Ming Li
- Professor, Electrical and Computer Engineering
- Member of the Graduate Faculty
Contact
- (520) 621-2434
- Electrical & Computer Engr, Rm. 230
- Tucson, AZ 85721
- lim@arizona.edu
Biography
Ming Li (S'08-M'11) received the PhD degree in electrical and computer engineering from Worcester Polytechnic Institute, the ME and BE degrees in electronic and information engineering from Beihang University, China. He joined the Computer Science Department, Utah State University, as an assistant professor in 2011. His research interests include the general areas of cyber security and privacy, with current emphases on data security and privacy in cloud computing, security in wireless networks and cyber-physical systems. He is a member of IEEE and ACM. |
Awards
- IEEE; TPC Member Award
- Distinguished TPC Member Award, IEEE INFOCOM, 2018, 2020, 2021, Spring 2021
- Best Paper Award
- ACM WiSec 2020, Spring 2020
- Distinguished Scholar Award
- Craig M. Berge Dean's Faculty Fellowship, The University of Arizona, Spring 2020
- The University of Arizona, Spring 2019
- 100 Distinguished TPC Member Award
- IEEE INFOCOM 2018, Spring 2018
- IEEE Senior Member
- IEEE, Spring 2017
- ONR Young Investigator Program (YIP) Award
- Office of Naval Research, Spring 2016
- Blue Sky Ideas Best Paper Award
- Fall 2015
- AFOSR Summer Faculty Fellowship Program
- Spring 2015
- NSF CAREER Award
- Spring 2014
- Top Reviewer, Certificate
- Spring 2014
Interests
No activities entered.
Courses
2024-25 Courses
-
Dissertation
ECE 920 (Spring 2025) -
Fund Info and Network Security
ECE 471 (Spring 2025) -
Fund Info and Network Security
ECE 571 (Spring 2025) -
Dissertation
ECE 920 (Fall 2024)
2023-24 Courses
-
Dissertation
ECE 920 (Spring 2024) -
Fund Info and Network Security
ECE 471 (Spring 2024) -
Fund Info and Network Security
ECE 571 (Spring 2024) -
Adv Tpc:Electrical Engr
ECE 696B (Fall 2023) -
Colloquium
ECE 695 (Fall 2023) -
Dissertation
ECE 920 (Fall 2023) -
Research
ECE 900 (Fall 2023)
2022-23 Courses
-
Dissertation
ECE 920 (Spring 2023) -
Fund Info and Network Security
ECE 471 (Spring 2023) -
Fund Info and Network Security
ECE 571 (Spring 2023) -
Dissertation
ECE 920 (Fall 2022)
2021-22 Courses
-
Dissertation
ECE 920 (Spring 2022) -
Fund Info and Network Security
ECE 471 (Spring 2022) -
Fund Info and Network Security
ECE 571 (Spring 2022) -
Dissertation
ECE 920 (Fall 2021)
2020-21 Courses
-
Dissertation
ECE 920 (Spring 2021) -
Fund Info and Network Security
ECE 471 (Spring 2021) -
Fund Info and Network Security
ECE 571 (Spring 2021) -
Adv Tpc:Electrical Engr
ECE 696B (Fall 2020) -
Dissertation
ECE 920 (Fall 2020)
2019-20 Courses
-
Dissertation
ECE 920 (Spring 2020) -
Fund Info and Network Security
ECE 471 (Spring 2020) -
Fund Info and Network Security
ECE 571 (Spring 2020) -
Dissertation
ECE 920 (Fall 2019)
2018-19 Courses
-
Dissertation
ECE 920 (Spring 2019) -
Fund Info and Network Security
ECE 471 (Spring 2019) -
Fund Info and Network Security
ECE 571 (Spring 2019) -
Dissertation
ECE 920 (Fall 2018) -
Fund Of Computer Network
ECE 478 (Fall 2018) -
Fund Of Computer Network
ECE 578 (Fall 2018) -
Honors Thesis
MATH 498H (Fall 2018) -
Research
ECE 900 (Fall 2018)
2017-18 Courses
-
Dissertation
ECE 920 (Spring 2018) -
Fund Info and Network Security
ECE 471 (Spring 2018) -
Fund Info and Network Security
ECE 571 (Spring 2018) -
Dissertation
ECE 920 (Fall 2017) -
Research
ECE 900 (Fall 2017)
2016-17 Courses
-
Dissertation
ECE 920 (Spring 2017) -
Fund Info and Network Security
ECE 471 (Spring 2017) -
Fund Info and Network Security
ECE 571 (Spring 2017) -
Research
ECE 900 (Spring 2017) -
Dissertation
ECE 920 (Fall 2016) -
Research
ECE 900 (Fall 2016)
2015-16 Courses
-
Computer Program Engr Apps II
ECE 275 (Spring 2016) -
Dissertation
ECE 920 (Spring 2016) -
Independent Study
ECE 699 (Spring 2016)
Scholarly Contributions
Chapters
- Pan, Y., Li, M., Hou, Y., Gerdes, R. M., & Cetiner, B. A. (2019). Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas. In Proactive and Dynamic Network Defense(pp 115--137). Springer, Cham.
- Li, M., Lou, W., & Ren, K. (2011). Secure device pairing. In Encyclopedia of Cryptography and Security(pp 1111--1115). Springer US.
Journals/Publications
- Leontiadis, I., & Li, M. (2021). Secure and collusion-resistant data aggregation from convertible tags. International Journal of Information Security, 20(1), 1--20.
- Ghose, N., Lazos, L., & Li, M. (2020). In-band Secret-Free Pairing for COTS Wireless Devices. IEEE Transactions on Mobile Computing.
- Jiang, B. o., Li, M., & Tandon, R. (2020). Local information privacy and its application to privacy-preserving data aggregation. IEEE Transactions on Dependable and Secure Computing.
- Man, Y., Li, M., & Gerdes, R. (2020). GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems. arXiv preprint arXiv:2001.07792.
- Sun, M., Al-Hashimi, A., Li, M., & Gerdes, R. (2020). Impacts of constrained sensing and communication based attacks on vehicular platoons. IEEE transactions on vehicular technology, 69(5), 4773--4787.
- Wang, B., Hou, Y., & Li, M. (2020). QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data. IEEE Transactions on Cloud Computing.
- Zhang, W., Jiang, B. o., Li, M., Tandon, R., Liu, Q., & Li, H. (2020). Aggregation-based location privacy: An information theoretic approach. Computers \& Security, 97, 101953.
- Salama, A. M., Li, M., Lazos, L., Xiao, Y., & Krunz, M. (2019). Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access. IEEE Transactions on Cognitive Communications and Networking, 5(3), 611--624.
- Seif, M., Tandon, R., & Li, M. (2019). Secure retrospective interference alignment. Entropy, 21(11), 1092.
- Li, M., Yang, D., Lin, J., & Tang, J. (2018). SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics. Computer Networks, 143, 176--190.
- Tithi, T., Deka, B., Gerdes, R. M., Winstead, C., Li, M., & Heaslip, K. (2018). Analysis of friendly jamming for secure location verification of vehicles for intelligent highways. IEEE Transactions on Vehicular Technology, 67(8), 7437--7449.
- Zhang, W., Li, M., Tandon, R., & Li, H. (2018). Online location trace privacy: An information theoretic approach. IEEE Transactions on Information Forensics and Security, 14(1), 235--250.
- Victors, J., Li, M., & Fu, X. (2017). The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services. the Proceedings on Privacy Enhancing Technologies (PoPETS), 2017(1), 1--21.
- Hou, Y., Li, M., & Yu, S. (2016). Making Wireless Body Area Networks Robust under Cross-Technology Interference. IEEE Transactions on Wireless Communications.
- Hou, Y., Li, M., Yuan, X., Hou, Y. T., & Lou, W. (2016). Cooperative Interference Mitigation for Heterogeneous Multi-hop Wireless Networks Coexistence. IEEE Transactions on Wireless Communications.
- Wang, B., Li, M., & Wang, H. (2016). Geometric Range Search on Encrypted Spatial Data. IEEE Transactions on Information Forensics and Security, 11(4), 704--719.
- Yan, Q., Zeng, H., Jiang, T., Li, M., Lou, W., & Hou, Y. T. (2016). Jamming Resilient Communication Using MIMO Interference Cancellation. IEEE Transactions on Information Forensics and Security, 11(7), 1486--1499.
- Qiu, S., Liu, J., Shi, Y., Li, M., & Wang, W. (2015). Identity-Based Private Matching over Outsourced Encrypted Datasets. IEEE Transactions on Cloud Computing.
- Shi, L., Yuan, J., Yu, S., & Li, M. (2015). MASK-BAN: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks. IEEE Internet of Things Journal, 2(1), 52--62.
- Zheng, Y., Li, M., Lou, W., & Hou, T. (2015). Location Based Handshake and Private Proximity Test with Location Tags. IEEE Transactions on on Dependable and Secure Computing.
- Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1), 222--233.
- Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., & Li, H. (2014). Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Transactions on Parallel and Distributed Systems, 25(11), 3025--3035.
- Yan, Q., Li, M., Chen, F., Jiang, T., Lou, W., Hou, T., & Lu, C. (2014). SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Network. IEEE Transactions on Wireless Communications.
- Li, M., Yu, S., Cao, N., & Lou, W. (2013). Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Transactions on Wireless Communications, 12(5), 2024--2033.
- Li, M., Yu, S., Guttman, J. D., Lou, W., & Ren, K. (2013). Secure ad hoc trust initialization and key management in wireless body area networks. ACM Transactions on sensor Networks (TOSN), 9(2), 18.
- Li, M., Yu, S., Ren, K., Lou, W., & Hou, Y. T. (2013). Toward privacy-assured and searchable cloud data storage services. IEEE Network, 27(4), 56--62.
- Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), 131--143.
- Yan, Q., Li, M., Yang, Z., Lou, W., & Zhai, H. (2012). Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding. IEEE Journal on Selected Areas in Communications, 30(2), 484--492.
- Yang, Z., Li, M., & Lou, W. (2012). CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 11(8).
- Li, M., Yang, Z., & Lou, W. (2011). Codeon: Cooperative popular content distribution for vehicular networks using symbol level network coding. IEEE Journal on Selected Areas in Communications, 29(1), 223--235.
- Li, M., Zeng, K., & Lou, W. (2011). Opportunistic broadcast of event-driven warning messages in vehicular ad hoc networks with lossy links. Computer Networks, 55(10), 2443--2464.
- Yang, Z., Li, M., & Lou, W. (2011). R-Code: Network coding-based reliable broadcast in wireless mesh networks. Ad Hoc Networks, 9(5), 788--798.
- Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless Communications, 17(1), 51--58.
- Liu, F., Zhao, H., Li, M., Ren, F., & Zhu, Y. (2010). Adaptive local routing strategy on a scale-free network. Chinese Physics B, 19(4), 0513.
- Li, M., Liu, F., & Ren, F. (2007). Routing strategy on a two-dimensional small-world network model. Physical Review E, 75(6), 066115.
Proceedings Publications
- Gu, X., Li, M., Cheng, Y., Xiong, L. i., & Cao, Y. (2020). $\{$PCKV$\}$: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. In 29th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 20).
- Gu, X., Li, M., Cheng, Y., Xiong, L., & Cao, Y. (2020, Fall). PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. In 2020 USENIX Security Symposium, 1-18.More infoBoston, MA 2019 Nov;1–18
- Gu, X., Li, M., Xiong, L. i., & Cao, Y. (2020). Providing input-discriminative protection for local differential privacy. In 2020 IEEE 36th International Conference on Data Engineering (ICDE).
- Gu, X., Li, M., Xiong, L., & Cao, Y. (2020, Spring). Providing Input-Discriminative Protection for Local Differential Privacy. In IEEE International Conference on Data Engineering (ICDE 2020).
- Krunz, M., Xiao, Y., Lazos, L., Li, M., & Salama, A. M. (2020, Spring 2020). “Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users. In IEEE International Conference on Communications (IEEE ICC), 1-7.
- Liu, T., Liu, Z., Liu, Q. i., Wen, W., Xu, W., & Li, M. (2020). StegoNet: Turn Deep Neural Network into a Stegomalware. In Annual Computer Security Applications Conference.
- Man, Y., Li, M., & Gerdes, R. (2020). GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ($\{$RAID$\}$ 2020).
- Melcher, J. L., Zheng, Y., Anthony, D., Troglia, M., Yang, T., Yang, A., Aggelopoulos, S., Pan, Y., & Li, M. (2020). iJam with channel randomization. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.
- Pan, Y., Efrat, A., Li, M., Wang, B., Quan, H., Mitchell, J., Gao, J., & Arkin, E. (2020). Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. In Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing.
- Pan, Y., Zheng, Y., & Li, M. (2020). ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications.
- Salama, A. M., Li, M., Lazos, L., Xiao, Y., & Krunz, M. (2020). Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users. In ICC 2020-2020 IEEE International Conference on Communications (ICC).
- Seif, M., Tandon, R., & Li, M. (2020). Wireless federated learning with local differential privacy. In 2020 IEEE International Symposium on Information Theory (ISIT).
- Sun, M., Man, Y., Li, M., & Gerdes, R. (2020). SVM: secure vehicle motion verification with a single wireless receiver. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks.
- Zhao, T., Jiang, B. o., Li, M., & Tandon, R. (2020). Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback. In 2020 International Joint Conference on Neural Networks (IJCNN).
- Andrews, S., Gerdes, R. M., & Li, M. (2019). Crowdsourced measurements for device fingerprinting. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks.
- Foruhandeh, M., Man, Y., Gerdes, R., Li, M., & Chantem, T. (2019). SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. In Proceedings of the 35th Annual Computer Security Applications Conference.
- Gu, X., Li, M., Cao, Y., & Xiong, L. i. (2019). Supporting both range queries and frequency estimation with local differential privacy. In 2019 IEEE Conference on Communications and Network Security (CNS).
- Guo, Z., Li, M., & Xiao, Y. (2019). Enhancing LAA/Wi-Fi Coexistence via Concurrent Transmissions and Interference Cancellation. In 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
- Jiang, B. o., Li, M., & Tandon, R. (2019). Local Information Privacy with Bounded Prior. In ICC 2019-2019 IEEE International Conference on Communications (ICC).
- Man, Y., Li, M., & Gerdes, R. (2019). Poster: Perceived Adversarial Examples. In IEEE Symposium on Security and Privacy.
- Quan, H., Liu, H., Wang, B., Li, M., & Zhang, Y. (2019). Randex: Mitigating Range Injection Attacks on Searchable Encryption. In 2019 IEEE Conference on Communications and Network Security (CNS).
- Seif, M., Tandon, R., & Li, M. (2019). Context Aware Laplacian Mechanism for Local Information Privacy. In 2019 IEEE Information Theory Workshop (ITW).
- Zhao, T., Li, M., & Ditzler, G. (2019). Online reconfigurable antenna state selection based on Thompson sampling. In 2019 International Conference on Computing, Networking and Communications (ICNC).
- Zhao, T., Li, M., & Poloczek, M. (2019). Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling. In ICC 2019-2019 IEEE International Conference on Communications (ICC).
- Aronov, B., Efrat, A., Li, M., Gao, J., Mitchell, J. S., Polishchuk, V., Wang, B., Quan, H., & Ding, J. (2018). Are friends of my friends too social? limitations of location privacy in a socially-connected world. In Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing.
- Chu, X. u., Ruan, N. a., Li, M., & Jia, W. (2018). Pseudonym Inference in Cooperative Vehicular Traffic Scenarios. In 2018 IEEE Conference on Communications and Network Security (CNS).
- Ghose, N., Lazos, L., & Li, M. (2018). SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications.
- Ghose, N., Lazos, L., & Li, M. (2018). Secure device bootstrapping without secrets resistant to signal manipulation attacks. In 2018 IEEE Symposium on Security and Privacy (SP).
- Jiang, B. o., Li, M., & Tandon, R. (2018). Context-aware data aggregation with localized information privacy. In 2018 IEEE Conference on Communications and Network Security (CNS).
- Leontiadis, I., & Li, M. (2018). Storage efficient substring searchable symmetric encryption. In Proceedings of the 6th International Workshop on Security in Cloud Computing.
- Pan, Y., Li, M., Fan, N., & Hou, Y. (2018). On the throughput limit of multi-hop wireless networks with reconfigurable antennas. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
- Salama, A. M., Li, M., Lazos, L., Xiao, Y., & Krunz, M. (2018). On the privacy and utility tradeoff in database-assisted dynamic spectrum access. In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
- Samy, I., Lazos, L., Xiao, Y., Li, M., & Krunz, M. (2018). LTE misbehavior detection in Wi-Fi/LTE coexistence under the LAA-LTE standard. In Proceedings of the 11th ACM Conference on Security \& Privacy in Wireless and Mobile Networks.
- Seif, M., Tandon, R., & Li, M. (2018). On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays. In 2018 IEEE International Conference on Communications (ICC).
- Seif, M., Tandon, R., & Li, M. (2018). On the secure degrees of freedom of the K-user interference channel with delayed CSIT. In 2018 IEEE International Symposium on Information Theory (ISIT).
- Sun, M., Li, M., & Gerdes, R. (2018). Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications. In 2018 IEEE Conference on Communications and Network Security (CNS).
- Hou, Y., Li, M., & Yang, D. (2017). Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks. In 2017 International Conference on Computing, Networking and Communications (ICNC).
- Hou, Y., Li, M., & Zeng, K. (2017). Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas. In 2017 International Conference on Computing, Networking and Communications (ICNC).
- Hou, Y., Li, M., & Yang, D. (2016). A game theoretical approach to coexistence of heterogeneous mimo wireless networks with interference cancellation. In 2016 International Conference on Computing, Networking and Communications (ICNC).
- Li, M., Yang, D., Lin, J., & Tang, J. (2016). SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on.
- Qiu, S., Wang, B., Li, M., Victors, J., Liu, J., Shi, Y., & Wang, W. (2016). Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets. In Proceedings of the 4th ACM International Workshop on Security in Cloud Computing.
- Quan, H., Wang, B., Leontiadis, I., Li, M., & Zhang, Y. (2016). SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. In International Conference on Cryptology and Network Security.
- Solomon, M., Sunderam, V., Xiong, L., & Li, M. (2016). Enabling Mutually Private Location Proximity Services in Smart Cities: A Comparative Assessment. In IEEE International Smart Cities Conference (ISC2),.
- Wang, B., Hou, Y., & Li, M. (2016). Practical and secure nearest neighbor search on encrypted large-scale data. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on.
- Hou, Y., Li, M., Chauhan, R., Gerdes, R. M., & Zeng, K. (2015). Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security.
- Liu, T., Djordjevic, I. B., & Li, M. (2015, July). Signal Constellation Design for Cross-Phase Modulation Dominated Channels (Invited Paper). In IEEE ICTON 2015; Budapest Hungary.
- Liu, T., Djordjevic, I. B., & Li, M. (2015, November). Multidimensional signal constellation design for channel dominated with nonlinear phase noise. In 12th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services - TELSIKS 2015; Nis Serbia, 133-136.
- Shahabi, C., Fan, L., Nocera, L., Xiong, L., & Li, M. (2015). Privacy-preserving inference of social relationships from location data: a vision paper. In Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems.
- Wang, B., Li, M., Wang, H., & Li, H. (2015). Circular range search on encrypted spatial data. In Communications and Network Security (CNS), 2015 IEEE Conference on.
- Deka, B., Gerdes, R. M., Li, M., & Heaslip, K. (2014). Friendly Jamming for Secure Localization in Vehicular Transportation. In The 10th International Conference on Security and Privacy in Communication Networks (SecureComm'14).
- Deka, B., Gerdes, R. M., Li, M., & Heaslip, K. (2014). Poster: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security.
- Hou, Y., Li, M., Yuan, X., Hou, Y. T., & Lou, W. (2014). Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications.
- Wang, B., Hou, Y., Li, M., Wang, H., & Li, H. (2014). Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In Proceedings of the 9th ACM symposium on Information, computer and communications security.
- Wang, B., Hou, Y., Li, M., Wang, H., Li, H., & Li, F. (2014). Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy. In The 10th International Conference on Security and Privacy in Communication Networks (SecureComm'14).
- Wang, B., Li, M., Chow, S. S., & Li, H. (2014). A tale of two clouds: Computing on data encrypted under multiple keys. In Communications and Network Security (CNS), 2014 IEEE Conference on.
- Hou, Y., & Li, M. (2013). Enforcing spectrum access rules in cognitive radio networks through cooperative jamming. In International Conference on Wireless Algorithms, Systems, and Applications.
- Hou, Y., Li, M., & Guttman, J. D. (2013). Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks.
- Hou, Y., Li, M., & Yu, S. (2013). Surviving the RF smog: Making Body Area Networks robust to cross-technology interference. In 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
- Shi, L., Yuan, J., Yu, S., & Li, M. (2013). ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks.
- Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., & Li, H. (2013). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security.
- Wang, B., Chow, S. S., Li, M., & Li, H. (2013). Storing shared data on the cloud via security-mediator. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on.
- Wang, B., Li, H., & Li, M. (2013). Privacy-preserving public auditing for shared cloud data supporting group dynamics. In 2013 IEEE International Conference on Communications (ICC).
- Wang, B., Li, M., Chow, S. S., & Li, H. (2013). Computing encrypted cloud data efficiently under multiple keys. In Communications and Network Security (CNS), 2013 IEEE Conference on.
- Yan, Q., Li, M., Chen, F., Jiang, T., Lou, W., Hou, Y. T., & Lu, C. (2013). Non-parametric passive traffic monitoring in cognitive radio networks. In INFOCOM, 2013 Proceedings IEEE.
- Yan, Q., Zeng, H., Jiang, T., Li, M., Lou, W., & Hou, Y. T. (2013). MIMO-based Jamming Resilient Communication in Wireless Networks. In The 33nd IEEE International Conference on Computer Communication (INFOCOM 2014).
- Li, M., Yu, S., Lou, W., & Hou, Y. T. (2012). Toward privacy-assured cloud data services with flexible search functionalities. In 2012 32nd International Conference on Distributed Computing Systems Workshops.
- Shi, L., Li, M., Yu, S., & Yuan, J. (2012). BANA: Body Area Network Authentication Exploiting Channel Characteristics. In The fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2012).
- Yan, Q., Li, M., Jiang, T., Lou, W., & Hou, Y. T. (2012). Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks. In INFOCOM, 2012 Proceedings IEEE.
- Yuan, J., Shi, L., Yu, S., & Li, M. (2012). Authenticated secret key extraction using channel characteristics for body area networks. In Proceedings of the 2012 ACM conference on Computer and communications security.
- Zhang, N., Li, M., Lou, W., & Hou, Y. T. (2012). Mushi: Toward multiple level security cloud with strong hardware level isolation. In MILCOM 2012-2012 IEEE Military Communications Conference.
- Zheng, Y., Li, M., Lou, W., & Hou, Y. T. (2012). Sharp: Private proximity test and secure handshake with cheat-proof location tags. In European Symposium on Research in Computer Security.
- Li, M., Cao, N., Yu, S., & Lou, W. (2011). Findu: Privacy-preserving personal profile matching in mobile social networks. In INFOCOM, 2011 Proceedings IEEE.
- Li, M., Yu, S., Cao, N., & Lou, W. (2011). Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on.
- Zhang, N., Li, M., & Lou, W. (2011). Distributed data mining with differential privacy. In 2011 IEEE International Conference on Communications (ICC).
- Li, M., Yu, S., Lou, W., & Ren, K. (2010). Group device pairing based secure sensor association and key management for body area networks. In INFOCOM, 2010 Proceedings IEEE.
- Li, M., Yu, S., Ren, K., & Lou, W. (2010). Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In International Conference on Security and Privacy in Communication Systems.
- Yang, Z., Li, M., & Lou, W. (2010). Codeplay: Live multimedia streaming in vanets using symbol-level network coding. In Network Protocols (ICNP), 2010 18th IEEE International Conference on.
- Li, M., Lou, W., & Zeng, K. (2009). Oppcast: Opportunistic broadcast ofwarning messages in vanets with unreliable links. In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
- Yang, Z., Li, M., & Lou, W. (2009). A network coding approach to reliable broadcast in wireless mesh networks. In International Conference on Wireless Algorithms, Systems, and Applications.
- Yang, Z., Li, M., & Lou, W. (2009). R-Code: Network coding based reliable broadcast in wireless mesh networks with unreliable links. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE.
- Li, M., & Lou, W. (2008). Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links. In Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness.
- Liu, F., Li, M., Zhang, R., Zhang, H., & Xu, Z. (2008). Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks. In 2008 The 28th International Conference on Distributed Computing Systems Workshops.
- Duan, H., Liu, F., Li, M., & Xu, M. (2007). A rapid antenna selection for MIMO-diversity systems. In Intelligent Signal Processing and Communication Systems, 2007. ISPACS 2007. International Symposium on.
Others
- Zeng, K., Lou, W., & Li, M. (2011). Multihop Wireless Networks: Opportunistic Routing.