Selected Publications

[By Research Area]

Book

  1. Kai Zeng, Wenjing Lou and Ming Li,
    Multihop Wireless Networks: Opportunistic Routing,”
    Wiley, ISBN: 978-0-470-66617-3, October, 2011.

Book Chapters and Magazine Articles

  1. Ming Li and Wenjing Lou,
    “Secure Device Pairing,”
    to appear, Encyclopedia of Cryptography and Security
    (3rd Ed.), Editors: Sushil Jajodia, Pierangela Samarati and Moti Yung, Springer, 2022.
  2. Yanjun Pan, Ming Li, Yantian Hou, Ryan Gerdes, Bedri Cetiner,
    “Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas”,
    invited chapter in book Proactive and Dynamic Network Defense, Springer, Cliff Wang and Zhuo Lu (Editors), ISBN: 978-3-030-10596-9, to appear, 2019.
  3. Shucheng Yu, Ming Li and Lu Shi,
    “Trust Establishment in Wireless Body Area Networks”,
    invited chapter in book Wearable Sensors: fundamentals, implementation and applications, Elsevier, Edward Sazonov and Michael Neuman (Editors), 2014.
  4. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou and Y. Thomas Hou,
    “Toward Privacy-Assured Searchable Cloud Data Storage Services”,
    IEEE Network
    , Jul./Aug. 2013.
  5. Ming Li, Wenjing Lou and Kui Ren,
    “Secure Device Pairing,”
    Encyclopedia of Cryptography and Security
    (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2011.
  6. Ming Li, Wenjing Lou, and Kui Ren,
    Data Security and Privacy in Wireless Body Area Networks,”
    IEEE Wireless Communications Magazine,
    Vol. 17, No. 1, Feb. 2010.

Journal Papers (Underlined authors are/were my students or visiting students)

  1. Bo Jiang, Ming Li, and Ravi Tandon
    "Online Context-aware Streaming Data Release with Sequence Information Privacy ",
    IEEE Transactions on Information Forensics and Security (TIFS), accepted, Mar. 2024.
  2. Hanyu Quan, Boyang Wang, Ming Li, Iraklis Leontiadis,
    “FastReach: A System for Privacy-Preserving Reachability Queries over Location Data”,
    Computers & Security , accepted, Sept. 2023.
  3. Nirnimesh Ghose, Kaustubh Gupta, Loukas Lazos, Ming Li, Ziqi Xu, and Jincheng Li
    "ZITA: Zero-Interaction Two-Factor Authentication using Contact Traces and In-band Proximity Verification",
    IEEE Transactions on Mobile Computing (TMC), accepted, Sept. 2023.
  4. Bo Jiang, Mohamed Seif, Ravi Tandon and Ming Li,
    "Answering Count Queries for Genomic Data with Perfect Privacy",
    IEEE Transactions on Information Forensics and Security (TIFS), accepted, Jun. 2023.
  5. Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Willy Chang, Ming Li, Olga Boric–Lubecke, Victor Lubecke, Wenhai Sun,
    "Cross-Modality Continuous User Authentication and Device Pairing with Respiratory Pattern",
    IEEE Internet of Things Journal (IoTJ), accepted, Apr. 2023.
  6. Yanmao Man, Ming Li, and Ryan Gerdes,
    "Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures",
    ACM Transactions on Cyber-Physical Systems (TCPS), accepted, Apr. 2023.
  7. Zhiwu Guo, Ming Li, and Marwan Krunz,
    "Exploiting Successive Interference Cancellation for Spectrum Sharing over Unlicensed Bands",
    IEEE Transactions on Mobile Computing (TMC), accepted, Mar. 2023.
  8. Wenjing Zhang, Bo Jiang, Ming Li, and Xiaodong Lin,
    "Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach",
    IEEE Transactions on Information Forensics and Security (TIFS), accepted, Feb. 2022.
  9. Islam Samy, Xiao Han, Loukas Lazos, Ming Li, Yong Xiao, and Marwan Krunz,
    "Misbehavior Detection in Wi-Fi/LTE Coexistence over Unlicensed Bands",
    IEEE Transactions on Mobile Computing (TMC), accepted, Oct. 2021.
  10. Bo Jiang, Mohamed Seif, Ravi Tandon, and Ming Li
    "Context-Aware Local Information Privacy",
    IEEE Transactions on Information Forensics and Security (TIFS), accepted, May 2021.
  11. Tianchi Zhao, Ming Li and Yanjun Pan,
    "Online Learning Based Reconfigurable Antenna Mode Selection Exploiting Channel Correlation",
    IEEE Transactions on Wireless Communications (TWC), accepted, Apr. 2021.
  12. Bo Jiang, Ming Li and Ravi Tandon,
    "Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation",
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-18, Nov. 2020.
  13. Nirnimesh Ghose, Loukas Lazos, and Ming Li,
    "In-band Secret-Free Pairing for COTS Wireless Devices",
    IEEE Transactions on Mobile Computing (TMC), accepted, Jul. 2020.
  14. Boyang Wang,  Yantian Hou and Ming Li,
    "QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data",
    IEEE Transactions on Cloud Computing, accepted, Jul. 2020.
  15. Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, and Hui Li,
    "Aggregation-based Location Privacy: An Information Theoretic Approach",
    Computers & Security , accepted, Jul. 2020.
  16. Mingshun Sun*, Ali Al-Hashimi*, Ming Li and Ryan Gerdes, (*: co-first authors)
    "Impacts of Constrained Sensing and Communication based Attacks on Vehicular Platoons",
    IEEE Transactions on Vehicular Technology (TVT), accepted, Feb. 2020.
  17. Iraklis Leontiadis and Ming Li,
    "Collusion Resistant Aggregation from Convertible Tags",
    International Journal of Information Security (IJIS), accepted, Dec. 2019.
  18. Mohamed Seif, Ravi Tandon and Ming Li,
    "Secure Retrospective Interference Alignment",
    Journal of Entropy , accepted, Oct 2019.
  19. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz,
    "Trading Privacy for Utility in Database-assisted Dynamic Spectrum Access",
    IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted, May 2019.
  20. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang,
    "SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown Statistics",
    Elsevier Computer Networks (COMNET), accepted, Jul. 2018.
  21. Wenjing Zhang, Ming Li, Ravi Tandon, and Hui Li,
    "Online Location Trace Privacy: An Information Theoretic Approach",
    IEEE Transactions on Information Forensics and Security (TIFS), accepted, Jun. 2018.
  22. Tasnuva Tithi, Baswati Deka, Ryan. M. Gerdes, Chris Winstead, Ming Li and Kevin Heaslip,
    "Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways",
    IEEE Transactions on Vehicular Technology (TVT), accepted, May 2018.
  23. Yanjun Pan, Yantian Hou, Ming Li, Ryan Gerdes, Kai Zeng, Md Asaduzzaman Towfiq, Bedri Cetiner,
    “Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization,”
    IEEE Transactions on Dependable and Secure Computing
    (TDSC), accepted, pp. 1-14, Sept. 2017.
  24. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu and Yanfeng Shi,
    “Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data,”
    IEEE Transactions on Cloud Computing
    (TCC), accepted, pp. 1-12, Aug. 2017.
  25. Boyang Wang, Ming Li and Li Xiong,
    "FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data",
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-14, Mar. 2017.
  26. Yantian Hou, Ming Li and Shucheng Yu,
    "Making Body Area Networks Robust against Cross-Technology Interference",
    IEEE Transactions on Wireless Communications (TWC), Vol. 16, No. 1, pp. 429- 440, Jan. 2017.
  27. Jesse Victors, Ming Li and Xinwen Fu,
    "The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services",
    the Proceedings on Privacy Enhancing Technologies (PoPETS), to appear, Vol. 2017, No. 1, pp. 1-21, Sept. 2016.
  28. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou,
    “Cooperative Interference Mitigation for Heterogeneous Multi-hop Networks Coexistence”,
    IEEE Transactions on Wireless Communications (TWC), Vol. 15, No. 8, pp. 5328 - 5340, Aug. 2016.
  29. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou,
    “Jamming Resilient Communication using MIMO Interference Cancellation”,
    IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 7, pp. 1486 - 1499, July 2016.
  30. Shuo Qiu,  Jiqiang Liu, Yanfeng Shi, Ming Li and Wei Wang,
    “Identity-Based Private Matching over Outsourced Encrypted Datasets”,
    IEEE Transactions on Cloud Computing (TCC), accepted, Vol. PP, No. 99, pp. 1-11, Nov. 2015.
  31. Boyang Wang, Ming Li and Haitao Wang,
    “Geometric Range Search on Encrypted Spatial Data”,
    IEEE Transactions on Information Forensics & Security (TIFS), accepted, Vol. 11, No. 4, pp. 704-719, April 2016.
  32. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou,
    “Location Based Handshake and Private Proximity Test with Location Tags”,
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. PP, No. 99, pp. 1-14, Aug. 2015.
  33. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li,
    MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks“,
    IEEE Internet of Things Journal, Vol. 2, No. 1, pp. 52-62, Feb. 2015.
  34. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu,
    SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Networks“,
    IEEE Transactions on Wireless Communications (TWC), Vol. 13,  No. 10, Oct. 2014.
  35. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li,
    “Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”,
    IEEE Transactions on Parallel and Distributed Systems (TPDS),  Vol. 25, No. 11,  pp: 3025-3035, Nov. 2014.
  36. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan,
    BANA: Body Area Network Authentication Exploiting Channel Characteristics”,
    IEEE Journal of Selected Areas on Communications (JSAC), Vol: 31, No. 9, pp: 1803-1816, Sept. 2013.
  37. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    “Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks,”
    IEEE Transactions on Wireless Communications
    (TWC), Vol. 12, No. 5, pp. 2024-2033, Aug. 2013.
  38. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,
    “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,”
    IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 1, pp. 222-233, Jan. 2014.
  39. Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou and Kui Ren,
    “Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks”,
    ACM Transactions on Sensor Networks
    (TOSN),  Vol. 9, No. 2, pp. 18, May  2013.
  40. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou,
    “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,”
    IEEE Transactions on Parallel and Distributed Systems
    (TPDS), Vol. 24, No. 1, pp. 131-143, Jan. 2013. (Spotlight paper of the issue)
  41. Zhenyu Yang, Ming Li and Wenjing Lou,
    “Live Multimedia Streaming in VANETs using Symbol-Level Network Coding”,
    IEEE Transactions on Wireless Communications
    (TWC), Vol. 11, No. 8, Aug. 2012.
  42. Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou and H. Zhai,
    “Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Ad Hoc Networks using Symbol Level Network Coding”,
    IEEE Journal on Selected Areas in Communications
    (JSAC), Vol. 30, No. 2, Feb. 2012.
  43. Ming Li, Kai Zeng and Wenjing Lou,
    “Opportunistic Broadcast of Event-driven Warning Messages in Vehicular Ad Hoc Networks with Lossy Links,”
    Elsevier
    Computer Networks (COMNET), Vol. 55, July 2011, Pages 2443-2464.
  44. Zhenyu Yang, Ming Li and Wenjing Lou,
    “R-Code: Network Coding-based Reliable Broadcast in Wireless Mesh Networks,”
    Elsevier Ad Hoc Networks, Vol. 9, No. 5, July 2011, Pages 788-798.
  45. Ming Li, Zhenyu Yang and Wenjing Lou,
    “CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,”
    IEEE Journal on Selected Areas in Communications (JSAC), Vol. 29, No. 1, Jan. 2011.(Best paper award nomination by IEEE ComSoc MMTC)
  46. Feng Liu, Han Zhao, Ming Li, Fengyuan Ren and Yanbo Zhu,
    ”Adaptive Local Routing Strategy on Scale-Free Network,”
    Chinese Physics B
    , Vol. 19, No. 4, Apr. 2010.
  47. Ming Li, Feng Liu and Fengyuan Ren,
    “Routing Strategy on a Two-dimensional Small-World Network Model,”
    Physical Review E
    75, 066115, Jun. 2007.

Selected Conference Papers

  1. Raymond Muller, Yanmao Man, Ming Li, Ryan Gerdes, Jonathan Petit, Z. Berkay Celik,
    "VOGUES: Validation of Object Guise using Estimated Components,"
    The 33rd USENIX Security Symposium (USENIX Security '24), Philadelphia, PA, Aug. 2024.
  2. Lewis W. Koplon, Ameer G. Nessaee, Alex Choi, Andress Mentoza, Michael Villasana, Loukas Lazos and Ming Li,
    “Cyclops: Binding a Vehicle’s Digital Identity to its Physical Trajectory using Monocular Cameras,”
    International Symposium on Vehicle Security and Privacy (VehicleSec 2024), Co-located with NDSS Symposium, Feb. 26, 2024, San Diego, CA.
  3. Zhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei,
    “DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum,”
    2024 International Conference on Computing, Networking and Communications (ICNC 2024), AI and Machine Learning for Communications and Networking Symposium, Feb. 19-22, 2024, Big Island, Hawaii.
  4. Zhiwu Guo, Chicheng Zhang, Ming Li, Marwan Krunz,
    “Fair Coexistence of Heterogeneous Networks: A Novel Probabilistic Multi-Armed Bandit Approach,”
    21st International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt 2023), Aug. 2023, Singapore.
  5. Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos and Ming Li,
    "Wiggle: Physical Challenge-Response Verification of Vehicle Platooning,"
    2023 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium , Honolulu, HI, Feb. 2023.
  6. Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, and Ryan Gerdes,
    "That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems using Spatiotemporal Consistency,"
    The 32nd USENIX Security Symposium (USENIX Security '23), Aug. 2023.
  7. Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, and Ryan Gerdes,
    "Evaluating Perception Attacks on Prediction and Planning of Autonomous Vehicles,"
    the 31st USENIX Security Symposium Poster Session (USENIX Security '22 Posters), Boston, MA, Aug. 2022
  8. Tianchi Zhao, Chicheng Zhang, Ming Li,
    "Hierarchical Unimodal Bandits,"
    European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Oral Presentation, Sept. 2022 (acceptance rate: 26%)
  9. Bo Jiang, Tianchi Zhao, Ming Li,
    "Thompson Sampling under Bernoulli Rewards with Local Differential Privacy,"
    ICML Workshop on Theory and Practice of Differential Privacy, Jul. 2022
  10. Mingshun Sun, Zhiwu Guo, Ming Li, and Ryan Gerdes,
    "POSTER: Passive Drone Localization using LTE Signals",
    the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks Poster & Demo Session (ACM WiSec 2022 Posters & Demos), San Antonio, TX, May 2022 (Best Poster Award, 1 out of 8).
  11. Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li and Ryan Gerdes,
    "Physical Hijacking Attacks against Object Trackers",
    The ACM Conference on Computer and Communications Security (ACM CCS 2022), Nov. 2022.
  12. Abdullah Zubair Mohammed, Alok Singh, Gokcen Yilmaz Dayanikli, Ryan Gerdes, Mani Mina, and Ming Li
    "Towards Wireless Spiking of Smart Locks",
    The IEEE Workshop on the Internet of Safe Things (SafeThings 2022), co-located at IEEE S & P 2022, May 2022. (Best Paper Award, 3 out of 8).
  13. Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li and Ryan Gerdes,
    "DRIVETRUTH: Automated Autonomous Driving Dataset Generation for Security Applications",
    The 4th International Workshop on Automotive and Autonomous Vehicle Security (AutoSec 2022), co-located at NDSS 2022, Apr. 2022 (GM Security AutoDriving Security Award).
  14. Abdullah Zubair Mohammed, Yanmao Man, Ryan Gerdes, Ming Li and Z. Berkay Celik
    "Physical Layer Data Manipulation Attacks on the CAN Bus",
    The 4th International Workshop on Automotive and Autonomous Vehicle Security (AutoSec 2022), co-located at NDSS 2022, Apr. 2022.
  15. Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, and Nirnimesh Ghose,
    "PoF: Proof-of-Following for Vehicle Platoons",
    The 29th Network and Distributed System Security Symposium (NDSS 2022), San Diego, CA, Apr. 2022.
  16. Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Samson Aggelopoulos, Brian Lu, Alvin Yang, Thomas Yang, Stephanie Aelmore, Willy Chang, Alana Power, Ming Li, Olga Boric–Lubecke, Victor Lubecke, Wenhai Sun,
    "Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test",
    2021 IEEE Global Communications Conference (IEEE GLOBECOM 2021), December 7 - 11, Madrid, Spain, and virtual.
  17. Yanjun Pan, Ziqi Xu, Ming Li and Loukas Lazos,
    "Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization",
    The Twenty-Second ACM International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2021), Hybrid, Jul. 2021 (20% acceptance rate).
  18. Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, and Ming Li,
    "StegoNet: Turn Deep Neural Network into a Stegomalware",
    The 2020 Annual Computer Security Applications Conference (ACSAC 2020), Austin, TX, Dec. 2020 (23% acceptance rate).
  19. Yanmao Man, Ming Li, and Ryan Gerdes,
    "GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems",
    The 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), Oct. 14-16, 2020 (Acceptance rate: 26%) [Source Code] [Website] [Presentation Video].
  20. Mingshun Sun , Yanmao Man, Ming Li, and Ryan Gerdes,
    "SVM: Secure Vehicle Motion Verification with a Single Wireless Receiver",
    The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020), Jul. 8-15, 2020 (Acceptance rate: 26%)
    (Best Paper Award) (Replicability Label)
  21. Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph Mitchell, Esther Arkin and Jie Gao,
    "Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach",
    The 21st International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2020), October 11-14, 2020 (Acceptance rate: 15%).
  22. Mohamed Seif, Ravi Tandon, Ming Li
    "Wireless Federated Learning with Local Differential Privacy",
    The 2020 IEEE International Symposium on Information Theory (IEEE ISIT 2020), June 21-26, 2020, Los Angeles, CA.
  23. Tianchi Zhao, Bo Jiang, Ming Li and Ravi Tandon,
    "Regret Analysis of Stochastic Multi-armed Bandit Problem with Partial Information Feedback",
    The 2020 International Joint Conference on Neural Networks (IJCNN 2020), Jul. 19-24, 2020, Glasgow, UK.
  24. Xiaolan Gu, Ming Li, Li Xiong and Yang Cao,
    "Providing Input-Discriminative Protection for Local Differential Privacy", Presentation Slides
    IEEE International Conference on Data Engineering (ICDE 2020), Apr. 2020, Dallas, TX.
  25. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz,
    "Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users“,
    IEEE International Conference on Communications (IEEE ICC'20, CRAN Symposium), Dublin, Ireland, June 6-11, 2020.
  26. Yanjun Pan, Yao Zheng and Ming Li,
    "ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization",
    IEEE INFOCOM 2020, Apr. 2020, Beijing, China (Acceptance rate: 19.8%)
  27. Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong and Yang Cao,
    "PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility",
    2020 USENIX Security Symposium (USENIX Security), Aug. 2020, Boston, MA.
  28. Mahsa Foruhandeh*, Yanmao Man*, Ryan Gerdes, Ming Li, Thidapat Chantem, (*: co-first authors)
    "SIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks",
    The 2019 Annual Computer Security Applications Conference (ACSAC 2019), San Juan, Pueto Rico, Dec. 9-13, 2019 (22.6% acceptance rate) [Dataset].
  29. Zhiwu Guo, Ming Li and Yong Xiao,
    "Enhancing LAA/WiFi Coexistence via Concurrent Transmissions and Interference Cancellation",
    The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2019), Newark, NJ, November 11-14, 2019.
  30. Mohamed Seif, Ravi Tandon and Ming Li,
    "Context Aware Laplacian Mechanism for Local Information Privacy",
    The IEEE Information Theory Workshop (ITW), Visby, Gotland, Sweden, Aug. 25-28, 2019.
  31. Yanmao Man, Ming Li and Ryan Gerdes,
    " Perceived Adversarial Examples",
    Poster, The 40th IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 20-22, 2019.
  32. Seth Andrews, Ryan Gerdes and Ming Li,
    "Crowdsourced measurements for device fingerprinting",
    The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec '19), Miami, FL, May 15-17, 2019 (Full paper acceptance rate: 25.6%)
  33. Xiaolan Gu, Ming Li, Yang Cao and Li Xiong,
    "Supporting both Range Queries and Frequency Estimation with Local Differential Privacy",
    the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  34. Hanyu Quan, Hao Liu, Boyang Wang, Ming Li and Yuqing Zhang,
    "Randex: Mitigating Range Injection Attacks on Searchable Encryption",
    the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  35. Tianchi Zhao, Ming Li and Matthias Poloczek,
    "Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling,"
    2019 IEEE International Conference on Communications (IEEE ICC), Wireless Communications Symposium, Shanghai, China, May 2019.
  36. Bo Jiang, Ming Li and Ravi Tandon,
    "Local Information Privacy with Bounded Prior",
    2019 IEEE International Conference on Communications (IEEE ICC), Communication and Information Systems Security Symposium, Shanghai, China, May 2019.
  37. Tianchi Zhao, Ming Li and Greg Ditzler,
    "Online Reconfigurable Antenna State Selection based on Thompson Sampling",
    2019 International Conference on Computing, Networking and Communications (ICNC 2019), Wireless Communications Symposium, Honolulu, Hawaii, February 18-21, 2019.
  38. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz,
    "On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access" (Full paper),
    The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2018), Seoul, South Korea, Oct. 22-25, 2018
  39. Islam Samy, Loukas Lazos, Yong Xiao, Ming Li and Marwan Krunz,
    "LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard",
    11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, Jun. 18-20, 2018 (Full Paper Acceptance rate: 25.6%)
  40. Mohamed Seif, Ravi Tandon and Ming Li,
    “On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT”,
    2018 IEEE International Symposium on Information Theory (IEEE ISIT), Vail, CO, Jun. 2018.
  41. Yanjun Pan, Ming Li, Neng Fan, and Yantian Hou,
    "On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas",
    the 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON 2018), Jun. 2018, Hong Kong, China (Acceptance rate: 23.2%)
  42. Boris Aronov, Alon Efrat, Ming Li, Jie Gao, Joseph S. B. Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan, Jiaxin Ding,
    "Are Friends of My Friends Too Social? Limitations of Location Privacy in a Socially-Connected World",
    The Nineteenth International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2018), Los Angeles, CA, Jun. 2018 (Acceptance rate: 16.9%)
  43. Nirnimesh Ghose, Loukas Lazos and Ming Li,
    "Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks",
    The 39th IEEE Symposium on Security & Privacy (Oakland) (IEEE S & P 2018), San Francisco, CA, May 21-23, 2018. (Acceptance rate: 11.48%)
  44. Bo Jiang, Ming Li and Ravi Tandon,
    "Context-Aware Data Aggregation with Localized Information Privacy",
    the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  45. Mingshun Sun, Ming Li and Ryan Gerdes,
    "Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications",
    the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  46. Xu Chu, Na Ruan, Ming Li and Weijia Jia,
    "Pseudonym Inference in Cooperative Vehicular Traffic Scenarios",
    the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  47. Mohamed Seif, Ravi Tandon and Ming Li,
    "On the Secure Degrees of Freedom of 2 × 2 × 2 Multi-Hop Network with Untrusted Relays,"
    IEEE International Conference on Communications (ICC 2018, Communication Theory Symposium), Kansas City, KS, May 21-23, 2018.
  48. Nirnimesh Ghose, Loukas Lazos and Ming Li,
    "SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices",
    The 37th IEEE International Conference on Computer Communication (IEEE INFOCOM 2018), April 15-19, 2018, Honolulu, HI (Acceptance rate: 19.2%)
  49. Ahmed M. Salama, Ming Li, Dejun Yang,
    "Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks",
    2017 IEEE Global Communications Conference (Globecom 2017), Cognitive Radio and Networks Symposium, Singapore, Dec. 4-8, 2017.
  50. Mingshun Sun, Ming Li and Ryan Gerdes,
    “A Data Trust Framework for VANETs Enabling False Data Detection and Secure Vehicle Tracking”,
    the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  51. Seth Andrews, Ryan Gerdes and Ming Li,
    “Towards Physical Layer Identification of Cognitive Radio Devices”,
    the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  52. Nirnimesh Ghose, Loukas Lazos and Ming Li,
    "HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation'',
    26th USENIX Security Symposium (USENIX Security '17), Vancouver, BC, Canada, Aug. 16-18, 2017, pp. 1-18. (Acceptance rate: 16.1%)
  53. Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li,
    "Mutually private location proximity detection with access control",
    31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA - July 17-19, 2017.
  54. Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, and Ming Li,
    "Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles",
    the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017), Denver, CO, Jun. 26-29, 2017. (Acceptance rate: 22%)
  55. Yantian Hou, Ming Li and Kai Zeng,
    “Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas",
    International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  56. Yantian Hou, Ming Li and Dejun Yang,
    "Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks",
    International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  57. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang,
    “SecReach: Secure Reachability Computation on Encrypted Location Check-in Data”,
    The 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November 14-16, 2016.  (Acceptance rate: 25.8%)
  58. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang,
    “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”,
    The Fourth International Workshop on Security in Cloud Computing (SCC), Xi’an, China, May. 2016, accepted.
  59. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang,
    “SpecWatch: Adversarial Spectrum Usage Monitoring in CRNs with Unknown Statistics”,
    The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA,  Apr. 2016. (Acceptance rate: 18.25%)
  60. Boyang Wang,  Yantian Hou and Ming Li,
    “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data”,
    The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA,  Apr. 2016. (Acceptance rate: 18.25%)
  61. Yantian Hou, Ming Li and Dejun Yang,
    “A Game Theoretical Approach to Coexistence of Heterogeneous MIMO Wireless Networks with Interference Cancellation”,
    International Conference on Computing, Networking and Communication (ICNC), Feb. 15-18 2016, Kauai, HI.
  62. Cyrus Shahabi, Liyue Fan, Luciano Nocera, Li Xiong and Ming Li,
    “Privacy-Preserving Inference of Social Relationships from Location Data: A Vision Paper”,
    ACM SIGSPATIAL GIS, Nov. 2015, Seattle, WA (CCC Blue Sky Ideas Award, 3 out of 20).
  63. Boyang Wang, Ming Li, Haitao Wang, and Hui Li,
    “Circular Range Search on Encrypted Spatial Data”,
    the 3rd IEEE Conference on Communications and Network Security (CNS’15), Florence, Italy, Sept. 2015.
  64. Yantian Hou, Ming Li, Ruchir Chauhan, Ryan. M. Gerdes, and Kai Zeng,
    “Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice”,
    the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS’15),Singapore, Apr. 2015.
    (Acceptance ratio: 48/269=17.8%).
  65. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li,
    “Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy”,
    The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  66. Baswati Deka, Ryan. M. Gerdes, Ming Li and Kevin Heaslip,
    “Friendly Jamming for Secure Localization in Vehicular Transportation” (short paper),
    The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  67. Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li,
    “A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys”,
    the 2nd IEEE Conference on Communications and Network Security (CNS’14), San Francisco, CA, Oct. 29-31, 2014.
  68. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li,
    Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index”,
    the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS’14), Kyoto, Japan, Jun 4-6, 2014
    (Acceptance ratio: 52/260=20%).
  69. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou,
    Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks”,
    The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  70. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou,
    MIMO-based Jamming Resilient Communication in Wireless Networks”,
    The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  71. Yantian Hou, Ming Li and Shucheng Yu,
    Surviving the RF Smog: Making Body Area Networks Robust to Cross-Technology Interference”,
    10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’13), New Orleans, Jun. 24-27, 2013.
  72. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li,
    Storing Shared Data on the Cloud via Security-Mediator”,
    The 33rd International Conference on Distributed Computing Systems (ICDCS ’13), Philadelphia, PA, Jul. 8-11, 2013.
    (Acceptance ratio: 61/464=13%)
  73. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li,
    “Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”,
    the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13), Hangzhou, China, May 7-10, 2013.
    (Full-paper acceptance ratio: 35/216=16.2%, Distinguished Paper Award, 2 out of 216)
  74. Yantian Hou, Ming Li, and Joshua. D. Guttman,
    Chorus: Scalable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel”,
    The sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  75. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li,
    ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks“,
    the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  76. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu,
    Non-parametric Passive Traffic Monitoring in Cognitive Radio Networks”,
    the 32nd IEEE International Conference on Computer Communication
    (INFOCOM’13), Turin, Italy, Apr. 2013
    (Acceptance ratio: 280/1613=17%).
  77. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou,
    “SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags”,
    the 17th European Symposium on Research in Computer Security
    (ESORICS’12), Pisa, Italy, Sept. 10-14, 2012.
    (Acceptance ratio: 50/248=20%)
  78. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan,
    BANA: Body Area Network Authentication Exploiting Channel Characteristics“,
    The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
    (WiSec’12), Tucson, AZ, Apr. 2012.
    (Acceptance ratio: 17/63=27%)
  79. Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou and Y. Thomas Hou,
    “Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks,”
    the 31st IEEE International Conference on Computer Communication
    (INFOCOM’12), Orlando, FL, Mar. 2012.
    (Acceptance ratio: 278/1547=18%)
  80. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    Authorized Private Keyword Search over Encrypted Data in Cloud Computing,”
    the 31st International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, MN, Jun. 21-24, 2011.
    (Acceptance ratio: 15%) (#1 top accessed ICDCS’11 article in IEEE Xplore as of January, Feburary, and March 2012)
  81. Ning Zhang, Ming Li and Wenjing Lou,
    “Distributed Data Mining with Differential Privacy,”
    IEEE International Conference on Communications (ICC’11) (Communication and Information System Security Symposium), Kyoto, Japan, Jun. 2011.
  82. Ming Li, Ning Cao, Shucheng Yu and Wenjing Lou,
    FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks,”
    The 30th IEEE International Conference on Computer Communications
    (INFOCOM’11), Shanghai, China, Apr. 2011.
    (Acceptance ratio: 291/1823 = 16%)
  83. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,
    “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,”
    The 30th IEEE International Conference on Computer Communications (INFOCOM’11), Shanghai, China, Apr. 2011.
    (Acceptance ratio: 291/1823 = 16%)
  84. Ming Li, Shucheng Yu, Kui Ren and Wenjing Lou,
    Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings“,
    The 6th International ICST Conference on Security and Privacy in Communication Networks
    (SecureComm’10), Singapore, Sept. 7-10. (Acceptance ratio: 28/112=25%)
  85. Ming Li, Shucheng Yu, Wenjing Lou and Kui Ren,
    Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks,”
    The 29th IEEE International Conference on Computer Communications
    (INFOCOM’10), San Diego, CA., Mar. 15-19, 2010.
    (Acceptance ratio: 276/1575=17.5%) [Video demonstration]
  86. Zhenyu Yang, Ming Li and Wenjing Lou,
    “CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding,”
    The 18th IEEE International Conference on Network Protocols
    (ICNP’10), Kyoto, Japan, Oct. 5-8, 2010.
    (Acceptance ratio: 31/170 =18%).
  87. Ming Li, Wenjing Lou and Kai Zeng,
    “OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links,”
    The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems
    (MASS’09), Macau SAR, China, Oct. 12-15, 2009. (Acceptance ratio: 62/245=25.3%)

Technical Reports

  1. Boyang Wang, Ming Li, Haitao Wang and Hui Li,
    Circular Range Search on Encrypted Spatial Data“,
    Technical report, May. 2015.
  2. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou and Wenjing Lou,
    Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks“,
    Technical report, Aug. 2013.
  3. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou and Y. Thomas Hou,
    MIMO-based Jamming Resilient Communication in Wireless Networks“,
    Technical Report, 2013.
  4. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li,
    “Privacy-Preserving Multi-Dimensional Range Search over Encrypted Cloud Data within Sublinear Time”,Technical report, 2013.
  5. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,”
    Technical report
    , 2011.
  6. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks,”
    Technical report
    , 2012.
  7. Ming Li, Zhenyu Yang and Wenjing Lou,
    CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,”
    Technical report
    , 2010.