Publications By Research Area

Wireless Networking:

Book:

  1. Kai Zeng, Wenjing Lou and Ming Li”Multihop Wireless Networks: Opportunistic Routing,”
    Wiley, ISBN: 978-0-470-66617-3, October, 2011.

Journal Papers:

  1. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang, "SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown Statistics", Elsevier Computer Networks (COMNET), accepted, Jul. 2018.
  2. Yantian Hou, Ming Li and Shucheng Yu, "Making Body Area Networks Robust against Cross-Technology Interference", IEEE Transactions on Wireless Communications (TWC), accepted, Oct. 2016.
  3. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou, “Cooperative Interference Mitigation for Heterogeneous Multi-hop Networks Coexistence”, IEEE Transactions on Wireless Communications (TWC), accepted, Apr. 2016.
  4. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu, “SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Networks“, IEEE Transactions on Wireless Communications (TWC), accepted, Jul. 2014.
  5. Zhenyu Yang, Ming Li and Wenjing Lou, “Live Multimedia Streaming in VANETs using Symbol-Level Network Coding”, IEEE Transactions on Wireless Communications (TWC), Vol. 11, No. 8, Aug. 2012.
  6. Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou and H. Zhai, “Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Ad Hoc Networks using Symbol Level Network Coding”,  IEEE Journal on Selected Areas in Communications (JSAC), Vol. 30, No. 2, Feb. 2012.
  7. Ming Li, Kai Zeng and Wenjing Lou, “Opportunistic Broadcast of Event-driven Warning Messages in Vehicular Ad Hoc Networks with Lossy Links,”  Elsevier Computer Networks (COMNET), Vol. 55, July 2011, Pages 2443-2464.
  8. Zhenyu Yang, Ming Li and Wenjing Lou, “R-Code: Network Coding-based Reliable Broadcast in Wireless Mesh Networks,” Elsevier Ad Hoc Networks, Vol. 9, No. 5, July 2011, Pages 788-798.
  9. Ming Li, Zhenyu Yang and Wenjing Lou, “CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,” IEEE Journal on Selected Areas in Communications (JSAC), Vol. 29, No. 1, Jan. 2011.(Best paper award nomination by IEEE ComSoc MMTC)
  10. Feng Liu, Han Zhao, Ming Li, Fengyuan Ren and Yanbo Zhu, ”Adaptive Local Routing Strategy on Scale-Free Network,” Chinese Physics B, Vol. 19, No. 4, Apr. 2010.
  11. Ming Li, Feng Liu and Fengyuan Ren, “Routing Strategy on a Two-dimensional Small-World Network Model,” Physical Review E 75, 066115, Jun. 2007.

Conference Papers:

  1. Tianchi Zhao, Ming Li and Matthias Poloczek, "Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling," 2019 IEEE International Conference on Communications (IEEE ICC), Wireless Communications Symposium, Shanghai, China, May 2019.
  2. Tianchi Zhao, Ming Li and Greg Ditzler, "Online Reconfigurable Antenna State Selection based on Thompson Sampling", 2019 International Conference on Computing, Networking and Communications (ICNC 2019), Wireless Communications Symposium, Honolulu, Hawaii, February 18-21, 2019.
  3. Yanjun Pan, Ming Li, Neng Fan, and Yantian Hou, "On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas", the 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON 2018), Jun. 2018, Hong Kong, China (Acceptance rate: 23.2%)
  4. Mohamed Seif, Ravi Tandon and Ming Li, "On the Secure Degrees of Freedom of 2 × 2 × 2 Multi-Hop Network with Untrusted Relays," IEEE ICC 2018 (Communication Theory Symposium), Kansas City, KS, May 21-23, 2018.
  5. Ahmed M. Salama, Ming Li, Dejun Yang, "Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks", 2017 IEEE Global Communications Conference (Globecom 2017), Cognitive Radio and Networks Symposium, Singapore, Dec. 4-8, 2017.
  6. Yantian Hou, Ming Li and Kai Zeng, “Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas", International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  7. Yantian Hou, Ming Li and Dejun Yang, "Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks", International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  8. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang, “SpecWatch: Adversarial Spectrum Usage Monitoring in CRNs with Unknown Statistics”, The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA,  Apr. 2016. (Acceptance rate: 18.25%)
  9. Yantian Hou, Ming Li and Dejun Yang, “A Game Theoretical Approach to Coexistence of Heterogeneous MIMO Wireless Networks with Interference Cancellation”, International Conference on Computing, Networking and Communication (ICNC), Feb. 15-18 2016, Kauai, HI.
  10. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou, “Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks”, The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  11. Yantian Hou, Ming Li and Shucheng Yu, “Surviving the RF Smog: Making Body Area Networks Robust to Cross-Technology Interference”, 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’13), New Orleans, Jun. 24-27, 2013.
  12. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu, “Non-parametric Passive Traffic Monitoring in Cognitive Radio Networks”,  the 32nd IEEE International Conference on Computer Communication (INFOCOM’13), Turin, Italy, Apr. 2013
    (Acceptance ratio: 280/1613=17%).
  13. Zhenyu Yang, Ming Li and Wenjing Lou, “CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding,”   The 18th IEEE International Conference on Network Protocols (ICNP’10), Kyoto, Japan, Oct. 5-8, 2010. (Acceptance ratio: 31/170 =18%).
  14. Ming Li, Wenjing Lou and Kai Zeng, “OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links,” The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’09), Macau SAR, China, Oct. 12-15, 2009. (Acceptance ratio: 62/245=25.3%)
  15. Zhenyu Yang, Ming Li and Wenjing Lou, “R-Code: Network Coding based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links,” IEEE Global Communications Conference (GLOBECOM 2009), Hawaii, Nov. 30-Dec. 4, 2009.
  16. Zhenyu Yang, Ming Li and Wenjing Lou, “A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks,” International Conference on Wireless Algorithms, Systems and Applications (WASA 2009), Boston, MA, Aug. 16-18, 2009.
  17. Ming Li and Wenjing Lou, “Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links,” (invited paper), ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine), Hong Kong, China, Jul. 28-31, 2008.
  18. Hong Duan, Feng Liu, Ming Li and Mengran Xu, “A Rapid Antenna Selection for MIMO-Diversity Systems,” IEEE International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS), Xiamen, China, Nov. 2007.

Wireless Security:

Book Chapters and Magazine Articles:

  1. Yanjun Pan, Ming Li, Yantian Hou, Ryan Gerdes, Bedri Cetiner, “Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas”, invited chapter in book Proactive and Dynamic Network Defense, Springer, Cliff Wang and Zhuo Lu (Editors), ISBN: 978-3-030-10596-9, to appear, 2019.
  2. Shucheng Yu, Ming Li and Lu Shi, “Trust Establishment in Wireless Body Area Networks”, invited chapter in book Wearable Sensors: fundamentals, implementation and applications, Elsevier, Edward Sazonov and Michael Neuman (Editors), accepted, 2014
  3. Ming Li, Wenjing Lou and Kui Ren, “Secure Device Pairing,”  Encyclopedia of Cryptography and Security (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2011.
  4. Ming Li, Wenjing Lou, and Kui Ren, “Data Security and Privacy in Wireless Body Area Networks,” IEEE Wireless Communications Magazine, Vol. 17, No. 1, Feb. 2010.

Journal Papers:

  1. Tasnuva Tithi, Baswati Deka, Ryan. M. Gerdes, Chris Winstead, Ming Li and Kevin Heaslip, "Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways", IEEE Transactions on Vehicular Technology (TVT), accepted, Feb. 2018.
  2. Yanjun Pan, Yantian Hou, Ming Li, Ryan Gerdes, Kai Zeng, Md Asaduzzaman Towfiq, Bedri Cetiner, “Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization,” IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-14, Sept. 2017.
  3. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou, “Jamming Resilient Communication using MIMO Interference Cancellation”, IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 7, pp. 1486 - 1499, July 2016.
  4. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou, “Location Based Handshake and Private Proximity Test with Location Tags”, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. PP, No. 99, pp. 1-14, Aug. 2015.
  5. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li, “MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks“,IEEE Internet of Things Journal, accepted, Jan. 2015.
  6. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan, “BANA: Body Area Network Authentication Exploiting Channel Characteristics”, IEEE Journal of Selected Areas on Communications (JSAC), Sep. 2013.
  7. Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou and Kui Ren, “Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks”, ACM Transactions on Sensor Networks (TOSN), to appear, May 2013.

Conference Papers:

  1. Seth Andrews, Ryan Gerdes and Ming Li, "Crowdsourced measurements for device fingerprinting", The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec '19), Miami, FL, May 15-17, 2019.
  2. Islam Samy, Loukas Lazos, Yong Xiao, Ming Li and Marwan Krunz, "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard", 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, Jun. 18-20, 2018 (Full Paper Acceptance rate: 25.6%)
  3. Mohamed Seif, Ravi Tandon and Ming Li, “On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT”, 2018 IEEE International Symposium on Information Theory (IEEE ISIT), Vail, CO, Jun. 2018.
  4. Nirnimesh Ghose, Loukas Lazos and Ming Li, "Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks", The 39th IEEE Symposium on Security & Privacy (Oakland) 2018 (S&P 2018), San Francisco, CA, May 21-23, 2018. (Acceptance rate: 11.48%)
  5. Mohamed Seif, Ravi Tandon and Ming Li, "On the Secure Degrees of Freedom of 2 × 2 × 2 Multi-Hop Network with Untrusted Relays," IEEE ICC 2018 (Communication Theory Symposium), Kansas City, KS, May 21-23, 2018.
  6. Nirnimesh Ghose, Loukas Lazos and Ming Li, "SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices", The 37th IEEE International Conference on Computer Communication (IEEE INFOCOM 2018), April 15-19, 2018, Honolulu, HI (Acceptance rate: 19.2%)
  7. Seth Andrews, Ryan Gerdes and Ming Li,“Towards Physical Layer Identification of Cognitive Radio Devices”, the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  8. Nirnimesh Ghose, Loukas Lazos and Ming Li, "HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation'', 26th USENIX Security Symposium (USENIX Security '17), Vancouver, BC, Canada, Aug. 16-18, 2017, pp. 1-18. (Acceptance rate: 16.1%)
  9. Yantian Hou, Ming Li, Ruchir Chauhan, Ryan. M. Gerdes, and Kai Zeng, “Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice”, the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS’15),Singapore, Apr. 2015. (Acceptance ratio: 48/269=17.8%).
  10. Baswati Deka, Ryan. M. Gerdes, Ming Li and Kevin Heaslip, “Friendly Jamming for Secure Localization in Vehicular Transportation” (short paper), The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  11. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou, “MIMO-based Jamming Resilient Communication in Wireless Networks”, The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  12. Yantian Hou, Ming Li, and Joshua. D. Guttman, “Chorus: Scalable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel”, The sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  13. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li, “ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks“, the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  14. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou, “SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags”, the 17th European Symposium on Research in Computer Security (ESORICS’12), Pisa, Italy, Sept. 10-14, 2012. (Acceptance ratio: 50/248=20%)
  15. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan, “BANA: Body Area Network Authentication Exploiting Channel Characteristics“, The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’12), Tucson, AZ, Apr. 2012. (Acceptance ratio: 17/63=27%)
  16. Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou and Y. Thomas Hou, “Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks,” the 31st IEEE International Conference on Computer Communication (INFOCOM’12), Orlando, FL, Mar. 2012. (Acceptance ratio: 278/1547=18%)
  17. Ming Li, Shucheng Yu, Wenjing Lou and Kui Ren, “Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks,”  The 29th IEEE International Conference on Computer Communications (INFOCOM’10), San Diego, CA., Mar. 15-19, 2010.
    (Acceptance ratio: 276/1575=17.5%) [Video demonstration]

Privacy-Enhancing Technologies:

Magazine Articles:

  1. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou and Y. Thomas Hou, “Toward Privacy-Assured Searchable Cloud Data Storage Services”,  IEEE Network, Jul./Aug. 2013.

Journal Papers:

  1. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz, "Trading Privacy for Utility in Database-assisted Dynamic Spectrum Access", IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted, May 2019.
  2. Wenjing Zhang, Ming Li, Ravi Tandon, and Hui Li, "Online Location Trace Privacy: An Information Theoretic Approach", IEEE Transactions on Information Forensics and Security (TIFS), accepted, Jun. 2018.
  3. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu and Yanfeng Shi,“Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data,” IEEE Transactions on Cloud Computing (TCC), accepted, Aug. 2017.
  4. Boyang Wang, Ming Li and Li Xiong, "FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data", IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, Mar. 2017.
  5. Jesse Victors, Ming Li and Xinwen Fu, "The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services", the Proceedings on Privacy Enhancing Technologies (PoPETS), to appear, Vol. 2017, No. 1.
  6. Shuo Qiu,  Jiqiang Liu, Yanfeng Shi, Ming Li and Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing (TCC), accepted, Dec. 2015.
  7. Boyang Wang, Ming Li and Haitao Wang, “Geometric Range Search on Encrypted Spatial Data”, IEEE Transactions on Information Forensics & Security (TIFS), accepted, Nov. 2015.
  8. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li, “Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”, IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted, Jan. 2014.
  9. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou, “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems (TPDS), Jan. 2014.
  10. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou, “Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks,”  IEEE Transactions on Wireless Communications (TWC), Aug. 2013.
  11. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,” IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 24, No. 1, pp. 131-143, Jan. 2013. (Spotlight paper of the issue)

Conference Papers:

  1. Mohamed Seif, Ravi Tandon and Ming Li, Context Aware Laplacian Mechanism for Local Information Privacy, The IEEE Information Theory Workshop (ITW), Visby, Gotland, Sweden, Aug. 25-28, 2019.
  2. Xiaolan Gu, Ming Li, Yang Cao and Li Xiong, "Supporting both Range Queries and Frequency Estimation with Local Differential Privacy", the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  3. Hanyu Quan, Hao Liu, Boyang Wang, Ming Li and Yuqing Zhang, "Randex: Mitigating Range Injection Attacks on Searchable Encryption", the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  4. Bo Jiang, Ming Li and Ravi Tandon,"Localized Information Privacy with Bounded Prior", 2019 IEEE International Conference on Communications (IEEE ICC), Communication and Information Systems Security Symposium, Shanghai, China, May 2019.
  5. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz, "On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access" (Full paper), The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2018), Seoul, South Korea, Oct. 22-25, 2018
  6. Iraklis Leontiadis and Ming Li, ”Storage Efficient Substring Searchable Symmetric Encryption“, ACM ASIACCS-SCC Workshop, Incheon, South Korea, Jun. 2018.
  7. Boris Aronov, Alon Efrat, Ming Li, Jie Gao, Joseph S. B. Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan, Jiaxin Ding, "Are Friends of My Friends Too Social? Limitations of Location Privacy in a Socially-Connected World", The Nineteenth International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2018), Los Angeles, Jun. 2018 (Acceptance rate: 16.9%)
  8. Bo Jiang, Ming Li and Ravi Tandon, "Context-Aware Data Aggregation with Localized Information Privacy", the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  9. Xu Chu, Na Ruan, Ming Li and Weijia Jia, "Pseudonym Inference in Cooperative Vehicular Traffic Scenarios", the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  10. Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li, "Mutually private location proximity detection with access control", 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA - July 17-19, 2017.
  11. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang, “SecReach: Secure Reachability Computation on Encrypted Location Check-in Data”, The 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November 14-16, 2016. (Acceptance rate: 25.8%)
  12. Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li,  “Enabling Mutually Private Location Proximity Services in Smart Cities: A Comparative Assessment”, 2016 IEEE International Smart Cities Conference (ISC2), Trento, Italy, Sept. 12 – 15, 2016.
  13. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”, The Fourth International Workshop on Security in Cloud Computing (SCC), Xi’an, China, May. 2016.
  14. Boyang Wang,  Yantian Hou and Ming Li, “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data”, The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA,  Apr. 2016. (Acceptance rate: 18.25%)
  15. Cyrus Shahabi, Liyue Fan, Luciano Nocera, Li Xiong and Ming Li, “Privacy-Preserving Inference of Social Relationships from Location Data: A Vision Paper”, ACM SIGSPATIAL GIS 2015.
  16. Boyang Wang, Ming Li, Haitao Wang, and Hui Li, “Circular Range Search on Encrypted Spatial Data”, the 3rd IEEE Conference on Communications and Network Security (CNS’15), Florence, Italy, Sept. 2015.
  17. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li, “Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy”, The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  18. Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li, “A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys”, the 2nd IEEE Conference on Communications and Network Security (CNS’14), San Francisco, CA, Oct. 29-31, 2014.
  19. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li, “Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index”, the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS’14), Kyoto, Japan, Jun 4-6, 2014 (Acceptance ratio: 52/260=20%).
  20. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li, “Storing Shared Data on the Cloud via Security-Mediator”, The 33rd International Conference on Distributed Computing Systems (ICDCS ’13), Philadelphia, PA, Jul. 8-11, 2013. (Acceptance ratio: 61/464=13%)
  21. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li, “Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”, the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13), Hangzhou, China, May 7-10, 2013. (Full-paper acceptance ratio: 35/216=16.2%, distinguished paper award)
  22. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,” the 31st International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, MN, Jun. 21-24, 2011. (Acceptance ratio: 15%) (#1 top accessed ICDCS’11 article in IEEE Xplore as of January, Feburary, and March 2012)
  23. Ning Zhang, Ming Li and Wenjing Lou, “Distributed Data Mining with Differential Privacy,” IEEE International Conference on Communications (ICC’11) (Communication and Information System Security Symposium), Kyoto, Japan, Jun. 2011.
  24. Ming Li, Ning Cao, Shucheng Yu and Wenjing Lou, “FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks,” The 30th IEEE International Conference on Computer Communications (INFOCOM’11), Shanghai, China, Apr. 2011. (Acceptance ratio: 291/1823 = 16%)
  25. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou, “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” The 30th IEEE International Conference on Computer Communications (INFOCOM’11), Shanghai, China, Apr. 2011. (Acceptance ratio: 291/1823 = 16%)
  26. Ming Li, Shucheng Yu, Kui Ren and Wenjing Lou, “Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings“,  The 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm’10), Singapore, Sept. 7-10. (Acceptance ratio: 28/112=25%)

Cyber-Physical System Security:

Conference Papers:

  1. Yanmao Man, Ming Li and Ryan Gerdes, "Perceived Adversarial Examples", Poster, The 40th IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 20-22, 2019.
  2. Mingshun Sun, Ming Li and Ryan Gerdes, "Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications", the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  3. Mingshun Sun, Ming Li and Ryan Gerdes, “A Data Trust Framework for VANETs Enabling False Data Detection and Secure Vehicle Tracking”, the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  4. Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, and Ming Li, "Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles", the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017), Denver, CO, Jun. 26-29, 2017. (Acceptance rate: 22%)