Lei Li

Affiliations:
  • Kennesaw State University, College of Computing and Software Engineering, GA, USA
  • Southern Polytechnic State University, Marietta, GA, USA (former)
  • Georgia State University, Atlanta, GA, USA (former)


According to our database1, Lei Li authored at least 42 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Communication-Efficient Semihierarchical Federated Analytics in IoT Networks.
IEEE Internet Things J., 2022

2021
We Did It! So Can You! Creating "No-Textbook" IT Degrees.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Retrieving and Classifying LinkedIn Job Titles for Alumni Career Analysis.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Emotional Analysis of Learning Cybersecurity with Games.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Perceptions of Information Systems Security Compliance: An Empirical Study in Higher Education Setting.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
A Novel Framework for Collaborated IT Project with the Consideration of Data Security and Privacy.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Promoting Information Security Policy Compliance - An Empirical Study.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Practice What You Preach - Building a Capstone Management System as Undergraduate IT Capstone Projects.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Untampered Electronic Voting in Entertainment Industry: A Blockchain-based Implementation.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

2018
Using Social Media to Improve Student-Instructor Communication in an Onlinef Learning Environment.
Int. J. Inf. Commun. Technol. Educ., 2018

Cognitive Approach for Location Privacy Protection.
IEEE Access, 2018

Can We Be More Innovative with Program Revision?: Using a Data-Driven 360 Degree Program Review Model.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

2017
An Evaluation Framework for Selecting Collaboration Systems for Student Teamwork.
Int. J. Inf. Commun. Technol. Educ., 2017

The Evolution of the Master of Science in Information Technology Curriculum.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

Learning database security with hands-on mobile labs.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
Static Mining and Dynamic Taint for Mobile Security Threats Analysis.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

CACROS: A Context-Aware Cloud Content Roaming Service.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Creating Courses with No Textbook - Pros and Cons: Panel Discussion.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Transforming IT Education with No-Cost Learning Materials.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Career Trajectory Analysis of Information Technology Alumni: A LinkedIn Perspective.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

An Open and Portable Platform for Learning Data Security in Mobile Cloud Computing.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Developing Hands-on Labware for Emerging Database Security.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

The Paradox of Social Media Security: Users' Perceptions versus Behaviors.
Proceedings of the 5th Annual Conference on Research in Information Technology, 2016

MongoDB NoSQL Injection Analysis and Detection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Using Real-Time Fear Appeals to Improve Social Media Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Practicing and Evaluating Soft Skills in IT Capstone Projects.
Proceedings of the 16th Annual Conference on Information Technology Education, 2015

Which Collaboration Technologies Best Support Student Teamwork? An Empirical Investigation.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Bringing Business Intelligence to Health Information Technology Curriculum.
J. Inf. Syst. Educ., 2014

Promoting Information Systems Major to Undergraduate Students: A Comprehensive Investigation.
J. Inf. Syst. Educ., 2014

Success factors and challenges for IT capstone projects.
Proceedings of the 15th Annual Conference on Information Technology Education, 2014

Bringing business intelligence to healthcare informatics curriculum: a preliminary investigation.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

A survey of security vulnerabilities in social networking media: the case of facebook.
Proceedings of the 3rd annual conference on Research in information technology, 2014

2013
Can you hear me now?: an empirical study on using social media to improve student-instructor communication.
Proceedings of the 14th Annual ACM SIGITE Conference on Information Technology Education, 2013

2010
SOM Clustering to Promote Interoperability of Directory Metadata: A Grid-Enabled Genetic Algorithm Approach.
J. Univers. Comput. Sci., 2010

2008
The influence of checklists and roles on software practitioner risk perception and decision-making.
J. Syst. Softw., 2008

2006
A genetic algorithm based approach for systematic SOM clustering of directory metadata.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Grid-enabled Automatic Web Page Classification.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2006

2005
A methodology for semantic integration of metadata in bioinformatics data sources.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
An Architecture for Semantic Facilitation and Reuse of Directory Metadata.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004


  Loading...