What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ming Li
Google Scholar
ORCID:
0000-0002-4073-0273
50
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Investigating Physical Latency Attacks Against Camera-Based Perception.
Raymond Muller
Ruoyu Song
Chenyi Wang
Yuxia Zhan
Jean-Philippe Monteuuis
Yanmao Man
Ming Li
Ryan M. Gerdes
Jonathan Petit
Z. Berkay Celik
2025
conf/uss
DP-BREM: Differentially-Private and Byzantine-Robust Federated Learning with Client Momentum.
Xiaolan Gu
Ming Li
Li Xiong
2025
conf/uss
From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception.
Chenyi Wang
Raymond Muller
Ruoyu Song
Jean-Philippe Monteuuis
Jonathan Petit
Yanmao Man
Ryan M. Gerdes
Z. Berkay Celik
Ming Li
2024
journals/tifs
Online Context-Aware Streaming Data Release With Sequence Information Privacy.
Bo Jiang
Ming Li
Ravi Tandon
2024
conf/uss
VOGUES: Validation of Object Guise using Estimated Components.
Raymond Muller
Yanmao Man
Ming Li
Ryan M. Gerdes
Jonathan Petit
Z. Berkay Celik
2024
conf/acsac
Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory.
Chenyi Wang
Yanmao Man
Raymond Muller
Ming Li
Z. Berkay Celik
Ryan M. Gerdes
Jonathan Petit
2023
journals/compsec
FastReach: A system for privacy-preserving reachability queries over location data.
Hanyu Quan
Boyang Wang
Ming Li
Iraklis Leontiadis
2023
journals/tifs
Answering Count Queries for Genomic Data With Perfect Privacy.
Bo Jiang
Mohamed Seif
Ravi Tandon
Ming Li
2023
conf/uss
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency.
Yanmao Man
Raymond Muller
Ming Li
Z. Berkay Celik
Ryan M. Gerdes
2022
journals/tifs
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach.
Wenjing Zhang
Bo Jiang
Ming Li
Xiaodong Lin
2022
conf/ccs
Physical Hijacking Attacks against Object Trackers.
Raymond Muller
Yanmao Man
Z. Berkay Celik
Ming Li
Ryan M. Gerdes
2022
conf/sp
Towards Wireless Spiking of Smart Locks.
Abdullah Zubair Mohammed
Alok K. Singh
Gökçen Yilmaz Dayanikli
Ryan M. Gerdes
Mani Mina
Ming Li
2022
conf/ndss
PoF: Proof-of-Following for Vehicle Platoons.
Ziqi Xu
Jingcheng Li
Yanjun Pan
Loukas Lazos
Ming Li
Nirnimesh Ghose
2022
conf/wisec
Passive Drone Localization Using LTE Signals.
Mingshun Sun
Zhiwu Guo
Ming Li
Ryan M. Gerdes
2021
journals/tifs
Context-Aware Local Information Privacy.
Bo Jiang
Mohamed Seif
Ravi Tandon
Ming Li
2020
journals/compsec
Aggregation-based location privacy: An information theoretic approach.
Wenjing Zhang
Bo Jiang
Ming Li
Ravi Tandon
Qiao Liu
Hui Li
2020
conf/uss
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Xiaolan Gu
Ming Li
Yueqiang Cheng
Li Xiong
Yang Cao
2020
conf/acsac
StegoNet: Turn Deep Neural Network into a Stegomalware.
Tao Liu
Zihao Liu
Qi Liu
Wujie Wen
Wenyao Xu
Ming Li
2020
conf/wisec
SVM: secure vehicle motion verification with a single wireless receiver.
Mingshun Sun
Yanmao Man
Ming Li
Ryan M. Gerdes
2019
journals/tifs
Online Location Trace Privacy: An Information Theoretic Approach.
Wenjing Zhang
Ming Li
Ravi Tandon
Hui Li
2019
conf/cns
Supporting Both Range Queries and Frequency Estimation with Local Differential Privacy.
Xiaolan Gu
Ming Li
Yang Cao
Li Xiong
2019
conf/cns
Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Hanyu Quan
Hao Liu
Boyang Wang
Ming Li
Yuqing Zhang
2019
conf/acsac
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Mahsa Foruhandeh
Yanmao Man
Ryan M. Gerdes
Ming Li
Thidapat Chantem
2019
conf/wisec
Crowdsourced measurements for device fingerprinting.
Seth Andrews
Ryan M. Gerdes
Ming Li
2018
conf/ccs
Storage Efficient Substring Searchable Symmetric Encryption.
Iraklis Leontiadis
Ming Li
2018
conf/sp
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks.
Nirnimesh Ghose
Loukas Lazos
Ming Li
2018
conf/cns
Pseudonym Inference in Cooperative Vehicular Traffic Scenarios.
Xu Chu
Na Ruan
Ming Li
Weijia Jia
2018
conf/cns
Context-aware Data Aggregation with Localized Information Privacy.
Bo Jiang
Ming Li
Ravi Tandon
2018
conf/cns
Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications.
Mingshun Sun
Ming Li
Ryan M. Gerdes
2018
conf/wisec
LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard.
Islam Samy
Loukas Lazos
Yong Xiao
Ming Li
Marwan Krunz
2017
conf/uss
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation.
Nirnimesh Ghose
Loukas Lazos
Ming Li
2017
conf/cns
Towards physical layer identification of cognitive radio devices.
Seth Andrews
Ryan M. Gerdes
Ming Li
2017
conf/cns
A data trust framework for VANETs enabling false data detection and secure vehicle tracking.
Mingshun Sun
Ming Li
Ryan M. Gerdes
2017
conf/dsn
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles.
Daniel D. Dunn
Samuel A. Mitchell
Imran Sajjad
Ryan M. Gerdes
Rajnikant Sharma
Ming Li
2016
journals/tifs
Geometric Range Search on Encrypted Spatial Data.
Boyang Wang
Ming Li
Haitao Wang
2016
journals/tifs
Jamming Resilient Communication Using MIMO Interference Cancellation.
Qiben Yan
Huacheng Zeng
Tingting Jiang
Ming Li
Wenjing Lou
Yiwei Thomas Hou
2016
conf/ccs
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Shuo Qiu
Boyang Wang
Ming Li
Jesse Victors
Jiqiang Liu
Yanfeng Shi
Wei Wang
2016
conf/cans
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
Hanyu Quan
Boyang Wang
Iraklis Leontiadis
Ming Li
Yuqing Zhang
2015
conf/ccs
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Yantian Hou
Ming Li
Ruchir Chauhan
Ryan M. Gerdes
Kai Zeng
2015
conf/cns
Circular range search on encrypted spatial data.
Boyang Wang
Ming Li
Haitao Wang
Hui Li
2014
conf/ccs
POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems.
Bhaswati Deka
Ryan M. Gerdes
Ming Li
Kevin P. Heaslip
2014
conf/ccs
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Boyang Wang
Yantian Hou
Ming Li
Haitao Wang
Hui Li
2014
conf/cns
A tale of two clouds: Computing on data encrypted under multiple keys.
Boyang Wang
Ming Li
Sherman S. M. Chow
Hui Li
2013
conf/ccs
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Wenhai Sun
Bing Wang
Ning Cao
Ming Li
Wenjing Lou
Y. Thomas Hou
Hui Li
2013
conf/cns
Computing encrypted cloud data efficiently under multiple keys.
Boyang Wang
Ming Li
Sherman S. M. Chow
Hui Li
2013
conf/wisec
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Lu Shi
Jiawei Yuan
Shucheng Yu
Ming Li
2013
conf/wisec
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Yantian Hou
Ming Li
Joshua D. Guttman
2012
conf/ccs
Authenticated secret key extraction using channel characteristics for body area networks.
Jiawei Yuan
Lu Shi
Shucheng Yu
Ming Li
2012
conf/esorics
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Yao Zheng
Ming Li
Wenjing Lou
Y. Thomas Hou
2012
conf/wisec
BANA: body area network authentication exploiting channel characteristics.
Lu Shi
Ming Li
Shucheng Yu
Jiawei Yuan
Coauthors
Abdullah Zubair Mohammed
(1)
Alok K. Singh
(1)
Bhaswati Deka
(1)
Bing Wang
(1)
Bo Jiang
(6)
Boyang Wang
(9)
Chenyi Wang
(3)
Daniel D. Dunn
(1)
Gökçen Yilmaz Dayanikli
(1)
Haitao Wang
(3)
Hanyu Quan
(3)
Hao Liu
(1)
Huacheng Zeng
(1)
Hui Li
(7)
Imran Sajjad
(1)
Iraklis Leontiadis
(3)
Islam Samy
(1)
Jean-Philippe Monteuuis
(2)
Jesse Victors
(1)
Jiawei Yuan
(3)
Jingcheng Li
(1)
Jiqiang Liu
(1)
Jonathan Petit
(4)
Joshua D. Guttman
(1)
Kai Zeng
(1)
Kevin P. Heaslip
(1)
Li Xiong
(3)
Loukas Lazos
(4)
Lu Shi
(3)
Mahsa Foruhandeh
(1)
Mani Mina
(1)
Marwan Krunz
(1)
Ming Li
(50)
Mingshun Sun
(4)
Mohamed Seif
(2)
Na Ruan
(1)
Ning Cao
(1)
Nirnimesh Ghose
(3)
Qi Liu
(1)
Qiao Liu
(1)
Qiben Yan
(1)
Rajnikant Sharma
(1)
Ravi Tandon
(6)
Raymond Muller
(6)
Ruchir Chauhan
(1)
Ruoyu Song
(1)
Ruoyu Song
(1)
Ryan M. Gerdes
(17)
Samuel A. Mitchell
(1)
Seth Andrews
(2)
Sherman S. M. Chow
(2)
Shucheng Yu
(3)
Shuo Qiu
(1)
Tao Liu
(1)
Thidapat Chantem
(1)
Tingting Jiang
(1)
Wei Wang
(1)
Weijia Jia
(1)
Wenhai Sun
(1)
Wenjing Lou
(3)
Wenjing Zhang
(3)
Wenyao Xu
(1)
Wujie Wen
(1)
Xiaodong Lin
(1)
Xiaolan Gu
(3)
Xu Chu
(1)
Y. Thomas Hou
(2)
Yanfeng Shi
(1)
Yang Cao
(2)
Yanjun Pan
(1)
Yanmao Man
(8)
Yantian Hou
(3)
Yao Zheng
(1)
Yiwei Thomas Hou
(1)
Yong Xiao
(1)
Yueqiang Cheng
(1)
Yuqing Zhang
(2)
Yuxia Zhan
(1)
Z. Berkay Celik
(6)
Zhiwu Guo
(1)
Zihao Liu
(1)
Ziqi Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to