Publications

list | by year | by topic

  1. [C] Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan and Lingchen Zhang, "Secure Cryptography Infrastructures in the Cloud," to appear in 2019 IEEE GLOBECOM.
  2. [C] Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jin and Congli Wang, "Certificate Transparency in the Wild: Exploring the Reliability of Monitor," in ACM CCS, London, UK, Nov 11-15, 2019.
  3. [C] Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang and Guangqi Liu, "Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs," in SecureComm, Orlando, October 23-25, 2019.
  4. [C] Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo, "#DontTweetThis: Scoring Private Information in Social Networks," in the 19th Privacy Enhancing Technologies Symposium (PETS), vol 4, Stockholm, Sweden, July 15-16, 2019. (Acceptance rate: 16/91)
  5. [J] Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li, "Content-Aware Trust Propagation Towards Online Review Spam Detection," in ACM Journal of Data and Information Quality (JDIQ) - Special Issue on Combating Digital Misinformation and Disinformation and On the Horizon, Volume 11 Issue 3, July 2019.
  6. [C] Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee and Bo Luo, "Arcana: Enabling Private Posts on Public Microblog Platforms," in the 34rd International Information Security and Privacy Conference (IFIP SEC), Lisbon, Portugal, June 25-27, 2019.
  7. [J] S. Zhang, C. Tian, H. Zhang, J. Yu and F. Li, "Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method," in IEEE Access, vol. 7, pp. 53823-53838, 2019.
  8. [C] Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li, "Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways," in European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 2018. (acceptance rate: 56/283=19.8%)
  9. [C] Lei Yang and Fengjun Li, "Cloud-Assisted Privacy-Preserving Classification for IoT Applications," in IEEE Conference on Communications and Network Security (CNS), Beijing, China, May 2018. (acceptance rate 28%)
  10. [W] Pegah Nokhiz and Fengjun Li, "Understanding Rating Behavior based on Moral Foundations: The case of Yelp Reviews," in Big Data Technology and Ethics Considerations in Customer Behavior and Customer Feedback Mining Workshop, IEEE BigData, Boston, MA, 2017.
  11. [C] Hao Xue and Fengjun Li, "Online Review Spam Detection through Content-Aware Trust Propagation," in the 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Philadelphia, PA, July 2017.
  12. [C] Chung Kit Wu, Hongxu Zhu, Loi Lei Lai, Anna S. F. Chang, Fengjun Li, Kim Fung Tsang, and Roy Kalawsky, "A Time-synchronized ZigBee Building Network for Smart Water Management," in 15th IEEE International Conference on Industrial Informatics (INDIN), Emden, July 2017
  13. [J] Abdulmali Humayed, Jinqiang Lin, Fengjun Li, and Bo Luo, "Cyber-Physical Systems Security -- A Survey," in IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, PP(99):1-1, 2017.
  14. [J] Lei Yang and Fengjun Li, "Securing Smart Grid In-Network Aggregation through False Data Detection," in EAI Transactions on Industrial Networks and Intelligent Systems – Special Issue on CI & Smart Grid Cyber Security, 17(10):e5, February, 2017.
  15. [C] Hyunjin Seo, James Sterbenz, Fengjun Li and Shiva Velma, "Multilevel Analysis of Networked Movements in Digital Age," in International Communication Association Conference, 2017.
  16. [C] Lei Yang, Humayed Abudulmalik, and Fengjun Li, "A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things," in Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, December 2016. (acceptance rate 22.8%)
  17. [C] Hyunjin Seo, Fengjun Li, Roseann Pluretti, Hao Xue, and Shiva Velma, "Perceptions of Online Reviews: Motivation, Sidedness, and Reviewer Information," in Journalism and Mass Communication Annual Conference, Minneapolis, MN, August 2016.
  18. [C] Lei Yang and Fengjun Li, "Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing," in the 11th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Dallas, USA, October, 2015. (acceptance rate 27%, Best Paper Award Winner)
  19. [P] Fengjun Li, Xin Fu, and Bo Luo, "A Hardware Fingerprint Using GPU Core Frequency Variations," in ACM Conference on Computer and Communications Security (CCS), Denver, CO, October 2015. (Poster)
  20. [C] Lei Yang and Fengjun Li, "mTor: A Multipath Tor Routing beyond Bandwidth Throttling," in IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015. (acceptance rate 28%)
  21. [P] Lei Yang and Fengjun Li, "Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing," In IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015. (Poster)
  22. [C] Hao Xue, Fengjun Li, Hyunjin Seo, and Roseann Pluretti, "Trust-Aware Review Spam Detection," in the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, Helsinki, Finland, Aug 2015. (acceptance rate 28.4%)
  23. [C] Hyunjin Seo, Fengjun Li, Jeongsub Lim, Roseann Pluretti, Hao Xue, and Sreenivas Kumar Vekapu, "User ratings of yelp reviews: A big data analysis approach," in Association for Education in Journalism and Mass Communication Annual Conference, San Francisco, CA, August 2015.
  24. [C] Hyunjin Seo, Fengjun Li, Roseann Pluretti, Hao Xue, and Sreenivas Kumar Vekapu, "Perceived usefulness of online reviews: Effects of review characteristics and reviewer attributes," in Proceedings of the 65th International Communication Association Annual Conference, San Juan, Puerto Rico, May 2015.
  25. [C] Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, "SEDB: Building Secure Database Services for Sensitive Data," in the 16th International Conference on Information and Communications Security (ICICS), Hong Kong, December 2014.
  26. [C] Lei Yang, Hao Xue, Fengjun Li, "Privacy-preserving Data Sharing in Smart Grid Systems," in the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, November 2014.
  27. [C] Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha, "EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients," in the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Beijing, China, September 2014. (acceptance rate 27.6%)
  28. [W] Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma, "virtio-ct: A Secure Cryptographic Token Service in Hypervisors," in International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO), SecureComm, Beijing, China, September 2014.
  29. [C] Lei Yang and Fengjun Li, "Detecting False Data Injection in Smart Grid In-Network Aggregation," in the 4th IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, Canada, October 2013.
  30. [J] Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu, "Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing," in IEEE Transactions on Information Forensics & Security, 8(6):888-900, June 2013.
  31. [W] Yingying Ma and Fengjun Li, "Detecting Review Spam: Challenges and Opportunities," in the Collaborative Communities for Social Computing (CCSocialComp) Workshop, IEEE CollaborateCom, Pittsburgh, PA, October 2012. (invited)
  32. [C] Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo and Peng Liu, "Stalking Online: on User Privacy in Social Networks," in ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. (acceptance rate: 18.6%)
  33. [C] Fengjun Li and Bo Luo, "Preserving Data Integrity for Smart Grid Data Aggregation," in Proceedings of the 3rd IEEE Conference on Smart Grid Communications (SmartGridComm), Taina, Taiwan, Novermber, 2012.
  34. [J] Fengjun Li, Xukai Zhou, Peng Liu, and JakeY. Chen, "New Threats to Health Data Privacy," in BMC Bioinformatics, 12(Suppl 12):S7, 2011.
  35. [J] Fengjun Li, Bo Luo, and Peng Liu, "Secure and Privacy-Preserving Information Aggregation for Smart Grids," in International Journal of Security and Networks, Special Issue on Security and Privacy in Smart Grid, 6(1):28 - 39, 2011.
  36. [C] Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, and Peng Liu, "Privacy Preserving Group Linkage," in the 23rd Scientific and Statistical Database Management Conference (SSDBM), Portland, OR, July 2011. (acceptance rate 12.1%)
  37. [C] Fengjun Li, Bo Luo, and Peng Liu, "Secure Information Aggregation for Smart Grids Using Homomorphic Encryption," in Proceedings of the 1st IEEE Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, October 2010.
  38. [W] Fengjun Li, Jake Y. Chen, Xukai Zou, and Peng Liu, "New Privacy Threats in Healthcare Informatics: When Medical Records Join the Web," in Proceedings of the 9th International Workshop on Data Mining in Bioinformatics (BIOKDD), Washington D.C., July 2010. (short paper)
  39. [C] Fengjun Li, Bo Luo, Peng Liu, and Chao-Hsien Chu, "A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping," in Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010. (acceptance rate: 17.5%)
  40. [C] Fengjun Li, Bo Luo, Peng Liu, Anna Squicciarini, Dongwon Lee, and Chao-Hsien Chu, "Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering," in Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, FL, November, 2008. (invited)
  41. [J] Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu, "In-broker Access Control for Information Brokerage Systems," in International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 12(4):283-292, 2007.
  42. [C] Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu, "Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering," in Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS), Alexandria, VA, October 2007. (acceptance rate: 18%)
  43. [C] Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu, "In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems," in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006. (acceptance rate: 25%)
  44. [J] Wing S Wong, and Fengjun Li, "Fairness Indices and Distributed Control in Communication Networks," in Communication in Information and Systems, vol.6, no.2, pp.83-114, 2006.
  45. [C] Wing S Wong and Fengjun Li, "A Fairness Index for Communication Networks," in Lecture Notes in Control and Information Sciences - New Directions and Applications in Control Theory, vol 321. pp. 389-400, September 2005.

Book Chapters

  1. Bin Xie, Bo Luo, and Fengjun Li. Website Construction Under Linux. Mechanical Industry Publishing House of China, ISBN 7-111-08156-0, May 2000. (Chinese)