default search action
Feng Li 0001
Person information
- affiliation: Indiana University - Purdue University Indianapolis, Department of Computer and Information Technology, IN, USA
- affiliation (PhD 2009): Florida Atlantic University, Boca Raton, FL, USA
- not to be confused with: Feng Li 0025
Other persons with the same name
- Feng Li — disambiguation page
- Feng Li 0002 — Shandong University, School of Computer Science and Technology, Jinan, China (and 1 more)
- Feng Li 0003 — Qian Xuesen Laboratory of Space Technology, Beijing, China (and 3 more)
- Feng Li 0004 — Wuhan University, School of Mathematics and Statistics / Computational Science Hubei Key Laboratory, China
- Feng Li 0005 — Mitsubishi Electric Research Labs, Cambridge, MA, USA (and 2 more)
- Feng Li 0006 — Dalian University of Technology, School of Mathematical Sciences, China
- Feng Li 0007 — Nanyang Technological University, School of Computer Science and Engineering, Singapore (and 1 more)
- Feng Li 0008 — Nanjing University, School of Electronic Science and Engineering, China (and 2 more)
- Feng Li 0009 — Anhui University of Technology, School of Electrical and Information Engineering, Ma'anshan, China (and 2 more)
- Feng Li 0010 — Southwestern University of Finance and Economics, School of Business Administration, Chengdu, China (and 1 more)
- Feng Li 0011 — Xi'an Jiaotong University, Department of Information and Communication Engineering, School of Electronic and Information Engineering, China
- Feng Li 0012 — Harbin Institute of Technology, Center of Ultra-Precision Optoelectronic Instrument Engineering, China
- Feng Li 0013 — University of California Los Angeles, School of Dentistry, CA, USA (and 1 more)
- Feng Li 0014 — Shandong University, School of Computer Science and Technology, China
- Feng Li 0015 — PLA Naval University of Engineering, Department of Navigation Engineering, Wuhan, China
- Feng Li 0016 — Pierre and Marie Curie University, Paris, France
- Feng Li 0017 — Northeastern University, College of Computer and Communication Engineering, Shenyang, China (and 1 more)
- Feng Li 0018 — University of Chicago, Department of Radiology, Kurt Rossmann Laboratories for Radiologic Image Research, IL, USA
- Feng Li 0019 — University of Melbourne, Department of Electrical and Electronic Engineering, Australia
- Feng Li 0020 — University of California Irvine, Center for Pervasive Communications and Computing, CA, USA
- Feng Li 0021 — City University of London, Cass Business School, UK (and 2 more)
- Feng Li 0022 — Harbin Institute of Technology, Shenzhen Graduate School, Shenzhen Key Laboratory of Internet Information Collaboration, China
- Feng Li 0023 — Jiangsu University of Technology, College of Electrical and Information Engineering, Department of Automation, Changzhou, China (and 1 more)
- Feng Li 0024 — Huazhong University of Science and Technology, School of Management, Wuhan, China
- Feng Li 0025 — Indiana University - Purdue University, Department of Computer Science, Indianapolis, IN, USA
- Feng Li 0026 — Chinese Academy of Sciences, Suzhou Institute of Nano-Tech and Nano-Bionics (SINANO), China (and 1 more)
- Feng Li 0027 — Tianjin University, School of Electrical and Information Engineering, China
- Feng Li 0028 — Central University of Finance and Economics, Beijing, China (and 1 more)
- Feng Li 0029 — Hong Kong Polytechnic University, Department of Electronic and Information Engineering, Hong Kong (and 1 more)
- Feng Li 0030 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China (and 1 more)
- Feng Li 0031 — Harbin Institute of Technology, School of Computer Science and Technology, China
- Feng Li 0032 — Northeastern University, School of Computer Science and Engineering, Shenyang, China
- Feng Li 0033 — Xidian University, School of Computer Science and Technology, Xi'an, China
- Feng Li 0034 — Guangdong University of Technology, School of Automation, Guangzhou, China
- Feng Li 0035 — Donghua University, School of Computer Science and Technology, Shanghai
- Feng Li 0036 — Donghua University, School of Computer Science and Technology, Shanghai
- Feng Li 0037 — Hefei University of Technology, China (and 1 more)
- Feng Li 0038 — Chongqing University, Chongqing, China
- Feng Li 0039 — Old Dominion University, Department of Electrical and Computer Engineering, Norfolk, Virginia, USA
- Feng Li 0040 — Hong Kong University of Science and Technology, Hong Kong (and 1 more)
- Feng Li 0041 — Xidian University, School of Cyber Engineering, Xi'an, Shaanxi, China (and 1 more)
- Feng Li 0042 — University of Science and Technology of China, Department of Automation, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Tianchong Gao, Yucheng Bian, Feng Li, Agnideven Palanisamy Sundar:
Generating-Based Attacks to Online Social Networks. IEEE Trans. Comput. Soc. Syst. 11(6): 7881-7891 (2024) - [c59]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Subjective Logic-based Decentralized Federated Learning for Non-IID Data. ARES 2024: 12:1-12:11 - [c58]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Toward Multimodal Vertical Federated Learning: A Traffic Analysis Case Study. ICCCN 2024: 1-9 - 2023
- [c57]Ryan Hosler, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li, Tianchong Gao:
Unsupervised Deep Learning for an Image Based Network Intrusion Detection System. GLOBECOM 2023: 6825-6831 - [c56]Joshua Schoenbachler, Vinay Krishnan, Garvit Agarwal, Feng Li:
Sorting Ransomware from Malware Utilizing Machine Learning Methods with Dynamic Analysis. MobiHoc 2023: 516-521 - [c55]David Chen, Kehan Wang, Agnideven Palanisamy Sundar, Feng Li:
TrustNetFL: Enhancing Federated Learning with Trusted Client Aggregation for Improved Security. MobiHoc 2023: 534-539 - 2022
- [j21]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective. IEEE Trans. Veh. Technol. 71(7): 7680-7690 (2022) - [c54]Tianchong Gao, Feng Li:
Machine Learning-based Online Social Network Privacy Preservation. AsiaCCS 2022: 467-478 - [c53]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Distributed Swift and Stealthy Backdoor Attack on Federated Learning. NAS 2022: 1-8 - [i2]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective. CoRR abs/2203.12430 (2022) - 2021
- [j20]Tianchong Gao, Feng Li:
Differential Private Social Network Publication and Persistent Homology Preservation. IEEE Trans. Netw. Sci. Eng. 8(4): 3152-3166 (2021) - [c52]Cheng Peng, Qin Hu, Jianan Chen, Kyubyung Kang, Feng Li, Xukai Zou:
Energy-Efficient Device Selection in Federated Edge Learning. ICCCN 2021: 1-9 - [c51]Ryan Hosler, Tyler Phillips, Xiaoyuan Yu, Agnideven Palanisamy Sundar, Xukai Zou, Feng Li:
Learning Discriminative Features for Adversarial Robustness. MSN 2021: 303-310 - 2020
- [j19]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao, Evan D. Russomanno:
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey. IEEE Access 8: 171703-171715 (2020) - [j18]Tianchong Gao, Feng Li:
Protecting Social Network With Differential Privacy Under Novel Graph Model. IEEE Access 8: 185276-185289 (2020) - [c50]Qin Hu, Feng Li, Xukai Zou, Yinhao Xiao:
Correlated Participation Decision Making for Federated Edge Learning. GLOBECOM 2020: 1-6 - [c49]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Tianchong Gao:
Deep Dynamic Clustering of Spam Reviewers using Behavior-Anomaly-based Graph Embedding. GLOBECOM 2020: 1-6 - [c48]Agnideven Palanisamy Sundar, Feng Li, Xukai Zou, Qin Hu, Tianchong Gao:
Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems. MASS 2020: 347-355
2010 – 2019
- 2019
- [j17]Tianchong Gao, Wei Peng, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, Mohammad Al Hasan:
Android Malware Detection via Graphlet Sampling. IEEE Trans. Mob. Comput. 18(12): 2754-2767 (2019) - [c47]Tianchong Gao, Feng Li:
Sharing Social Networks Using a Novel Differentially Private Graph Model. CCNC 2019: 1-4 - [c46]Tianchong Gao, Feng Li:
Efficient Content Delivery via Interest Queueing. ICC 2019: 1-6 - [c45]Tianchong Gao, Feng Li:
De-Anonymization of Dynamic Online Social Networks via Persistent Structures. ICC 2019: 1-6 - [c44]Tianchong Gao, Feng Li:
PHDP: Preserving Persistent Homology in Differentially Private Graph Publications. INFOCOM 2019: 2242-2250 - [c43]Tyler Phillips, Xukai Zou, Feng Li, Ninghui Li:
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. SACMAT 2019: 141-146 - [c42]Tianchong Gao, Feng Li:
Privacy-Preserving Sketching for Online Social Network Data Publication. SECON 2019: 1-9 - 2018
- [j16]Tianchong Gao, Feng Li:
Studying the utility preservation in social network anonymization via persistent homology. Comput. Secur. 77: 49-64 (2018) - [j15]Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model. IEEE Trans. Comput. Soc. Syst. 5(4): 1009-1020 (2018) - [c41]Erick Eduardo Bernal Martinez, Bella Oh, Feng Li, Xiao Luo:
Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples. FPS 2018: 143-155 - 2017
- [j14]Xukai Zou, Huian Li, Feng Li, Wei Peng, Yan Sui:
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election. Cryptogr. 1(2): 13 (2017) - [j13]Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, Jie Wu:
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Trans. Parallel Distributed Syst. 28(5): 1417-1429 (2017) - [c40]Andrew Choliy, Feng Li, Tianchong Gao:
Obfuscating function call topography to test structural malware detection against evasion attacks. ICNC 2017: 808-813 - [c39]Tianchong Gao, Feng Li:
Preserving Graph Utility in Anonymized Social Networks? A Study on the Persistent Homology. MASS 2017: 348-352 - [c38]Tyler Phillips, Xukai Zou, Feng Li:
A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme. MASS 2017: 545-549 - [c37]Tianchong Gao, Feng Li:
Using Persistent Homology to Represent Online Social Network Graphs. MASS 2017: 555-559 - [c36]Wei Jiang, Feng Li, Dan Lin, Elisa Bertino:
No one can track you: Randomized authentication in Vehicular Ad-hoc Networks. PerCom 2017: 197-206 - [c35]Tianchong Gao, Feng Li, Yu Chen, Xukai Zou:
Preserving Local Differential Privacy in Online Social Networks. WASA 2017: 393-405 - 2016
- [j12]Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, Huanyang Zheng:
Trust Evaluation in Online Social Networks Using Generalized Network Flow. IEEE Trans. Computers 65(3): 952-963 (2016) - [c34]Wei Peng, Tianchong Gao, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, Mohammad Al Hasan:
ACTS: Extracting Android App topologiCal signature through graphleT Sampling. CNS 2016: 37-45 - 2015
- [c33]Wei Peng, Feng Li, Xukai Zou:
Temporal coverage based content distribution in heterogeneous smart device networks. ICC 2015: 3477-3482 - [c32]Kevin Butterfield, Huian Li, Xukai Zou, Feng Li:
Enhancing and Implementing Fully Transparent Internet Voting. ICCCN 2015: 1-6 - 2014
- [j11]Mohammed Rangwala, Ping Zhang, Xukai Zou, Feng Li:
A taxonomy of privilege escalation attacks in Android applications. Int. J. Secur. Networks 9(1): 40-55 (2014) - [j10]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
A Two-Stage Deanonymization Attack against Anonymized Social Networks. IEEE Trans. Computers 63(2): 290-303 (2014) - [j9]Yan Sui, Xukai Zou, Eliza Yingzi Du, Feng Li:
Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method. IEEE Trans. Computers 63(4): 902-916 (2014) - [j8]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Behavioral Malware Detection in Delay Tolerant Networks. IEEE Trans. Parallel Distributed Syst. 25(1): 53-63 (2014) - [c31]Wei Peng, Feng Li, Chin-Tser Huang, Xukai Zou:
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces. ICC 2014: 804-809 - [c30]Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng:
Feedback-based smartphone strategic sampling for BYOD security. ICCCN 2014: 1-8 - [c29]Xukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li:
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties. INFOCOM 2014: 136-144 - [i1]Wei Jiang, Dan Lin, Feng Li, Elisa Bertino:
Randomized and Efficient Authentication in Mobile Environments. IACR Cryptol. ePrint Arch. 2014: 86 (2014) - 2013
- [c28]Wei Peng, Feng Li, Keesook J. Han, Xukai Zou, Jie Wu:
T-dominance: Prioritized defense deployment for BYOD security. CNS 2013: 37-45 - [c27]Huian Li, Yan Sui, Wei Peng, Xukai Zou, Feng Li:
A viewable e-voting scheme for environments with conflict of interest. CNS 2013: 251-259 - [c26]Wei Chang, Jie Wu, Chiu C. Tan, Feng Li:
Sybil defenses in mobile social networks. GLOBECOM 2013: 641-646 - [c25]Feng Li, Wei Peng, Chin-Tser Huang, Xukai Zou:
Smartphone strategic sampling in defending enterprise network security. ICC 2013: 2155-2159 - [c24]Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. INFOCOM 2013: 2886-2894 - [c23]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links. MASS 2013: 402-410 - 2012
- [j7]Feng Li, Jie Wu, Avinash Srinivasan:
Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks. IEICE Trans. Inf. Syst. 95-D(1): 12-19 (2012) - [j6]Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu:
On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling. IEEE Trans. Parallel Distributed Syst. 23(8): 1528-1535 (2012) - [c22]Yunsheng Wang, Jie Wu, Zhen Jiang, Feng Li:
A joint replication-migration-based routing in delay tolerant networks. ICC 2012: 73-77 - [c21]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Seed and Grow: An attack against anonymized social networks. SECON 2012: 587-595 - [c20]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices. SECON 2012: 596-604 - [c19]Yan Sui, Xukai Zou, Eliza Yingzi Du, Feng Li:
Secure and privacy-preserving biometrics based active authentication. SMC 2012: 1291-1296 - [c18]Yan Sui, Xukai Zou, Feng Li, Eliza Yingzi Du:
Active User Authentication for Mobile Devices. WASA 2012: 540-548 - 2011
- [c17]Xukai Zou, Mingrui Qi, Feng Li, Yan Sui, Kai Wang:
A New Scheme for Anonymous Secure Group Communication. HICSS 2011: 1-9 - [c16]Xukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li:
A New Approach to Weighted Multi-Secret Sharing. ICCCN 2011: 1-6 - [c15]Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks. MASS 2011: 411-420 - 2010
- [j5]Feng Li, Jie Wu:
Uncertainty Modeling and Reduction in MANETs. IEEE Trans. Mob. Comput. 9(7): 1035-1048 (2010) - [j4]Feng Li, Yinying Yang, Jie Wu:
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs. IEEE Trans. Syst. Man Cybern. Part B 40(3): 612-622 (2010) - [c14]Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu:
VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones. INFOCOM 2010: 366-370 - [c13]Feng Li, Yinying Yang, Jie Wu:
CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. INFOCOM 2010: 2811-2819 - [c12]Feng Li, Yinying Yang, Jie Wu, Xukai Zou:
Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks. NAS 2010: 333-340
2000 – 2009
- 2009
- [b1]Feng Li:
An uncertainty-aware reputation system in mobile networks: analysis and applications. Florida Atlantic University, Boca Raton, FL, USA, 2009 - [j3]Mingming Lu, Feng Li, Jie Wu:
Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks. IEEE Trans. Reliab. 58(3): 485-495 (2009) - [c11]Feng Li, Jie Wu:
FRAME: An Innovative Incentive Scheme in Vehicular Networks. ICC 2009: 1-6 - [c10]Feng Li, Jie Wu:
MOPS: Providing Content-Based Service in Disruption-Tolerant Networks. ICDCS 2009: 526-533 - [c9]Feng Li, Jie Wu, Anand Srinivasan:
Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets. INFOCOM 2009: 2428-2436 - [c8]Feng Li, Jie Wu:
LocalCom: A Community-based Epidemic Forwarding Scheme in Disruption-tolerant Networks. SECON 2009: 1-9 - [p1]Feng Li, Yinying Yang, Jie Wu:
Mobility Management in MANETs: Exploit the Positive Impacts of Mobility. Guide to Wireless Ad Hoc Networks 2009: 211-235 - 2008
- [j2]Feng Li, Avinash Srinivasan, Jie Wu:
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks. Int. J. Secur. Networks 3(3): 173-182 (2008) - [j1]Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li:
Clique-based group key assignment in Wireless Sensor Networks. Int. J. Secur. Networks 3(4): 226-239 (2008) - [c7]Jie Wu, Mingming Lu, Feng Li:
Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks. ICDCS 2008: 470-477 - [c6]Avinash Srinivasan, Feng Li, Jie Wu:
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. ICDCS Workshops 2008: 364-369 - [c5]Feng Li, Jie Wu:
Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs. SECON 2008: 432-440 - 2007
- [c4]Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu:
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks. GLOBECOM 2007: 427-431 - [c3]Feng Li, Jie Wu:
Mobility Reduces Uncertainty in MANETs. INFOCOM 2007: 1946-1954 - 2006
- [c2]Mingming Lu, Feng Li, Jie Wu:
Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks. ICPADS (1) 2006: 495-500 - [c1]Feng Li, Jie Wu:
A probabilistic voting-based filtering scheme in wireless sensor networks. IWCMC 2006: 27-32
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-31 23:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint