My current research interests lie in the intersection of security and privacy and AI/ML/data science. Most recently, my group primarily focuses on two topics: AI/ML security, and IoT/CPS/mobile security.
Here are two Wordle "word clouds" generated from abstracts of my papers -- (left): papers from 2012 to 2017; (right): papers from 2018 to 2020.
Here I provide a list of my current and previous research topics and representative publications in each topic.
AI/ML Security and Privacy
-
Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, and Bo Luo. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. In European Symposium on Research in Computer Security (ESORICS), 2024. [ pdf][ data and code]
-
Zeyan Liu, Zijun Yao, Fengjun Li, and Bo Luo. On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. In ACM Conference on Computer and Communications Security (CCS) , 2024. [ full paper with appendix ][ data and code]
-
Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, and Fengjun Li. The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. In ACM Conference on Computer and Communications Security (CCS), 2024. [ pdf]
-
Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, and Bo Luo. PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. In the 24th Privacy Enhancing Technologies Symposium (PETS), Bristol, UK, 2024. [ pdf]
-
Zeyan Liu, Fengjun Li, Zhu Li, and Bo Luo. LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022. [ pdf]
-
Ishrak Hayet, Zijun Yao, and Bo Luo. Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings. In Findings of EMNLP, 2022.
-
Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, and Bo Luo. Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 2022. (Acceptance rate: 18.5%) [ link][ pdf]
-
Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, and Bo Luo. Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. In Annual Computer Security Applications Conference (ACSAC), 2021. (Acceptance rate: 24.5%) ( ACSAC Distinguished Paper Award) [ link][ pdf][ code]
-
Sana Awan, Bo Luo, and Fengjun Li. CONTRA: Defending against Poisoning Attacks in Federated Learning. In European Symposium on Research in Computer Security (ESORICS), 2021. (Acceptance rate: 20.2%) [ link][ pdf]
-
Sana Awan, Fengjun Li, Bo Luo, and Mei Liu.
POSTER: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. In ACM Conference on Computer and Communications Security - Posters and Demos, 2019. (Poster) [ link][ pdf]
IoT/CPS, Network, and Mobile Security
-
Zhaohui Wang, Bo Luo, and Fengjun Li. PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps. In the 25th Privacy Enhancing Technologies Symposium (PETS), 2025.
-
Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, and Bo Luo. A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. In ACM Conference on Computer and Communications Security (CCS), 2024. [ pdf]
-
Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, and Bo Luo. Companion Apps or Backdoors? on the Security of Automotive Companion Apps. In European Symposium on Research in Computer Security (ESORICS), 2024. [ pdf]
-
Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, and Qibin Sun. You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation. In USENIX Security Symposium, 2024. (accepted) [ pdf]
-
Yijun Zhao, Lingjing Yu, Yong Sun, Qingyun Liu, and Bo Luo. No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS. In ACM/IEEE International Conference on Program Comprehension (ICPC), Lisbon, Portugal, 2024. ( ICPC 2024 Distinguished Paper Award)[ pdf]
-
Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, and Feng Wu. Blacktooth: Breaking through the Defense of Bluetooth in Silence. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022 [ pdf]
-
Javaria Ahmad, Fengjun Li, and Bo Luo. IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 2022. (Acceptance rate: 18.5%) [ link][ pdf]
-
Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, and Qingyun Liu. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. In USENIX Security Symposium, 2020. (Acceptance rate: 16.1%) [ link]
[ pdf] [ presentation on YouTube]
-
Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. In European Symposium on Research in Computer Security (ESORICS), 2020. (Acceptance rate: 19.6%) [ link][ pdf] [ intro video] [ presentation on YouTube ]
-
Linzhi Jiang, Liqun Chen, Athanasios Giannetsos, Bo Luo, Kaitai Liang, and Jinguang Han. Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case. In IEEE Internet of Things Journal, vol. 6, iss. 6, 2019. [ link][ pdf]
-
Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li. Hide Your Hackable Smart Home From Remote Attacks: The Multipath Onion IoT Gateways. In European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, 2018. (Acceptance rate: 19.7%) [ link] [ pdf]
-
Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. In Annual Computer Security Applications Conference (ACSAC), 2017 ( ACSAC 2017 Best Paper Award). [ link] [ pdf]
-
Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. Cyber-Physical Systems Security -- A Survey. In IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, Volume: 4 Issue: 6, 2017. [ link] [ pdf]
System Security
-
Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S. L. Wei, Yan Zhuang. FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems. In USENIX Security Symposium, 2024. (accepted) [ pdf]
-
Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, and Jing Wang. Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware
Transactional Memory. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, iss. 3, 2021. [ link] [ pdf]
-
Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, and Ziqiang Ma. TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud. In Annual Computer Security Applications Conference (ACSAC), 2019. (Acceptance rate: 22.6%). [ link][ pdf]
-
Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, and Wenjing Lou. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018. (Acceptance rate: 22.8%) [ link] [ pdf]
-
Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, and Jiwu Jing. Copker: A Cryptographic Engine against Cold-Boot Attacks. In IEEE Transactions on Dependable and Secure Computing (TDSC). Volume: 15, Issue: 5, 2018. [ link] [ pdf]
-
Jingqiang Lin, Bo Luo, Le Guan, and Jiwu Jing. Secure Computing using Registers and Caches: the Problem, Challenges and Solutions. In IEEE Security & Privacy Magazine, vol. 14, iss. 6, 2016. [ link] [ pdf]
-
Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, and Jing Wang. Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. In IEEE Symposium on Security & Privacy (Oakland), 2015 (Acceptance rate: 13.5%). [ link] [ pdf]
-
Le Guan, Jingqiang Lin, Bo Luo, and Jiwu Jing. Copker: Computing with Private Keys without RAM. In Network and Distributed System Security Symposium (NDSS), 2014 (Acceptance rate: 18%)
Social Network Analysis and Privacy Protection
-
Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. #DontTweetThis: Scoring Private Information in Social Networks. In the 19th Privacy Enhancing Technologies Symposium ( PETS), 2019 (Acceptance rate: 17.6%, Vol 4. 2019). [ link] [ pdf]
-
Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li. Content-Aware Trust Propagation Towards Online Review Spam Detection. In ACM Journal of Data and Information Quality (JDIQ), 2019. [ link] [ pdf]
-
Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu,
Jianlong Tan, and Bo Luo. My Friend Leaks My Privacy: Modeling and Analyzing Privacy
in Social Networks. In ACM Symposium on Access Control Models and Technologies
(SACMAT), Indianapolis, IN, June 2018. [ link] [ pdf]
-
Chao Lan, Yuhao Yang, Xiaoli Li, Bo Luo, and Jun Huan. Learning Social Circles in Ego-Networks based on Multi-View Network Structure. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 29, iss. 8, Aug 2017. [ link] [ pdf]
-
Yuhao Yang, Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. Automatic Social Circle Detection Using Multi-View Clustering. In ACM Conf. on Information and Knowledge Management (CIKM), 2014 (Acceptance rate: 20.9%).
-
Shu Huang, Min Chen, Bo Luo, and Dongwon Lee. Predicting aggregate social activities using continuous-time stochastic process. In 21st ACM Conf. on Information and Knowledge Management (CIKM), Maui HI, USA, October 2012. Acceptance Rate: 13.4%
-
Hongliang Fei, Ruoyi Jiang, Yunhao Yang, Bo Luo, and Jun Huan, Content based Social Behavior Prediction: A Multi-task Learning Approach. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM), Glasgow, UK, October 2011 (short paper).
AI, Machine Learning, Information Retrieval
-
Wenchi Ma, Xuemin Tu, Bo Luo, and Guanghui Wang. Semantic Clustering based Deduction Learning for Image Recognition and Classification. In Pattern Recognition, vol. 124, 2022. [ link] [ pdf]
-
Yuxin Chen, Hariprasad Sampathkumar, Bo Luo, and Xue-wen Chen. iLike: Bridging the semantic gap in vertical image search by integrating text and visual features. In IEEE Transactions on Knowledge and Data Engineering, vol 25, issue 10, pp. 2257-2270, 2013.
-
Yuanliang Meng, Junyan Li, Patrick Denton, Yuxin Chen, Bo Luo, Paul Selden and Xue-Wen Chen. IPKB: A Digital Library for Invertebrate Paleontology. In ACM/IEEE Joint Conference on Digital Libraries (JCDL), 2012.
-
Yuxin Chen, Nenghai Yu, Bo Luo, and Xue-wen Chen. iLike: Integrating Visual and Textual Features
for Vertical Search. In ACM Multimedia Conference (ACMMM), Firenze, Italy, October 2010. Acceptance rate: 17%
Access Control and Secure Information Sharing
-
Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, and Dan Meng. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. In IEEE Transactions on Dependable and Secure Computing (TDSC). (Accepted) [ link]
-
Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, and Dan Meng. GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. In Annual Computer Security Applications Conference (ACSAC), 2020. (Acceptance rate: 23.2%) [ link] [ pdf]
-
Manogna Thimma, Fang Liu, Jingqiang Lin, and Bo Luo. HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol 27, issue 8, 2015.
-
Wenrong Zeng, Yuhao Yang, and Bo Luo. Using Data Content to Assist Access Control for Large-Scale Content-Centric Databases. In IEEE International Conference on Big Data (IEEE BigData), 2014 (Acceptance rate: 18.5%).
-
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. In IEEE Transactions on Information Forensics & Security, vol 8, no 6, pp. 888-900, June 2013.
-
Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Rewriting Insecure XML Queries to Secure Ones using Non-Deterministic Finite Automata. In The VLDB Journal, vol. 20, no. 3, 2011.
-
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering. In 14th ACM Conf. on Computer and Communication Security (CCS), Alexandria, VA, USA, October 2007. Acceptance rate: 18%
-
Bo Luo, Dongwon Lee, and Peng Liu. Pragmatic XML Access Control using Off-the-shelf RDBMS. In 12th European Symposium On Research In Computer Security (ESORICS), Dresden, Germany, September 2007. Acceptance rate: 23.8%
-
Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Fine-Grained Run-Time XML Access Control via NFA-based Query Rewriting. In ACM Thirteenth Conference on Information and Knowledge Management (CIKM), pp 543-552, Washington D.C., USA, Nov. 2004. Acceptance rate: 20%
|