Publications

list | by year | by topic

  1. Zeyan Liu, Fengjun Li, Zhu Li, and Bo Luo, LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks, in ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022.
  2. Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, and Bo Luo, Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems, in European Symposium on Research in Computer Security (ESORICS), 2022. (Acceptance rate: 104/562=18.5%)
  3. Javaria Ahmad, Fengjun Li, and Bo Luo, IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps, in European Symposium on Research in Computer Security (ESORICS), 2022. (Acceptance rate: 104/562=18.5%)
  4. Krushi Patel, Andrews A. Bur, Fengjun Li, and Guanghui Wang, Aggregating global features into local vision Transformer, in the 26th International Conference on Pattern Recognition (ICPR), Montreal, Quebec, Canada, August 2022. (Best Student Paper Award)
  5. Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan, uAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware, in the 44th IEEE/ACM International Conference on Software Engineering (ICSE), May 21-29, 2022. (Acceptance rate: 197/691=28.5%)
  6. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, and Congli Wang, The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild, in IEEE/ACM Transactions on Networking, vol. 30, no. 2, pp. 749-765, April 2022.
  7. Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, and Bo Luo, Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency, in the 2021 Annual Computer Security Applications Conference (ACSAC), 2021. (Acceptance rate: 80/326=24.5%, Distinguished Paper Award)
  8. Sana Awan, Bo Luo, and Fengjun Li, CONTRA: Defending against Poisoning Attacks in Federated Learning, in European Symposium on Research in Computer Security (ESORICS), 2021. (Acceptance rate: 71/351=20.2%)
  9. Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, and Bo Luo, You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps, in IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021. (Acceptance rate: 28%)
  10. Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, and Fengjun Li, From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware, in the Network and Distributed System Security Symposium (NDSS) 2021. ((Acceptance rate: 15.2%) [Presentation]
  11. Bingyu Li, Fengjun Li, Ziqiang Ma, and Qianhong Wu, Exploring the Security of Certificate Transparency in the Wild, in Applied Cryptography and Network Security Workshops (ACNS) 2020. Lecture Notes in Computer Science, vol 12418. Springer, Cham.
  12. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo, CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks, in European Symposium on Research in Computer Security (ESORICS), 2020. [Presentation] (Acceptance rate: 19.6%)
  13. Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, and Bo Luo, WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications, in Annual Hot Topics in the Science of Security Symposium (HoTSoS), 2020.
  14. Xing Song, Lemuel R. Waitman, Yong Hu, Bo Luo, Fengjun Li, and Mei Liu, The Impact of Medical Big Data Anonymization on Early Acute Kidney Injury Risk Prediction, in AMIA Summits on Translational Science Proceedings, May 2020.
  15. Qiang Zhou, Chengliang Tian, Hanlin Zhang, Jia Yu, and Fengjun Li, How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields, Information Sciences, Volume 512, 2020, Pages 641-660, ISSN 0020-0255.
  16. Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan and Lingchen Zhang, Secure Cryptography Infrastructures in the Cloud, in IEEE Global Communications Conference (GLOBECOM), Waikoloa, Hi, USA, 2019.
  17. Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang and Fengjun Li, Towards the Trust-Enhancements of Single Sign-On Services, in IEEE Conference on Dependable and Secure Computing (DSC), 2019.
  18. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jin and Congli Wang, Certificate Transparency in the Wild: Exploring the Reliability of Monitor, in ACM Conference on Computer and Communications Security (CCS), London, UK, Nov 11-15, 2019. (Acceptance rate: 16%)
  19. [P] Sana Awan, Fengjun Li, Bo Luo, and Mei Liu, A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain, in ACM Conference on Computer and Communications Security (CCS), London, UK, Nov 11-15, 2019. (Poster)
  20. Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang and Guangqi Liu, Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs, in SecureComm, Orlando, October 23-25, 2019.
  21. Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo, #DontTweetThis: Scoring Private Information in Social Networks, in the 19th Privacy Enhancing Technologies Symposium (PETS), vol 4, Stockholm, Sweden, July 15-16, 2019. (Acceptance rate: 16/91)
  22. Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li, Content-Aware Trust Propagation Towards Online Review Spam Detection, in ACM Journal of Data and Information Quality (JDIQ) - Special Issue on Combating Digital Misinformation and Disinformation and On the Horizon, Volume 11 Issue 3, July 2019.
  23. Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee and Bo Luo, Arcana: Enabling Private Posts on Public Microblog Platforms, in the 34rd International Information Security and Privacy Conference (IFIP SEC), Lisbon, Portugal, June 25-27, 2019.
  24. S. Zhang, C. Tian, H. Zhang, J. Yu and F. Li, Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method, in IEEE Access, vol. 7, pp. 53823-53838, 2019.
  25. Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li, Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways, in European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 2018. (acceptance rate: 56/283=19.8%)
  26. Lei Yang and Fengjun Li, Cloud-Assisted Privacy-Preserving Classification for IoT Applications, in IEEE Conference on Communications and Network Security (CNS), Beijing, China, May 2018. (acceptance rate 28%)
  27. Pegah Nokhiz and Fengjun Li, Understanding Rating Behavior based on Moral Foundations: The case of Yelp Reviews, in Big Data Technology and Ethics Considerations in Customer Behavior and Customer Feedback Mining Workshop, IEEE BigData, Boston, MA, 2017.
  28. Hao Xue and Fengjun Li, Online Review Spam Detection through Content-Aware Trust Propagation, in the 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Philadelphia, PA, July 2017.
  29. Chung Kit Wu, Hongxu Zhu, Loi Lei Lai, Anna S. F. Chang, Fengjun Li, Kim Fung Tsang, and Roy Kalawsky, A Time-synchronized ZigBee Building Network for Smart Water Management, in 15th IEEE International Conference on Industrial Informatics (INDIN), Emden, July 2017
  30. Abdulmali Humayed, Jinqiang Lin, Fengjun Li, and Bo Luo, Cyber-Physical Systems Security -- A Survey, in IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, PP(99):1-1, 2017.
  31. Lei Yang and Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection, in EAI Transactions on Industrial Networks and Intelligent Systems – Special Issue on CI & Smart Grid Cyber Security, 17(10):e5, February, 2017.
  32. Hyunjin Seo, James Sterbenz, Fengjun Li and Shiva Velma, Multilevel Analysis of Networked Movements in Digital Age, in International Communication Association Conference, 2017.
  33. Lei Yang, Humayed Abudulmalik, and Fengjun Li, A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things, in Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, December 2016. (acceptance rate 22.8%)
  34. Hyunjin Seo, Fengjun Li, Roseann Pluretti, Hao Xue, and Shiva Velma, Perceptions of Online Reviews: Motivation, Sidedness, and Reviewer Information, in Journalism and Mass Communication Annual Conference, Minneapolis, MN, August 2016.
  35. Lei Yang and Fengjun Li, Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing, in the 11th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Dallas, USA, October, 2015. (acceptance rate 27%, Best Paper Award)
  36. [P] Fengjun Li, Xin Fu, and Bo Luo, A Hardware Fingerprint Using GPU Core Frequency Variations, in ACM Conference on Computer and Communications Security (CCS), Denver, CO, October 2015. (Poster)
  37. Lei Yang and Fengjun Li, mTor: A Multipath Tor Routing beyond Bandwidth Throttling, in IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015. (acceptance rate 28%)
  38. [P] Lei Yang and Fengjun Li, Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing, In IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015. (Poster)
  39. Hao Xue, Fengjun Li, Hyunjin Seo, and Roseann Pluretti, Trust-Aware Review Spam Detection, in the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, Helsinki, Finland, Aug 2015. (acceptance rate 28.4%)
  40. Hyunjin Seo, Fengjun Li, Jeongsub Lim, Roseann Pluretti, Hao Xue, and Sreenivas Kumar Vekapu, User ratings of yelp reviews: A big data analysis approach, in Association for Education in Journalism and Mass Communication Annual Conference, San Francisco, CA, August 2015.
  41. Hyunjin Seo, Fengjun Li, Roseann Pluretti, Hao Xue, and Sreenivas Kumar Vekapu, Perceived usefulness of online reviews: Effects of review characteristics and reviewer attributes, in Proceedings of the 65th International Communication Association Annual Conference, San Juan, Puerto Rico, May 2015.
  42. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, SEDB: Building Secure Database Services for Sensitive Data, in the 16th International Conference on Information and Communications Security (ICICS), Hong Kong, December 2014.
  43. Lei Yang, Hao Xue, Fengjun Li, Privacy-preserving Data Sharing in Smart Grid Systems, in the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, November 2014.
  44. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha, EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients, in the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Beijing, China, September 2014. (acceptance rate 27.6%)
  45. Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma, virtio-ct: A Secure Cryptographic Token Service in Hypervisors, in International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO), SecureComm, Beijing, China, September 2014.
  46. Lei Yang and Fengjun Li, Detecting False Data Injection in Smart Grid In-Network Aggregation, in the 4th IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, Canada, October 2013.
  47. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu, Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing, in IEEE Transactions on Information Forensics & Security, 8(6):888-900, June 2013.
  48. Yingying Ma and Fengjun Li, Detecting Review Spam: Challenges and Opportunities, in the Collaborative Communities for Social Computing (CCSocialComp) Workshop, IEEE CollaborateCom, Pittsburgh, PA, October 2012. (invited)
  49. Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo and Peng Liu, Stalking Online: on User Privacy in Social Networks, in ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. (acceptance rate: 18.6%)
  50. Fengjun Li and Bo Luo, Preserving Data Integrity for Smart Grid Data Aggregation, in Proceedings of the 3rd IEEE Conference on Smart Grid Communications (SmartGridComm), Taina, Taiwan, Novermber, 2012.
  51. Fengjun Li, Xukai Zhou, Peng Liu, and JakeY. Chen, New Threats to Health Data Privacy, in BMC Bioinformatics, 12(Suppl 12):S7, 2011.
  52. Fengjun Li, Bo Luo, and Peng Liu, Secure and Privacy-Preserving Information Aggregation for Smart Grids, in International Journal of Security and Networks, Special Issue on Security and Privacy in Smart Grid, 6(1):28 - 39, 2011.
  53. Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, and Peng Liu, Privacy Preserving Group Linkage, in the 23rd Scientific and Statistical Database Management Conference (SSDBM), Portland, OR, July 2011. (acceptance rate 12.1%)
  54. Fengjun Li, Bo Luo, and Peng Liu, Secure Information Aggregation for Smart Grids Using Homomorphic Encryption, in Proceedings of the 1st IEEE Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, October 2010.
  55. Fengjun Li, Jake Y. Chen, Xukai Zou, and Peng Liu, New Privacy Threats in Healthcare Informatics: When Medical Records Join the Web, in Proceedings of the 9th International Workshop on Data Mining in Bioinformatics (BIOKDD), Washington D.C., July 2010. (short paper)
  56. Fengjun Li, Bo Luo, Peng Liu, and Chao-Hsien Chu, A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping, in Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010. (acceptance rate: 17.5%)
  57. Fengjun Li, Bo Luo, Peng Liu, Anna Squicciarini, Dongwon Lee, and Chao-Hsien Chu, Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering, in Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, FL, November, 2008. (invited)
  58. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu, In-broker Access Control for Information Brokerage Systems, in International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 12(4):283-292, 2007.
  59. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu, Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering, in Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS), Alexandria, VA, October 2007. (acceptance rate: 18%)
  60. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu, In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems, in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006. (acceptance rate: 25%)
  61. Wing S Wong, and Fengjun Li, Fairness Indices and Distributed Control in Communication Networks, in Communication in Information and Systems, vol.6, no.2, pp.83-114, 2006.
  62. Wing S Wong and Fengjun Li, A Fairness Index for Communication Networks, in Lecture Notes in Control and Information Sciences - New Directions and Applications in Control Theory, vol 321. pp. 389-400, September 2005.

Book Chapters

  1. Bin Xie, Bo Luo, and Fengjun Li. Website Construction Under Linux. Mechanical Industry Publishing House of China, ISBN 7-111-08156-0, May 2000. (Chinese)