Outputs

As of September 2024, here are our peer-reviewed publications since 2021:

  1. Yebo Feng, Jun Li, Devkishen Sisodia, and Peter Reiher, “On explainable and adaptable detection of distributed denial-of-service traffic,” IEEE Transactions on Dependable and Secure Computing, 21(4):2211-2226, July-August 2024.
  2. Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert Deng, “Double Issuer-Hiding Attribute-Based Credentials from Tag-Based Aggregatable Mercurial Signatures,” IEEE Transactions on Dependable and Secure Computing, 21(4): 2585-2602, July-August 2024.
  3. Yang Yang, Wenyi Xue, Yonghua Zhan, Minming Huang, Yingjiu Li, Robert Deng, “AnoPay: Anonymous Payment for Vehicle Parking with Updatable Credential,” IEEE Transactions on Dependable and Secure Computing, 21(4):1621-1638, July-August 2024.
  4. Ying Zheng, Lei Jiao, Han Yang, Lulu Chen, Ying Liu, Yuxiao Wang, Yuedong Xu, Xin Wang, Zongpeng Li, “Online Scheduling and Pricing for Multi-LoRA Fine-Tuning Tasks”, 53rd International Conference on Parallel Processing (ICPP), August 2024.
  5. Konglin Zhu, Fuchun Zhang, Lei Jiao, Bowei Xue, Lin Zhang, “Client Selection for Federated Learning Using Combinatorial Multi-Armed Bandit under Long-Term Energy Constraint”, Elsevier Computer Networks, 250:110512, August 2024.
  6. Kongyange Zhao, Zhi Zhou, Lei Jiao, Shen Cai, Fei Xu, Xu Chen, “Taming Serverless Cold Start of Cloud Model Inference with Edge Computing”, IEEE Transactions on Mobile Computing, 23(8):8111-8128, August 2024.
  7. Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu, “SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks,” ACM ASIA 19th Conference on Computer and Communications Security (ASIACCS), July 2024.
  8. Ming Shi, Xiaojun Lin, Lei Jiao, “Combining Regularization with Look-Ahead for Competitive Online Convex Optimization”, IEEE/ACM Transactions on Networking, 32(3):2391-2405, June 2024.
  9. Yifan Zeng, Ruiting Zhou, Lei Jiao, Ziyi Han, Jieling Yu, Yue Ma, “Efficient Online DNN Inference with Continuous Learning in Edge Computing”, IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS), June 2024.
  10. Ying Zheng, Lei Jiao, Yuedong Xu, Bo An, Xin Wang, Zongpeng Li, “Scheduling Generative-AI Job DAGs with Model Serving in Data Centers” IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS), short paper, June 2024.
  11. Yingjiu Li, Binanda Sengupta, Yangguang Tian, Jiaming Yuan, Tsz Hon Yuen, “Message Control for Blockchain Rewriting,” IEEE Transactions on Dependable and Secure Computing, early access, March 2024.
  12. Zhangxiang Hu, Jun Li, and Christopher Wilson, “Resilient intermediary-based key exchange protocol for IoT,” ACM Transactions on Internet of Things, 5(1):1-31, February 2024.
  13. Devkishen Sisodia, Jun Li, Samuel Mergendahl, and Hasan Cam, “A two-mode, adaptive security framework for smart home security applications,” ACM Transactions on Internet of Things, 5(2):1-31, February 2024.
  14. Yang Yang, Robert Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng, “PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications,” 31st Network and Distributed System Security Symposium (NDSS), February 2024.
  15. Lingjun Pu, Jianxin Shi, Xinjing Yuan, Xu Chen, Lei Jiao, Tian Zhang, Jingdong Xu, “EMS: Erasure-coded Multi-source Streaming for UHD Videos within Cloud Native 5G Networks”, IEEE Transactions on Mobile Computing, 23(2):1472-1487, February 2024.
  16. Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou, “Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting,” IEEE Transactions on Information Forensics and Security, 19:1756-1766, December 2023.
  17. Bowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hwa Pang, Robert Deng, “Identifiable, But Not Visible: A Privacy-Preserving Person Re-Identification Scheme,” IEEE Transactions on Reliability, 72(4):1295-1307, December 2023.
  18. Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li, “A Robustness-Assured White-Box Watermark in Neural Networks,” IEEE Transactions on Dependable and Secure Computing, 20(6):5214-5229, November-December 2023.
  19. Fei Wang, Lei Jiao, Konglin Zhu, Lin Zhang, “Online Edge Computing Demand Response via Deadline-Aware V2G Discharging Auctions”, IEEE Transactions on Mobile Computing, 22(12):7279-7293, December 2023.
  20. Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher, “Toward adaptive DDoS-filtering rule generation,” IEEE 11th Conference on Communications and Network Security (CNS), October 2023.
  21. Lumin Shi, Jun Li, Devkishen Sisodia, Mingwei Zhang, Alberto Dainotti, and Peter Reiher, “DDoS mitigation dilemma exposed: A two-wave attack with collateral damage of millions,” EAI 19th International Conference on Security and Privacy in Communication Networks (SecureComm), October 2023.
  22. Mingwei Zhang, Jun Li, Jiabin Wu, and Peter Reiher, “A game theoretical analysis of distributed denial-of-service defense incentive,” EAI 19th International Conference on Security and Privacy in Communication Networks (SecureComm), October 2023.
  23. Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen, “A Practical Forward-Secure DualRing,” 22nd International Conference on Cryptology and Network Security (CANS), October 2023.
  24. Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert Deng, “PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability,” Journal of Parallel and Distributed Computing, 180(C):104721, October 2023.
  25. Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert Deng, “Threshold Attribute-based Credentials with Redactable Signature,” IEEE Transactions on Services Computing, 16(5): 3751-3765, September-October 2023.
  26. Yibo Jin, Lei Jiao, Mingtao Ji, Zhuzhong Qian, Sheng Zhang, Ning Chen, Sanglu Lu, “Scheduling In-Band Network Telemetry with Convergence-Preserving Federated Learning”, IEEE/ACM Transactions on Networking, 31(5):2313-2328, October 2023.
  27. Yibo Jin, Lei Jiao, Zhuzhong Qian, Ruiting Zhou, Lingjun Pu, “Orchestrating Blockchain with Decentralized Federated Learning in Edge Networks”, IEEE 20th International Conference on Sensing, Communication, and Networking (SECON), September 2023.
  28. Jun Li, Devkishen Sisodia, and Shad Stafford, “On the detection of smart, self-propagating Internet worms,” IEEE Transactions on Dependable and Secure Computing, 20(4):3051-3063, July-August 2023.
  29. Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert Deng, “CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics,” IEEE Transactions on Information Forensics and Security, 18:5416-5430, August 2023.
  30. Wenyi Xue, Yang Yang, Yingjiu Li, Hwee Hwa Pang, Robert Deng, “ACB-Vote: Efficient, Flexible, and Privacy-Preserving Blockchain-Based Score Voting with Anonymously Convertible Ballots,” IEEE Transactions on Information Forensics and Security, 18:3720-3734, June 2023.
  31. Xinjing Yuan, Lingjun Pu, Lei Jiao, Xiaofei Wang, Meijuan Yang, Jingdong Xu, “When Computing Power Network Meets Distributed Machine Learning: An Efficient Federated Split Learning Framework”, IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), June 2023.
  32. Fei Wang, Lei Jiao, Konglin Zhu, Xiaojun Lin, Lei Li, “Toward Sustainable AI: Federated Learning Demand Response in Cloud-Edge Systems via Auctions”, IEEE 42nd International Conference on Computer Communications (INFOCOM), May 2023.
  33. Biao Hou, Song Yang, Fernando A. Kuipers, Lei Jiao, Xiaoming Fu, “EAVS: Edge-assisted Adaptive Video Streaming with Fine-grained Serverless Pipelines”, IEEE 42nd International Conference on Computer Communications (INFOCOM), May 2023.
  34. Ruiting Zhou, Jinlong Pang, Qin Zhang, Chuan Wu, Lei Jiao, Yi Zhong, Zongpeng Li, “Online Scheduling Algorithm for Heterogeneous Distributed Machine Learning Jobs”, IEEE Transactions on Cloud Computing, 11(2):1514-1529, April-June 2023.
  35. Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng, “SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics,” IEEE Transactions on Dependable and Secure Computing, 20(2):1104-1123, March-April 2023.
  36. Konglin Zhu, Wentao Chen, Lei Jiao, Jiaxing Wang, Yuyang Peng, Lin Zhang, “Online Training Data Acquisition for Federated Learning in Cloud-Edge Networks”, Elsevier Computer Networks, 223:109556, March 2023.
  37. Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng, “A Secure EMR Sharing System with Tamper Resistance and Expressive Access Control,” IEEE Transactions on Dependable and Secure Computing, 20(1):53-67, January-February 2023.
  38. Song Yang, Lei Jiao, Ramin Yahyapour, Jiannong Cao, “Online Orchestration of Collaborative Caching for Multi-Bitrate Videos in Edge Computing”, IEEE Transactions on Parallel and Distributed Systems, 33(12):4207-4220, December 2022.
  39. Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert Deng, “M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption,” 17th International Conference on Information Security Practice and Experience (ISPEC), November 2022.
  40. Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng, “Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing,” IEEE Transactions on Dependable and Secure Computing, 19(2): 1064-1077, November-December 2022.
  41. Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, Jianfeng Ma, “CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases”, IEEE Journal on Selected Areas in Communications, 40(11):3191-3206, November 2022.
  42. Yebo Feng, Devkishen Sisodia, and Jun Li, “CJ-Sniffer: Measurement and content-agnostic detection of cryptojacking traffic,” 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), October 2022.
  43. Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert Deng, “Accountable and Fine-Grained Controllable Rewriting in Blockchains,” IEEE Transactions on Information Forensics and Security, 18:101-116, October 2022.
  44. Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert Deng, Zheng Yang, “Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification,” The Computer Journal, 65(10): 2570-2588, October 2022.
  45. Ming Shi, Xiaojun Lin, Lei Jiao, “Power-of-2-Arms for Bandit Learning with Switching Costs”, ACM 23rd International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MOBIHOC), October 2022.
  46. Yi Zhong, Lei Jiao, Ruiting Zhou, Liujing Song, “On-Demand or On-Premises: Online Mitigation of DDoS Attacks via Cloud-Edge Coordination”, IEEE 19th International Conference on Sensing, Communication and Networking (SECON), September 2022.
  47. Youmei Song, Lei Jiao, Renyu Yang, Tianyu Wo, Jie Xu, “Incentivizing Online Edge Caching via Auction-Based Subsidization”, IEEE 19th International Conference on Sensing, Communication and Networking (SECON), September 2022.
  48. Yulan Yuan, Lei Jiao, Konglin Zhu, Lin Zhang, “Scheduling Online EV Charging Demand Response via V2V Auctions and Local Generation”, IEEE Transactions on Intelligent Transportation Systems, 23(8):11436-11452, August 2022.
  49. Ne Wang, Ruiting Zhou, Lei Jiao, Renli Zhang, Bo Li, Zongpeng Li, “Preemptive Scheduling for Distributed Machine Learning Jobs in Edge-Cloud Networks”, IEEE Journal on Selected Areas in Communications, 40(8):2411-2425, August 2022.
  50. Yulan Yuan, Lei Jiao, Konglin Zhu, Lin Zhang, “Incentivizing Federated Learning under Long-Term Energy Constraint via Online Randomized Auctions”, IEEE Transactions on Wireless Communications, 21(7):5129-5144, July 2022.
  51. Lumin Shi, Jun Li, Mingwei Zhang, and Peter Reiher, “On capturing DDoS traffic footprints on the Internet,” IEEE Transactions on Dependable and Secure Computing, 19(4):2755–2770, July-August 2022.
  52. Bowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hwa Pang, Robert Deng, “FREED: An Efficient Privacy-Preserving Solution for Person Re-Identification,” IEEE 5th Conference on Dependable and Secure Computing (DSC), Best Paper Award, June 2022.
  53. Yulan Yuan, Lei Jiao, Konglin Zhu, Xiaojun Lin, Lin Zhang, “AI in 5G: The Case of Online Distributed Transfer Learning over Edge Networks”, IEEE 41st International Conference on Computer Communications (INFOCOM), May 2022.
  54. Zhangxiang Hu, Jun Li, Samuel Mergendahl, and Christopher Wilson, “Toward a resilient key exchange protocol for IoT,” ACM 12th Conference on Data and Application Security and Privacy (CODASPY), April 2022.
  55. Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Bowen Zhao, Yang Yang, Ximeng Liu, Robert Deng, “ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning,” IEEE Transactions on Information Forensics and Security, 17:1639-1654, April 2022.
  56. Li Song, Qiongxiao Wang, Jingqiang Lin, Yingjiu Li, Shijie Jia, “Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme,” IEEE 23rd Wireless Communications and Networking Conference (WCNC), April 2022.
  57. Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu, “SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering,” IEEE Transactions on Dependable and Secure Computing, 19(2):1149-1163, March-April 2022.
  58. Shutong Chen, Lei Jiao, Fangming Liu, Lin Wang, “EdgeDR: An Online Mechanism Design for Demand Response in Edge Clouds”, IEEE Transactions on Parallel and Distributed Systems, 33(2):343-358, February 2022.
  59. Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li, “DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model,” IEEE Transactions on Dependable and Secure Computing, 19(1):77-90, January-February 2022.
  60. Yibo Jin, Zhuzhong Qian, Song Guo, Sheng Zhang, Lei Jiao, Sanglu Lu, “runData: Re-distributing Data via Piggybacking for Geo-distributed Data Analytics over Edges”, IEEE Transactions on Parallel and Distributed Systems, 33(1):40-55, January 2022.
  61. Yibo Jin, Lei Jiao, Zhuzhong Qian, Sheng Zhang, Sanglu Lu, “Budget-Aware Online Control of Edge Federated Learning on Streaming Data with Stochastic Inputs”, IEEE Journal on Selected Areas in Communications, 39(12):3704-3722, December 2021.
  62. Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng, “LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset,” ACM Conference on Computer and Communications Security (CCS), November 2021.
  63. Yebo Feng, Jun Li, Lei Jiao, Xintao Wu, “Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic,” IEEE Transactions on Dependable and Secure Computing, 18(5):2149-2163, September-October 2021.
  64. Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu, “Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud,” IEEE Transactions on Dependable and Secure Computing, 19(6):3759-3773, August 2021.
  65. Ximing Liu, Yingjiu Li, Robert H. Deng, “UltraPIN: Inferring PIN Entries via Ultrasound,” ACM Asia Conference on Computer and Communications Security (ASIACCS), June 2021.
  66. Jianzhen Luo, Jun Li, Lei Jiao, Jun Cai, “On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains,” IEEE Transactions on Parallel and Distributed Systems, 32(5):1238-1255, May 2021.
  67. Yangguang Tian, Yingjiu Li, Robert Deng, Binanda Sengupta, Guomin Yang, “Lattice-Based Remote User Authentication from Reusable Fuzzy Signature,” Journal of Computer Security, 29(3): 273-298, May 2021.
  68. Yibo Jin, Lei Jiao, Zhuzhong Qian, Sheng Zhang, Sanglu Lu, “Learning for Learning: Predictive Online Control of Federated Learning with Edge Provisioning”, IEEE 40th International Conference on Computer Communications (INFOCOM), May 2021.
  69. Ming Shi, Xiaojun Lin, Lei Jiao, “Combining Regularization with Look-Ahead for Competitive Online Convex Optimization”, IEEE 40th International Conference on Computer Communications (INFOCOM), May 2021.
  70. Jiayun Xu, Yingjiu Li, Robert Deng, “Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection,” Network and Distributed System Security Symposium (NDSS), February 2021.
  71. Lin Wang, Lei Jiao, Ting He, Jun Li, Henri Bal, “Service Placement for Collaborative Edge Applications”, IEEE/ACM Transactions on Networking, 29(1):34-47, February 2021.