Fengjun Li

Orcid: 0000-0003-4079-2228

According to our database1, Fengjun Li authored at least 83 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps.
Proc. Priv. Enhancing Technol., 2025

2024
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Proc. Priv. Enhancing Technol., 2024

Certificate Transparency Revisited: The Public Inspections on Third-party Monitors.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Model-free Resilient Controller Design based on Incentive Feedback Stackelberg Game and Q-learning.
Proceedings of the 7th IEEE International Conference on Industrial Cyber-Physical Systems, 2024

Multi-Layer Dense Attention Decoder for Polyp Segmentation.
Proceedings of the 14th International Conference on Biomedical Engineering and Technology, 2024

Companion Apps or Backdoors? On the Security of Automotive Companion Apps.
Proceedings of the Computer Security - ESORICS 2024, 2024

The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking.
Proceedings of the Computer Security - ESORICS 2024, 2024

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A hybrid computing framework for risk-oriented reliability analysis in dynamic PSA context: A case study.
Qual. Reliab. Eng. Int., December, 2023

Preassigned-time projective synchronization of delayed fully quaternion-valued discontinuous neural networks with parameter uncertainties.
Neural Networks, August, 2023

Siamese Graph Learning for Semi-Supervised Age Estimation.
IEEE Trans. Multim., 2023

Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT.
CoRR, 2023

Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Research on a high-performance domestic intelligent cockpit interaction platform.
Proceedings of the International Conference on Electronics, 2023

Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022

Interpreting Adversarial Examples and Robustness for Deep Learning-Based Auto-Driving Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Generative Memory-Guided Semantic Reasoning Model for Image Inpainting.
IEEE Trans. Circuits Syst. Video Technol., 2022

Some Fixed Point Results in E-Metric Spaces and an Application.
Symmetry, 2022

Preassigned-Time Synchronization of Delayed Fuzzy Cellular Neural Networks with Discontinuous Activations.
Neural Process. Lett., 2022

μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware.
CoRR, 2022

Learning Generalizable Latent Representations for Novel Degradations in Super-Resolution.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

$\mu AFL$: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Aggregating Global Features into Local Vision Transformer.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.
Proceedings of the Computer Security - ESORICS 2022, 2022

LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021

UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services.
CoRR, 2021

You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps.
Proceedings of the 20th IEEE International Conference on Trust, 2021

From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Exploiting Invariance of Mining Facial Landmarks.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

CONTRA: Defending Against Poisoning Attacks in Federated Learning.
Proceedings of the Computer Security - ESORICS 2021, 2021

Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Integrated nonlinear robust adaptive control for active front steering and direct yaw moment control systems with uncertainty observer.
Trans. Inst. Meas. Control, 2020

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020

WOLF: automated machine learning workflow management framework for malware detection and other applications.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Proceedings of the Computer Security - ESORICS 2020, 2020

Exploring the Security of Certificate Transparency in the Wild.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
#DontTweetThis: Scoring Private Information in Social Networks.
Proc. Priv. Enhancing Technol., 2019

Content-Aware Trust Propagation Toward Online Review Spam Detection.
ACM J. Data Inf. Qual., 2019

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019

Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs.
Proceedings of the Security and Privacy in Communication Networks, 2019

Arcana: Enabling Private Posts on Public Microblog Platforms.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Secure Cryptography Infrastructures in the Cloud.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Towards the Trust-Enhancements of Single Sign-On Services.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways.
Proceedings of the Computer Security, 2018

Cloud-Assisted Privacy-Preserving Classification for IoT Applications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Cyber-Physical Systems Security - A Survey.
IEEE Internet Things J., 2017

Securing Smart Grid In-Network Aggregation through False Data Detection.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2017

A time-synchronized ZigBee building network for smart water management.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

A Content-Aware Trust Index for Online Review Spam Detection.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Understanding rating behavior based on moral foundations: The case of Yelp reviews.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
A multi-cloud based privacy-preserving data publishing scheme for the internet of things.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Trust-Aware Review Spam Detection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Enhancing traffic analysis resistance for Tor hidden services with multipath routing.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

mTor: A multipath Tor routing beyond bandwidth throttling.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Privacy-preserving data sharing in Smart Grid systems.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

virtio-ct: A Secure Cryptographic Token Service in Hypervisors.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

SEDB: Building Secure Database Services for Sensitive Data.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
IEEE Trans. Inf. Forensics Secur., 2013

Detecting false data injection in smart grid in-network aggregation.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

2012
Preserving data integrity for smart grid data aggregation.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Detecting review spam: Challenges and opportunities.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Stalking online: on user privacy in social networks.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Secure and privacy-preserving information aggregation for smart grids.
Int. J. Secur. Networks, 2011

New threats to health data privacy.
BMC Bioinform., 2011

Application of Generalized Chebyshev Neural Network in Air Quality Prediction.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Privacy Preserving Group Linkage.
Proceedings of the Scientific and Statistical Database Management, 2011

2010
Air Quality Prediction in Yinchuan by Using Neural Networks.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Approximation to Nonlinear Discrete-Time Systems by Recurrent Neural Networks.
Proceedings of the Sixth International Symposium on Neural Networks, 2009

2008
Function Approximation by Neural Networks.
Proceedings of the Advances in Neural Networks, 2008

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Fairness Indices and Distributed Control in Communication Networks.
Commun. Inf. Syst., 2006

In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems.
Proceedings of the IEEE International Conference on Sensor Networks, 2006


  Loading...