Qun Li

Affiliations:
  • College of William and Mary, Department of Computer Science, Williamsburg, VA, USA
  • Dartmouth College, Department of Computer Science, Hanover, NH, USA (PhD)


According to our database1, Qun Li authored at least 154 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy-Preserving Data Integrity Verification for Secure Mobile Edge Storage.
IEEE Trans. Mob. Comput., September, 2023

Byzantine Tolerant Algorithms for Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2023

Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2023

An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation.
IEEE Trans. Cloud Comput., 2023

SurfaceNet: Fault-Tolerant Quantum Networks with Surface Codes.
CoRR, 2023

Preconditioned Federated Learning.
CoRR, 2023

LAWS: Look Around and Warm-Start Natural Gradient Descent for Quantum Neural Networks.
Proceedings of the IEEE International Conference on Quantum Software, 2023

MORE: Measurement and Correlation Based Variational Quantum Circuit for Multi-Classification.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

2022
vTrust: Remotely Executing Mobile Apps Transparently With Local Untrusted OS.
IEEE Trans. Computers, 2022

Scalable Quantum Neural Networks for Classification.
CoRR, 2022

wpScalable Quantum Neural Networks for Classification.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

EZPath: Expediting Container Network Traffic via Programmable Switches.
Proceedings of the IFIP Networking Conference, 2022

Privacy-Preserving and Robust Federated Deep Metric Learning.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Poster: Scalable Quantum Convolutional Neural Networks for Edge Computing.
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022

2021
Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training.
IEEE Trans. Parallel Distributed Syst., 2021

Defenses Against Byzantine Attacks in Distributed Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng., 2021

The Emergence of Vehicle Computing.
IEEE Internet Comput., 2021

User input enrichment via sensing devices.
Comput. Networks, 2021

ToFi: An Algorithm to Defend Against Byzantine Attacks in Federated Learning.
Proceedings of the Security and Privacy in Communication Networks, 2021

Defending Against Byzantine Attacks in Quantum Federated Learning.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Efficient Privacy-Preserving Federated Learning for Resource-Constrained Edge Devices.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Neuron Manifold Distillation for Edge Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Practical Location Privacy Attacks and Defense on Point-of-interest Aggregates.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

QuantumFed: A Federated Learning Framework for Collaborative Quantum Training.
Proceedings of the IEEE Global Communications Conference, 2021

CE-SGD: Communication-Efficient Distributed Machine Learning.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Escaping Backdoor Attack Detection of Deep Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Chatbot Security and Privacy in the Age of Personal Assistants.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020

Open Questions for Next Generation Chatbots.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020

2019
Guest Editor's Introduction: Special Section on Fog/Edge Computing and Services.
IEEE Trans. Serv. Comput., 2019

Efficient Live Migration of Edge Services Leveraging Container Layered Storage.
IEEE Trans. Mob. Comput., 2019

A Survey of Virtual Machine Management in Edge Computing.
Proc. IEEE, 2019

Ultrasound Proximity Networking on Smart Mobile Devices for IoT Applications.
IEEE Internet Things J., 2019

Trojan Attack on Deep Generative Models in Autonomous Driving.
Proceedings of the Security and Privacy in Communication Networks, 2019

Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud Applications.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

FABA: An Algorithm for Fast Aggregation against Byzantine Attacks in Distributed Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Privacy-Preserving Data Integrity Verification in Mobile Edge Computing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Virtual machine migration for IoT applications.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

2018
CamK: Camera-Based Keystroke Detection and Localization for Small Mobile Devices.
IEEE Trans. Mob. Comput., 2018

Graphical passwords for older computer users.
Int. J. Secur. Networks, 2018

Household Electrical Load Scheduling Algorithms with Renewable Energy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

eSGD: Communication Efficient Distributed Deep Learning on the Edge.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

EdgeCons: Achieving Efficient Consensus in Edge Computing Networks.
Proceedings of the USENIX Workshop on Hot Topics in Edge Computing, 2018

Learning from Differentially Private Neural Activations with Edge Computing.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

FastPay: A Secure Fast Payment Method for Edge-IoT Platforms using Blockchain.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios.
IEEE Trans. Mob. Comput., 2017

Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks.
IEEE Internet Things J., 2017

Challenges and Software Architecture for Fog Computing.
IEEE Internet Comput., 2017

Enabling accurate and efficient modeling-based CPU power estimation for smartphones.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

WearLock: Unlocking Your Phone via Acoustics Using Smartwatch.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Graphical passwords for older computer users.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

LAVEA: latency-aware video analytics on edge computing platform.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Efficient service handoff across edge servers via docker container migration.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Mining and analysis of public information for insight into personal fitness tracker reliability, operations and user performance.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

2016
CamK: A camera-based keyboard for small mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

GlassGesture: Exploring head gesture interface of smart glasses.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

AMIL: Localizing neighboring mobile devices through a simple gesture.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

MobiPlay: a remote execution based record-and-replay tool for mobile applications.
Proceedings of the 38th International Conference on Software Engineering, 2016

Towards User Re-Authentication on Mobile Devices via On-Screen Keyboard.
Proceedings of the Fourth IEEE Workshop on Hot Topics in Web Systems and Technologies, 2016

Poster Abstract: EdgeStore: Integrating Edge Computing into Cloud-Based Storage Systems.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

2015
VProof: Lightweight Privacy-Preserving Vehicle Location Proofs.
IEEE Trans. Veh. Technol., 2015

Efficient Protocols for Collecting Histograms in Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Exploring the Gap between Ideal and Reality: An Experimental Study on Continuous Scanning with Mobile Reader in RFID Systems.
IEEE Trans. Mob. Comput., 2015

Security and Privacy Issues of Fog Computing: A Survey.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Survey of Fog Computing: Concepts, Applications and Issues.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

SMOC: A secure mobile cloud computing platform.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Physical media covert channels on smart mobile devices.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Fog Computing: Platform and Applications.
Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, 2015

2014
VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet.
IEEE Trans. Veh. Technol., 2014

Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks.
IEEE/ACM Trans. Netw., 2014

Design, Realization, and Evaluation of DozyAP for Power-Efficient Wi-Fi Tethering.
IEEE/ACM Trans. Netw., 2014

Exploiting ZigBee in Reducing WiFi Power Consumption for Mobile Devices.
IEEE Trans. Mob. Comput., 2014

Online vector scheduling and generalized load balancing.
J. Parallel Distributed Comput., 2014

Efficiently collecting histograms over RFID tags.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

LBSNSim: Analyzing and modeling location-based social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Preserving secondary users' privacy in cognitive radio networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Near-pri: Private, proximity based location sharing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Defending Against Cooperative Attacks in Cooperative Spectrum Sensing.
IEEE Trans. Wirel. Commun., 2013

SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput.
IEEE Trans. Parallel Distributed Syst., 2013

SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Defending against Unidentifiable Attacks in Electric Power Grids.
IEEE Trans. Parallel Distributed Syst., 2013

Selected Papers from "The 6th China Conference of Wireless Sensor Networks".
Int. J. Distributed Sens. Networks, 2013

V-edge: Fast Self-constructive Power Modeling of Smartphones Based on Battery Voltage Dynamics.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Optimizing background email sync on smartphones.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Continuous scanning with mobile reader in RFID systems: an experimental study.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

Extracting secret key from wireless link dynamics in vehicular environments.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

APT: Accurate outdoor pedestrian tracking with smartphones.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

HoWiES: A holistic approach to ZigBee assisted WiFi energy savings in mobile devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Fast Mencius: Mencius with low commit latency.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

CacheKeeper: a system-wide web caching service for smartphones.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

2012
Efficient median estimation for large-scale sensor RFID systems.
Int. J. Sens. Networks, 2012

Achieving distributed user access control in sensor networks.
Ad Hoc Networks, 2012

Location Proof via Passive RFID Tags.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

DozyAP: power-efficient Wi-Fi tethering.
Proceedings of the 10th International Conference on Mobile Systems, 2012

SybilDefender: Defend against sybil attacks in large social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

MobiShare: Flexible privacy-preserving location sharing in mobile online social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Unidentifiable Attacks in Electric Power Systems.
Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 2012

2011
Public-key based access control in sensornet.
Wirel. Networks, 2011

Association Control for Vehicular WiFi Access: Pursuing Efficiency and Fairness.
IEEE Trans. Parallel Distributed Syst., 2011

A Timing-Based Scheme for Rogue AP Detection.
IEEE Trans. Parallel Distributed Syst., 2011

Verifiable Privacy-Preserving Sensor Network Storage for Range Query.
IEEE Trans. Mob. Comput., 2011

ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

IMDGuard: Securing implantable medical devices with the external wearable guardian.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Defending against vehicular rogue APs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Achieving robust message authentication in sensor networks: a public-key based approach.
Wirel. Networks, 2010

Efficient techniques for monitoring missing RFID tags.
IEEE Trans. Wirel. Commun., 2010

Snoogle: A Search Engine for Pervasive Environments.
IEEE Trans. Parallel Distributed Syst., 2010

Optimize Storage Placement in Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Microsearch: A search engine for embedded devices used in pervasive computing.
ACM Trans. Embed. Comput. Syst., 2010

High Speed Data Routing in Vehicular Sensor Networks.
J. Commun., 2010

Designing a Practical Access Point Association Protocol.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Efficient Tag Identification in Mobile RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Efficient Continuous Scanning in RFID Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Counting RFID Tags Efficiently and Anonymously.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
IBE-Lite: A Lightweight Identity-Based Cryptography for Body Sensor Networks.
IEEE Trans. Inf. Technol. Biomed., 2009

High level architecture evolved modular federation object model
CoRR, 2009

Privacy-aware routing in sensor networks.
Comput. Networks, 2009

Experimental Study on Mobile RFID Performance.
Proceedings of the Wireless Algorithms, 2009

Experimental Study on Secure Data Collection in Vehicular Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Communication in Naturally Mobile Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

A Measurement Based Rogue AP Detection Scheme.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Achieving Efficiency and Fairness for Association Control in Vehicular Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

2008
Secure and Serverless RFID Authentication and Search Protocols.
IEEE Trans. Wirel. Commun., 2008

Body sensor network security: an identity-based cryptography approach.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Microsearch: When Search Engines Meet Small Devices.
Proceedings of the Pervasive Computing, 2008

Finding popular categories for RFID tags.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Snoogle: A Search Engine for the Physical World.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

How to Monitor for Missing RFID tags.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Cooperative Relay Service in a Wireless LAN.
IEEE J. Sel. Areas Commun., 2007

Severless Search and Authentication Protocols for RFID.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

Outlier detection in sensor networks.
Proceedings of the 8th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2007

2006
Global Clock Synchronization in Sensor Networks.
IEEE Trans. Computers, 2006

Elliptic curve cryptography-based access control in sensor networks.
Int. J. Secur. Networks, 2006

Data storage placement in sensor networks.
Proceedings of the 7th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2006

Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

A Robust and Secure RFID-Based Pedigree System (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Distributed User Access Control in Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2006

2005
Navigation protocols in sensor networks.
ACM Trans. Sens. Networks, 2005

A study on object tracking quality under probabilistic coverage in sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2003
Three power-aware routing algorithms for sensor networks.
Wirel. Commun. Mob. Comput., 2003

MobiCom poster: reactive behavior in self-reconfiguring sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Communication in disconnected ad hoc networks using message relay.
J. Parallel Distributed Comput., 2003

Distributed algorithms for guiding navigation across a sensor network.
Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, 2003

Distributed Energy-conserving Routing Protocols.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Message relay in disconnected ad-hoc networks.
Proceedings of the International Mobility and Wireless Access Workshop, 2002

2001
Online power-aware routing in wireless Ad-hoc networks.
Proceedings of the MOBICOM 2001, 2001

2000
Sending messages to mobile users in disconnected ad-hoc wireless networks.
Proceedings of the MOBICOM 2000, 2000


  Loading...