Meng Li

Orcid: 0000-0003-3553-0813

Affiliations:
  • Hefei University of Technology, Key Laboratory of Knowledge Engineering with Big Data, Anhui, China
  • Beijing Institute of Technology, School of Computer Science and Technology, China (PhD 2019)


According to our database1, Meng Li authored at least 79 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading.
IEEE Internet Things J., October, 2024

Decentralized Fair IoT Data Trading via Searchable Proxy Re-Encryption.
IEEE Internet Things J., June, 2024

Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics.
IEEE Trans. Knowl. Data Eng., May, 2024

SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning.
IEEE Internet Things J., May, 2024

Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State.
IEEE Internet Things J., April, 2024

Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach.
IEEE Trans. Wirel. Commun., January, 2024

Phantasm: Adaptive Scalable Mining Toward Stable BlockDAG.
IEEE Trans. Serv. Comput., 2024

Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024

ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids.
IEEE Trans. Serv. Comput., 2024

Secure and Flexible Wildcard Queries.
IEEE Trans. Inf. Forensics Secur., 2024

Decentralized Threshold Signatures With Dynamically Private Accountability.
IEEE Trans. Inf. Forensics Secur., 2024

Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024

KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy From Anywhere.
IEEE Trans. Inf. Forensics Secur., 2024

Graph-Based Covert Transaction Detection and Protection in Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

HCA: Hashchain-Based Consensus Acceleration Via Re-Voting.
IEEE Trans. Dependable Secur. Comput., 2024

A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024

UPBEAT: Test Input Checks of Q# Quantum Libraries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024

Threshold Signatures with Private Accountability via Secretly Designated Witnesses.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023

An Efficient and Privacy-Preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks.
IEEE Trans. Veh. Technol., June, 2023

Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing.
ACM Trans. Database Syst., June, 2023

Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023

Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Nereus: Anonymous and Secure Ride-Hailing Service Based on Private Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Eunomia: Anonymous and Secure Vehicular Digital Forensics Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

A Comparative Evaluation of Automated Analysis Tools for Solidity Smart Contracts.
CoRR, 2023

Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey.
CoRR, 2023

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain.
CoRR, 2023

A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023

2022
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022

Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks.
IEEE Trans. Green Commun. Netw., 2022

Privacy-Preserving Navigation Supporting Similar Queries in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain.
IEEE Internet Things J., 2022

Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022

Graph Encryption for Shortest Path Queries with k Unsorted Nodes.
Proceedings of the IEEE International Conference on Trust, 2022

Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2021
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing.
IEEE Trans. Serv. Comput., 2021

Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

A Blockchain-Based Storage System With Financial Incentives for Load-balancing.
IEEE Trans. Netw. Sci. Eng., 2021

An improved steganography without embedding based on attention GAN.
Peer-to-Peer Netw. Appl., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

LEChain: A blockchain-based lawful evidence management scheme for digital forensics.
Future Gener. Comput. Syst., 2021

A blockchain-based trading system for big data.
Comput. Networks, 2021

Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

2020
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Blockchain-based anomaly detection of electricity consumption in smart grids.
Pattern Recognit. Lett., 2020

Attack-Resilient TLS Certificate Transparency.
IEEE Access, 2020

Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Blockchain-Based Trading Platform for Big Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

One-Time, Oblivious, and Unlinkable Query Processing Over Encrypted Data on Cloud.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A New Steganography Without Embedding Based on Adversarial Training.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.
IEEE Internet Things J., 2019

Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet Things J., 2019

Find me a safe zone: A countermeasure for channel state information based attacks.
Comput. Secur., 2019

Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid.
IEEE Commun. Mag., 2019

Invalidating Analysis Knowledge for Code Virtualization Protection Through Partition Diversity.
IEEE Access, 2019

Leveraging WebAssembly for Numerical JavaScript Code Virtualization.
IEEE Access, 2019

Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019

CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing.
Proceedings of the Security and Privacy in Communication Networks, 2019

WisDriver: A WiFi and Smartphone Sensing System for Safely Driving.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

New Steganalytic Features for Spatial Image Steganography Based on Non-negative Matrix Factorization.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

BanFEL: A Blockchain Based Smart Contract for Fair and Efficient Lottery Scheme.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Blockchain Technology in Internet of Things
Springer, ISBN: 978-3-030-21765-5, 2019

2018
Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid.
IEEE Wirel. Commun., 2018

Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
Secur. Commun. Networks, 2018

PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing.
IEEE Access, 2018

SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

2017
Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017

A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
A Perturbed Compressed Sensing Protocol for Crowd Sensing.
Mob. Inf. Syst., 2016

Differentially Private Publication Scheme for Trajectory Data.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

2013
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2011
An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011


  Loading...