Ming Li
Orcid: 0000-0002-4073-0273Affiliations:
- University of Arizona, Tucson, AZ, USA
- Utah State University, Logan, UT, USA (2011 - 2015)
- Worcester Polytechnic Institute, MA, USA (PhD 2011)
According to our database1,
Ming Li
authored at least 145 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification.
IEEE Trans. Mob. Comput., May, 2024
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures.
ACM Trans. Cyber Phys. Syst., April, 2024
Exploiting Successive Interference Cancellation for Spectrum Sharing Over Unlicensed Bands.
IEEE Trans. Mob. Comput., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
2023
Comput. Secur., December, 2023
IEEE Trans. Mob. Comput., August, 2023
Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns.
IEEE Internet Things J., August, 2023
IEEE Trans. Inf. Forensics Secur., 2023
DP-BREM: Differentially-Private and Byzantine-Robust Federated Learning with Client Momentum.
CoRR, 2023
Fair Coexistence of Heterogeneous Networks: A Novel Probabilistic Multi-Armed Bandit Approach.
Proceedings of the 21st International Symposium on Modeling and Optimization in Mobile, 2023
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
2022
IEEE Trans. Mob. Comput., 2022
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach.
IEEE Trans. Inf. Forensics Secur., 2022
Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Online Learning-Based Reconfigurable Antenna Mode Selection Exploiting Channel Correlation.
IEEE Trans. Wirel. Commun., 2021
Int. J. Inf. Sec., 2021
PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy.
CoRR, 2021
Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test.
CoRR, 2021
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
Impacts of Constrained Sensing and Communication Based Attacks on Vehicular Platoons.
IEEE Trans. Veh. Technol., 2020
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cloud Comput., 2020
GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Proceedings of the 29th USENIX Security Symposium, 2020
GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020
Proceedings of the IEEE International Symposium on Information Theory, 2020
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Cogn. Commun. Netw., 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Cloud Comput., 2018
Comput. Networks, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018
On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
IEEE Trans. Wirel. Commun., 2017
IEEE Trans. Dependable Secur. Comput., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence.
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Enabling mutually private location proximity services in smart cities: A comparative assessment.
Proceedings of the IEEE International Smart Cities Conference, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
A game theoretical approach to coexistence of heterogeneous MIMO wireless networks with interference cancellation.
Proceedings of the 2016 International Conference on Computing, 2016
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet Things J., 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Privacy-preserving inference of social relationships from location data: a vision paper.
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2015
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wirel. Commun., 2013
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2013
Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013
IEEE J. Sel. Areas Commun., 2013
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
Surviving the RF smog: Making Body Area Networks robust to cross-technology interference.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEEE Trans. Wirel. Commun., 2012
Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2011
Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011
Ad Hoc Networks, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
Proceedings of the Wireless Algorithms, 2009
OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008