Feng Li

Orcid: 0000-0001-7633-7863

Affiliations:
  • Indiana University - Purdue University Indianapolis, Department of Computer and Information Technology, IN, USA
  • Florida Atlantic University, Boca Raton, FL, USA (PhD 2009)


According to our database1, Feng Li authored at least 79 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Sorting Ransomware from Malware Utilizing Machine Learning Methods with Dynamic Analysis.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

TrustNetFL: Enhancing Federated Learning with Trusted Client Aggregation for Improved Security.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Unsupervised Deep Learning for an Image Based Network Intrusion Detection System.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Solving the Federated Edge Learning Participation Dilemma: A Truthful and Correlated Perspective.
IEEE Trans. Veh. Technol., 2022

Distributed Swift and Stealthy Backdoor Attack on Federated Learning.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

Machine Learning-based Online Social Network Privacy Preservation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Differential Private Social Network Publication and Persistent Homology Preservation.
IEEE Trans. Netw. Sci. Eng., 2021

Learning Discriminative Features for Adversarial Robustness.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Energy-Efficient Device Selection in Federated Edge Learning.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey.
IEEE Access, 2020

Protecting Social Network With Differential Privacy Under Novel Graph Model.
IEEE Access, 2020

Multi-Armed-Bandit-based Shilling Attack on Collaborative Filtering Recommender Systems.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Deep Dynamic Clustering of Spam Reviewers using Behavior-Anomaly-based Graph Embedding.
Proceedings of the IEEE Global Communications Conference, 2020

Correlated Participation Decision Making for Federated Edge Learning.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Android Malware Detection via Graphlet Sampling.
IEEE Trans. Mob. Comput., 2019

Privacy-Preserving Sketching for Online Social Network Data Publication.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

PHDP: Preserving Persistent Homology in Differentially Private Graph Publications.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

De-Anonymization of Dynamic Online Social Networks via Persistent Structures.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient Content Delivery via Interest Queueing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Sharing Social Networks Using a Novel Differentially Private Graph Model.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model.
IEEE Trans. Comput. Soc. Syst., 2018

Studying the utility preservation in social network anonymization via persistent homology.
Comput. Secur., 2018

Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial Samples.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

2017
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distributed Syst., 2017

Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election.
Cryptogr., 2017

Preserving Local Differential Privacy in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Cancellable and Privacy-Preserving Facial Biometric Authentication Scheme.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Using Persistent Homology to Represent Online Social Network Graphs.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Preserving Graph Utility in Anonymized Social Networks? A Study on the Persistent Homology.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Obfuscating function call topography to test structural malware detection against evasion attacks.
Proceedings of the 2017 International Conference on Computing, 2017

2016
Trust Evaluation in Online Social Networks Using Generalized Network Flow.
IEEE Trans. Computers, 2016

ACTS: Extracting Android App topologiCal signature through graphleT Sampling.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Enhancing and Implementing Fully Transparent Internet Voting.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Temporal coverage based content distribution in heterogeneous smart device networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Behavioral Malware Detection in Delay Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Design and Analysis of a Highly User-Friendly, Secure, Privacy-Preserving, and Revocable Authentication Method.
IEEE Trans. Computers, 2014

A Two-Stage Deanonymization Attack against Anonymized Social Networks.
IEEE Trans. Computers, 2014

A taxonomy of privilege escalation attacks in Android applications.
Int. J. Secur. Networks, 2014

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Feedback-based smartphone strategic sampling for BYOD security.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014

2013
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Outsourcing privacy-preserving social networks to a cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Smartphone strategic sampling in defending enterprise network security.
Proceedings of IEEE International Conference on Communications, 2013

Sybil defenses in mobile social networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

T-dominance: Prioritized defense deployment for BYOD security.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A viewable e-voting scheme for environments with conflict of interest.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling.
IEEE Trans. Parallel Distributed Syst., 2012

Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2012

Active User Authentication for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Secure and privacy-preserving biometrics based active authentication.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Seed and Grow: An attack against anonymized social networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

A joint replication-migration-based routing in delay tolerant networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

A New Approach to Weighted Multi-Secret Sharing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

A New Scheme for Anonymous Secure Group Communication.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs.
IEEE Trans. Syst. Man Cybern. Part B, 2010

Uncertainty Modeling and Reduction in MANETs.
IEEE Trans. Mob. Comput., 2010

Fuzzy Closeness-Based Delegation Forwarding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Mobility Management in MANETs: Exploit the Positive Impacts of Mobility.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

An uncertainty-aware reputation system in mobile networks: analysis and applications.
PhD thesis, 2009

Efficient Opportunistic Routing in Utility-Based Ad Hoc Networks.
IEEE Trans. Reliab., 2009

LocalCom: A Community-based Epidemic Forwarding Scheme in Disruption-tolerant Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Thwarting Blackhole Attacks in Disruption-Tolerant Networks using Encounter Tickets.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

MOPS: Providing Content-Based Service in Disruption-Tolerant Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

FRAME: An Innovative Incentive Scheme in Vehicular Networks.
Proceedings of IEEE International Conference on Communications, 2009

2008
Clique-based group key assignment in Wireless Sensor Networks.
Int. J. Secur. Networks, 2008

PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks.
Int. J. Secur. Networks, 2008

Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Utility-Based Opportunistic Routing in Multi-Hop Wireless Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Mobility Reduces Uncertainty in MANETs.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

2006
A probabilistic voting-based filtering scheme in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006


  Loading...