Publications By Research Area

Wireless Networking:

Book:

  1. Kai Zeng, Wenjing Lou and Ming Li”Multihop Wireless Networks: Opportunistic Routing,”
    Wiley, ISBN: 978-0-470-66617-3, October, 2011.

Journal Papers:

  1. Zhiwu Guo, Ming Li, and Marwan Krunz, "Exploiting Successive Interference Cancellation for Spectrum Sharing over Unlicensed Bands", IEEE Transactions on Mobile Computing (TMC), accepted, Mar. 2023.
  2. Tianchi Zhao, Ming Li and Yanjun Pan, "Online Learning Based Reconfigurable Antenna Mode Selection Exploiting Channel Correlation", IEEE Transactions on Wireless Communications (TWC), accepted, Apr. 2021.
  3. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang, "SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown Statistics", Elsevier Computer Networks (COMNET), accepted, Jul. 2018.
  4. Yantian Hou, Ming Li and Shucheng Yu, "Making Body Area Networks Robust against Cross-Technology Interference", IEEE Transactions on Wireless Communications (TWC), accepted, Oct. 2016.
  5. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou, “Cooperative Interference Mitigation for Heterogeneous Multi-hop Networks Coexistence”, IEEE Transactions on Wireless Communications (TWC), accepted, Apr. 2016.
  6. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu, “SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Networks“, IEEE Transactions on Wireless Communications (TWC), accepted, Jul. 2014.
  7. Zhenyu Yang, Ming Li and Wenjing Lou, “Live Multimedia Streaming in VANETs using Symbol-Level Network Coding”, IEEE Transactions on Wireless Communications (TWC), Vol. 11, No. 8, Aug. 2012.
  8. Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou and H. Zhai, “Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Ad Hoc Networks using Symbol Level Network Coding”,  IEEE Journal on Selected Areas in Communications (JSAC), Vol. 30, No. 2, Feb. 2012.
  9. Ming Li, Kai Zeng and Wenjing Lou, “Opportunistic Broadcast of Event-driven Warning Messages in Vehicular Ad Hoc Networks with Lossy Links,”  Elsevier Computer Networks (COMNET), Vol. 55, July 2011, Pages 2443-2464.
  10. Zhenyu Yang, Ming Li and Wenjing Lou, “R-Code: Network Coding-based Reliable Broadcast in Wireless Mesh Networks,” Elsevier Ad Hoc Networks, Vol. 9, No. 5, July 2011, Pages 788-798.
  11. Ming Li, Zhenyu Yang and Wenjing Lou, “CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,” IEEE Journal on Selected Areas in Communications (JSAC), Vol. 29, No. 1, Jan. 2011.(Best paper award nomination by IEEE ComSoc MMTC)
  12. Feng Liu, Han Zhao, Ming Li, Fengyuan Ren and Yanbo Zhu, ”Adaptive Local Routing Strategy on Scale-Free Network,” Chinese Physics B, Vol. 19, No. 4, Apr. 2010.
  13. Ming Li, Feng Liu and Fengyuan Ren, “Routing Strategy on a Two-dimensional Small-World Network Model,” Physical Review E 75, 066115, Jun. 2007.

Conference Papers:

  1. Zhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei, “DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum,” 2024 International Conference on Computing, Networking and Communications (ICNC 2024), AI and Machine Learning for Communications and Networking Symposium, Feb. 19-22, 2024, Big Island, Hawaii.
  2. Zhiwu Guo, Chicheng Zhang, Ming Li, Marwan Krunz, “Fair Coexistence of Heterogeneous Networks: A Novel Probabilistic Multi-Armed Bandit Approach, 21st International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt 2023), Aug. 2023, Singapore.
  3. Tianchi Zhao, Chicheng Zhang, Ming Li, "Hierarchical Unimodal Bandits," European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Oral Presentation, Sept. 2022 (acceptance rate: 26%)
  4. Tianchi Zhao, Bo Jiang, Ming Li and Ravi Tandon, "Regret Analysis of Stochastic Multi-armed Bandit Problem with Partial Information Feedback", The 2020 International Joint Conference on Neural Networks (IJCNN 2020), Jul. 19-24, 2020, Glasgow, UK.
  5. Zhiwu Guo, Ming Li and Yong Xiao, "Enhancing LAA/WiFi Coexistence via Concurrent Transmissions and Interference Cancellation", The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2019), Newark, NJ, November 11-14, 2019.
  6. Tianchi Zhao, Ming Li and Matthias Poloczek, "Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling," 2019 IEEE International Conference on Communications (IEEE ICC), Wireless Communications Symposium, Shanghai, China, May 2019.
  7. Tianchi Zhao, Ming Li and Greg Ditzler, "Online Reconfigurable Antenna State Selection based on Thompson Sampling", 2019 International Conference on Computing, Networking and Communications (ICNC 2019), Wireless Communications Symposium, Honolulu, Hawaii, February 18-21, 2019.
  8. Yanjun Pan, Ming Li, Neng Fan, and Yantian Hou, "On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas", the 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON 2018), Jun. 2018, Hong Kong, China (Acceptance rate: 23.2%)
  9. Mohamed Seif, Ravi Tandon and Ming Li, "On the Secure Degrees of Freedom of 2 × 2 × 2 Multi-Hop Network with Untrusted Relays," IEEE ICC 2018 (Communication Theory Symposium), Kansas City, KS, May 21-23, 2018.
  10. Ahmed M. Salama, Ming Li, Dejun Yang, "Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks", 2017 IEEE Global Communications Conference (Globecom 2017), Cognitive Radio and Networks Symposium, Singapore, Dec. 4-8, 2017.
  11. Yantian Hou, Ming Li and Kai Zeng, “Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas", International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  12. Yantian Hou, Ming Li and Dejun Yang, "Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks", International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  13. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang, “SpecWatch: Adversarial Spectrum Usage Monitoring in CRNs with Unknown Statistics”, The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA,  Apr. 2016. (Acceptance rate: 18.25%)
  14. Yantian Hou, Ming Li and Dejun Yang, “A Game Theoretical Approach to Coexistence of Heterogeneous MIMO Wireless Networks with Interference Cancellation”, International Conference on Computing, Networking and Communication (ICNC), Feb. 15-18 2016, Kauai, HI.
  15. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou, “Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks”, The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  16. Yantian Hou, Ming Li and Shucheng Yu, “Surviving the RF Smog: Making Body Area Networks Robust to Cross-Technology Interference”, 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’13), New Orleans, Jun. 24-27, 2013.
  17. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu, “Non-parametric Passive Traffic Monitoring in Cognitive Radio Networks”,  the 32nd IEEE International Conference on Computer Communication (INFOCOM’13), Turin, Italy, Apr. 2013
    (Acceptance ratio: 280/1613=17%).
  18. Zhenyu Yang, Ming Li and Wenjing Lou, “CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding,”   The 18th IEEE International Conference on Network Protocols (ICNP’10), Kyoto, Japan, Oct. 5-8, 2010. (Acceptance ratio: 31/170 =18%).
  19. Ming Li, Wenjing Lou and Kai Zeng, “OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links,” The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’09), Macau SAR, China, Oct. 12-15, 2009. (Acceptance ratio: 62/245=25.3%)
  20. Zhenyu Yang, Ming Li and Wenjing Lou, “R-Code: Network Coding based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links,” IEEE Global Communications Conference (GLOBECOM 2009), Hawaii, Nov. 30-Dec. 4, 2009.
  21. Zhenyu Yang, Ming Li and Wenjing Lou, “A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks,” International Conference on Wireless Algorithms, Systems and Applications (WASA 2009), Boston, MA, Aug. 16-18, 2009.
  22. Ming Li and Wenjing Lou, “Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links,” (invited paper), ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), Hong Kong, China, Jul. 28-31, 2008.
  23. Hong Duan, Feng Liu, Ming Li and Mengran Xu, “A Rapid Antenna Selection for MIMO-Diversity Systems,” IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China, Nov. 2007.

Wireless Security:

Book Chapters and Magazine Articles:

  1. Yanjun Pan, Ming Li, Yantian Hou, Ryan Gerdes, Bedri Cetiner, “Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas”, invited chapter in book Proactive and Dynamic Network Defense, Springer, Cliff Wang and Zhuo Lu (Editors), ISBN: 978-3-030-10596-9, to appear, 2019.
  2. Shucheng Yu, Ming Li and Lu Shi, “Trust Establishment in Wireless Body Area Networks”, invited chapter in book Wearable Sensors: fundamentals, implementation and applications, Elsevier, Edward Sazonov and Michael Neuman (Editors), accepted, 2014
  3. Ming Li, Wenjing Lou and Kui Ren, “Secure Device Pairing,”  Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2011.
  4. Ming Li, Wenjing Lou, and Kui Ren, “Data Security and Privacy in Wireless Body Area Networks,” IEEE Wireless Communications Magazine, Vol. 17, No. 1, Feb. 2010.

Journal Papers:

  1. Nirnimesh Ghose, Kaustubh Gupta, Loukas Lazos, Ming Li, Ziqi Xu, and Jincheng Li, "ZITA: Zero-Interaction Two-Factor Authentication using Contact Traces and In-band Proximity Verification", IEEE Transactions on Mobile Computing (TMC), accepted, Sept. 2023.
  2. Islam Samy, Xiao Han, Loukas Lazos, Ming Li, Yong Xiao, and Marwan Krunz, "Misbehavior Detection in Wi-Fi/LTE Coexistence over Unlicensed Bands", IEEE Transactions on Mobile Computing (TMC), accepted, Oct. 2021.
  3. Nirnimesh Ghose, Loukas Lazos, and Ming Li, "In-band Secret-Free Pairing for COTS Wireless Devices", IEEE Transactions on Mobile Computing (TMC), accepted, Jul. 2020.
  4. Mohamed Seif, Ravi Tandon and Ming Li, "Secure Retrospective Interference Alignment", Journal of Entropy , accepted, Oct 2019.
  5. Tasnuva Tithi, Baswati Deka, Ryan. M. Gerdes, Chris Winstead, Ming Li and Kevin Heaslip, "Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways", IEEE Transactions on Vehicular Technology (TVT), accepted, Feb. 2018.
  6. Yanjun Pan, Yantian Hou, Ming Li, Ryan Gerdes, Kai Zeng, Md Asaduzzaman Towfiq, Bedri Cetiner, “Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization,” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-14, Sept. 2017.
  7. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou, “Jamming Resilient Communication using MIMO Interference Cancellation”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 7, pp. 1486 - 1499, July 2016.
  8. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou, “Location Based Handshake and Private Proximity Test with Location Tags”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. PP, No. 99, pp. 1-14, Aug. 2015.
  9. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li, “MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks“,IEEE Internet of Things Journal, accepted, Jan. 2015.
  10. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan, “BANA: Body Area Network Authentication Exploiting Channel Characteristics”, IEEE Journal of Selected Areas on Communications (JSAC), Sep. 2013.
  11. Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou and Kui Ren, “Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks”, ACM Transactions on Sensor Networks (TOSN), to appear, May 2013.

Conference Papers:

  1. Lewis W. Koplon, Ameer G. Nessaee, Alex Choi, Andress Mentoza, Michael Villasana, Loukas Lazos and Ming Li, “Cyclops: Binding a Vehicle’s Digital Identity to its Physical Trajectory using Monocular Cameras,” International Symposium on Vehicle Security and Privacy (VehicleSec 2024), Co-located with NDSS Symposium 2024, Feb. 26, 2024, San Diego, CA.
  2. Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos and Ming Li, "Wiggle: Physical Challenge-Response Verification of Vehicle Platooning," 2023 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium, Honolulu, HI, Feb. 2023.
  3. Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, and Nirnimesh Ghose, "PoF: Proof-of-Following for Vehicle Platoons", The 29th Network and Distributed System Security Symposium (NDSS 2022), Feb. 2022.
  4. Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Samson Aggelopoulos, Brian Lu, Alvin Yang, Thomas Yang, Stephanie Aelmore, Willy Chang, Alana Power, Ming Li, Olga Boric–Lubecke, Victor Lubecke, Wenhai Sun, "Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test", 2021 IEEE Global Communications Conference (IEEE GLOBECOM 2021), December 7 - 11, Madrid, Spain, and virtual.
  5. Yanjun Pan, Ziqi Xu, Ming Li and Loukas Lazos, "Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization", The Twenty-Second ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2021), Hybrid, Jul. 2021 (20% acceptance rate).
  6. Mingshun Sun , Yanmao Man, Ming Li, and Ryan Gerdes, "SVM: Secure Vehicle Motion Verification with a Single Wireless Receiver", The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020), Jul. 8-15, 2020 (Acceptance rate: 26%).
  7. Mohamed Seif, Ravi Tandon, Ming Li, "Wireless Federated Learning with Local Differential Privacy", The 2020 IEEE International Symposium on Information Theory (IEEE ISIT 2020), June 21-26, 2020, Los Angeles, CA.
  8. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz, "Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users“, IEEE International Conference on Communications (IEEE ICC'20, CRAN Symposium), Dublin, Ireland, June 6-11, 2020.
  9. Yanjun Pan, Yao Zheng and Ming Li, "ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization", IEEE INFOCOM 2020, Apr. 2020, Beijing, China (Acceptance rate: 19.8%)
  10. Seth Andrews, Ryan Gerdes and Ming Li, "Crowdsourced measurements for device fingerprinting", The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec '19), Miami, FL, May 15-17, 2019.
  11. Islam Samy, Loukas Lazos, Yong Xiao, Ming Li and Marwan Krunz, "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard", 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, Jun. 18-20, 2018 (Full Paper Acceptance rate: 25.6%)
  12. Mohamed Seif, Ravi Tandon and Ming Li, “On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT”, 2018 IEEE International Symposium on Information Theory (IEEE ISIT), Vail, CO, Jun. 2018.
  13. Nirnimesh Ghose, Loukas Lazos and Ming Li, "Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks", The 39th IEEE Symposium on Security & Privacy (Oakland) 2018 (S&P 2018), San Francisco, CA, May 21-23, 2018. (Acceptance rate: 11.48%)
  14. Mohamed Seif, Ravi Tandon and Ming Li, "On the Secure Degrees of Freedom of 2 × 2 × 2 Multi-Hop Network with Untrusted Relays," IEEE ICC 2018 (Communication Theory Symposium), Kansas City, KS, May 21-23, 2018.
  15. Nirnimesh Ghose, Loukas Lazos and Ming Li, "SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices", The 37th IEEE International Conference on Computer Communication (IEEE INFOCOM 2018), April 15-19, 2018, Honolulu, HI (Acceptance rate: 19.2%)
  16. Seth Andrews, Ryan Gerdes and Ming Li,“Towards Physical Layer Identification of Cognitive Radio Devices”, the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  17. Nirnimesh Ghose, Loukas Lazos and Ming Li, "HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation'', 26th USENIX Security Symposium (USENIX Security '17), Vancouver, BC, Canada, Aug. 16-18, 2017, pp. 1-18. (Acceptance rate: 16.1%)
  18. Yantian Hou, Ming Li, Ruchir Chauhan, Ryan. M. Gerdes, and Kai Zeng, “Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice”, the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS’15),Singapore, Apr. 2015. (Acceptance ratio: 48/269=17.8%).
  19. Baswati Deka, Ryan. M. Gerdes, Ming Li and Kevin Heaslip, “Friendly Jamming for Secure Localization in Vehicular Transportation” (short paper), The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  20. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou, “MIMO-based Jamming Resilient Communication in Wireless Networks”, The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  21. Yantian Hou, Ming Li, and Joshua. D. Guttman, “Chorus: Scalable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel”, The sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  22. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li, “ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks“, the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  23. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou, “SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags”, the 17th European Symposium on Research in Computer Security (ESORICS’12), Pisa, Italy, Sept. 10-14, 2012. (Acceptance ratio: 50/248=20%)
  24. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan, “BANA: Body Area Network Authentication Exploiting Channel Characteristics“, The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’12), Tucson, AZ, Apr. 2012. (Acceptance ratio: 17/63=27%)
  25. Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou and Y. Thomas Hou, “Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks,” the 31st IEEE International Conference on Computer Communication (INFOCOM’12), Orlando, FL, Mar. 2012. (Acceptance ratio: 278/1547=18%)
  26. Ming Li, Shucheng Yu, Wenjing Lou and Kui Ren, “Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks,”  The 29th IEEE International Conference on Computer Communications (INFOCOM’10), San Diego, CA., Mar. 15-19, 2010.
    (Acceptance ratio: 276/1575=17.5%) [Video demonstration]

Privacy & Applied Cryptography:

Magazine Articles:

  1. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou and Y. Thomas Hou, “Toward Privacy-Assured Searchable Cloud Data Storage Services”,  IEEE Network, Jul./Aug. 2013.

Journal Papers:

  1. Bo Jiang, Ming Li, and Ravi Tandon, "Online Context-aware Streaming Data Release with Sequence Information Privacy ", IEEE Transactions on Information Forensics and Security (TIFS), accepted, Mar. 2024.
  2. Hanyu Quan, Boyang Wang, Ming Li, Iraklis Leontiadis, “FastReach: A System for Privacy-Preserving Reachability Queries over Location Data”, Computers & Security , accepted, Sept. 2023.
  3. Bo Jiang, Mohamed Seif, Ravi Tandon and Ming Li, "Answering Count Queries for Genomic Data with Perfect Privacy", IEEE Transactions on Information Forensics and Security (TIFS), accepted, Jun. 2023.
  4. Wenjing Zhang, Bo Jiang, Ming Li, and Xiaodong Lin, "Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach", IEEE Transactions on Information Forensics and Security (TIFS), accepted, Feb. 2022.
  5. Bo Jiang, Mohamed Seif, Ravi Tandon, and Ming Li, "Context-Aware Local Information Privacy", IEEE Transactions on Information Forensics and Security (TIFS), accepted, May 2021.
  6. Bo Jiang, Ming Li and Ravi Tandon, "Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-18, Nov. 2020.
  7. Boyang Wang,  Yantian Hou and Ming Li, "QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data", IEEE Transactions on Cloud Computing, accepted, Jul. 2020.
  8. Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, and Hui Li, "Aggregation-based Location Privacy: An Information Theoretic Approach", Computers & Security , accepted, Jul. 2020.
  9. Iraklis Leontiadis and Ming Li, "Collusion Resistant Aggregation from Convertible Tags", International Journal of Information Security (IJIS), accepted, Dec. 2019.
  10. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz, "Trading Privacy for Utility in Database-assisted Dynamic Spectrum Access", IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted, May 2019.
  11. Wenjing Zhang, Ming Li, Ravi Tandon, and Hui Li, "Online Location Trace Privacy: An Information Theoretic Approach", IEEE Transactions on Information Forensics and Security (TIFS), accepted, Jun. 2018.
  12. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu and Yanfeng Shi,“Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data,” IEEE Transactions on Cloud Computing (TCC), accepted, Aug. 2017.
  13. Boyang Wang, Ming Li and Li Xiong, "FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, Mar. 2017.
  14. Jesse Victors, Ming Li and Xinwen Fu, "The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services", the Proceedings on Privacy Enhancing Technologies (PoPETS), to appear, Vol. 2017, No. 1.
  15. Shuo Qiu,  Jiqiang Liu, Yanfeng Shi, Ming Li and Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing (TCC), accepted, Dec. 2015.
  16. Boyang Wang, Ming Li and Haitao Wang, “Geometric Range Search on Encrypted Spatial Data”, IEEE Transactions on Information Forensics & Security (TIFS), accepted, Nov. 2015.
  17. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li, “Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”, IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted, Jan. 2014.
  18. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou, “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems (TPDS), Jan. 2014.
  19. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou, “Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks,”  IEEE Transactions on Wireless Communications (TWC), Aug. 2013.
  20. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,” IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 24, No. 1, pp. 131-143, Jan. 2013. (Spotlight paper of the issue)

Conference Papers:

  1. Bo Jiang, Tianchi Zhao, Ming Li, "Thompson Sampling under Bernoulli Rewards with Local Differential Privacy," ICML Workshop on Theory and Practice of Differential Privacy, Jul. 2022
  2. Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph Mitchell, Esther Arkin and Jie Gao, "Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach", The 21st International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2020), October 11-14, 2020 (Acceptance rate: 15%).
  3. Mohamed Seif, Ravi Tandon, Ming Li, "Wireless Federated Learning with Local Differential Privacy", The 2020 IEEE International Symposium on Information Theory (IEEE ISIT 2020), June 21-26, 2020, Los Angeles, CA.
  4. Xiaolan Gu, Ming Li, Li Xiong and Yang Cao, "Providing Input-Discriminative Protection for Local Differential Privacy", IEEE International Conference on Data Engineering (ICDE 2020), Apr. 2020, Dallas, TX.
  5. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz, "Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users“, IEEE International Conference on Communications (IEEE ICC'20, CRAN Symposium), Dublin, Ireland, June 6-11, 2020.
  6. Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong and Yang Cao, "PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility", 2020 USENIX Security Symposium, Aug. 2020, Boston, MA.
  7. Mohamed Seif, Ravi Tandon and Ming Li, Context Aware Laplacian Mechanism for Local Information Privacy, The IEEE Information Theory Workshop (ITW), Visby, Gotland, Sweden, Aug. 25-28, 2019.
  8. Xiaolan Gu, Ming Li, Yang Cao and Li Xiong, "Supporting both Range Queries and Frequency Estimation with Local Differential Privacy", the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  9. Hanyu Quan, Hao Liu, Boyang Wang, Ming Li and Yuqing Zhang, "Randex: Mitigating Range Injection Attacks on Searchable Encryption", the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  10. Bo Jiang, Ming Li and Ravi Tandon,"Localized Information Privacy with Bounded Prior", 2019 IEEE International Conference on Communications (IEEE ICC), Communication and Information Systems Security Symposium, Shanghai, China, May 2019.
  11. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz, "On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access" (Full paper), The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2018), Seoul, South Korea, Oct. 22-25, 2018
  12. Iraklis Leontiadis and Ming Li, ”Storage Efficient Substring Searchable Symmetric Encryption“, ACM ASIACCS-SCC Workshop, Incheon, South Korea, Jun. 2018.
  13. Boris Aronov, Alon Efrat, Ming Li, Jie Gao, Joseph S. B. Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan, Jiaxin Ding, "Are Friends of My Friends Too Social? Limitations of Location Privacy in a Socially-Connected World", The Nineteenth International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2018), Los Angeles, Jun. 2018 (Acceptance rate: 16.9%)
  14. Bo Jiang, Ming Li and Ravi Tandon, "Context-Aware Data Aggregation with Localized Information Privacy", the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  15. Xu Chu, Na Ruan, Ming Li and Weijia Jia, "Pseudonym Inference in Cooperative Vehicular Traffic Scenarios", the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  16. Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li, "Mutually private location proximity detection with access control", 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA - July 17-19, 2017.
  17. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang, “SecReach: Secure Reachability Computation on Encrypted Location Check-in Data”, The 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November 14-16, 2016. (Acceptance rate: 25.8%)
  18. Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li,  “Enabling Mutually Private Location Proximity Services in Smart Cities: A Comparative Assessment”, 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, Sept. 12 – 15, 2016.
  19. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”, The Fourth International Workshop on Security in Cloud Computing (SCC), Xi’an, China, May. 2016.
  20. Boyang Wang,  Yantian Hou and Ming Li, “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data”, The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA,  Apr. 2016. (Acceptance rate: 18.25%)
  21. Cyrus Shahabi, Liyue Fan, Luciano Nocera, Li Xiong and Ming Li, “Privacy-Preserving Inference of Social Relationships from Location Data: A Vision Paper”, ACM SIGSPATIAL GIS 2015.
  22. Boyang Wang, Ming Li, Haitao Wang, and Hui Li, “Circular Range Search on Encrypted Spatial Data”, the 3rd IEEE Conference on Communications and Network Security (CNS’15), Florence, Italy, Sept. 2015.
  23. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li, “Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy”, The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  24. Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li, “A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys”, the 2nd IEEE Conference on Communications and Network Security (CNS’14), San Francisco, CA, Oct. 29-31, 2014.
  25. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li, “Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index”, the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS’14), Kyoto, Japan, Jun 4-6, 2014 (Acceptance ratio: 52/260=20%).
  26. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li, “Storing Shared Data on the Cloud via Security-Mediator”, The 33rd International Conference on Distributed Computing Systems (ICDCS ’13), Philadelphia, PA, Jul. 8-11, 2013. (Acceptance ratio: 61/464=13%)
  27. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li, “Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”, the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13), Hangzhou, China, May 7-10, 2013. (Full-paper acceptance ratio: 35/216=16.2%, distinguished paper award)
  28. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,” the 31st International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, MN, Jun. 21-24, 2011. (Acceptance ratio: 15%) (#1 top accessed ICDCS’11 article in IEEE Xplore as of January, Feburary, and March 2012)
  29. Ning Zhang, Ming Li and Wenjing Lou, “Distributed Data Mining with Differential Privacy,” IEEE International Conference on Communications (ICC’11) (Communication and Information System Security Symposium), Kyoto, Japan, Jun. 2011.
  30. Ming Li, Ning Cao, Shucheng Yu and Wenjing Lou, “FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks,” The 30th IEEE International Conference on Computer Communications (INFOCOM’11), Shanghai, China, Apr. 2011. (Acceptance ratio: 291/1823 = 16%)
  31. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou, “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” The 30th IEEE International Conference on Computer Communications (INFOCOM’11), Shanghai, China, Apr. 2011. (Acceptance ratio: 291/1823 = 16%)
  32. Ming Li, Shucheng Yu, Kui Ren and Wenjing Lou, “Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings“,  The 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’10), Singapore, Sept. 7-10. (Acceptance ratio: 28/112=25%)

Cyber-Physical System Security:

Journal Papers:

  1. Yanmao Man, Ming Li, and Ryan Gerdes, "Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures", ACM Transactions on Cyber-Physical Systems (TCPS), accepted, Apr. 2023.
  2. Mingshun Sun*, Ali Al-Hashimi*, Ming Li and Ryan Gerdes, (*: co-first authors), "Impacts of Constrained Sensing and Communication based Attacks on Vehicular Platoons", IEEE Transactions on Vehicular Technology (TVT), accepted, Feb. 2020.

Conference Papers:

  1. Raymond Muller, Yanmao Man, Ming Li, Ryan Gerdes, Jonathan Petit, Z. Berkay Celik, "VOGUES: Validation of Object Guise using Estimated Components," The 33rd USENIX Security Symposium (USENIX Security '24), Philadelphia, PA, Aug. 2024.
  2. Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, and Ryan Gerdes, "That Person Behaves Like A Car: Misclassification Attack Detection for Autonomous Systems using Spatiotemporal Consistency," The 32nd USENIX Security Symposium (USENIX Security '23), Aug. 2023, accepted.
  3. Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, and Ryan Gerdes, "Evaluating Perception Attacks on Prediction and Planning of Autonomous Vehicles," the 31st USENIX Security Symposium Poster Session (USENIX Security '22 Posters), Boston, MA, Aug. 2022
  4. Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li and Ryan Gerdes, "Physical Hijacking Attacks against Object Trackers", The ACM Conference on Computer and Communications Security (ACM CCS 2022) , Nov. 2022.
  5. Abdullah Zubair Mohammed, Alok Singh, Gokcen Yilmaz Dayanikli, Ryan Gerdes, Mani Mina, and Ming Li, "Towards Wireless Spiking of Smart Locks", The IEEE Workshop on the Internet of Safe Things (SafeThings 2022), co-located at IEEE S & P 2022, May 2022.
  6. Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li and Ryan Gerdes, "DRIVETRUTH: Automated Autonomous Driving Dataset Generation for Security Applications", The 4th International Workshop on Automotive and Autonomous Vehicle Security (AutoSec 2022), co-located at NDSS 2022, Apr. 2022.
  7. Abdullah Zubair Mohammed, Yanmao Man, Ryan Gerdes, Ming Li and Z. Berkay Celik, "Physical Layer Data Manipulation Attacks on the CAN Bus", The 4th International Workshop on Automotive and Autonomous Vehicle Security (AutoSec 2022), co-located at NDSS 2022, Apr. 2022.
  8. Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, and Ming Li, "StegoNet: Turn Deep Neural Network into a Stegomalware", The 2020 Annual Computer Security Applications Conference (ACSAC 2020), Austin, TX, Dec. 2020 (23% acceptance rate).
  9. Yanmao Man, Ming Li, and Ryan Gerdes, "GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems", The 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), Oct. 14-16, 2020 (Acceptance rate: 26%).
  10. Mahsa Foruhandeh*, Yanmao Man*, Ryan Gerdes, Ming Li, Thidapat Chantem, "SIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks", The 2019 Annual Computer Security Applications Conference (ACSAC 2019), San Juan, Pueto Rico, Dec. 9-13, 2019 (22.6% acceptance rate) (*: co-first authors)
  11. Yanmao Man, Ming Li and Ryan Gerdes, "Perceived Adversarial Examples", Poster, The 40th IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 20-22, 2019.
  12. Mingshun Sun, Ming Li and Ryan Gerdes, "Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications", the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  13. Mingshun Sun, Ming Li and Ryan Gerdes, “A Data Trust Framework for VANETs Enabling False Data Detection and Secure Vehicle Tracking”, the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  14. Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, and Ming Li, "Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles", the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017), Denver, CO, Jun. 26-29, 2017. (Acceptance rate: 22%)