Cyber-physical systems security—A survey A Humayed, J Lin, F Li, B Luo IEEE Internet of Things Journal 4 (6), 1802-1831, 2017 | 1101 | 2017 |
Secure information aggregation for smart grids using homomorphic encryption F Li, B Luo, P Liu 2010 first IEEE international conference on smart grid communications, 327-332, 2010 | 718 | 2010 |
Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain S Awan, F Li, B Luo, M Liu Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 136 | 2019 |
CONTRA: Defending Against Poisoning Attacks in Federated Learning S Awan, B Luo, F Li Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 112 | 2021 |
Secure and privacy-preserving information aggregation for smart grids F Li, B Luo, P Liu International Journal of Security and Networks 6 (1), 28-39, 2011 | 107 | 2011 |
Preserving data integrity for smart grid data aggregation F Li, B Luo 2012 IEEE Third International Conference on Smart Grid Communications …, 2012 | 106 | 2012 |
Stalking online: on user privacy in social networks Y Yang, J Lutes, F Li, B Luo, P Liu Proceedings of the second ACM conference on Data and Application Security …, 2012 | 69 | 2012 |
New threats to health data privacy F Li, X Zou, P Liu, JY Chen BMC bioinformatics 12, 1-7, 2011 | 62 | 2011 |
Certificate transparency in the wild: Exploring the reliability of monitors B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 59 | 2019 |
Detecting false data injection in smart grid in-network aggregation L Yang, F Li 2013 IEEE international conference on smart grid communications …, 2013 | 44 | 2013 |
Enforcing secure and privacy-preserving information brokering in distributed information sharing F Li, B Luo, P Liu, D Lee, CH Chu IEEE transactions on information forensics and security 8 (6), 888-900, 2013 | 43 | 2013 |
In-broker access control: Towards efficient end-to-end performance of information brokerage systems F Li, B Luo, P Liu, D Lee, P Mitra, WC Lee, CH Chu IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006 | 43 | 2006 |
Trust-aware review spam detection H Xue, F Li, H Seo, R Pluretti 2015 IEEE Trustcom/BigDataSE/ISPA 1, 726-733, 2015 | 41 | 2015 |
Privacy-preserving data sharing in smart grid systems L Yang, H Xue, F Li 2014 IEEE International Conference on Smart Grid Communications …, 2014 | 38 | 2014 |
# DontTweetThis: Scoring Private Information in Social Networks Q Wang, H Xue, F Li, D Lee, B Luo Proceedings on Privacy Enhancing Technologies 2019 (4), 72-92, 2019 | 35 | 2019 |
mTor: A multipath Tor routing beyond bandwidth throttling L Yang, F Li 2015 IEEE Conference on Communications and Network Security (CNS), 479-487, 2015 | 35 | 2015 |
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware W Li, J Shi, F Li, J Lin, W Wang, L Guan Proceedings of the 44th International Conference on Software Engineering, 1-12, 2022 | 34 | 2022 |
Aggregating global features into local vision transformer K Patel, AM Bur, F Li, G Wang 2022 26th International Conference on Pattern Recognition (ICPR), 1141-1147, 2022 | 32 | 2022 |
Automaton segmentation: A new approach to preserve privacy in XML information brokering F Li, B Luo, P Liu, D Lee, CH Chu Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 32 | 2007 |
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields Q Zhou, C Tian, H Zhang, J Yu, F Li Information Sciences 512, 641-660, 2020 | 31 | 2020 |