detection via graphlet
sampling. IEEE Transactions on Mobile Computing, 2018. ISSN 1536-1233. doi:
10:1109/TMC:2018:2880731.
|
J17
|
Tianchong Gao and Feng Li. Studying the utility
preservation in social network anonymization via persistent homology.
Computers & Security, 77:49-64, 2018.
|
J16
|
Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, and Jie Wu.
2017. Preserving Privacy with Probabilistic Indistinguishability in
Weighted Social Networks. IEEE Transaction on Parallel and Distributed
Systems 28, 5, 1417-1429, 2017.
|
J15
|
Xukai Zou, Huian Li, Feng Li, Wei Peng, and Yan Sui.
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling
an Open and Fair Election. Cryptography 1, no. 2: 13, 2017.
|
J14
|
Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang,
and Huanyang Zheng. Trust evaluation in online social networks using
generalized network flow. IEEE Transactions on Computers 65, no. 3:
952-963, 2015.
|
J13
|
M. Rangwala, P. Zhang, X. Zou and F. Li, “A Taxonomy
of Privilege Escalation Attacks in Android Applications”, in
International Journal of Security and Networks (IJSN), Vol. 9, No. 1:
40-55, 2014.
|
J12
|
Y. Sui, X. Zou, Y. Du, and F. Li, “Design and
Analysis of a highly user-friendly, secure, privacy-preserving, and
revocable authentication method”, IEEE Transactions on Computers,
63.4:902-916, 10.1109/TC.2013.25, Apr. 2014.
|
J11
|
W. Peng, F. Li, and X. Zou, “Moving-target Defense
for Cloud Infrastructure: Lessons from Botnets”, Book chapter, High
Performance Semantic Cloud Auditing: 35-64, Editor: Keesook Han and Baek-Young Choi, Springer, 2014.
|
J10
|
W. Peng, F. Li, X. Zou and J. Wu, “A Two-stage
De-anonymization Attack against Anonymized Social Networks”. IEEE
Transactions on Computers, 63.2: 290-303, 10.1109/TC.2012.202, Feb. 2014.
|
J09
|
W. Peng, F. Li, X. Zou and J. Wu, “Behavioral
Malware Detection in Delay Tolerant Networks”. IEEE Transactions on
Parallel and Distributed Systems, 25.1: 53-63, 10.1109/TPDS.2013.27, Jan.
2014.
|
J08
|
F. Li, A. Srinivasan, and J. Wu, “Uncertainty
Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc
Networks," IEICE Transactions 95-D (1):12-19, 2012.
|
J07
|
P. Adusumilli, Y. Sui, X. Zou,
B. Ramamurthy, and F. Li, “A Key Distribution Scheme for
Distributed Group with Authentication Capability,” International
Journal of Performability Engineering
8(2):199-212, 2012.
|
J06
|
Y. Zhao, J. Wu, F. Li, and S. Lu, “On Maximizing the
Lifetime of Wireless Sensor Networks Using Virtual Backbone
Scheduling,” IEEE Transactions on Parallel and Distributed Systems,
23.8:1528-1535, August, 2012.
|
J05
|
F. Li, and J. Wu, "Uncertainty Modeling and Reduction
in MANETs," IEEE Transactions on Mobile Computing 9.7:1035-1048.
July, 2010. (TMC Impact factor: 1.72)
|
J04
|
F. Li, Y. Yang, and J. Wu, "Attack and Flee: Game
Theory-based Analysis on Interactions among Nodes in MANETs," IEEE
Transactions on Systems, Man, and Cybernetics--Part B: Cybernetics
40.3:612-622. June, 2010. (SMCB Impact factor: 1.35)
|
J03
|
A. Srinivasan, F. Li, J. Wu, and M. Li. "Clique-based Group Key Assignment in
Wireless Sensor Networks," in International Journal of
Security and Networks (IJSN), Vol. 3, No. 4: 226-239, 2008.
|
J02
|
F. Li, A. Srinivasan, and J. Wu, "PVFS: A Probabilistic Voting-based Filtering
Scheme in Wireless Sensor Networks," in International
Journal of Security and Networks (IJSN), Vol. 3, No. 3: 173-182, 2008.
|
J01
|
M. Lu, F. Li, and J. Wu, "Efficient Opportunistic Routing in
Utility-Based Ad Hoc Networks," IEEE Transaction of
Reliability 58.3:485-495. September, 2009.
|
FUNDED PROJECTS
Enhancing Undergraduate Experience in Mobile Cloud and
Data Security
|
National Science Foundation (NSF), PI
|
$381,000
|
12/15/2018 - 11/30/2021
|
Highway End-of-Queue Alerting System Based on Probe
Vehicle Data
|
Joint Transportation Research Program (JTRP), Co-PI
|
$110,786
|
07/01/2018-08/31/2019
|
Enhancing Undergraduate Experience in Mobile Cloud
Security
|
National Science Foundation (NSF), PI
|
$360, 000
|
06/01/2016 - 05/31/2021
|
IUSE: Collaborative Project: Building Virtual Research,
Interactive, Service, and Experiential Learning Modules for Cyber
Security Education
|
National Science Foundation (NSF), PI
|
$287,159
|
09/01/2014- 08/31/2019
|
Collaborative Project: Building an Innovative Smartphone
Virtual Laboratory Environment for Cyber-security Education and Training
|
National Science Foundation (NSF), PI
|
$103, 195
|
08/01/2013- 07/31/2016
|
Enhancing Undergraduate Experience in Mobile Computing
Security
|
National Science Foundation (NSF), PI
|
$359,964
|
06/01/2013- 05/31/2016
|
Moving Cloud: Create Moving-target Defense in Cloud by
Learning from Botnets
|
Northrop Grumman Cybersecurity Research Consortium, PI
|
$107,224
|
12/01/2012-08/31/2014
|
Copyright Feng Li 2009~2020,
All rights reserved.
|
|