Yufeng Li

Orcid: 0000-0002-7279-1783

Affiliations:
  • Shanghai University, School of Computer Engineering and Science, Shanghai, China
  • Purple Mountain Laboratories, Nanjing, China


According to our database1, Yufeng Li authored at least 32 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Quantitative risk assessment for connected automated Vehicles: Integrating improved STPA-SafeSec and Bayesian network.
Reliab. Eng. Syst. Saf., 2025

A trust model for VANETs using malicious-aware multiple routing.
Comput. Secur., 2025

2024
Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes.
Sensors, May, 2024

Complying with ISO 26262 and ISO/SAE 21434: A Safety and Security Co-Analysis Method for Intelligent Connected Vehicle.
Sensors, March, 2024

In-Vehicle Digital Forensics for Connected and Automated Vehicles With Public Auditing.
IEEE Internet Things J., February, 2024

Hardware Secure Module Based Lightweight Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Inf. Forensics Secur., 2024

SISSA: Real-Time Monitoring of Hardware Functional Safety and Cybersecurity With In-Vehicle SOME/IP Ethernet Traffic.
IEEE Internet Things J., 2024

Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system.
Comput. Secur., 2024

2023
Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting.
Comput. Secur., November, 2023

Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light.
Comput. Secur., September, 2023

Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs.
Future Internet, May, 2023

Dynamic Heterogeneous Redundancy-Based Joint Safety and Security for Connected Automated Vehicles: Preliminary Simulation and Field Test Results.
IEEE Veh. Technol. Mag., 2023

Integrated safety and security enhancement of connected automated vehicles using DHR architecture.
Secur. Saf., 2023

Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

EAVA: Adaptive and Fast Edge-assisted Video Analytics On Mobile Device.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

WiDual: User Identified Gesture Recognition Using Commercial WiFi.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
QoS-Aware Joint Task Scheduling and Resource Allocation in Vehicular Edge Computing.
Sensors, 2022

Conditional Anonymous Authentication With Abuse-Resistant Tracing and Distributed Trust for Internet of Vehicles.
IEEE Internet Things J., 2022

A Reusable Convolutional Accelerator for CNN on Resource-limited FPGA.
Proceedings of the IEEE Smartworld, 2022

Towards Fast and Energy-Efficient Offloading for Vehicular Edge Computing.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Privacy protection scheme for edge computing based on function encryption.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Neural Adaptive IoT Streaming Analytics with RL-Adapt.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2019
An Optimization Method for Intrusion Detection Classification Model Based on Deep Belief Network.
IEEE Access, 2019

A Novel Software-Defined Convolutional Neural Networks Accelerator.
IEEE Access, 2019

A Backdoor Attack Against LSTM-Based Text Classification Systems.
IEEE Access, 2019

DIN: A Bio-Inspired Distributed Intelligence Networking.
Proceedings of the Network and Parallel Computing, 2019

Identity authentication on mobile devices using face verification and ID image recognition.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

2018
<i>Research Notes</i>: Distributed Shadow for Router Security Defense.
Int. J. Softw. Eng. Knowl. Eng., 2018

2008
Compensation Buffer Sizing for Providing User-Level QoS Guarantee of Media Flows.
Proceedings of IEEE International Conference on Communications, 2008

A Forwarding Approach for Routers Supporting PIM-SM in the IPv6 Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Design and Buffer Sizing of TCAM-Based Pipelined Forwarding Engines.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Analysis of the Centralized Algorithm and the Distributed Algorithm for Parallel Packet Switch.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006


  Loading...