1. Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, and Fengjun Li. The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition. In ACM Conference on Computer and Communications Security (CCS), Salt Lake City, Utah, USA, October 2024. (accepted)
    [paper]
  2. Zeyan Liu, Zijun Yao, Fengjun Li, and Bo Luo. On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing. In ACM Conference on Computer and Communications Security (CCS), Salt Lake City, Utah, USA, October 2024. (accepted)
    [paper, full version with appendix, code]
  3. Sumit Bhattai, Pramil Paudel, Zhu Li, Bo Luo, and Fengjun Li. Robust Privacy-Preserving Classification for Lensless Image. In IEEE International Conference on Mobile Ad-Hoc and Smart Systems (MASS), Seoul, South Korea, September, 2024. (accepted)
    [paper]
  4. Yuying Li, Zeyan Liu, Junyi Zhao, Liangqin Ren, Fengjun Li, Jiebo Luo, and Bo Luo. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking. In European Symposium on Research in Computer Security (ESORICS), Bydgoszcz, Poland, September 2024. (accepted)
    [paper, code]
  5. Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, and Bo Luo. Companion Apps or Backdoors? on the Security of Automotive Companion Apps. In European Symposium on Research in Computer Security (ESORICS), Bydgoszcz, Poland, September 2024. (accepted)
    [paper]
  6. Liangqin Ren, Zeyan Liu, Fengjun Li, Kaitai Liang, Zhu Li, and Bo Luo. PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption. In the 24th Privacy Enhancing Technologies Symposium (PETS), Bristol, UK, July 2024.
    [paper, code]
  7. Krushi Patel, Fengjun Li, and Guanghui Wang. Multi-Layer Dense Attention Decoder for Polyp Segmentation. In International Conference on Biomedical Engineering and Technology (ICBET), Seoul, South Korea, June 2024.
    [paper]
  8. Jiajun Shen, Fengjun Li, Morteza Hashemi, and Huazhen Fang. Model-free Resilient Controller Design based on Incentive Feedback Stackelberg Game and Q-learning. In IEEE International Conference on Industrial Cyber-Physical Systems, St. Louis, MO, USA, May 2024.
    [paper]
  9. Aozhuo Sun, Jingqiang Lin, Wei Wang, Zeyan Liu, Bingyu Li, Shushang Wen, Qiongxiao Wang, Fengjun Li. Certificate Transparency Revisited: The Public Inspections on Third-party Monitors. Network and Distributed System Security (NDSS) Symposium, San Diego, CA, USA, February 2024.
    [paper, code]
  10. Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, and Fengjun Li. Poster: Ethics of Computer Security and Privacy Research-Trends and Standards from a Data Perspective. In ACM Conference on Computer and Communications Security, 2023. (Poster).
    [paper]
  11. Zhaohui Wang, Bo Luo, and Fengjun Li. Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking. In ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI), 2023. (Poster)
    [paper, SmartAppZoo Dataset]
  12. Zeyan Liu, Fengjun Li, Zhu Li, and Bo Luo. LoneNeuron: a Highly-effective Feature-domain Neural Trojan using Invisible and Polymorphic Watermarks. In ACM SIGSAC Conference on Computer and Communications Security (CCS), Los Angeles, CA, USA, 2022.
    [paper]
  13. Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, and Bo Luo. Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 2022. (Acceptance rate: 104/562=18.5%)
    [paper]
  14. Javaria Ahmad, Fengjun Li, and Bo Luo. IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. In European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 2022. (Acceptance rate: 104/562=18.5%)
    [paper]
  15. Krushi Patel, Andrews A. Bur, Fengjun Li, and Guanghui Wang. Aggregating global features into local vision Transformer. In the 26th International Conference on Pattern Recognition (ICPR), Montreal, Quebec, Canada, August 2022.
    [paper] (Best Student Paper Award)
  16. Krushi Patel, Fengjun Li, and Guanghui Wang. FuzzyNet: A Fuzzy Attention Module for Polyp Segmentation. In NeurIPS 2022 Workshop.
    [paper, code]
  17. Wenqiang Li, Jiameng Shi, Fengjun Li, Jingqiang Lin, Wei Wang, and Le Guan. uAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware. In the 44th IEEE/ACM International Conference on Software Engineering (ICSE), Pittsburgh, PA, USA, May 21-29, 2022. (Acceptance rate: 197/691=28.5%)
    [paper]
  18. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, and Congli Wang. The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. In IEEE/ACM Transactions on Networking, vol. 30, no. 2, pp. 749-765, April 2022.
    [paper]
  19. Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, and Bo Luo. Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. In Annual Computer Security Applications Conference (ACSAC), December 2021, Online. (Acceptance rate: 80/326=24.5%)
    [paper] (Distinguished Paper Award)
  20. Sana Awan, Bo Luo, and Fengjun Li. CONTRA: Defending against Poisoning Attacks in Federated Learning. In European Symposium on Research in Computer Security (ESORICS), 2021, Online. (Acceptance rate: 71/351=20.2%)
    [paper]
  21. Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, and Bo Luo. You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. In IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), October 2021. (Acceptance rate: 28%)
    [paper]
  22. Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, and Fengjun Li. From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. In the Network and Distributed System Security Symposium (NDSS) 2021. (Acceptance rate: 15.2%)
    [paper, presentation]
  23. Bingyu Li, Fengjun Li, Ziqiang Ma, and Qianhong Wu. Exploring the Security of Certificate Transparency in the Wild. In Applied Cryptography and Network Security Workshops (ACNS), 2020.
    [paper]
  24. Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. In European Symposium on Research in Computer Security (ESORICS), 2020. (Acceptance rate: 19.6%)
    [paper, presentation]
  25. Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, and Bo Luo. WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications. In Annual Hot Topics in the Science of Security Symposium (HoTSoS), 2020, Online.
    [paper]
  26. Xing Song, Lemuel R. Waitman, Yong Hu, Bo Luo, Fengjun Li, and Mei Liu. The Impact of Medical Big Data Anonymization on Early Acute Kidney Injury Risk Prediction. In AMIA Summits on Translational Science Proceedings, May 2020.
    [paper]
  27. Qiang Zhou, Chengliang Tian, Hanlin Zhang, Jia Yu, and Fengjun Li. How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. Information Sciences, Volume 512, 2020, Pages 641-660, ISSN 0020-0255.
    [paper]
  28. Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan and Lingchen Zhang. Secure Cryptography Infrastructures in the Cloud. In IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019.
    [paper]
  29. Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang and Fengjun Li. Towards the Trust-Enhancements of Single Sign-On Services. In IEEE Conference on Dependable and Secure Computing (DSC), 2019.
    [paper]
  30. Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jin and Congli Wang. Certificate Transparency in the Wild: Exploring the Reliability of Monitor. In ACM Conference on Computer and Communications Security (CCS), London, UK, November 11-15, 2019. (Acceptance rate: 16%)
    [paper]
  31. Sana Awan, Fengjun Li, Bo Luo, and Mei Liu. A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. In ACM Conference on Computer and Communications Security (CCS), London, UK, November 2019. (Poster)
    [paper]
  32. Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang and Guangqi Liu. Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. In International Conference on Security and Privacy in Communication Networks (SecureComm), Orlando, FL, USA, October 23-25, 2019.
    [paper]
  33. Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. #DontTweetThis: Scoring Private Information in Social Networks. In the 19th Privacy Enhancing Technologies Symposium (PETS), vol 4, Stockholm, Sweden, July 15-16, 2019. (Acceptance rate: 16/91)
    [paper]
  34. Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li. Content-Aware Trust Propagation Towards Online Review Spam Detection. In ACM Journal of Data and Information Quality (JDIQ) - Special Issue on Combating Digital Misinformation and Disinformation and On the Horizon, Volume 11 Issue 3, July 2019.
    [paper]
  35. Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee and Bo Luo. Arcana: Enabling Private Posts on Public Microblog Platforms. In International Information Security and Privacy Conference (IFIP SEC), Lisbon, Portugal, June 25-27, 2019.
    [paper]
  36. S. Zhang, C. Tian, H. Zhang, J. Yu and F. Li, Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method, in IEEE Access, vol. 7, pp. 53823-53838, 2019.
    [paper]
  37. Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways. In European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 2018. (acceptance rate: 56/283=19.8%)
    [paper]
  38. Lei Yang and Fengjun Li. Cloud-Assisted Privacy-Preserving Classification for IoT Applications. In IEEE Conference on Communications and Network Security (CNS), Beijing, China, May 2018. (acceptance rate 28%)
    [paper]
  39. Pegah Nokhiz and Fengjun Li. Understanding Rating Behavior based on Moral Foundations: The case of Yelp Reviews. In Big Data Technology and Ethics Considerations in Customer Behavior and Customer Feedback Mining Workshop, IEEE BigData, Boston, MA, 2017.
    [paper]
  40. Hao Xue and Fengjun Li. Online Review Spam Detection through Content-Aware Trust Propagation. In the 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Philadelphia, PA, July 2017.
    [paper]
  41. Chung Kit Wu, Hongxu Zhu, Loi Lei Lai, Anna S. F. Chang, Fengjun Li, Kim Fung Tsang, and Roy Kalawsky. A Time-synchronized ZigBee Building Network for Smart Water Management. In the 15th IEEE International Conference on Industrial Informatics (INDIN), Emden, July 2017.
    [paper]
  42. Abdulmali Humayed, Jinqiang Lin, Fengjun Li, and Bo Luo. Cyber-Physical Systems Security -- A Survey. In IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, PP(99):1-1, 2017.
    [paper]
  43. Lei Yang and Fengjun Li. Securing Smart Grid In-Network Aggregation through False Data Detection. In EAI Transactions on Industrial Networks and Intelligent Systems – Special Issue on CI & Smart Grid Cyber Security, 17(10):e5, February, 2017.
    [paper]
  44. Hyunjin Seo, James Sterbenz, Fengjun Li and Shiva Velma, Multilevel Analysis of Networked Movements in Digital Age, in International Communication Association Conference, 2017.
    [paper]
  45. Lei Yang, Humayed Abudulmalik, and Fengjun Li. A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things, in Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, December 2016. (acceptance rate 22.8%)
    [paper]
  46. Hyunjin Seo, Fengjun Li, Roseann Pluretti, Hao Xue, and Shiva Velma, Perceptions of Online Reviews: Motivation, Sidedness, and Reviewer Information, in Journalism and Mass Communication Annual Conference, Minneapolis, MN, August 2016.
    [paper]
  47. Lei Yang and Fengjun Li. Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. In the 11th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Dallas, USA, October, 2015. (acceptance rate 27%)
    [paper] (Best Paper Award)
  48. [P] Fengjun Li, Xin Fu, and Bo Luo. A Hardware Fingerprint Using GPU Core Frequency Variations. In ACM Conference on Computer and Communications Security (CCS), Denver, CO, October 2015. (Poster)
    [paper]
  49. Lei Yang and Fengjun Li. mTor: A Multipath Tor Routing beyond Bandwidth Throttling. In IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015. (acceptance rate 28%)
    [paper]
  50. Lei Yang and Fengjun Li. Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. In IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015. (Poster)
    [paper]
  51. Hao Xue, Fengjun Li, Hyunjin Seo, and Roseann Pluretti. Trust-Aware Review Spam Detection. In the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, Helsinki, Finland, Aug 2015. (acceptance rate 28.4%)
    [paper]
  52. Hyunjin Seo, Fengjun Li, Jeongsub Lim, Roseann Pluretti, Hao Xue, and Sreenivas Kumar Vekapu, User ratings of yelp reviews: A big data analysis approach, in Association for Education in Journalism and Mass Communication Annual Conference, San Francisco, CA, August 2015.
    [paper]
  53. Hyunjin Seo, Fengjun Li, Roseann Pluretti, Hao Xue, and Sreenivas Kumar Vekapu, Perceived usefulness of online reviews: Effects of review characteristics and reviewer attributes, in Proceedings of the 65th International Communication Association Annual Conference, San Juan, Puerto Rico, May 2015.
    [paper]
  54. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, SEDB: Building Secure Database Services for Sensitive Data. In the 16th International Conference on Information and Communications Security (ICICS), Hong Kong, December 2014.
    [paper]
  55. Lei Yang, Hao Xue, Fengjun Li. Privacy-preserving Data Sharing in Smart Grid Systems. In the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, November 2014.
    [paper]
  56. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha. EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems against Faulty Clients. In the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Beijing, China, September 2014. (acceptance rate 27.6%)
    [paper]
  57. Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma. virtio-ct: A Secure Cryptographic Token Service in Hypervisors. In International Workshop on Data Protection in Mobile and Pervasive Computing (DAPRO), SecureComm, Beijing, China, 2014.
    [paper]
  58. Lei Yang and Fengjun Li. Detecting False Data Injection in Smart Grid In-Network Aggregation. In the 4th IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, Canada, October 2013.
    [paper]
  59. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. In IEEE Transactions on Information Forensics & Security, 8(6):888-900, June 2013.
    [paper]
  60. Yingying Ma and Fengjun Li. Detecting Review Spam: Challenges and Opportunities. In the Collaborative Communities for Social Computing (CCSocialComp) Workshop, IEEE CollaborateCom, Pittsburgh, PA, October 2012. (invited paper)
    [paper]
  61. Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo and Peng Liu. Stalking Online: on User Privacy in Social Networks. In ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. (acceptance rate: 18.6%)
    [paper]
  62. Fengjun Li and Bo Luo. Preserving Data Integrity for Smart Grid Data Aggregation. In IEEE Conference on Smart Grid Communications (SmartGridComm), Taina, Taiwan, Novermber, 2012.
    [paper]
  63. Fengjun Li, Xukai Zhou, Peng Liu, and Jake Y. Chen. New Threats to Health Data Privacy. In BMC Bioinformatics, 12(Suppl 12):S7, 2011.
    [paper]
  64. Fengjun Li, Bo Luo, and Peng Liu. Secure and Privacy-Preserving Information Aggregation for Smart Grids. In International Journal of Security and Networks, Special Issue on Security and Privacy in Smart Grid, 6(1):28 - 39, 2011.
    [paper]
  65. Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee, and Peng Liu. Privacy Preserving Group Linkage. In the 23rd Scientific and Statistical Database Management Conference (SSDBM), Portland, OR, USA, July 2011. (acceptance rate 12.1%)
    [paper]
  66. Fengjun Li, Bo Luo, and Peng Liu. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption. In IEEE Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, USA, October 2010.
    [paper]
  67. Fengjun Li, Jake Y. Chen, Xukai Zou, and Peng Liu. New Privacy Threats in Healthcare Informatics: When Medical Records Join the Web. In International Workshop on Data Mining in Bioinformatics (BIOKDD), Washington D.C., USA, July 2010.
    [paper]
  68. Fengjun Li, Bo Luo, Peng Liu, and Chao-Hsien Chu, A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping, in Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA, March 2010. (acceptance rate: 17.5%)
    [paper]
  69. Fengjun Li, Bo Luo, Peng Liu, Anna Squicciarini, Dongwon Lee, and Chao-Hsien Chu. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. In International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, FL, USA, November, 2008. (invited paper)
    [paper]
  70. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu. In-broker Access Control for Information Brokerage Systems. In International Journal on Intelligent Control and Systems, Special Issue on Information Assurance, 12(4):283-292, 2007.
    [paper]
  71. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu. Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering. In the 14th ACM Conference on Computer and Communication Security (CCS), Alexandria, VA, USA, October 2007. (acceptance rate: 18%)
    [paper]
  72. Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu. In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Taichung, Taiwan, June 2006. (acceptance rate: 25%)
    [paper]
  73. Wing S Wong and Fengjun Li. Fairness Indices and Distributed Control in Communication Networks. In Communication in Information and Systems, vol.6, no.2, pp.83-114, 2006.
    [paper]
  74. Wing S Wong and Fengjun Li. A Fairness Index for Communication Networks. In Lecture Notes in Control and Information Sciences - New Directions and Applications in Control Theory, vol 321. pp. 389-400, September 2005.
    [paper]