Home

  Teaching

  Research

  Services

  Life

  Contact

  Bookmarks


 

PEER REVIEWED CONFERENCE PROCEEDING ARTICLES

 

C36

M. Mohamed, Z. Li, H. Liu, Y. Chen, and F. Li, “Uber-in-Light: Unobtrusive Visible Light Communication Leveraging Complementary Color Channel,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2016.

C35

W. Peng, F. Li, and X. Zou, “Temporal Coverage Based Content Distribution in Heterogeneous Smart Device Networks”, in Proc. of IEEE Communication and Information Systems Security Symposium (ICC), 2015.

C34

F. Li, C. Huang, W. Peng, and J. Huang, “Feedback-based Smartphone Strategic Sampling in BYOD Security”, in Proc. of International Conference on Computer Communications and Networks (ICCCN), 2014.

C33

M. Rangwala, W. Peng, X. Zou and F. Li, “A Mutual Agreement Signature Scheme for Secure Data Provenance”, in Proc. of International Conference on Computer Communications and Networks (ICCCN), 2014.

C32

W. Peng, F. Li, C. Huang, and X. Zou, “A Moving-target Defense Strategy for Cloud-based Services with Heterogeneous and Dynamic Attack Surfaces”, in Proc. of IEEE Communication and Information Systems Security Symposium (ICC), 2014.

C31

X. Zou, H. Li, Y. Sui, W. Peng, and F. Li, “Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting Parties,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2014.

C30

W. Peng, F. Li, K. Han, X. Zou, and J. Wu, “T-dominance: Prioritized Defense Deployment for BYOD Security”, in Proc. of IEEE Conference on Communications and Network Security (CNS), 2013.

C29

H. Li, Y. Sui, W. Peng, X. Zou, F. Li, “A Viewable E-voting Scheme for Environments with Conflict of Interest”, in Proc. of IEEE Conference on Communications and Network Security (CNS), 2013.

C28

G. Wang, Q. Liu, F. Li, S. Yang and J. Wu, "Outsourcing Privacy-Preserving Social Networks to a Cloud," accepted to appear in IEEE International Conference on Computer Communications (INFOCOM), April, 2013, (acceptance rate 17%).

C27

W. Peng, F. Li, X. Zou, and J. Wu, “The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links”. In Proc. of IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2013.

C26

W. Chang, J. Wu, C. Tan, F. Li, “Sybil Defenses in Mobile Social Networks," in Proc. of IEEE Global Communications Conference (GLOBECOM), 2013.

C25

F. Li, W. Peng, C. Huang, and X. Zou, “Smartphone Strategic Sampling in Defending Enterprise Network Security,” in Proc. of IEEE Communication and Information Systems Security Symposium (ICC), 2013.

C24

Y. Sui, X. Zou, Y. Du and F. Li, “Secure and Privacy-preserving Biometrics based Active Authentication”, In Proc. of IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012.

C23

Y. Sui, X. Zou, F. Li, E. Du: Active User Authentication for Mobile Devices. In Proc. Of International Conference on Wireless Algorithms, Systems, and Applications (WASA), 2012.

C22

W. Peng, F. Li, X. Zou and J. Wu, “A Privacy-Preserving Social-Aware Incentive System for Word-of-Mouth Advertisement Dissemination on Smart Mobile Devices,” in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012.

C21

W. Peng, F. Li, X. Zou and J. Wu, “Seed and Grow: An Attack Against Anonymized Social Networks,” in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012.

C20

Y. Wang, J. Wu, Z. Jiang, F. Li, “A Joint Replication-Migration-based Routing in Delay Tolerant Networks,” in Proc. of IEEE International Conference on Communications (ICC), 2012.

C19

W. Peng, F. Li, X. Zou and J. Wu, "Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks," in Proc. of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011.

C18

X. Zou, F. Maino, E. Bertino, Y. Sui, K. Wang, and F. Li, "A Clean and Efficient Approach to Weighted Multi-Secret Sharing, " in Proc. of the International Conference on Computer Communications and Networks (ICCCN), August, 2011.

C17

X. Zou, M. Qi, Y. Sui, and F. Li, "A New Scheme for Anonymous Secure Group Communication", accepted to in Proc. of 44th Hawaii International Conference on System Sciences (HICSS-44), January, 2011.

C16

F. Li, Y. Yang, J. Wu, and X. Zou, "Fuzzy Closeness-based Delegation Forwarding in Delay Tolerant Networks," in Proc. of IEEE International Conference on Networking, Architecture, and Storage (NAS), July, 2010.

C15

F. Li, Y. Yang, J. Wu, "CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks," in Proc. of the IEEE International Conference on Computer Communications (INFOCOM), March, 2010, (acceptance rate 17.5%).

C14

Y. Zhao, F. Li, J. Wu, and S. Lu, "VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones, " in Proc. of the IEEE International Conference on Computer Communications (INFOCOM), Mini-conference, March, 2010.

C13

F. Li and J. Wu, "LocalCom: A Community-based Epidemic Forwarding Scheme in Disruption-tolerant Networks," accepted to appear in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009, (acceptance rate 18.8%).

C12

F. Li and J. Wu, "MOPS: Providing Content-based Service in Disruption-tolerant Networks," accepted to appear in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), 2009, (acceptance rate 16%).

C11

F. Li, A. Srinivasan, and J. Wu, "Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets," accepted to appear in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2009, (acceptance rate 19%).

C10

F. Li and J. Wu, "FRAME: An Innovative Incentive Scheme in Vehicular Networks," accepted to appear in Proc. of IEEE International Conference on Communications (ICC), 2009.

C09

F. Li and J. Wu, "Hit and Run: A Bayesian Game between Malicious and Regular Nodes in MANETs," in Proc. of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008, (acceptance rate 21%).

C08

J. Wu, M. Lu, and F. Li, "Utility-Based Opportunistic Routing in Multi-hop Wireless Networks," in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), 2008, (acceptance rate 16%).

C07

A. Srinivasan, F. Li, and J. Wu, "A Novel CDS-based Reputation Monitoring System for Wireless Sensor Networks," accepted to appear in Proc. of the 1st International Workshop on Wireless Security and Privacy (WiSP) (in conjunction with ICDCS 2008), 2008.

C06

A. Srinivasan, F. Li, J. Wu, M. Li, "CAGE: Clique-based Assignment of Group kEy," in Proc. of the Second International Conference on Communications and Networking (ChinaCom), 2007.

C05

F. Li and J. Wu, "Authentication Via Ambassadors: A Novel Authentication Mechanism in MANETs," in Proc. of Military Communications Conference (MILCOM), 2007.

C04

F. Li, A. Srinivasan, M. Lu, and J. Wu, "Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks," in Proc. of IEEE Global Communications Conference (GLOBECOM), 2007.

C03

F. Li and J. Wu, "Mobility Reduces Uncertainty in MANETs," in Proc. of IEEE International Conference on Computer Communications (INFOCOM), 2007, (acceptance rate 18%).

C02

M. Lu, F. Li, and J. Wu, "Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks," in Proc. of 20th Int'l Conf. on Parallel and Distributed Systems (ICPADS), 2006.

C01

F. Li and J. Wu, "A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks," in Proc. of ACM International Wireless Communications and Mobile Computing Conference (IWCMC) Computer and Network Security Symposium, 2006.

 

 

 

PEER REVIEWED JOURNAL ARTICLES & BOOK CHAPTERS

 

J13

M. Rangwala, P. Zhang, X. Zou and F. Li, “A Taxonomy of Privilege Escalation Attacks in Android Applications”, in International Journal of Security and Networks (IJSN), Vol. 9, No. 1: 40-55, 2014.

J12

Y. Sui, X. Zou, Y. Du, and F. Li, “Design and Analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method”, IEEE Transactions on Computers, 63.4:902-916, 10.1109/TC.2013.25, Apr. 2014. 

J11

W. Peng, F. Li, and X. Zou, “Moving-target Defense for Cloud Infrastructure: Lessons from Botnets”, Book chapter, High Performance Semantic Cloud Auditing: 35-64, Editor: Keesook Han and Baek-Young Choi, Springer, 2014.

J10

W. Peng, F. Li, X. Zou and J. Wu, “A Two-stage De-anonymization Attack against Anonymized Social Networks”. IEEE Transactions on Computers, 63.2: 290-303, 10.1109/TC.2012.202, Feb. 2014.

J09

W. Peng, F. Li, X. Zou and J. Wu, “Behavioral Malware Detection in Delay Tolerant Networks”. IEEE Transactions on Parallel and Distributed Systems, 25.1: 53-63, 10.1109/TPDS.2013.27, Jan. 2014.

J08

F. Li, A. Srinivasan, and J. Wu, “Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks," IEICE Transactions 95-D (1):12-19, 2012.

J07

P. Adusumilli, Y. Sui, X. Zou, B. Ramamurthy, and F. Li, “A Key Distribution Scheme for Distributed Group with Authentication Capability,” International Journal of Performability Engineering 8(2):199-212, 2012.

J06

Y. Zhao, J. Wu, F. Li, and S. Lu, “On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling,” IEEE Transactions on Parallel and Distributed Systems, 23.8:1528-1535, August, 2012.

J05

F. Li, and J. Wu, "Uncertainty Modeling and Reduction in MANETs," IEEE Transactions on Mobile Computing 9.7:1035-1048. July, 2010. (TMC Impact factor: 1.72)

J04

F. Li, Y. Yang, and J. Wu, "Attack and Flee: Game Theory-based Analysis on Interactions among Nodes in MANETs," IEEE Transactions on Systems, Man, and Cybernetics--Part B: Cybernetics 40.3:612-622. June, 2010. (SMCB Impact factor: 1.35)

J03

A. Srinivasan, F. Li, J. Wu, and M. Li. "Clique-based Group Key Assignment in Wireless Sensor Networks," in International Journal of Security and Networks (IJSN), Vol. 3, No. 4: 226-239, 2008.

J02

F. Li, A. Srinivasan, and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," in International Journal of Security and Networks (IJSN), Vol. 3, No. 3: 173-182, 2008.

J01

M. Lu, F. Li, and J. Wu, "Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks," IEEE Transaction of Reliability 58.3:485-495. September, 2009.

 

FUNDED PROJECTS

Enhancing Undergraduate Experience in Mobile Cloud Security

 

National Science Foundation (NSF), PI

$360, 000

06/01/2016 - 05/31/2019

IUSE: Collaborative Project: Building Virtual Research, Interactive, Service, and Experiential Learning Modules for Cyber Security Education

 

National Science Foundation (NSF), PI

$287,159

09/01/2014- 08/31/2017

Collaborative Project: Building an Innovative Smartphone Virtual Laboratory Environment for Cyber-security Education and Training

 

National Science Foundation (NSF), PI

$103, 195

08/01/2013- 07/31/2016

Enhancing Undergraduate Experience in Mobile Computing Security

 

National Science Foundation (NSF), PI

$359,964

06/01/2013- 05/31/2016

Moving Cloud: Create Moving-target Defense in Cloud by Learning from Botnets

 

Northrop Grumman Cybersecurity Research Consortium, PI

$107,224

12/01/2012-08/31/2014

 

Copyright Feng Li 2009~2017, All rights reserved.