default search action
Ming Li 0003
Person information
- affiliation: University of Arizona, Tucson, AZ, USA
- affiliation (2011 - 2015): Utah State University, Logan, UT, USA
- affiliation (PhD 2011): Worcester Polytechnic Institute, MA, USA
Other persons with the same name
- Ming Li — disambiguation page
- Ming Li 0001 — University of Waterloo, ON, Canada (and 3 more)
- Ming Li 0002 — East China Normal University, Shanghai, China (and 1 more)
- Ming Li 0004 — Xidian University, National Key Lab of Radar Signal Processing, Xi'an, China
- Ming Li 0005 — Nanjing University, National Key Laboratory for Novel Software Technology, China
- Ming Li 0006 — University of Texas at Arlington, TX, USA (and 2 more)
- Ming Li 0007 — California State University, Fresno, CA, USA (and 1 more)
- Ming Li 0008 — Worcester Polytechnic Institute, MA, USA
- Ming Li 0009 — IBM T. J. Watson Research Center, Yorktown Heights, NY, USA (and 1 more)
- Ming Li 0010 — Deakin University, VIC, Australia
- Ming Li 0011 — Dalian University of Technology, School of Information and Communication Engineering, China (and 2 more)
- Ming Li 0012 — Taiyuan University of Technology, College of Mathematics, China (and 1 more)
- Ming Li 0013 — China University of Mining & Technology, Xuzhou, China
- Ming Li 0014 — Unilever Corporate Research, Sharnbrook, Bedford, UK
- Ming Li 0015 — Lanzhou University of Technology, China
- Ming Li 0016 — RWTH Aachen University, Germany
- Ming Li 0017 — Zhejiang University, State Key Laboratory of CAD&CG, China
- Ming Li 0018 — Max-Planck-Institut für Informatik, Saarbrücken, Germany
- Ming Li 0019 — Carleton University, Ottawa, ON, Canada
- Ming Li 0020 — Google (and 1 more)
- Ming Li 0021 — Oracle (and 1 more)
- Ming Li 0022 — Vanderbilt University, Department of Biostatistics, Nashville, TN, USA
- Ming Li 0023 — Simon Fraser University, Burnaby, BC, Canada
- Ming Li 0024 — Concordia University, Department of Economics, Montreal, QC, Canada
- Ming Li 0025 — Chinese Academy of Sciences, Institute of Semiconductors, China (and 1 more)
- Ming Li 0026 — Duke Kunshan University, Data Science Research Center, China (and 3 more)
- Ming Li 0028 — National University of Defense Technology, College of Mechatronic Engineering and Automation, Changsha, China
- Ming Li 0029 — Beihang University, School of Automation Science and Electrical Engineering, Beijing, China (and 2 more)
- Ming Li 0030 — Auburn University MRI Research Center, Auburn, USA
- Ming Li 0031 — China University of Mining and Technology, School of Computer Science and Technology, Xuzhou, China
- Ming Li 0032 — Heidelberg University, Institute of Geography, Germany
- Ming Li 0033 — Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Ming Li 0034 — Beihang University, Institute of Solid Mechanics, Beijing, China
- Ming Li 0035 — Aalto University, Department of Computer Science, Espoo, Finland
- Ming Li 0036 — Honghe University, Department of Mathematics, Mengzi, Yunnan, China
- Ming Li 0037 — Wuhan University, State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, China
- Ming Li 0038 — Second Military Medical University, Changhai Hospital, Department of Orthopaedics, Shanghai, China
- Ming Li 0039 — China Jiliang University, Department of Mathematics, Hangzhou, China
- Ming Li 0040 — Nanchang University, ISST, China (and 1 more)
- Ming Li 0041 — Tianjin Normal University, Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission, China (and 1 more)
- Ming Li 0042 — Hamburg University of Technology, Germany
- Ming Li 0043 — Unilever China (and 1 more)
- Ming Li 0044 — Colorado School of Mines, Department of Electrical Engineering and Computer Science, Golden, CO, USA
- Ming Li 0045 — Shanghai Jiao Tong University, Institute of Image Processing and Pattern Recognition, China
- Ming Li 0046 — Yanshan University, College of Electrical Engineering, Qinhuangdao, China
- Ming Li 0047 — Beijing Jiaotong University, School of Electronic and Information Engineering, China
- Ming Li 0048 — Sun Yat-sen University, School of Geography and Planning, Guangzhou, China
- Ming Li 0049 — Jinan University, College of Information Science and Technology, China
- Ming Li 0051 — China University of Petroleum, School of Economics and Management, Beijing, China
- Ming Li 0052 — National Institutes of Health, Center for Interventional Oncology / National Heart, Lung, and Blood Institute, Bethesda, MD, USA (and 1 more)
- Ming Li 0053 — Macquarie University, Sydney, NSW, Australia (and 3 more)
- Ming Li 0054 — Beihang University, School of Transportation Science and Engineering / Beijing Advanced Innovation Center for Big Data and Brain Computing, Beijing, China
- Ming Li 0055 — Hong Kong Polytechnic University, Department of Industrial and Systems Engineering, Hong Kong (and 2 more)
- Ming Li 0056 — Nanchang Hangkong University, MOE Key Laboratory of Nondestructive Testing, China (and 1 more)
- Ming Li 0057 — Ocean University of China, College of Engineering, Department of Automation, Qingdao, China (and 1 more)
- Ming Li 0058 — Shenyang University of Technology, School of Electrical Engineering, China
- Ming Li 0059 — National University of Defense Technology, College of Meteorology and Oceanography, Nanjing, China
- Ming Li 0060 — Harbin Engineering University, College of Computer Science and Technology, China
- Ming Li 0061 — Rizhao People's Hospital, Department of Nuclear Medicine, China
- Ming Li 0062 — CRRC Tangshan Company, Ltd., Tangshan, China
- Ming Li 0063 — Harbin Institute of Technology, Communication Research Center, China
- Ming Li 0064 — Beijing Institute of Technology, State Key Laboratory of Explosion Science and Technology, China
- Ming Li 0065 — Zhejiang Normal University, Department of Computer Science, Jinhua, China (and 2 more)
- Ming Li 0066 — National University of Defense Technology, College of Electronic Science and Technology, State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, Changsha, China
- Ming Li 0067 — Lappeenranta University of Technology, LUT, Laboratory of Intelligent Machines, Department of Mechanical Engineering, Finland
- Ming Li 0068 — University of Amsterdam, IRLab, Netherlands (and 1 more)
- Ming Li 0069 — Nanjing University, School of Electronic Science and Engineering, China
- Ming Li 0070 — China University of Petroleum, School of Science, Qingdao, China (and 1 more)
- Ming Li 0071 — Jiangsu Ocean University, Department of Computer Science and Technology, China (and 1 more)
- Ming Li 0072 — Wuhan University of Technology, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Yanmao Man, Ming Li, Ryan M. Gerdes:
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures. ACM Trans. Cyber Phys. Syst. 8(2): 14 (2024) - [j45]Bo Jiang, Ming Li, Ravi Tandon:
Online Context-Aware Streaming Data Release With Sequence Information Privacy. IEEE Trans. Inf. Forensics Secur. 19: 4390-4405 (2024) - [j44]Zhiwu Guo, Ming Li, Marwan Krunz:
Exploiting Successive Interference Cancellation for Spectrum Sharing Over Unlicensed Bands. IEEE Trans. Mob. Comput. 23(3): 2438-2455 (2024) - [j43]Nirnimesh Ghose, Kaustubh Gupta, Loukas Lazos, Ming Li, Ziqi Xu, Jincheng Li:
ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification. IEEE Trans. Mob. Comput. 23(5): 6318-6333 (2024) - [c94]Zhiwu Guo, Wenhan Zhang, Ming Li, Marwan Krunz, Mohammad Hossein Manshaei:
DL-SIC: Deep Learning Aided Successive Interference Cancellation in Shared Spectrum. ICNC 2024: 754-760 - [c93]Raymond Muller, Yanmao Man, Ming Li, Ryan M. Gerdes, Jonathan Petit, Z. Berkay Celik:
VOGUES: Validation of Object Guise using Estimated Components. USENIX Security Symposium 2024 - [i24]Bo Jiang, Ming Li, Ravi Tandon:
Correction to Local Information Privacy and Its Applications to Data Aggregation. CoRR abs/2410.12309 (2024) - 2023
- [j42]Hanyu Quan, Boyang Wang, Ming Li, Iraklis Leontiadis:
FastReach: A system for privacy-preserving reachability queries over location data. Comput. Secur. 135: 103513 (2023) - [j41]Shekh Md Mahmudul Islam, Yao Zheng, Yanjun Pan, Marionne Millan, Willy Chang, Ming Li, Olga Boric-Lubecke, Victor Lubecke, Wenhai Sun:
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns. IEEE Internet Things J. 10(16): 14197-14211 (2023) - [j40]Bo Jiang, Mohamed Seif, Ravi Tandon, Ming Li:
Answering Count Queries for Genomic Data With Perfect Privacy. IEEE Trans. Inf. Forensics Secur. 18: 3862-3875 (2023) - [j39]Islam Samy, Xiao Han, Loukas Lazos, Ming Li, Yong Xiao, Marwan Krunz:
Misbehavior Detection in Wi-Fi/LTE Coexistence Over Unlicensed Bands. IEEE Trans. Mob. Comput. 22(8): 4773-4791 (2023) - [c92]Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li:
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. ICNC 2023: 54-60 - [c91]Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes:
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency. USENIX Security Symposium 2023: 6929-6946 - [c90]Zhiwu Guo, Chicheng Zhang, Ming Li, Marwan Krunz:
Fair Coexistence of Heterogeneous Networks: A Novel Probabilistic Multi-Armed Bandit Approach. WiOpt 2023: 1-8 - [i23]Xiaolan Gu, Ming Li, Li Xiong:
DP-BREM: Differentially-Private and Byzantine-Robust Federated Learning with Client Momentum. CoRR abs/2306.12608 (2023) - [i22]Ziqi Xu, Jingcheng Li, Yanjun Pan, Ming Li, Loukas Lazos:
Secret-Free Device Pairing in the mmWave Band. CoRR abs/2306.17330 (2023) - [i21]Bo Jiang, Ming Li, Ravi Tandon:
Online Context-aware Data Release with Sequence Information Privacy. CoRR abs/2307.14388 (2023) - 2022
- [j38]Boyang Wang, Yantian Hou, Ming Li:
QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data. IEEE Trans. Cloud Comput. 10(3): 2066-2078 (2022) - [j37]Bo Jiang, Ming Li, Ravi Tandon:
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation. IEEE Trans. Dependable Secur. Comput. 19(3): 1918-1935 (2022) - [j36]Wenjing Zhang, Bo Jiang, Ming Li, Xiaodong Lin:
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach. IEEE Trans. Inf. Forensics Secur. 17: 849-864 (2022) - [j35]Nirnimesh Ghose, Loukas Lazos, Ming Li:
In-Band Secret-Free Pairing for COTS Wireless Devices. IEEE Trans. Mob. Comput. 21(2): 612-628 (2022) - [c89]Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li, Ryan M. Gerdes:
Physical Hijacking Attacks against Object Trackers. CCS 2022: 2309-2322 - [c88]Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose:
PoF: Proof-of-Following for Vehicle Platoons. NDSS 2022 - [c87]Abdullah Zubair Mohammed, Alok K. Singh, Gökçen Yilmaz Dayanikli, Ryan M. Gerdes, Mani Mina, Ming Li:
Towards Wireless Spiking of Smart Locks. SP (Workshops) 2022: 251-257 - [c86]Mingshun Sun, Zhiwu Guo, Ming Li, Ryan M. Gerdes:
Passive Drone Localization Using LTE Signals. WISEC 2022: 295-297 - [i20]Bo Jiang, Mohamed Seif, Ravi Tandon, Ming Li:
Answering Count Queries for Genomic Data with Perfect Privacy. CoRR abs/2202.01806 (2022) - [i19]Connor Dickey, Christopher Smith, Quentin Johnson, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li:
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. CoRR abs/2209.00080 (2022) - 2021
- [j34]Iraklis Leontiadis, Ming Li:
Secure and collusion-resistant data aggregation from convertible tags. Int. J. Inf. Sec. 20(1): 1-20 (2021) - [j33]Bo Jiang, Mohamed Seif, Ravi Tandon, Ming Li:
Context-Aware Local Information Privacy. IEEE Trans. Inf. Forensics Secur. 16: 3694-3708 (2021) - [j32]Tianchi Zhao, Ming Li, Yanjun Pan:
Online Learning-Based Reconfigurable Antenna Mode Selection Exploiting Channel Correlation. IEEE Trans. Wirel. Commun. 20(10): 6820-6834 (2021) - [c85]Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Samson Aggelopoulos, Brian Lu, Alvin Yang, Thomas Yang, Stephanie Aelmore, Willy Chang, Alana Power, Ming Li, Olga Boric-Lubecke, Victor Lubecke, Wenhai Sun:
Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test. GLOBECOM 2021: 1-6 - [c84]Yanjun Pan, Ziqi Xu, Ming Li, Loukas Lazos:
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. MobiHoc 2021: 231-240 - [i18]Islam Samy, Xiao Han, Loukas Lazos, Ming Li, Yong Xiao, Marwan Krunz:
Misbehavior Detection in Wi-Fi/LTE Coexistence over Unlicensed Bands. CoRR abs/2104.02776 (2021) - [i17]Yao Zheng, Shekh Md Mahmudul Islam, Yanjun Pan, Marionne Millan, Samson Aggelopoulos, Brian Lu, Alvin Yang, Thomas Yang, Stephanie Aelmore, Willy Chang, Alana Power, Ming Li, Olga Boric-Lubecke, Victor Lubecke, Wenhai Sun:
Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test. CoRR abs/2105.00314 (2021) - [i16]Yanjun Pan, Ziqi Xu, Ming Li, Loukas Lazos:
Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization. CoRR abs/2106.02731 (2021) - [i15]Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose:
PoF: Proof-of-Following for Vehicle Platoons. CoRR abs/2107.09863 (2021) - [i14]Xiaolan Gu, Ming Li, Li Xiong:
PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy. CoRR abs/2110.11578 (2021) - 2020
- [j31]Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, Hui Li:
Aggregation-based location privacy: An information theoretic approach. Comput. Secur. 97: 101953 (2020) - [j30]Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu, Yanfeng Shi:
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data. IEEE Trans. Cloud Comput. 8(1): 312-323 (2020) - [j29]Yanjun Pan, Yantian Hou, Ming Li, Ryan M. Gerdes, Kai Zeng, Md. Asaduzzaman Towfiq, Bedri A. Cetiner:
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization. IEEE Trans. Dependable Secur. Comput. 17(1): 106-120 (2020) - [j28]Mingshun Sun, Ali Al-Hashimi, Ming Li, Ryan M. Gerdes:
Impacts of Constrained Sensing and Communication Based Attacks on Vehicular Platoons. IEEE Trans. Veh. Technol. 69(5): 4773-4787 (2020) - [c83]Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, Ming Li:
StegoNet: Turn Deep Neural Network into a Stegomalware. ACSAC 2020: 928-938 - [c82]Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, Marwan Krunz:
Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users. ICC 2020: 1-7 - [c81]Xiaolan Gu, Ming Li, Li Xiong, Yang Cao:
Providing Input-Discriminative Protection for Local Differential Privacy. ICDE 2020: 505-516 - [c80]Tianchi Zhao, Bo Jiang, Ming Li, Ravi Tandon:
Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback. IJCNN 2020: 1-8 - [c79]Yanjun Pan, Yao Zheng, Ming Li:
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. INFOCOM 2020: 1927-1936 - [c78]Mohamed Seif, Ravi Tandon, Ming Li:
Wireless Federated Learning with Local Differential Privacy. ISIT 2020: 2604-2609 - [c77]Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, Esther M. Arkin:
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. MobiHoc 2020: 151-160 - [c76]Yanmao Man, Ming Li, Ryan M. Gerdes:
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems. RAID 2020: 317-332 - [c75]Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao:
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. USENIX Security Symposium 2020: 967-984 - [c74]Mingshun Sun, Yanmao Man, Ming Li, Ryan M. Gerdes:
SVM: secure vehicle motion verification with a single wireless receiver. WISEC 2020: 65-76 - [i13]Bo Jiang, Ming Li, Ravi Tandon:
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation. CoRR abs/2001.02385 (2020) - [i12]Yanmao Man, Ming Li, Ryan M. Gerdes:
GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems. CoRR abs/2001.07792 (2020) - [i11]Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, Esther M. Arkin:
Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach. CoRR abs/2001.08773 (2020) - [i10]Mohamed Seif, Ravi Tandon, Ming Li:
Wireless Federated Learning with Local Differential Privacy. CoRR abs/2002.05151 (2020) - [i9]Yanjun Pan, Yao Zheng, Ming Li:
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. CoRR abs/2002.07355 (2020) - [i8]Jordan L. Melcher, Yao Zheng, Dylan Anthony, Matthew Troglia, Yanjun Pan, Ming Li, Thomas Yang, Alvin Yang, Samson Aggelopoulos:
Demo: iJam with Channel Randomization. CoRR abs/2007.03201 (2020)
2010 – 2019
- 2019
- [j27]Mohamed Seif, Ravi Tandon, Ming Li:
Secure Retrospective Interference Alignment. Entropy 21(11): 1092 (2019) - [j26]Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, Marwan Krunz:
Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access. IEEE Trans. Cogn. Commun. Netw. 5(3): 611-624 (2019) - [j25]Boyang Wang, Ming Li, Li Xiong:
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. IEEE Trans. Dependable Secur. Comput. 16(2): 245-258 (2019) - [j24]Wenjing Zhang, Ming Li, Ravi Tandon, Hui Li:
Online Location Trace Privacy: An Information Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 14(1): 235-250 (2019) - [c73]Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li, Thidapat Chantem:
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. ACSAC 2019: 229-244 - [c72]Xiaolan Gu, Ming Li, Yang Cao, Li Xiong:
Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy. CNS 2019: 124-132 - [c71]Hanyu Quan, Hao Liu, Boyang Wang, Ming Li, Yuqing Zhang:
Randex: Mitigating Range Injection Attacks on Searchable Encryption. CNS 2019: 133-141 - [c70]Bo Jiang, Ming Li, Ravi Tandon:
Local Information Privacy with Bounded Prior. ICC 2019: 1-7 - [c69]Tianchi Zhao, Ming Li, Matthias Poloczek:
Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling. ICC 2019: 1-6 - [c68]Tianchi Zhao, Ming Li, Gregory Ditzler:
Online Reconfigurable Antenna State Selection based on Thompson Sampling. ICNC 2019: 888-893 - [c67]Mohamed Seif, Ravi Tandon, Ming Li:
Context Aware Laplacian Mechanism for Local Information Privacy. ITW 2019: 1-5 - [c66]Seth Andrews, Ryan M. Gerdes, Ming Li:
Crowdsourced measurements for device fingerprinting. WiSec 2019: 72-82 - [i7]Xiaolan Gu, Ming Li, Li Xiong, Yang Cao:
Providing Input-Discriminative Protection for Local Differential Privacy. CoRR abs/1911.01402 (2019) - [i6]Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao:
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. CoRR abs/1911.12834 (2019) - 2018
- [j23]Ming Li, Dejun Yang, Jian Lin, Ming Li, Jian Tang:
SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics. Comput. Networks 143: 176-190 (2018) - [j22]Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang:
Identity-Based Private Matching over Outsourced Encrypted Datasets. IEEE Trans. Cloud Comput. 6(3): 747-759 (2018) - [j21]Tasnuva Tithi, Bhaswati Deka, Ryan M. Gerdes, Chris Winstead, Ming Li, Kevin P. Heaslip:
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways. IEEE Trans. Veh. Technol. 67(8): 7437-7449 (2018) - [c65]Iraklis Leontiadis, Ming Li:
Storage Efficient Substring Searchable Symmetric Encryption. SCC@AsiaCCS 2018: 3-13 - [c64]Xu Chu, Na Ruan, Ming Li, Weijia Jia:
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. CNS 2018: 1-9 - [c63]Bo Jiang, Ming Li, Ravi Tandon:
Context-aware Data Aggregation with Localized Information Privacy. CNS 2018: 1-9 - [c62]Mingshun Sun, Ming Li, Ryan M. Gerdes:
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications. CNS 2018: 1-9 - [c61]Ahmed M. Salama, Ming Li, Loukas Lazos, Yong Xiao, Marwan Krunz:
On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access. DySPAN 2018: 1-10 - [c60]Mohamed Seif, Ravi Tandon, Ming Li:
On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays. ICC 2018: 1-7 - [c59]Nirnimesh Ghose, Loukas Lazos, Ming Li:
SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices. INFOCOM 2018: 1529-1537 - [c58]Mohamed Seif, Ravi Tandon, Ming Li:
On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT. ISIT 2018: 201-205 - [c57]Boris Aronov, Alon Efrat, Ming Li, Jie Gao, Joseph S. B. Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan, Jiaxin Ding:
Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World. MobiHoc 2018: 280-289 - [c56]Yanjun Pan, Ming Li, Neng Fan, Yantian Hou:
On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas. SECON 2018: 280-288 - [c55]Nirnimesh Ghose, Loukas Lazos, Ming Li:
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks. IEEE Symposium on Security and Privacy 2018: 819-835 - [c54]Islam Samy, Loukas Lazos, Yong Xiao, Ming Li, Marwan Krunz:
LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard. WISEC 2018: 87-98 - [i5]Mohamed Seif, Ravi Tandon, Ming Li:
On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT. CoRR abs/1801.03494 (2018) - [i4]Bo Jiang, Ming Li, Ravi Tandon:
Context-aware Data Aggregation with Localized Information Privacy. CoRR abs/1804.02149 (2018) - 2017
- [j20]Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou:
Location Based Handshake and Private Proximity Test with Location Tags. IEEE Trans. Dependable Secur. Comput. 14(4): 406-419 (2017) - [j19]Yantian Hou, Ming Li, Shucheng Yu:
Making Wireless Body Area Networks Robust Under Cross-Technology Interference. IEEE Trans. Wirel. Commun. 16(1): 429-440 (2017) - [c53]Seth Andrews, Ryan M. Gerdes, Ming Li:
Towards physical layer identification of cognitive radio devices. CNS 2017: 1-9 - [c52]Mingshun Sun, Ming Li, Ryan M. Gerdes:
A data trust framework for VANETs enabling false data detection and secure vehicle tracking. CNS 2017: 1-9 - [c51]Michael G. Solomon, Vaidy S. Sunderam, Li Xiong, Ming Li:
Mutually Private Location Proximity Detection with Access Control. DBSec 2017: 164-184 - [c50]Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li:
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles. DSN 2017: 499-510 - [c49]Ahmed M. Salama, Ming Li, Dejun Yang:
Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks. GLOBECOM 2017: 1-6 - [c48]Yantian Hou, Ming Li, Dejun Yang:
Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks. ICNC 2017: 155-161 - [c47]Yantian Hou, Ming Li, Kai Zeng:
Throughput optimization in multi-hop wireless networks with reconfigurable antennas. ICNC 2017: 620-626 - [c46]Minh N. B. Nguyen, Zaki Hasnain, Ming Li, Tanya Dorff, David Quinn, Sanjay Purushotham, Luciano Nocera, Paul K. Newton, Peter Kuhn, Jorge Nieva, Cyrus Shahabi:
Mining Human Mobility to Quantify Performance Status. ICDM Workshops 2017: 1172-1177 - [c45]Nirnimesh Ghose, Loukas Lazos, Ming Li:
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation. USENIX Security Symposium 2017: 433-450 - [i3]Ming Li, Dejun Yang, Jian Lin, Ming Li, Jian Tang:
SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown Statistics. CoRR abs/1710.05981 (2017) - [i2]Iraklis Leontiadis, Ming Li:
Storage Efficient Substring Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2017: 153 (2017) - [i1]Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. IACR Cryptol. ePrint Arch. 2017: 737 (2017) - 2016
- [j18]Boyang Wang, Ming Li, Haitao Wang:
Geometric Range Search on Encrypted Spatial Data. IEEE Trans. Inf. Forensics Secur. 11(4): 704-719 (2016) - [j17]Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Yiwei Thomas Hou:
Jamming Resilient Communication Using MIMO Interference Cancellation. IEEE Trans. Inf. Forensics Secur. 11(7): 1486-1499 (2016) - [j16]Yantian Hou, Ming Li, Xu Yuan, Yiwei Thomas Hou, Wenjing Lou:
Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence. IEEE Trans. Wirel. Commun. 15(8): 5328-5340 (2016) - [c44]Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. CANS 2016: 419-434 - [c43]Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang:
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets. SCC@AsiaCCS 2016: 29-36 - [c42]Yantian Hou, Ming Li, Dejun Yang:
A game theoretical approach to coexistence of heterogeneous MIMO wireless networks with interference cancellation. ICNC 2016: 1-5 - [c41]Ming Li, Dejun Yang, Jian Lin, Ming Li, Jian Tang:
SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics. INFOCOM 2016: 1-9 - [c40]Boyang Wang, Yantian Hou, Ming Li:
Practical and secure nearest neighbor search on encrypted large-scale data. INFOCOM 2016: 1-9 - [c39]Michael G. Solomon, Vaidy S. Sunderam, Li Xiong, Ming Li:
Enabling mutually private location proximity services in smart cities: A comparative assessment. ISC2 2016: 1-8 - 2015
- [j15]Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks. IEEE Internet Things J. 2(1): 52-62 (2015) - [c38]Yantian Hou, Ming Li, Ruchir Chauhan, Ryan M. Gerdes, Kai Zeng:
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice. AsiaCCS 2015: 261-272 - [c37]Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular range search on encrypted spatial data. CNS 2015: 182-190 - [c36]Cyrus Shahabi, Liyue Fan, Luciano Nocera, Li Xiong, Ming Li:
Privacy-preserving inference of social relationships from location data: a vision paper. SIGSPATIAL/GIS 2015: 9:1-9:4 - [c35]Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular Range Search on Encrypted Spatial Data. ICDCS 2015: 794-795 - 2014
- [j14]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distributed Syst. 25(1): 222-233 (2014) - [j13]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking. IEEE Trans. Parallel Distributed Syst. 25(11): 3025-3035 (2014) - [j12]Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Yiwei Thomas Hou, Chang-Tien Lu:
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 13(10): 5893-5905 (2014) - [c34]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li:
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. AsiaCCS 2014: 111-122 - [c33]Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip:
POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems. CCS 2014: 1424-1426 - [c32]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS 2014: 337-345 - [c31]Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, Wenjing Lou:
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks. INFOCOM 2014: 880-888 - [c30]Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MIMO-based jamming resilient communication in wireless networks. INFOCOM 2014: 2697-2706 - [c29]Bhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin P. Heaslip:
Friendly Jamming for Secure Localization in Vehicular Transportation. SecureComm (1) 2014: 212-221 - [c28]Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li:
Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy. SecureComm (1) 2014: 374-394 - 2013
- [j11]Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan:
BANA: Body Area Network Authentication Exploiting Channel Characteristics. IEEE J. Sel. Areas Commun. 31(9): 1803-1816 (2013) - [j10]Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. Thomas Hou:
Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4): 1-0 (2013) - [j9]Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou, Kui Ren:
Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Networks 9(2): 18:1-18:35 (2013) - [j8]Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou:
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distributed Syst. 24(1): 131-143 (2013) - [j7]Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou:
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks. IEEE Trans. Wirel. Commun. 12(5): 2024-2033 (2013) - [c27]Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. AsiaCCS 2013: 71-82 - [c26]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. CNS 2013: 504-513 - [c25]Boyang Wang, Hui Li, Ming Li:
Privacy-preserving public auditing for shared cloud data supporting group dynamics. ICC 2013: 1946-1950 - [c24]Boyang Wang, Sherman S. M. Chow, Ming Li, Hui Li:
Storing Shared Data on the Cloud via Security-Mediator. ICDCS 2013: 124-133 - [c23]Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas Hou, Chang-Tien Lu:
Non-parametric passive traffic monitoring in cognitive radio networks. INFOCOM 2013: 1240-1248 - [c22]Yantian Hou, Ming Li, Shucheng Yu:
Surviving the RF smog: Making Body Area Networks robust to cross-technology interference. SECON 2013: 353-361 - [c21]Yantian Hou, Ming Li:
Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming. WASA 2013: 440-453 - [c20]Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. WISEC 2013: 155-166 - [c19]Yantian Hou, Ming Li, Joshua D. Guttman:
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. WISEC 2013: 167-178 - 2012
- [j6]Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou, Hongqiang Zhai:
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding. IEEE J. Sel. Areas Commun. 30(2): 484-492 (2012) - [j5]Zhenyu Yang, Ming Li, Wenjing Lou:
CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding. IEEE Trans. Wirel. Commun. 11(8): 3006-3013 (2012) - [c18]Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li:
Authenticated secret key extraction using channel characteristics for body area networks. CCS 2012: 1028-1030 - [c17]Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou:
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. ESORICS 2012: 361-378 - [c16]Ming Li, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities. ICDCS Workshops 2012: 466-470 - [c15]Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. INFOCOM 2012: 900-908 - [c14]Mazda Salmanian, Ming Li:
Enabling secure and reliable policy-based routing in MANETs. MILCOM 2012: 1-7 - [c13]Ning Zhang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation. MILCOM 2012: 1-6 - [c12]Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan:
BANA: body area network authentication exploiting channel characteristics. WISEC 2012: 27-38 - 2011
- [j4]Zhenyu Yang, Ming Li, Wenjing Lou:
R-Code: Network coding-based reliable broadcast in wireless mesh networks. Ad Hoc Networks 9(5): 788-798 (2011) - [j3]Ming Li, Kai Zeng, Wenjing Lou:
Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links. Comput. Networks 55(10): 2443-2464 (2011) - [j2]Ming Li, Zhenyu Yang, Wenjing Lou:
CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding. IEEE J. Sel. Areas Commun. 29(1): 223-235 (2011) - [c11]Ning Zhang, Ming Li, Wenjing Lou:
Distributed Data Mining with Differential Privacy. ICC 2011: 1-5 - [c10]Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou:
Authorized Private Keyword Search over Encrypted Data in Cloud Computing. ICDCS 2011: 383-392 - [c9]Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-preserving multi-keyword ranked search over encrypted cloud data. INFOCOM 2011: 829-837 - [c8]Ming Li, Ning Cao, Shucheng Yu, Wenjing Lou:
FindU: Privacy-preserving personal profile matching in mobile social networks. INFOCOM 2011: 2435-2443 - [r1]Ming Li, Wenjing Lou, Kui Ren:
Secure Device Pairing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1111-1115 - 2010
- [j1]Ming Li, Wenjing Lou, Kui Ren:
Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1): 51-58 (2010) - [c7]Zhenyu Yang, Ming Li, Wenjing Lou:
CodePlay: Live multimedia streaming in VANETs using symbol-level network coding. ICNP 2010: 223-232 - [c6]Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren:
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks. INFOCOM 2010: 2651-2659 - [c5]Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou:
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. SecureComm 2010: 89-106
2000 – 2009
- 2009
- [c4]Zhenyu Yang, Ming Li, Wenjing Lou:
R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links. GLOBECOM 2009: 1-6 - [c3]Ming Li, Wenjing Lou, Kai Zeng:
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links. MASS 2009: 534-543 - [c2]Zhenyu Yang, Ming Li, Wenjing Lou:
A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks. WASA 2009: 234-243 - 2008
- [c1]Ming Li, Wenjing Lou:
Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links. QSHINE 2008: 47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint