Wei Li

Orcid: 0000-0003-1837-4759

Affiliations:
  • Georgia State University, Department of Computer Science, Atlanta, GA, USA
  • George Washington University, Department of Computer Science, Washington, DC, USA (PhD 2016)
  • Beijing University of Posts and Telecommunications, China (former)


According to our database1, Wei Li authored at least 70 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards Neural Network-Based Communication System: Attack and Defense.
IEEE Trans. Dependable Secur. Comput., 2023

Analysis on methods to effectively improve transfer learning performance.
Theor. Comput. Sci., 2023

Backdoor Attack on 3D Grey Image Segmentation.
Proceedings of the IEEE International Conference on Data Mining, 2023

Exact-Fun: An Exact and Efficient Federated Unlearning Approach.
Proceedings of the IEEE International Conference on Data Mining, 2023

Federated Generative Model on Multi-Source Heterogeneous Data in IoT.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Privacy-Preserving Mechanisms for Multi-Label Image Recognition.
ACM Trans. Knowl. Discov. Data, 2022

Efficient CityCam-to-Edge Cooperative Learning for Vehicle Counting in ITS.
IEEE Trans. Intell. Transp. Syst., 2022

Privacy Threat and Defense for Federated Learning With Non-i.i.d. Data in AIoT.
IEEE Trans. Ind. Informatics, 2022

Audio-Visual Autoencoding for Privacy-Preserving Video Streaming.
IEEE Internet Things J., 2022

Generative Adversarial Networks: A Survey Toward Private and Secure Applications.
ACM Comput. Surv., 2022

Decentralized Federated Learning: A Defense Against Gradient Inversion Attack.
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022

Pairwise Gaussian Graph Convolutional Networks: Defense Against Graph Adversarial Attack.
Proceedings of the IEEE Global Communications Conference, 2022

Multi-Aggregator Time-Warping Heterogeneous Graph Neural Network for Personalized Micro-Video Recommendation.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Detection Mechanisms of One-Pixel Attack.
Wirel. Commun. Mob. Comput., 2021

Multi-Source Adversarial Sample Attack on Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2021

Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

ADGAN: Protect Your Location Privacy in Camera Data of Auto-Driving Vehicles.
IEEE Trans. Ind. Informatics, 2021

Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices.
IEEE Trans. Cogn. Commun. Netw., 2021

Privacy protection among three antithetic-parties for context-aware services.
J. Netw. Comput. Appl., 2021

Adversarial Privacy-Preserving Graph Embedding Against Inference Attack.
IEEE Internet Things J., 2021

Generative Adversarial Networks: A Survey Towards Private and Secure Applications.
CoRR, 2021

Edge computing assisted privacy-preserving data computation for IoT devices.
Comput. Commun., 2021

Which Option Is a Better Way to Improve Transfer Learning Performance?
Proceedings of the Combinatorial Optimization and Applications, 2021

2020
zkCrowd: A Hybrid Blockchain-Based Crowdsourcing Platform.
IEEE Trans. Ind. Informatics, 2020

A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Image Privacy Protection by Particle Swarm Optimization Based Pivot Pixel Modification.
Proceedings of the Internet of Things - ICIOT 2020, 2020

2019
Security and Privacy for Smart Cyber-Physical Systems.
Secur. Commun. Networks, 2019

Coin Hopping Attack in Blockchain-Based IoT.
IEEE Internet Things J., 2019

Optimal Contract-Based Mechanisms for Online Data Trading Markets.
IEEE Internet Things J., 2019

Towards IP geolocation with intermediate routers based on topology discovery.
Cybersecur., 2019

Incorporating social interaction into three-party game towards privacy protection in IoT.
Comput. Networks, 2019

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Fairness-Aware Auction Mechanism for Sustainable Mobile Crowdsensing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Privacy-Preserving Auto-Driving: A GAN-Based Approach to Protect Vehicular Camera Data.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Mutual-Preference Driven Truthful Auction Mechanism in Mobile Crowdsensing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services.
IEEE Trans. Veh. Technol., 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining.
Math. Found. Comput., 2018

Privacy-preserving combinatorial auction without an auctioneer.
EURASIP J. Wirel. Commun. Netw., 2018

Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Privacy-Preserving Data Collection in Context-Aware Applications.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

2017
Localized Algorithms for Yao Graph-Based Spanner Construction in Wireless Networks Under SINR.
IEEE/ACM Trans. Netw., 2017

Throughput Maximization in Multi-User Cooperative Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

One-Time-Username: A Threshold-based Authentication System.
Proceedings of the 2017 International Conference on Identification, 2017

Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets.
IEEE Trans. Cogn. Commun. Netw., 2016

Secure multi-unit sealed first-price auction mechanisms.
Secur. Commun. Networks, 2016

Efficient privacy-preserving schemes for dot-product computation in mobile computing.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

2015
Achievable transmission capacity of cognitive radio networks with cooperative relaying.
EURASIP J. Wirel. Commun. Netw., 2015

TORA: A Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks.
Ad Hoc Sens. Wirel. Networks, 2015

A Secure Multi-unit Sealed First-Price Auction Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Bidder-Oriented Privacy-Preserving VCG Auction Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Secure Auctions without an Auctioneer via Verifiable Secret Sharing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
AP Association for Proportional Fairness in Multirate WLANs.
IEEE/ACM Trans. Netw., 2014

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

An extensible and flexible truthful auction framework for heterogeneous spectrum markets.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

2013
Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow CRNs.
IEEE J. Sel. Areas Commun., 2013

Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

Cooperative multi-hop relaying via network formation games in cognitive radio networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A multi-unit truthful double auction framework for secondary market.
Proceedings of IEEE International Conference on Communications, 2013

2012
Delay modeling in mobile cognitive radio networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Achievable transmission capacity of cognitive radio networks with cooperative relaying.
Proceedings of the 7th International Conference on Cognitive Radio Oriented Wireless Networks, 2012

2011
Achieving Proportional Fairness via AP Power Control in Multi-Rate WLANs.
IEEE Trans. Wirel. Commun., 2011

Mobility in IPv6: Whether and How to Hierarchize the Network?
IEEE Trans. Parallel Distributed Syst., 2011

Partially overlapping channel assignment based on "node orthogonality" for 802.11 wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs.
Proceedings of the Wireless Algorithms, 2010


  Loading...