What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Fengjun Li
Google Scholar
ORCID:
0000-0003-4079-2228
30
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps.
Zhaohui Wang
Bo Luo
Fengjun Li
2024
journals/popets
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Liangqin Ren
Zeyan Liu
Fengjun Li
Kaitai Liang
Zhu Li
Bo Luo
2024
conf/ccs
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition.
Ye Wang
Zeyan Liu
Bo Luo
Rongqing Hui
Fengjun Li
2024
conf/ccs
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing.
Zeyan Liu
Zijun Yao
Fengjun Li
Bo Luo
2024
conf/esorics
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking.
Yuying Li
Zeyan Liu
Junyi Zhao
Liangqin Ren
Fengjun Li
Jiebo Luo
Bo Luo
2024
conf/esorics
Companion Apps or Backdoors? On the Security of Automotive Companion Apps.
Prashanthi Mallojula
Fengjun Li
Xiaojiang Du
Bo Luo
2024
conf/ndss
Certificate Transparency Revisited: The Public Inspections on Third-party Monitors.
Aozhuo Sun
Jingqiang Lin
Wei Wang
Zeyan Liu
Bingyu Li
Shushang Wen
Qiongxiao Wang
Fengjun Li
2024
conf/acsac
Eunomia: A Real-time Privacy Compliance Firewall for Alexa Skills.
Javaria Ahmad
Fengjun Li
Razvan Beuran
Bo Luo
2023
conf/ccs
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
Kevin Li
Zhaohui Wang
Ye Wang
Bo Luo
Fengjun Li
2022
conf/ccs
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
Zeyan Liu
Fengjun Li
Zhu Li
Bo Luo
2022
conf/esorics
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.
Javaria Ahmad
Fengjun Li
Bo Luo
2022
conf/esorics
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
Zeyan Liu
Fengjun Li
Jingqiang Lin
Zhu Li
Bo Luo
2021
conf/esorics
CONTRA: Defending Against Poisoning Attacks in Federated Learning.
Sana Awan
Bo Luo
Fengjun Li
2021
conf/ndss
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware.
Wenqiang Li
Le Guan
Jingqiang Lin
Jiameng Shi
Fengjun Li
2021
conf/acsac
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
Sohaib Kiani
Sana Awan
Chao Lan
Fengjun Li
Bo Luo
2020
conf/acns
Exploring the Security of Certificate Transparency in the Wild.
Bingyu Li
Fengjun Li
Ziqiang Ma
Qianhong Wu
2020
conf/esorics
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
Abdulmalik Humayed
Fengjun Li
Jingqiang Lin
Bo Luo
2019
journals/popets
#DontTweetThis: Scoring Private Information in Social Networks.
Qiaozhi Wang
Hao Xue
Fengjun Li
Dongwon Lee
Bo Luo
2019
conf/ccs
Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Bingyu Li
Jingqiang Lin
Fengjun Li
Qiongxiao Wang
Qi Li
Jiwu Jing
Congli Wang
2019
conf/ccs
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
Sana Awan
Fengjun Li
Bo Luo
Mei Liu
2019
conf/sec
Arcana: Enabling Private Posts on Public Microblog Platforms.
Anirudh Narasimman
Qiaozhi Wang
Fengjun Li
Dongwon Lee
Bo Luo
2018
conf/esorics
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways.
Lei Yang
Chris Seasholtz
Bo Luo
Fengjun Li
2018
conf/cns
Cloud-Assisted Privacy-Preserving Classification for IoT Applications.
Lei Yang
Fengjun Li
2016
conf/acsac
A multi-cloud based privacy-preserving data publishing scheme for the internet of things.
Lei Yang
Abdulmalik Humayed
Fengjun Li
2015
conf/ccs
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations.
Fengjun Li
Xin Fu
Bo Luo
2015
conf/cns
mTor: A multipath Tor routing beyond bandwidth throttling.
Lei Yang
Fengjun Li
2015
conf/cns
Enhancing traffic analysis resistance for Tor hidden services with multipath routing.
Lei Yang
Fengjun Li
2014
conf/icics
SEDB: Building Secure Database Services for Sensitive Data.
Quanwei Cai
Jingqiang Lin
Fengjun Li
Qiongxiao Wang
2013
journals/tifs
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing.
Fengjun Li
Bo Luo
Peng Liu
Dongwon Lee
Chao-Hsien Chu
2007
conf/ccs
Automaton segmentation: a new approach to preserve privacy in xml information brokering.
Fengjun Li
Bo Luo
Peng Liu
Dongwon Lee
Chao-Hsien Chu
Coauthors
Abdulmalik Humayed
(2)
Anirudh Narasimman
(1)
Aozhuo Sun
(1)
Bingyu Li
(3)
Bo Luo
(21)
Chao Lan
(1)
Chao-Hsien Chu
(2)
Chris Seasholtz
(1)
Congli Wang
(1)
Dongwon Lee
(4)
Fengjun Li
(30)
Hao Xue
(1)
Javaria Ahmad
(2)
Jiameng Shi
(1)
Jiebo Luo
(1)
Jingqiang Lin
(6)
Jiwu Jing
(1)
Junyi Zhao
(1)
Kaitai Liang
(1)
Kevin Li
(1)
Le Guan
(1)
Lei Yang
(5)
Liangqin Ren
(2)
Mei Liu
(1)
Peng Liu
(2)
Prashanthi Mallojula
(1)
Qi Li
(1)
Qianhong Wu
(1)
Qiaozhi Wang
(2)
Qiongxiao Wang
(3)
Quanwei Cai
(1)
Razvan Beuran
(1)
Rongqing Hui
(1)
Sana Awan
(3)
Shushang Wen
(1)
Sohaib Kiani
(1)
Wei Wang
(1)
Wenqiang Li
(1)
Xiaojiang Du
(1)
Xin Fu
(1)
Ye Wang
(2)
Yuying Li
(1)
Zeyan Liu
(7)
Zhaohui Wang
(1)
Zhaohui Wang
(1)
Zhu Li
(1)
Zhu Li
(2)
Zijun Yao
(1)
Ziqiang Ma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to