default search action
Fengjun Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Zhaohui Wang, Bo Luo, Fengjun Li:
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps. Proc. Priv. Enhancing Technol. 2025(1): 776-791 (2025) - 2024
- [j21]Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, Bo Luo:
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. Proc. Priv. Enhancing Technol. 2024(3): 477-494 (2024) - [c59]Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo:
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. CCS 2024: 2236-2250 - [c58]Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li:
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. CCS 2024: 3346-3360 - [c57]Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, Bo Luo:
Companion Apps or Backdoors? On the Security of Automotive Companion Apps. ESORICS (3) 2024: 24-44 - [c56]Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, Bo Luo:
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. ESORICS (1) 2024: 311-331 - [c55]Krushi Patel, Fengjun Li, Guanghui Wang:
Multi-Layer Dense Attention Decoder for Polyp Segmentation. ICBET 2024: 115-120 - [c54]Jiajun Shen, Fengjun Li, Morteza Hashemi, Huazhen Fang:
Model-free Resilient Controller Design based on Incentive Feedback Stackelberg Game and Q-learning. ICPS 2024: 1-6 - [c53]Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li:
Certificate Transparency Revisited: The Public Inspections on Third-party Monitors. NDSS 2024 - [i13]Jiajun Shen, Fengjun Li, Morteza Hashemi, Huazhen Fang:
Model-free Resilient Controller Design based on Incentive Feedback Stackelberg Game and Q-learning. CoRR abs/2403.08948 (2024) - [i12]Krushi Patel, Fengjun Li, Guanghui Wang:
Multi-Layer Dense Attention Decoder for Polyp Segmentation. CoRR abs/2403.18180 (2024) - [i11]Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, Bo Luo:
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. CoRR abs/2404.14581 (2024) - 2023
- [j20]Hao Pu, Fengjun Li, Qingyun Wang, Pengzhen Li:
Preassigned-time projective synchronization of delayed fully quaternion-valued discontinuous neural networks with parameter uncertainties. Neural Networks 165: 740-754 (2023) - [j19]Chenyu Jiang, Zhanyu He, Fengjun Li, Fei Xie, Licheng Zheng, Jun Yang, Ming Yang:
A hybrid computing framework for risk-oriented reliability analysis in dynamic PSA context: A case study. Qual. Reliab. Eng. Int. 39(8): 3445-3471 (2023) - [j18]Hao Liu, Mei Ma, Zixian Gao, Zongyong Deng, Fengjun Li, Zhendong Li:
Siamese Graph Learning for Semi-Supervised Age Estimation. IEEE Trans. Multim. 25: 9586-9596 (2023) - [c52]Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li:
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective. CCS 2023: 3558-3560 - [c51]Wenjuan Bai, Fengjun Li, Cheng Lin, Hu Lin, Jian Wang, Qingyu Kong, Tong Chen, Xue Wang, Bo Yu:
Research on a high-performance domestic intelligent cockpit interaction platform. CECCT 2023: 60-65 - [c50]Zhaohui Wang, Bo Luo, Fengjun Li:
Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking. IoTDI 2023: 448-449 - [c49]Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye:
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms. TrustCom 2023: 730-739 - [e1]Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - [i10]Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo:
Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT. CoRR abs/2306.05524 (2023) - 2022
- [j17]Hao Pu, Fengjun Li:
Preassigned-Time Synchronization of Delayed Fuzzy Cellular Neural Networks with Discontinuous Activations. Neural Process. Lett. 54(5): 4265-4296 (2022) - [j16]Xinjie Shi, Pinhong Long, Huaping Huang, Fengjun Li:
Some Fixed Point Results in E-Metric Spaces and an Application. Symmetry 14(10): 2005 (2022) - [j15]Xin Feng, Wenjie Pei, Fengjun Li, Fanglin Chen, David Zhang, Guangming Lu:
Generative Memory-Guided Semantic Reasoning Model for Image Inpainting. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7432-7447 (2022) - [j14]Ke Wang, Fengjun Li, Chien-Ming Chen, Mohammad Mehedi Hassan, Jinyi Long, Neeraj Kumar:
Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems. IEEE Trans. Intell. Transp. Syst. 23(7): 9755-9764 (2022) - [j13]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE/ACM Trans. Netw. 30(2): 749-765 (2022) - [c48]Zeyan Liu, Fengjun Li, Zhu Li, Bo Luo:
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks. CCS 2022: 2129-2143 - [c47]Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems. ESORICS (3) 2022: 343-363 - [c46]Javaria Ahmad, Fengjun Li, Bo Luo:
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. ESORICS (2) 2022: 589-609 - [c45]Krushi Patel, Andrés M. Bur, Fengjun Li, Guanghui Wang:
Aggregating Global Features into Local Vision Transformer. ICPR 2022: 1141-1147 - [c44]Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan:
$\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware. ICSE 2022: 1-12 - [c43]Fengjun Li, Xin Feng, Fanglin Chen, Guangming Lu, Wenjie Pei:
Learning Generalizable Latent Representations for Novel Degradations in Super-Resolution. ACM Multimedia 2022: 1797-1807 - [i9]Krushi Patel, Andres M. Bur, Fengjun Li, Guanghui Wang:
Aggregating Global Features into Local Vision Transformer. CoRR abs/2201.12903 (2022) - [i8]Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, Le Guan:
μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware. CoRR abs/2202.03013 (2022) - [i7]Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. CoRR abs/2205.15944 (2022) - [i6]Fengjun Li, Xin Feng, Fanglin Chen, Guangming Lu, Wenjie Pei:
Learning Generalizable Latent Representations for Novel Degradations in Super Resolution. CoRR abs/2207.12941 (2022) - 2021
- [j12]Yunhai Zheng, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci. 121: 18-33 (2021) - [c42]Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo:
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. ACSAC 2021: 31-44 - [c41]Sana Awan, Bo Luo, Fengjun Li:
CONTRA: Defending Against Poisoning Attacks in Federated Learning. ESORICS (1) 2021: 455-475 - [c40]Jiangming Shi, Zixian Gao, Hao Liu, Zekuan Yu, Fengjun Li:
Exploiting Invariance of Mining Facial Landmarks. ACM Multimedia 2021: 4380-4389 - [c39]Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li:
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. NDSS 2021 - [c38]Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, Bo Luo:
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. TrustCom 2021: 114-121 - [i5]Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li:
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. CoRR abs/2107.12867 (2021) - [i4]Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo:
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. CoRR abs/2109.12459 (2021) - [i3]Xin Feng, Wenjie Pei, Fengjun Li, Fanglin Chen, David Zhang, Guangming Lu:
Generative Memory-Guided Semantic Reasoning Model for Image Inpainting. CoRR abs/2110.00261 (2021) - [i2]Chengqian Guo, Jingqiang Lin, Quanwei Cai, Fengjun Li, Qiongxiao Wang, Jiwu Jing, Bin Zhao, Wei Wang:
UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services. CoRR abs/2110.10396 (2021) - 2020
- [j11]Qiang Zhou, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. Inf. Sci. 512: 641-660 (2020) - [j10]Jiaxu Zhang, Shiying Zhou, Fengjun Li, Jian Zhao:
Integrated nonlinear robust adaptive control for active front steering and direct yaw moment control systems with uncertainty observer. Trans. Inst. Meas. Control 42(16): 3267-3280 (2020) - [c37]Bingyu Li, Fengjun Li, Ziqiang Ma, Qianhong Wu:
Exploring the Security of Certificate Transparency in the Wild. ACNS Workshops 2020: 453-470 - [c36]Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo:
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. ESORICS (1) 2020: 153-173 - [c35]Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, Bo Luo:
WOLF: automated machine learning workflow management framework for malware detection and other applications. HotSoS 2020: 11:1-11:8
2010 – 2019
- 2019
- [j9]Shengxia Zhang, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method. IEEE Access 7: 53823-53838 (2019) - [j8]Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, Fengjun Li:
Content-Aware Trust Propagation Toward Online Review Spam Detection. ACM J. Data Inf. Qual. 11(3): 11:1-11:31 (2019) - [j7]Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, Bo Luo:
#DontTweetThis: Scoring Private Information in Social Networks. Proc. Priv. Enhancing Technol. 2019(4): 72-92 (2019) - [c34]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c33]Sana Awan, Fengjun Li, Bo Luo, Mei Liu:
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. CCS 2019: 2561-2563 - [c32]Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, Fengjun Li:
Towards the Trust-Enhancements of Single Sign-On Services. DSC 2019: 1-8 - [c31]Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang:
Secure Cryptography Infrastructures in the Cloud. GLOBECOM 2019: 1-7 - [c30]Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, Bo Luo:
Arcana: Enabling Private Posts on Public Microblog Platforms. SEC 2019: 271-285 - [c29]Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu:
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. SecureComm (1) 2019: 511-531 - 2018
- [c28]Lei Yang, Fengjun Li:
Cloud-Assisted Privacy-Preserving Classification for IoT Applications. CNS 2018: 1-9 - [c27]Lei Yang, Chris Seasholtz, Bo Luo, Fengjun Li:
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways. ESORICS (1) 2018: 575-594 - 2017
- [j6]Lei Yang, Fengjun Li:
Securing Smart Grid In-Network Aggregation through False Data Detection. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(10): e5 (2017) - [j5]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. IEEE Internet Things J. 4(6): 1802-1831 (2017) - [c26]Pegah Nokhiz, Fengjun Li:
Understanding rating behavior based on moral foundations: The case of Yelp reviews. IEEE BigData 2017: 3938-3945 - [c25]Hao Xue, Fengjun Li:
A Content-Aware Trust Index for Online Review Spam Detection. DBSec 2017: 489-508 - [c24]Chung Kit Wu, Hongxu Zhu, Loi Lei Lai, Anna S. F. Chang, Fengjun Li, Kim Fung Tsang, Roy Kalawsky:
A time-synchronized ZigBee building network for smart water management. INDIN 2017: 1219-1222 - [i1]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. CoRR abs/1701.04525 (2017) - 2016
- [c23]Lei Yang, Abdulmalik Humayed, Fengjun Li:
A multi-cloud based privacy-preserving data publishing scheme for the internet of things. ACSAC 2016: 30-39 - 2015
- [c22]Fengjun Li, Xin Fu, Bo Luo:
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. CCS 2015: 1650-1652 - [c21]Lei Yang, Fengjun Li:
mTor: A multipath Tor routing beyond bandwidth throttling. CNS 2015: 479-487 - [c20]Lei Yang, Fengjun Li:
Enhancing traffic analysis resistance for Tor hidden services with multipath routing. CNS 2015: 745-746 - [c19]Lei Yang, Fengjun Li:
Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. SecureComm 2015: 367-384 - [c18]Hao Xue, Fengjun Li, Hyunjin Seo, Roseann Pluretti:
Trust-Aware Review Spam Detection. TrustCom/BigDataSE/ISPA (1) 2015: 726-733 - 2014
- [c17]Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang:
SEDB: Building Secure Database Services for Sensitive Data. ICICS 2014: 16-30 - [c16]Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma:
virtio-ct: A Secure Cryptographic Token Service in Hypervisors. SecureComm (2) 2014: 285-300 - [c15]Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha:
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients. SecureComm (1) 2014: 305-322 - [c14]Lei Yang, Hao Xue, Fengjun Li:
Privacy-preserving data sharing in Smart Grid systems. SmartGridComm 2014: 878-883 - 2013
- [j4]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. IEEE Trans. Inf. Forensics Secur. 8(6): 888-900 (2013) - [c13]Lei Yang, Fengjun Li:
Detecting false data injection in smart grid in-network aggregation. SmartGridComm 2013: 408-413 - 2012
- [c12]Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu:
Stalking online: on user privacy in social networks. CODASPY 2012: 37-48 - [c11]Yingying Ma, Fengjun Li:
Detecting review spam: Challenges and opportunities. CollaborateCom 2012: 651-654 - [c10]Fengjun Li, Bo Luo:
Preserving data integrity for smart grid data aggregation. SmartGridComm 2012: 366-371 - 2011
- [j3]Fengjun Li, Xukai Zou, Peng Liu, Jake Y. Chen:
New threats to health data privacy. BMC Bioinform. 12(S-12): S7 (2011) - [j2]Fengjun Li, Bo Luo, Peng Liu:
Secure and privacy-preserving information aggregation for smart grids. Int. J. Secur. Networks 6(1): 28-39 (2011) - [c9]Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, Peng Liu:
Privacy Preserving Group Linkage. SSDBM 2011: 432-450 - [c8]Fengjun Li:
Application of Generalized Chebyshev Neural Network in Air Quality Prediction. ICSI (1) 2011: 472-479 - 2010
- [c7]Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu:
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping. INFOCOM 2010: 2820-2828 - [c6]Fengjun Li:
Air Quality Prediction in Yinchuan by Using Neural Networks. ICSI (2) 2010: 548-557
2000 – 2009
- 2009
- [c5]Fengjun Li:
Approximation to Nonlinear Discrete-Time Systems by Recurrent Neural Networks. ISNN (4) 2009: 527-534 - 2008
- [c4]Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squicciarini, Dongwon Lee, Chao-Hsien Chu:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 - [c3]Fengjun Li:
Function Approximation by Neural Networks. ISNN (1) 2008: 384-390 - 2007
- [c2]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu:
Automaton segmentation: a new approach to preserve privacy in xml information brokering. CCS 2007: 508-518 - 2006
- [j1]Fengjun Li, Wing Shing Wong:
Fairness Indices and Distributed Control in Communication Networks. Commun. Inf. Syst. 6(2): 83-114 (2006) - [c1]Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu:
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. SUTC (1) 2006: 252-259
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint