Ming Li

According to our database1, Ming Li authored at least 71 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data.
IEEE Trans. Dependable Sec. Comput., 2019

Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access.
IEEE Trans. Cogn. Comm. & Networking, 2019

2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Vehicular Technology, 2018

Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Computing, 2018

SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics.
Computer Networks, 2018

On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Pseudonym Inference in Cooperative Vehicular Traffic Scenarios.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown Statistics.
CoRR, 2017

Throughput optimization in multi-hop wireless networks with reconfigurable antennas.
Proceedings of the 2017 International Conference on Computing, 2017

Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks.
Proceedings of the 2017 International Conference on Computing, 2017

Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Towards physical layer identification of cognitive radio devices.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization.
Proceedings of the Advances in Information and Computer Security, 2016

SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A game theoretical approach to coexistence of heterogeneous MIMO wireless networks with interference cancellation.
Proceedings of the 2016 International Conference on Computing, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet of Things Journal, 2015

Circular Range Search on Encrypted Spatial Data.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wireless Communications, 2014

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distrib. Syst., 2014

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Trans. Parallel Distrib. Syst., 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Friendly Jamming for Secure Localization in Vehicular Transportation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wireless Communications, 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distrib. Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
TOSN, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Network, 2013

BANA: Body Area Network Authentication Exploiting Channel Characteristics.
IEEE Journal on Selected Areas in Communications, 2013

ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Surviving the RF smog: Making Body Area Networks robust to cross-technology interference.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding.
IEEE Trans. Wireless Communications, 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE Journal on Selected Areas in Communications, 2012

BANA: body area network authentication exploiting channel characteristics.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Enabling secure and reliable policy-based routing in MANETs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Proceedings of the Computer Security - ESORICS 2012, 2012

Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Secure Device Pairing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding.
IEEE Journal on Selected Areas in Communications, 2011

Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Computer Networks, 2011

R-Code: Network coding-based reliable broadcast in wireless mesh networks.
Ad Hoc Networks, 2011

FindU: Privacy-preserving personal profile matching in mobile social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving multi-keyword ranked search over encrypted cloud data.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Data Mining with Differential Privacy.
Proceedings of IEEE International Conference on Communications, 2011

2010
Data security and privacy in wireless body area networks.
IEEE Wireless Commun., 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

CodePlay: Live multimedia streaming in VANETs using symbol-level network coding.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

2009
A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2009

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009


  Loading...