Selected Publications
2021
- Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, Alexandru G. Bardas. Defensive Technology Use by Political Activists During the Sudanese Revolution. In IEEE Symposium on Security and Privacy (S&P) -- Oakland, May 2021.
- Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, and Bo Luo. Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. In Annual Computer Security Applications Conference (ACSAC), 2021.
- Sana Awan, Bo Luo, and Fengjun Li. CONTRA: Defending against Poisoning Attacks in Federated Learning. In European Symposium on Research in Computer Security (ESORICS), 2021.
- Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, and Bo Luo. You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. In IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021.
2020
- Kailani R. Jones, Ting-Fang Yen, Sathya Chandran Sundaramurthy, Alexandru G. Bardas. Deploying Android Security Updates: An Extensive Study Involving Manufacturers, Carriers, and End Users. In ACM SIGSAC Conference on Computer and Communications Security (CCS), November 2020.
- Yousif Dafalla, Bo Liu, Dalton A. Hahn, Hongyu Wu, Reza Ahmadi, and Alexandru G. Bardas. Prosumer Nanogrids: A Cybersecurity Assessment. In IEEE Access, Volume 8, July 2020.
- Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, and Bo Luo. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. In European Symposium on Research in Computer Security (ESORICS), 2020.
- Xing Song, Lemuel R. Waitman, Yong Hu, Bo Luo, Fengjun Li, and Mei Liu. The Impact of Medical Big Data Anonymization on Early Acute Kidney Injury Risk Prediction. In AMIA Summits on Translational Science Proceedings. May 2020.
- Ron Andrews, Dalton A. Hahn, and Alexandru G. Bardas. Measuring the Prevalence of the Password Authentication Vulnerability in SSH. In IEEE International Conference on Communications (ICC) – Communications and Information System Security (CISS) Symposium, June 2020.
- Sohaib Kiani, Sana Awan, Jun Huan, Fengjun Li, and Bo Luo. WOLF: Automated Machine Learning Workflow Management Framework for Malware Detection and Other Applications. In Annual Hot Topics in the Science of Security Symposium (HoTSoS), 2020.
- Dalton A. Hahn, Drew Davidson, and Alexandru G. Bardas. MisMesh: Security Issues and Challenges in Service Meshes (Short Paper). In Security and Privacy in Communication Networks (SecureComm), October 2020.
2019
- Sana Awan, Fengjun Li, Bo Luo, and Mei Liu. POSTER: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain. In ACM Conference on Computer and Communications Security - Posters and Demos, 2019. (Poster).
- Qiaozhi Wang, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. #DontTweetThis: Scoring Private Information in Social Networks. In the 19th Privacy Enhancing Technologies Symposium (PETS), 2019.
- Anirudh Narasimman, Qiaozhi Wang, Fengjun Li, Dongwon Lee, and Bo Luo. Arcana: Enabling Private Posts on Public Microblog Platforms. In 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC), Lisbon, Portugal, June 2019.
- Hao Xue, Qiaozhi Wang, Bo Luo, Hyunjin Seo, and Fengjun Li. Content-Aware Trust Propagation Towards Online Review Spam Detection. In ACM Journal of Data and Information Quality (JDIQ), 2019.
2018
- Lei Yang, Chris Seasholtz, Bo Luo, and Fengjun Li. Hide Your Hackable Smart Home From Remote Attacks: The Multipath Onion IoT Gateways. In European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, 2018. .
- Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, and Bo Luo. My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. In ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, IN, June 2018..
- Lei Yang and Fengjun Li, Cloud-Assisted Privacy-Preserving Classification for IoT Applications. In IEEE Conference on Communications and Network Security (CNS), Beijing, China, May 2018.
2017
- Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. Cyber-Physical Systems Security -- A Survey. In IEEE Internet of Things Journal - Special Issue on Security and Privacy in Cyber-Physical Systems, Volume: 4 Issue: 6, 2017.
- Chao Lan, Yuhao Yang, Xiaoli Li, Bo Luo, and Jun Huan. Learning Social Circles in Ego-Networks based on Multi-View Network Structure. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 29, iss. 8, Aug 2017.
- Hao Xue and Fengjun Li, Online Review Spam Detection through Content-Aware Trust Propagation. In the 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Philadelphia, PA, July 2017.
- Qiaozhi Wang, Jaisneet Bhandal, Shu Huang and Bo Luo. Content-Based Classification of Sensitive Tweets. In International Journal of Semantic Computing (IJSC), Special Issue on ICSC2017 Best Papers, Vol. 11, No. 04, pp. 541-562, 2017.
- Abdulmalik Humayed, and Bo Luo. Using ID-Hopping to Defend Against Targeted DoS on CAN. In International Workshop on Safe Control of Connected and Autonomous Vehicles (SCAV), in conjunction with CPS Week 2017, Pittsburgh, PA, 2017.
- Lei Yang and Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection. In EAI Transactions on Industrial Networks and Intelligent Systems – Special Issue on CI & Smart Grid Cyber Security, 17(10):e5, February, 2017.
2016
- Lei Yang, Humayed Abudulmalik, and Fengjun Li, A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things. In Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, December 2016.
- Jingqiang Lin, Bo Luo, Le Guan, and Jiwu Jing. Secure Computing using Registers and Caches: the Problem, Challenges and Solutions. In IEEE Security & Privacy Magazine, vol. 14, iss. 6, 2016.
- Lei Yang and Fengjun Li, Securing Smart Grid In-Network Aggregation through False Data Detection. In EAI Transactions on Industrial Networks and Intelligent Systems – Special Issue on CI & Smart Grid Cyber Security, 17(10):e5, February, 2017.
2015
- Jamuna Gopal, Shu Huang, and Bo Luo. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs. In 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Fairfax, VA, 2015.
- Manogna Thimma, Fang Liu, Jingqiang Lin, and Bo Luo. HyXAC: Hybrid XML Access Control Integrating View-based and Query-rewriting Approaches. In IEEE Transactions on Knowledge and Data Engineering (TKDE), vol 27, issue 8, 2015.
- Lei Yang and Fengjun Li, Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing, in the 11th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Dallas, USA, October, 2015. Best Paper Award Winner.
- Fengjun Li, Xin Fu, and Bo Luo. POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. In ACM Conference on Computer and Communications Security (CCS), 2015 (Poster).
- Lei Yang and Fengjun Li, mTor: A Multipath Tor Routing beyond Bandwidth Throttling, In IEEE Conference on Communications and Network Security (CNS), Florence, Italy, September 2015.
2014
-
Wenrong Zeng, Yuhao Yang, and Bo Luo. Content-Based Access Control: Use Data Content to Assist Access Control for Large-Scale Content-Centric Databases. In IEEE International Conference on Big Data (IEEE BigData), 2014 (Acceptance rate: 18.5%).
- Yuhao Yang, Chao Lan, Xiaoli Li, Bo Luo, and Jun Huan. Automatic Social Circle Detection Using Multi-View Clustering. In ACM Conf. on Information and Knowledge Management (CIKM), 2014 (Acceptance rate: 20.9%).
- Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, “SEDB: Building Secure Database Services for Sensitive Data,” in 16th International Conference on Information and Communications Security (ICICS 2014), Hong Kong, December 2014.
- Lei Yang, Hao Xue, Fengjun Li, “Privacy-preserving Data Management in Smart Grid Systems,” in the 5th IEEE International Conference on Smart Grid Communications (SmartGridComm 2014), Venice, Italy, November 2014.
- Le Guan, Jingqiang Lin, Bo Luo, and Jiwu Jing. Copker: Computing with Private Keys without RAM. In Network and Distributed System Security Symposium (NDSS), 2014 (Acceptance rate: 18%)
2013
- Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, and Chao-Hsien Chu. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing. In IEEE Transactions on Information Forensics & Security, vol 8, no 6, pp. 888-900, June 2013.
- Lei Yang and Fengjun Li. Detecting False Data Injection in Smart Grid In-Network Aggregation,
the 4th IEEE International Conference on Smart Grid Communications (SmartGridComm), October 2013. Vancouver, Canada.
- Egemen K. Cetinkaya, Dan Broyles, Amit Dandekar, Sripriya Srinivasan, and James P. G. Sterbenz.
Modelling Communication Network Challenges for Future Internet Resilience, Survivability,
and Disruption Tolerance: A Simulation-Based Approach. Telecommunication Systems,
52(2):751–766, 2013.
- J.B. Evans, B.J. Ewy, M.T. Swink, S.G. Pennington, D.J. Siquieros, and S.L. Earp. TIGR: the tactical
ground reporting system. IEEE Communications Magazine, 51(10):42–49, October 2013.
- Manogna Thimma, Tsam Kai Tsui, and Bo Luo. HyXAC: a hybrid approach for XML access control. In ACM Symposium on Access Control Models and Technologies (SACMAT), 2013.
- Egemen K. C¸ etinkaya and James P. G. Sterbenz. A Taxonomy of Network Challenges. In Proceedings
of the 9th IEEE/IFIP International Conference on the Design of Reliable Communication Networks
(DRCN), pages 322–330, Budapest, March 2013.
- Brigid Halling and Perry Alexander. Verifying a privacy CA remote attestation protocol. In NASA
Formal Methods, pages 398–412. Springer, 2013.
2012
-
Fengjun Li, and Bo Luo. Preserving Data Integrity for Smart Grid Data Aggregation. In IEEE International Conference on Smart Grid Communications (SmartGridComm), 2012.
- Yingying Ma and Fengjun Li. Detecting Review Spam: Challenges and Opportunities. In Collaborative Communities for Social Computing (CCSocialComp) Workshop, October 2012. Pittsburgh, PA. (invited paper)
- Jingqiang Lin, Bo Luo, Jiwu Jing and Xiaokun Zhang. GRADE: Graceful Degradation in Byzantine Quorum Systems. In 31st International Symposium on Reliable Distributed Systems (SRDS), 2012.
- Yuxin Chen and Bo Luo. S2A: Secure Smart Household Appliances. In ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. Acceptance rate: 18.6%
- Yuhao Yang, Jonathan Lutes, Fengjun Li, Bo Luo and Peng Liu. Stalking Online: on User Privacy in Social Networks. In ACM Conference on Data and Application Security and Privacy (CODASPY), 2012. Acceptance rate: 18.6%
- D. Hein, S. Morozov, and H. Saiedian. A survey of client-side web threats and counter-threat
measures. Security and Communication Networks, 5(5):535–544, 2012.
2011
-
Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. QFilter: Rewriting Insecure XML Queries to Secure Ones using Non-Deterministic Finite Automata. In The VLDB Journal, vol. 20, no. 3, 2011.
- Fengjun Li, Bo Luo, and Peng Liu. Secure and Privacy-Preserving Information Aggregation for Smart Grids. In International Journal of Security and Networks, Special Issue on Security and Privacy in Smart Grid, Vo. 6, No. 1, 2011.
- Fengjun Li, Yuxin Chen, Bo Luo, Dongwon Lee and Peng Liu. Privacy-Preserving Group Linkage. In 23rd Scientific and Statistical Database Management Conference (SSDBM), Portland, OR, July 2011.
- H. Saiedian and D. Broyles. Security vulnerabilities in the same-origin policy: Implications and
alternatives. IEEE Computer, 44(9):29–36, Sep. 2011.
- Abdul Jabbar, Justin P Rohrer, Victor S Frost, and James PG Sterbenz. Survivable millimeterwave
mesh networks. Computer Communications, 34(16):1942–1955, 2011.
- Martin Kuehnhausen and Victor S Frost. Transportation security sensornet: a service-oriented
architecture for cargo monitoring. Journal of Systems and Information Technology, 13(4):369–388,
2011.
2010
- Daniel T Fokum, Victor S Frost, Martin Kuehnhausen, Daniel DePardo, Angela N Oguna, Leon S
Searl, Edward Komp, Matthew Zeets, Daniel D Deavours, Joseph B Evans, and Gary Minden. An opensystem
transportation security sensor network: Field-trial experiences. In IEEE
Transactions on Vehicular Technology, 59(8):3942–3955, 2010.
- James P. G. Sterbenz, David Hutchison, Egemen K. Cetinkaya, Abdul Jabbar, Justin P. Rohrer,
Marcus Scholler, and Paul Smith. Resilience and survivability in communication networks:
Strategies, principles, and survey of disciplines. Computer Networks, 54(8):1245–1265, 2010.
- Fengjun Li, Bo Luo, and Peng Liu. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption. In IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, MD, October 2010.
- Fengjun Li, Bo Luo, Peng Liu, and Chao-Hsien Chu. A Node-failure Resilient Anonymous Communication Protocol through Commutative Path Hopping. In IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, March 2010. Acceptance rate: 17.5%
2009
- Benjamin J Ewy, Michael T Swink, Steven G Pennington, Joseph B Evans, JinMKim, Chun Ling,
Samuel L Earp, and Mari Maeda. Tigr in iraq and afghanistan: Network-adaptive distribution of
media rich tactical data. In Military Communications Conference (MILCOM), 2009, pages
1–7. IEEE, 2009.
- D. Hein and H. Saiedian. Secure sofware engineering: Learning from the past to address the
future’s challenges. Information Security Journal: A Global Perspective, 18(1):08–25, 2009.
- B. Quanz, H. Fei, J. Huan, J. Evans, V. Frost, G. Minden, D. Deavours,
L. Searl, D. DePardo, M. Kuehnhausen, D. Fokum, M. Zeets, and A. Oguna. Anomaly detection with sensor
data for distributed security. In ICCCN 2009 Workshop on Sensor Networks (SN 2009), pages 1–6.
IEEE, 2009.
2008 and earlier
- Perry Alexander. Security as a system-level constraint. Invited presentation at High Confidence
Systems and Software Symposium (HCSS’08), 2008.
- Soshant Bali, Sridhar Machiraju, Hui Zang, and Victor Frost. A measurement study of schedulerbased
attacks in 3g wireless networks. In Passive and Active Network Measurement, pages 105–114.
Springer, 2007.
- Joseph B Evans, Weichao Wang, and Benjamin J Ewy. Wireless networking security: open issues
in trust, management, interoperation and measurement. International Journal of Security and
Networks, 1(1):84–94, 2006.
- J. Reinke and H. Saiedian. The availability of source code in relation to timely response to security
vulnerabilities. Computers & Security, 22(8):707–724, 2003.