My current research interests lie in the intersection of security and privacy and AI/ML/data science. Most recently, my group primarily focuses on two topics: AI/ML security, and IoT/CPS/mobile security.

Here are two Wordle "word clouds" generated from abstracts of my papers -- (left): papers from 2012 to 2017; (right): papers from 2018 to 2020.

Here I provide a list of my current and previous research topics and representative publications in each topic.

AI/ML Security and Privacy

  1. Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, and Bo Luo. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. In European Symposium on Research in Computer Security (ESORICS), 2024. [pdf][data and code]
  2. Zeyan Liu, Zijun Yao, Fengjun Li, and Bo Luo. On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. In ACM Conference on Computer and Communications Security (CCS) , 2024. [full paper with appendix ][data and code]
  3. Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, and Fengjun Li. The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. In ACM Conference on Computer and Communications Security (CCS), 2024. [pdf]
  4. Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, and Bo Luo. PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. In the 24th Privacy Enhancing Technologies Symposium (PETS), Bristol, UK, 2024. [pdf]
  5. Zeyan Liu, Fengjun Li, Zhu Li, and Bo Luo. LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022. [pdf]
  6. Ishrak Hayet, Zijun Yao, and Bo Luo. Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings. In Findings of EMNLP, 2022.
  7. Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, and Bo Luo. Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 2022. (Acceptance rate: 18.5%) [link][pdf]
  8. Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, and Bo Luo. Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. In Annual Computer Security Applications Conference (ACSAC), 2021. (Acceptance rate: 24.5%) (ACSAC Distinguished Paper Award) [link][pdf][code]
  9. Sana Awan, Bo Luo, and Fengjun Li. CONTRA: Defending against Poisoning Attacks in Federated Learning. In European Symposium on Research in Computer Security (ESORICS), 2021. (Acceptance rate: 20.2%) [link][pdf]
  10. Sana Awan, Fengjun Li, Bo Luo, and Mei Liu. POSTER: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. In ACM Conference on Computer and Communications Security - Posters and Demos, 2019. (Poster) [link][pdf]

IoT/CPS, Network, and Mobile Security

  1. Zhaohui Wang, Bo Luo, and Fengjun Li. PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps. In the 25th Privacy Enhancing Technologies Symposium (PETS), 2025.
  2. Lingjing Yu, Jingli Hao, Jun Ma, Yong Sun, Yijun Zhao, and Bo Luo. A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems. In ACM Conference on Computer and Communications Security (CCS), 2024. [pdf]
  3. Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, and Bo Luo. Companion Apps or Backdoors? on the Security of Automotive Companion Apps. In European Symposium on Research in Computer Security (ESORICS), 2024. [pdf]
  4. Xuanbo Huang, Kaiping Xue, Lutong Chen, Mingrui Ai, Huancheng Zhou, Bo Luo, Guofei Gu, and Qibin Sun. You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation. In USENIX Security Symposium, 2024. (accepted) [pdf]
  5. Yijun Zhao, Lingjing Yu, Yong Sun, Qingyun Liu, and Bo Luo. No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS. In ACM/IEEE International Conference on Program Comprehension (ICPC), Lisbon, Portugal, 2024. (ICPC 2024 Distinguished Paper Award)[pdf]
  6. Mingrui Ai, Kaiping Xue, Bo Luo, Lutong Chen, Nenghai Yu, Qibin Sun, and Feng Wu. Blacktooth: Breaking through the Defense of Bluetooth in Silence. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022 [pdf]
  7. Javaria Ahmad, Fengjun Li, and Bo Luo. IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 2022. (Acceptance rate: 18.5%) [link][pdf]
  8. Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, and Qingyun Liu. You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. In USENIX Security Symposium, 2020. (Acceptance rate: 16.1%) [link] [pdf] [presentation on YouTube]
  9. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. In European Symposium on Research in Computer Security (ESORICS), 2020. (Acceptance rate: 19.6%) [link][pdf] [intro video] [presentation on YouTube ]
  10. Linzhi Jiang, Liqun Chen, Athanasios Giannetsos, Bo Luo, Kaitai Liang, and Jinguang Han. Towards Practical Privacy-Preserving Processing over Encrypted Data in IoT: An Assistive Healthcare Use Case. In IEEE Internet of Things Journal, vol. 6, iss. 6, 2019. [link][pdf]
  11. Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li. Hide Your Hackable Smart Home From Remote Attacks: The Multipath Onion IoT Gateways. In European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, 2018. (Acceptance rate: 19.7%) [link] [pdf]
  12. Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia. Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. In Annual Computer Security Applications Conference (ACSAC), 2017 (ACSAC 2017 Best Paper Award). [link] [pdf]
  13. Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. Cyber-Physical Systems Security -- A Survey. In IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, Volume: 4 Issue: 6, 2017. [link] [pdf]

System Security

  1. Jinrui Ma, Lutong Chen, Kaiping Xue, Bo Luo, Xuanbo Huang, Mingrui Ai, Huanjie Zhang, David S. L. Wei, Yan Zhuang. FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems. In USENIX Security Symposium, 2024. (accepted) [pdf]
  2. Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, and Jing Wang. Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, iss. 3, 2021. [link] [pdf]
  3. Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, and Ziqiang Ma. TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud. In Annual Computer Security Applications Conference (ACSAC), 2019. (Acceptance rate: 22.6%). [link][pdf]
  4. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, and Wenjing Lou. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018. (Acceptance rate: 22.8%) [link] [pdf]
  5. Le Guan, Jingqiang Lin, Ziqiang Ma, Bo Luo, Luning Xia, and Jiwu Jing. Copker: A Cryptographic Engine against Cold-Boot Attacks. In IEEE Transactions on Dependable and Secure Computing (TDSC). Volume: 15, Issue: 5, 2018. [link] [pdf]
  6. Jingqiang Lin, Bo Luo, Le Guan, and Jiwu Jing. Secure Computing using Registers and Caches: the Problem, Challenges and Solutions. In IEEE Security & Privacy Magazine, vol. 14, iss. 6, 2016. [link] [pdf]
  7. Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, and Jing Wang. Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. In IEEE Symposium on Security & Privacy (Oakland), 2015 (Acceptance rate: 13.5%). [link] [pdf]
  8. Le Guan, Jingqiang Lin, Bo Luo, and Jiwu Jing. Copker: Computing with Private Keys without RAM. In Network and Distributed System Security Symposium (NDSS), 2014 (Acceptance rate: 18%)

Social Network Analysis and Privacy Protection

  1. Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. #DontTweetThis: Scoring Private Information in Social Networks. In the 19th Privacy Enhancing Technologies Symposium (PETS), 2019 (Acceptance rate: 17.6%, Vol 4. 2019). [link] [pdf]
  2. Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li. Content-Aware Trust Propagation Towards Online Review Spam Detection. In ACM Journal of Data and Information Quality (JDIQ), 2019. [link] [pdf]
  3. Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, and Bo Luo. My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. In ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, IN, June 2018. [link] [pdf]
  4. Chao Lan, Yuhao Yang, Xiaoli Li, Bo Luo, and Jun Huan. Learning Social Circles in Ego-Networks based on Multi-View Network Structure. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 29, iss. 8, Aug 2017. [link] [pdf]
  5. Yuhao Yang, Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. Automatic Social Circle Detection Using Multi-View Clustering. In ACM Conf. on Information and Knowledge Management (CIKM), 2014 (Acceptance rate: 20.9%).
  6. Shu Huang, Min Chen, Bo Luo, and Dongwon Lee. Predicting aggregate social activities using continuous-time stochastic process. In 21st ACM Conf. on Information and Knowledge Management (CIKM), Maui HI, USA, October 2012. Acceptance Rate: 13.4%
  7. Hongliang Fei, Ruoyi Jiang, Yunhao Yang, Bo Luo, and Jun Huan, Content based Social Behavior Prediction: A Multi-task Learning Approach. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM), Glasgow, UK, October 2011 (short paper).

AI, Machine Learning, Information Retrieval

  1. Wenchi Ma, Xuemin Tu, Bo Luo, and Guanghui Wang. Semantic Clustering based Deduction Learning for Image Recognition and Classification. In Pattern Recognition, vol. 124, 2022. [link] [pdf]
  2. Yuxin Chen, Hariprasad Sampathkumar, Bo Luo, and Xue-wen Chen. iLike: Bridging the semantic gap in vertical image search by integrating text and visual features. In IEEE Transactions on Knowledge and Data Engineering, vol 25, issue 10, pp. 2257-2270, 2013.
  3. Yuanliang Meng, Junyan Li, Patrick Denton, Yuxin Chen, Bo Luo, Paul Selden and Xue-Wen Chen. IPKB: A Digital Library for Invertebrate Paleontology. In ACM/IEEE Joint Conference on Digital Libraries (JCDL), 2012.
  4. Yuxin Chen, Nenghai Yu, Bo Luo, and Xue-wen Chen. iLike: Integrating Visual and Textual Features for Vertical Search. In ACM Multimedia Conference (ACMMM), Firenze, Italy, October 2010. Acceptance rate: 17%

Access Control and Secure Information Sharing

  1. Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, and Dan Meng. SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. In IEEE Transactions on Dependable and Secure Computing (TDSC). (Accepted) [link]
  2. Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, and Dan Meng. GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. In Annual Computer Security Applications Conference (ACSAC), 2020. (Acceptance rate: 23.2%) [link] [pdf]
  3. Manogna Thimma, Fang Liu, Jingqiang Lin, and Bo Luo. HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol 27, issue 8, 2015.
  4. Wenrong Zeng, Yuhao Yang, and Bo Luo. Using Data Content to Assist Access Control for Large-Scale Content-Centric Databases. In IEEE International Conference on Big Data (IEEE BigData), 2014 (Acceptance rate: 18.5%).
  5. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. In  IEEE Transactions on Information Forensics & Security, vol 8, no 6, pp. 888-900, June 2013.
  6. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Rewriting Insecure XML Queries to Secure Ones using Non-Deterministic Finite Automata. In The VLDB Journal, vol. 20, no. 3, 2011.
  7. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering. In 14th ACM Conf. on Computer and Communication Security (CCS), Alexandria, VA, USA, October 2007. Acceptance rate: 18%
  8. Bo Luo, Dongwon Lee, and Peng Liu. Pragmatic XML Access Control using Off-the-shelf RDBMS. In 12th European Symposium On Research In Computer Security (ESORICS), Dresden, Germany, September 2007. Acceptance rate: 23.8%
  9. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Fine-Grained Run-Time XML Access Control via NFA-based Query Rewriting. In ACM Thirteenth Conference on Information and Knowledge Management (CIKM), pp 543-552, Washington D.C., USA, Nov. 2004. Acceptance rate: 20%