Fengjun Li
Orcid: 0000-0003-4079-2228
According to our database1,
Fengjun Li
authored at least 83 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Proc. Priv. Enhancing Technol., 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Model-free Resilient Controller Design based on Incentive Feedback Stackelberg Game and Q-learning.
Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems, 2024
Proceedings of the 14th International Conference on Biomedical Engineering and Technology, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
A hybrid computing framework for risk-oriented reliability analysis in dynamic PSA context: A case study.
Qual. Reliab. Eng. Int., December, 2023
Preassigned-time projective synchronization of delayed fully quaternion-valued discontinuous neural networks with parameter uncertainties.
Neural Networks, August, 2023
CoRR, 2023
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023
Proceedings of the International Conference on Electronics, 2023
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022
Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Preassigned-Time Synchronization of Delayed Fuzzy Cellular Neural Networks with Discontinuous Activations.
Neural Process. Lett., 2022
Learning Generalizable Latent Representations for Novel Degradations in Super-Resolution.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021
CoRR, 2021
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps.
Proceedings of the 20th IEEE International Conference on Trust, 2021
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Integrated nonlinear robust adaptive control for active front steering and direct yaw moment control systems with uncertainty observer.
Trans. Inst. Meas. Control, 2020
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020
WOLF: automated machine learning workflow management framework for malware detection and other applications.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proc. Priv. Enhancing Technol., 2019
ACM J. Data Inf. Qual., 2019
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
A multi-cloud based privacy-preserving data publishing scheme for the internet of things.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Enhancing traffic analysis resistance for Tor hidden services with multipath routing.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
2012
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Int. J. Secur. Networks, 2011
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011
Proceedings of the Scientific and Statistical Database Management, 2011
2010
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
Proceedings of the Sixth International Symposium on Neural Networks, 2009
2008
Proceedings of the Advances in Neural Networks, 2008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008
2007
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Commun. Inf. Syst., 2006
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006