Ming Li

Orcid: 0000-0002-4073-0273

Affiliations:
  • University of Arizona, Tucson, AZ, USA
  • Utah State University, Logan, UT, USA (2011 - 2015)
  • Worcester Polytechnic Institute, MA, USA (PhD 2011)


According to our database1, Ming Li authored at least 135 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ZITA: Zero-Interaction Two-Factor Authentication Using Contact Traces and In-Band Proximity Verification.
IEEE Trans. Mob. Comput., May, 2024

Exploiting Successive Interference Cancellation for Spectrum Sharing Over Unlicensed Bands.
IEEE Trans. Mob. Comput., March, 2024

2023
Misbehavior Detection in Wi-Fi/LTE Coexistence Over Unlicensed Bands.
IEEE Trans. Mob. Comput., August, 2023

Cross-Modality Continuous User Authentication and Device Pairing With Respiratory Patterns.
IEEE Internet Things J., August, 2023

Answering Count Queries for Genomic Data With Perfect Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

Secret-Free Device Pairing in the mmWave Band.
CoRR, 2023

That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Proceedings of the 32nd USENIX Security Symposium, 2023

Wiggle: Physical Challenge-Response Verification of Vehicle Platooning.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
In-Band Secret-Free Pairing for COTS Wireless Devices.
IEEE Trans. Mob. Comput., 2022

Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation.
IEEE Trans. Dependable Secur. Comput., 2022

QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data.
IEEE Trans. Cloud Comput., 2022

Passive Drone Localization Using LTE Signals.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Towards Wireless Spiking of Smart Locks.
Proceedings of the 43rd IEEE Security and Privacy, 2022

PoF: Proof-of-Following for Vehicle Platoons.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Physical Hijacking Attacks against Object Trackers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Online Learning-Based Reconfigurable Antenna Mode Selection Exploiting Channel Correlation.
IEEE Trans. Wirel. Commun., 2021

Context-Aware Local Information Privacy.
IEEE Trans. Inf. Forensics Secur., 2021

Secure and collusion-resistant data aggregation from convertible tags.
Int. J. Inf. Sec., 2021

PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy.
CoRR, 2021

Technical Report: Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test.
CoRR, 2021

Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization.
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021

Insider-Resistant Context-Based Pairing for Multimodality Sleep Apnea Test.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Impacts of Constrained Sensing and Communication Based Attacks on Vehicular Platoons.
IEEE Trans. Veh. Technol., 2020

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2020

Demo: iJam with Channel Randomization.
CoRR, 2020

GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems.
CoRR, 2020

Aggregation-based location privacy: An information theoretic approach.
Comput. Secur., 2020

SVM: secure vehicle motion verification with a single wireless receiver.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Proceedings of the 29th USENIX Security Symposium, 2020

GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Data inference from encrypted databases: a multi-dimensional order-preserving matching approach.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Wireless Federated Learning with Local Differential Privacy.
Proceedings of the IEEE International Symposium on Information Theory, 2020

ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Providing Input-Discriminative Protection for Local Differential Privacy.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

StegoNet: Turn Deep Neural Network into a Stegomalware.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Online Location Trace Privacy: An Information Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2019

FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data.
IEEE Trans. Dependable Secur. Comput., 2019

Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access.
IEEE Trans. Cogn. Commun. Netw., 2019

Secure Retrospective Interference Alignment.
Entropy, 2019

Crowdsourced measurements for device fingerprinting.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Context Aware Laplacian Mechanism for Local Information Privacy.
Proceedings of the 2019 IEEE Information Theory Workshop, 2019

Online Reconfigurable Antenna State Selection based on Thompson Sampling.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Local Information Privacy with Bounded Prior.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways.
IEEE Trans. Veh. Technol., 2018

Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Comput., 2018

SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics.
Comput. Networks, 2018

LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Context-aware Data Aggregation with Localized Information Privacy.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Pseudonym Inference in Cooperative Vehicular Traffic Scenarios.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Making Wireless Body Area Networks Robust Under Cross-Technology Interference.
IEEE Trans. Wirel. Commun., 2017

Location Based Handshake and Private Proximity Test with Location Tags.
IEEE Trans. Dependable Secur. Comput., 2017

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
IACR Cryptol. ePrint Arch., 2017

Storage Efficient Substring Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2017

HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation.
Proceedings of the 26th USENIX Security Symposium, 2017

Throughput optimization in multi-hop wireless networks with reconfigurable antennas.
Proceedings of the 2017 International Conference on Computing, 2017

Game theoretical analysis of coexistence in MIMO-empowered Cognitive Radio Networks.
Proceedings of the 2017 International Conference on Computing, 2017

Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Mutually Private Location Proximity Detection with Access Control.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Towards physical layer identification of cognitive radio devices.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Cooperative Interference Mitigation for Heterogeneous Multi-Hop Wireless Networks Coexistence.
IEEE Trans. Wirel. Commun., 2016

Jamming Resilient Communication Using MIMO Interference Cancellation.
IEEE Trans. Inf. Forensics Secur., 2016

Geometric Range Search on Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2016

Enabling mutually private location proximity services in smart cities: A comparative assessment.
Proceedings of the IEEE International Smart Cities Conference, 2016

Practical and secure nearest neighbor search on encrypted large-scale data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A game theoretical approach to coexistence of heterogeneous MIMO wireless networks with interference cancellation.
Proceedings of the 2016 International Conference on Computing, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet Things J., 2015

Privacy-preserving inference of social relationships from location data: a vision paper.
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2015

Circular range search on encrypted spatial data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2014

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Friendly Jamming for Secure Localization in Vehicular Transportation.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

MIMO-based jamming resilient communication in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks.
IEEE Trans. Wirel. Commun., 2013

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption.
IEEE Trans. Parallel Distributed Syst., 2013

Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013

Toward privacy-assured and searchable cloud data storage services.
IEEE Netw., 2013

BANA: Body Area Network Authentication Exploiting Channel Characteristics.
IEEE J. Sel. Areas Commun., 2013

ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Surviving the RF smog: Making Body Area Networks robust to cross-technology interference.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Non-parametric passive traffic monitoring in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
CodePlay: Live Multimedia Streaming in VANETs Using Symbol-Level Network Coding.
IEEE Trans. Wirel. Commun., 2012

Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2012

MUSHI: Toward Multiple Level Security cloud with strong Hardware level Isolation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Enabling secure and reliable policy-based routing in MANETs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Proceedings of the Computer Security - ESORICS 2012, 2012

Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Secure Device Pairing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding.
IEEE J. Sel. Areas Commun., 2011

Opportunistic broadcast of event-driven warning messages in Vehicular Ad Hoc Networks with lossy links.
Comput. Networks, 2011

R-Code: Network coding-based reliable broadcast in wireless mesh networks.
Ad Hoc Networks, 2011

FindU: Privacy-preserving personal profile matching in mobile social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Distributed Data Mining with Differential Privacy.
Proceedings of IEEE International Conference on Communications, 2011

2010
Data security and privacy in wireless body area networks.
IEEE Wirel. Commun., 2010

Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings.
Proceedings of the Security and Privacy in Communication Networks, 2010

Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
A Network Coding Approach to Reliable Broadcast in Wireless Mesh Networks.
Proceedings of the Wireless Algorithms, 2009

OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Opportunistic broadcast of emergency messages in vehicular ad hoc networks with unreliable links.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008


  Loading...