Drivers Gerdes Aktiengesellschaft Network & Wireless Cards



CNXT Dupontorporated WELLCOM Mirc Electronics Limited Gerdes Aktiengesellschaft Devguru ELCON Systemtechnik GmbH CDMA Modem-II C-motech 4G.dp.ua CDMA FUJITSU TOSHIBA MOBILE COMMUNICATIONS LIMITED Olive Telecom G-Net Media Link IT NTT Beijing Tianyu Communication Equipment histon iTegno MMT U-Mobile P A EVDO cardorporated. WM320 Wireless Data Device (1) ALWIL Software (1) Belcarra (1) Callaway (1) Gerdes Aktiengesellschaft (1) Hilscher (1) ICube (1) IPM Datacom (1) Norza D55 Developer Community (1) Ositech (1) Prolific (1) RedHat (1) Softronics USB (1) SysNucleus (1) Xaplos (1).

  1. Drivers Gerdes Aktiengesellschaft Network Inc

As the auto industry struggles to find drivers for its cars, engineers at Stanford University may have come up with a solution: a car that doesn't need a driver.

'It's not a remote control car,' explained Chris Gerdes, Associate Professor of Mechanical Engineering at Stanford University. 'All of the intelligence it does is on board - it resides in a computer there.'

When the Stanford University researchers offered a bumpy spin in the driverless car, named Shelly, they didn't let CBS News correspondent John Blackstone go alone.

Shelley's computers are still learning to drive. By this fall they want Shelley to race to the top of Colorado's Pikes Peak with nobody at the wheel.

The Audi TTS has been given a global positioning system accurate within an inch, and 'brains' designed to take a beating.

'It's just a rugged computer,' Gerdes said. 'So it can handle all the bumps and bounces.'

The researchers at Stanford have been working on driverless cars for years now.

In 2005, they talked Blackstone into going for a ride in a car they called Stanley.

Stanley's driving style was cautious. But Shelley is all about speed. In a test at the Bonneville Salt Flats it clocked 130 mph.

While it may seem risky to hand the control of a speeding car to a computer, much of what this is about is removing risk for drivers.

DriversDrivers Gerdes Aktiengesellschaft Network & Wireless Cards

'The very same algorithms that we're running on the vehicle, we could actually put on a car and have it assist you,' Gerdes said.

The technology that's meant to help this car race up Pikes Peak without going off a cliff may one day keep regular drivers from going off the road. But there's another motivation as well.

'It's cool,' Gerdes said.

Book

  1. Kai Zeng, Wenjing Lou and Ming Li,
    “Multihop Wireless Networks: Opportunistic Routing,”
    Wiley, ISBN: 978-0-470-66617-3, October, 2011.
Drivers Gerdes Aktiengesellschaft Network & Wireless Cards

Book Chapters and Magazine Articles

Drivers
  1. Yanjun Pan, Ming Li, Yantian Hou, Ryan Gerdes, Bedri Cetiner,
    “Enhance Physical Layer Security via Channel Randomization with Reconfigurable Antennas”,
    invited chapter in book Proactive and Dynamic Network Defense, Springer, Cliff Wang and Zhuo Lu (Editors), ISBN: 978-3-030-10596-9, to appear, 2019.
  2. Shucheng Yu, Ming Li and Lu Shi,
    “Trust Establishment in Wireless Body Area Networks”,
    invited chapter in book Wearable Sensors: fundamentals, implementation and applications, Elsevier, Edward Sazonov and Michael Neuman (Editors), 2014.
  3. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou and Y. Thomas Hou,
    “Toward Privacy-Assured Searchable Cloud Data Storage Services”,
    IEEE Network
    , Jul./Aug. 2013.
  4. Ming Li, Wenjing Lou and Kui Ren,
    “Secure Device Pairing,”
    Encyclopedia of Cryptography and Security
    (2nd Ed.), H. Tilborg and S. Jajodia Ed., Springer, 2011.
  5. Ming Li, Wenjing Lou, and Kui Ren,
    “Data Security and Privacy in Wireless Body Area Networks,”
    IEEE Wireless Communications Magazine,
    Vol. 17, No. 1, Feb. 2010.

Journal Papers (Underlined authors are my students or visiting students)

  1. Bo Jiang, Ming Li and Ravi Tandon,
    'Local Information Privacy and Its Application to Privacy-Preserving Data Aggregation',
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-18, Nov. 2020.
  2. Nirnimesh Ghose, Loukas Lazos, and Ming Li,
    'In-band Secret-Free Pairing for COTS Wireless Devices',
    IEEE Transactions on Mobile Computing (TMC), accepted, Jul. 2020.
  3. Boyang Wang, Yantian Hou and Ming Li,
    'QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data',
    IEEE Transactions on Cloud Computing, accepted, Jul. 2020.
  4. Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, and Hui Li,
    'Aggregation-based Location Privacy: An Information Theoretic Approach',
    Computers & Security , accepted, Jul. 2020.
  5. Mingshun Sun*, Ali Al-Hashimi*, Ming Li and Ryan Gerdes, (*: co-first authors)
    'Impacts of Constrained Sensing and Communication based Attacks on Vehicular Platoons',
    IEEE Transactions on Vehicular Technology (TVT), accepted, Feb. 2020.
  6. Iraklis Leontiadis and Ming Li,
    'Collusion Resistant Aggregation from Convertible Tags',
    International Journal of Information Security (IJIS), accepted, Dec. 2019.
  7. Mohamed Seif, Ravi Tandon and Ming Li,
    'Secure Retrospective Interference Alignment',
    Journal of Entropy , accepted, Oct 2019.
  8. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz,
    'Trading Privacy for Utility in Database-assisted Dynamic Spectrum Access',
    IEEE Transactions on Cognitive Communications and Networking (TCCN), accepted, May 2019.
  9. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang,
    'SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown Statistics',
    ElsevierComputer Networks (COMNET), accepted, Jul. 2018.
  10. Wenjing Zhang, Ming Li, Ravi Tandon, and Hui Li,
    'Online Location Trace Privacy: An Information Theoretic Approach',
    IEEE Transactions on Information Forensics and Security (TIFS), accepted, Jun. 2018.
  11. Tasnuva Tithi, Baswati Deka, Ryan. M. Gerdes, Chris Winstead, Ming Li and Kevin Heaslip,
    'Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways',
    IEEE Transactions on Vehicular Technology (TVT), accepted, May 2018.
  12. Yanjun Pan, Yantian Hou, Ming Li, Ryan Gerdes, Kai Zeng, Md Asaduzzaman Towfiq, Bedri Cetiner,
    “Message Integrity Protection over Wireless Channel: Countering Signal Cancellation via Channel Randomization,”
    IEEE Transactions on Dependable and Secure Computing
    (TDSC), accepted, pp. 1-14, Sept. 2017.
  13. Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu and Yanfeng Shi,
    “Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data,”
    IEEE Transactions on Cloud Computing
    (TCC), accepted, pp. 1-12, Aug. 2017.
  14. Boyang Wang, Ming Li and Li Xiong,
    'FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data',
    IEEE Transactions on Dependable and Secure Computing (TDSC), accepted, pp. 1-14, Mar. 2017.
  15. Yantian Hou, Ming Li and Shucheng Yu,
    'Making Body Area Networks Robust against Cross-Technology Interference',
    IEEE Transactions on Wireless Communications (TWC), Vol. 16, No. 1, pp. 429- 440, Jan. 2017.
  16. Jesse Victors, Ming Li and Xinwen Fu,
    'The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services',
    the Proceedings on Privacy Enhancing Technologies (PoPETS), to appear, Vol. 2017, No. 1, pp. 1-21, Sept. 2016.
  17. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou,
    “Cooperative Interference Mitigation for Heterogeneous Multi-hop Networks Coexistence”,
    IEEE Transactions on Wireless Communications (TWC), Vol. 15, No. 8, pp. 5328 - 5340, Aug. 2016.
  18. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou,
    “Jamming Resilient Communication using MIMO Interference Cancellation”,
    IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 7, pp. 1486 - 1499, July 2016.
  19. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li and Wei Wang,
    “Identity-Based Private Matching over Outsourced Encrypted Datasets”,
    IEEE Transactions on Cloud Computing (TCC), accepted, Vol. PP, No. 99, pp. 1-11, Nov. 2015.
  20. Boyang Wang, Ming Li and Haitao Wang,
    “Geometric Range Search on Encrypted Spatial Data”,
    IEEE Transactions on Information Forensics & Security (TIFS), accepted, Vol. 11, No. 4, pp. 704-719, April 2016.
  21. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou,
    “Location Based Handshake and Private Proximity Test with Location Tags”,
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. PP, No. 99, pp. 1-14, Aug. 2015.
  22. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li,
    “MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks“,
    IEEE Internet of Things Journal, Vol. 2, No. 1, pp. 52-62, Feb. 2015.
  23. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu,
    “SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Networks“,
    IEEE Transactions on Wireless Communications (TWC), Vol. 13, No. 10, Oct. 2014.
  24. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li,
    “Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”,
    IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 11, pp: 3025-3035, Nov. 2014.
  25. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan,
    “BANA: Body Area Network Authentication Exploiting Channel Characteristics”,
    IEEE Journal of Selected Areas on Communications (JSAC), Vol: 31, No. 9, pp: 1803-1816, Sept. 2013.
  26. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    “Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks,”
    IEEE Transactions on Wireless Communications
    (TWC), Vol. 12, No. 5, pp. 2024-2033, Aug. 2013.
  27. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,
    “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,”
    IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 1, pp. 222-233, Jan. 2014.
  28. Ming Li, Shucheng Yu, Joshua D. Guttman, Wenjing Lou and Kui Ren,
    “Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks”,
    ACM Transactions on Sensor Networks
    (TOSN), Vol. 9, No. 2, pp. 18, May 2013.
  29. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren and Wenjing Lou,
    “Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption,”
    IEEE Transactions on Parallel and Distributed Systems
    (TPDS), Vol. 24, No. 1, pp. 131-143, Jan. 2013. (Spotlight paper of the issue)
  30. Zhenyu Yang, Ming Li and Wenjing Lou,
    “Live Multimedia Streaming in VANETs using Symbol-Level Network Coding”,
    IEEE Transactions on Wireless Communications
    (TWC), Vol. 11, No. 8, Aug. 2012.
  31. Qiben Yan, Ming Li, Zhenyu Yang, Wenjing Lou and H. Zhai,
    “Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Ad Hoc Networks using Symbol Level Network Coding”,
    IEEE Journal on Selected Areas in Communications
    (JSAC), Vol. 30, No. 2, Feb. 2012.
  32. Ming Li, Kai Zeng and Wenjing Lou,
    “Opportunistic Broadcast of Event-driven Warning Messages in Vehicular Ad Hoc Networks with Lossy Links,”
    Elsevier
    Computer Networks (COMNET), Vol. 55, July 2011, Pages 2443-2464.
  33. Zhenyu Yang, Ming Li and Wenjing Lou,
    “R-Code: Network Coding-based Reliable Broadcast in Wireless Mesh Networks,”
    Elsevier Ad Hoc Networks, Vol. 9, No. 5, July 2011, Pages 788-798.
  34. Ming Li, Zhenyu Yang and Wenjing Lou,
    “CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,”
    IEEE Journal on Selected Areas in Communications (JSAC), Vol. 29, No. 1, Jan. 2011.(Best paper award nomination by IEEE ComSoc MMTC)
  35. Feng Liu, Han Zhao, Ming Li, Fengyuan Ren and Yanbo Zhu,
    ”Adaptive Local Routing Strategy on Scale-Free Network,”
    Chinese Physics B
    , Vol. 19, No. 4, Apr. 2010.
  36. Ming Li, Feng Liu and Fengyuan Ren,
    “Routing Strategy on a Two-dimensional Small-World Network Model,”
    Physical Review E
    75, 066115, Jun. 2007.

Selected Conference Papers

  1. Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, and Ming Li,
    'StegoNet: Turn Deep Neural Network into a Stegomalware',
    The 2020 Annual Computer Security Applications Conference (ACSAC 2020), Austin, TX, Dec. 2020 (23% acceptance rate).
  2. Yanmao Man, Ming Li, and Ryan Gerdes,
    'GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems',
    The 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), Oct. 14-16, 2020 (Acceptance rate: 26%).
  3. Mingshun Sun , Yanmao Man, Ming Li, and Ryan Gerdes,
    'SVM: Secure Vehicle Motion Verification with a Single Wireless Receiver',
    The 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020), Jul. 8-15, 2020 (Acceptance rate: 26%)
    (Best Paper Award) (Replicability Label)
  4. Yanjun Pan, Alon Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph Mitchell, Esther Arkin and Jie Gao,
    'Data Inference from Encrypted Databases: A Multi-dimensional Order-Preserving Matching Approach',
    The 21st International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (ACM MobiHoc 2020), October 11-14, 2020 (Acceptance rate: 15%).
  5. Mohamed Seif, Ravi Tandon, Ming Li
    'Wireless Federated Learning with Local Differential Privacy',
    The 2020 IEEE International Symposium on Information Theory (IEEE ISIT 2020), June 21-26, 2020, Los Angeles, CA.
  6. Tianchi Zhao, Bo Jiang, Ming Li and Ravi Tandon,
    'Regret Analysis of Stochastic Multi-armed Bandit Problem with Partial Information Feedback',
    The 2020 International Joint Conference on Neural Networks (IJCNN 2020), Jul. 19-24, 2020, Glasgow, UK.
  7. Xiaolan Gu, Ming Li, Li Xiong and Yang Cao,
    'Providing Input-Discriminative Protection for Local Differential Privacy', Presentation Slides
    IEEE International Conference on Data Engineering (ICDE 2020), Apr. 2020, Dallas, TX.
  8. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz,
    'Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users“,
    IEEE International Conference on Communications (IEEE ICC'20, CRAN Symposium), Dublin, Ireland, June 6-11, 2020.
  9. Yanjun Pan, Yao Zheng and Ming Li,
    'ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization',
    IEEE INFOCOM 2020, Apr. 2020, Beijing, China (Acceptance rate: 19.8%)
  10. Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong and Yang Cao,
    'PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility',
    2020 USENIX Security Symposium, Aug. 2020, Boston, MA.
  11. Mahsa Foruhandeh*, Yanmao Man*, Ryan Gerdes, Ming Li, Thidapat Chantem, (*: co-first authors)
    'SIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks',
    The 2019 Annual Computer Security Applications Conference (ACSAC 2019), San Juan, Pueto Rico, Dec. 9-13, 2019 (22.6% acceptance rate).
  12. Zhiwu Guo, Ming Li and Yong Xiao,
    'Enhancing LAA/WiFi Coexistence via Concurrent Transmissions and Interference Cancellation',
    The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2019), Newark, NJ, November 11-14, 2019.
  13. Mohamed Seif, Ravi Tandon and Ming Li,
    'Context Aware Laplacian Mechanism for Local Information Privacy',
    The IEEE Information Theory Workshop (ITW), Visby, Gotland, Sweden, Aug. 25-28, 2019.
  14. Yanmao Man, Ming Li and Ryan Gerdes,
    ' Perceived Adversarial Examples',
    Poster, The 40th IEEE Symposium on Security & Privacy (Oakland), San Francisco, CA, May 20-22, 2019.
  15. Seth Andrews, Ryan Gerdes and Ming Li,
    'Crowdsourced measurements for device fingerprinting',
    The 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec '19), Miami, FL, May 15-17, 2019 (Full paper acceptance rate: 25.6%)
  16. Xiaolan Gu, Ming Li, Yang Cao and Li Xiong,
    'Supporting both Range Queries and Frequency Estimation with Local Differential Privacy',
    the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  17. Hanyu Quan, Hao Liu, Boyang Wang, Ming Li and Yuqing Zhang,
    'Randex: Mitigating Range Injection Attacks on Searchable Encryption',
    the 7th IEEE Conference on Communications and Network Security (IEEE CNS 2019), Washington, D.C., 10-12 June 2019 (Acceptance rate: 28%)
  18. Tianchi Zhao, Ming Li and Matthias Poloczek,
    'Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling,'
    2019 IEEE International Conference on Communications (IEEE ICC), Wireless Communications Symposium, Shanghai, China, May 2019.
  19. Bo Jiang, Ming Li and Ravi Tandon,
    'Local Information Privacy with Bounded Prior',
    2019 IEEE International Conference on Communications (IEEE ICC), Communication and Information Systems Security Symposium, Shanghai, China, May 2019.
  20. Tianchi Zhao, Ming Li and Greg Ditzler,
    'Online Reconfigurable Antenna State Selection based on Thompson Sampling',
    2019 International Conference on Computing, Networking and Communications (ICNC 2019), Wireless Communications Symposium, Honolulu, Hawaii, February 18-21, 2019.
  21. Ahmed Salama, Ming Li, Loukas Lazos, Yong Xiao, and Marwan Krunz,
    'On the Privacy and Utility Tradeoff in Database-Assisted Dynamic Spectrum Access' (Full paper),
    The IEEE International Symposium on Dynamic Spectrum Access Networks (IEEE DySPAN 2018), Seoul, South Korea, Oct. 22-25, 2018
  22. Islam Samy, Loukas Lazos, Yong Xiao, Ming Li and Marwan Krunz,
    'LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard',
    11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2018), Stockholm, Sweden, Jun. 18-20, 2018 (Full Paper Acceptance rate: 25.6%)
  23. Mohamed Seif, Ravi Tandon and Ming Li,
    “On the Secure Degrees of Freedom of the K-user Interference Channel with Delayed CSIT”,
    2018 IEEE International Symposium on Information Theory (IEEE ISIT), Vail, CO, Jun. 2018.
  24. Yanjun Pan, Ming Li, Neng Fan, and Yantian Hou,
    'On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas',
    the 15th Annual IEEE International Conference on Sensing, Communication, and Networking (IEEE SECON 2018), Jun. 2018, Hong Kong, China (Acceptance rate: 23.2%)
  25. Boris Aronov, Alon Efrat, Ming Li, Jie Gao, Joseph S. B. Mitchell, Valentin Polishchuk, Boyang Wang, Hanyu Quan, Jiaxin Ding,
    'Are Friends of My Friends Too Social? Limitations of Location Privacy in a Socially-Connected World',
    The Nineteenth International Symposium on Mobile Ad Hoc Networking and Computing (ACM MobiHoc 2018), Los Angeles, CA, Jun. 2018 (Acceptance rate: 16.9%)
  26. Nirnimesh Ghose, Loukas Lazos and Ming Li,
    'Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks',
    The 39th IEEE Symposium on Security & Privacy (Oakland) (IEEE S & P 2018), San Francisco, CA, May 21-23, 2018. (Acceptance rate: 11.48%)
  27. Bo Jiang, Ming Li and Ravi Tandon,
    'Context-Aware Data Aggregation with Localized Information Privacy',
    the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  28. Mingshun Sun, Ming Li and Ryan Gerdes,
    'Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications',
    the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  29. Xu Chu, Na Ruan, Ming Li and Weijia Jia,
    'Pseudonym Inference in Cooperative Vehicular Traffic Scenarios',
    the 6th IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, May 2018. (Acceptance rate: 28%)
  30. Mohamed Seif, Ravi Tandon and Ming Li,
    'On the Secure Degrees of Freedom of 2 × 2 × 2 Multi-Hop Network with Untrusted Relays,'
    IEEE International Conference on Communications (ICC 2018, Communication Theory Symposium), Kansas City, KS, May 21-23, 2018.
  31. Nirnimesh Ghose, Loukas Lazos and Ming Li,
    'SFIRE: Secret-Free In-band Trust Establishment for COTS Wireless Devices',
    The 37th IEEE International Conference on Computer Communication (IEEE INFOCOM 2018), April 15-19, 2018, Honolulu, HI (Acceptance rate: 19.2%)
  32. Ahmed M. Salama, Ming Li, Dejun Yang,
    'Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks',
    2017 IEEE Global Communications Conference (Globecom 2017), Cognitive Radio and Networks Symposium, Singapore, Dec. 4-8, 2017.
  33. Mingshun Sun, Ming Li and Ryan Gerdes,
    “A Data Trust Framework for VANETs Enabling False Data Detection and Secure Vehicle Tracking”,
    the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  34. Seth Andrews, Ryan Gerdes and Ming Li,
    “Towards Physical Layer Identification of Cognitive Radio Devices”,
    the 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, Oct. 2017. (Acceptance rate: 30%)
  35. Nirnimesh Ghose, Loukas Lazos and Ming Li,
    'HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation',
    26th USENIX Security Symposium (USENIX Security '17), Vancouver, BC, Canada, Aug. 16-18, 2017, pp. 1-18. (Acceptance rate: 16.1%)
  36. Michael Solomon, Vaidy Sunderam, Li Xiong and Ming Li,
    'Mutually private location proximity detection with access control',
    31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA - July 17-19, 2017.
  37. Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, and Ming Li,
    'Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles',
    the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2017), Denver, CO, Jun. 26-29, 2017. (Acceptance rate: 22%)
  38. Yantian Hou, Ming Li and Kai Zeng,
    “Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas',
    International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  39. Yantian Hou, Ming Li and Dejun Yang,
    'Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks',
    International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, USA, January 26-29, 2017
  40. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang,
    “SecReach: Secure Reachability Computation on Encrypted Location Check-in Data”,
    The 15th International Conference on Cryptology and Network Security (CANS 2016), Milan, Italy, November 14-16, 2016. (Acceptance rate: 25.8%)
  41. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi and Wei Wang,
    “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”,
    The Fourth International Workshop on Security in Cloud Computing (SCC), Xi’an, China, May. 2016, accepted.
  42. Ming Li, Dejun Yang, Jian Lin, Ming Li and Jian Tang,
    “SpecWatch: Adversarial Spectrum Usage Monitoring in CRNs with Unknown Statistics”,
    The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA, Apr. 2016. (Acceptance rate: 18.25%)
  43. Boyang Wang, Yantian Hou and Ming Li,
    “Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data”,
    The 35th IEEE International Conference on Computer Communication (INFOCOM’16), San Francisco, CA, Apr. 2016. (Acceptance rate: 18.25%)
  44. Yantian Hou, Ming Li and Dejun Yang,
    “A Game Theoretical Approach to Coexistence of Heterogeneous MIMO Wireless Networks with Interference Cancellation”,
    International Conference on Computing, Networking and Communication (ICNC), Feb. 15-18 2016, Kauai, HI.
  45. Cyrus Shahabi, Liyue Fan, Luciano Nocera, Li Xiong and Ming Li,
    “Privacy-Preserving Inference of Social Relationships from Location Data: A Vision Paper”,
    ACM SIGSPATIAL GIS, Nov. 2015, Seattle, WA (CCC Blue Sky Ideas Award, 3 out of 20).
  46. Boyang Wang, Ming Li, Haitao Wang, and Hui Li,
    “Circular Range Search on Encrypted Spatial Data”,
    the 3rd IEEE Conference on Communications and Network Security (CNS’15), Florence, Italy, Sept. 2015.
  47. Yantian Hou, Ming Li, Ruchir Chauhan, Ryan. M. Gerdes, and Kai Zeng,
    “Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice”,
    the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS’15),Singapore, Apr. 2015.
    (Acceptance ratio: 48/269=17.8%).
  48. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li,
    “Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy”,
    The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  49. Baswati Deka, Ryan. M. Gerdes, Ming Li and Kevin Heaslip,
    “Friendly Jamming for Secure Localization in Vehicular Transportation” (short paper),
    The 10th International Conference on Security and Privacy in Communication Networks (SecureComm’14), September 24–26, 2014, Beijing, China.
  50. Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li,
    “A Tale of Two Clouds: Computing on Data Encrypted under Multiple Keys”,
    the 2nd IEEE Conference on Communications and Network Security (CNS’14), San Francisco, CA, Oct. 29-31, 2014.
  51. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li,
    “Maple: Scalable Multi-Dimensional Range Search over Encrypted Cloud Data with Tree-based Index”,
    the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS’14), Kyoto, Japan, Jun 4-6, 2014
    (Acceptance ratio: 52/260=20%).
  52. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, and Wenjing Lou,
    “Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks”,
    The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  53. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, and Y. Thomas Hou,
    “MIMO-based Jamming Resilient Communication in Wireless Networks”,
    The 33nd IEEE International Conference on Computer Communication (INFOCOM’14), Toronto, ON, Canada, Apr. 27 – May 2, 2014 (Acceptance ratio: 320/1645=19.4%).
  54. Yantian Hou, Ming Li and Shucheng Yu,
    “Surviving the RF Smog: Making Body Area Networks Robust to Cross-Technology Interference”,
    10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’13), New Orleans, Jun. 24-27, 2013.
  55. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li,
    “Storing Shared Data on the Cloud via Security-Mediator”,
    The 33rd International Conference on Distributed Computing Systems (ICDCS ’13), Philadelphia, PA, Jul. 8-11, 2013.
    (Acceptance ratio: 61/464=13%)
  56. Wenhai Sun, Bin Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou and Hui Li,
    “Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking”,
    the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS’13), Hangzhou, China, May 7-10, 2013.
    (Full-paper acceptance ratio: 35/216=16.2%, distinguished paper award, 2 out of 216)
  57. Yantian Hou, Ming Li, and Joshua. D. Guttman,
    “Chorus: Scalable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel”,
    The sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  58. Lu Shi, Jiawei Yuan, Shucheng Yu, and Ming Li,
    “ASK-BAN: Authenticated Secret Key Extraction Utilizing Channel Characteristics for Body Area Networks“,
    the sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), Budapest, Hungary, April 17-19, 2013. (Full-paper acceptance ratio: 11/74=15%)
  59. Qiben Yan, Ming Li, Feng Chen, Tingting Jiang, Wenjing Lou, Y. Thomas. Hou and Chang-Tien Lu,
    “Non-parametric Passive Traffic Monitoring in Cognitive Radio Networks”,
    the 32nd IEEE International Conference on Computer Communication
    (INFOCOM’13), Turin, Italy, Apr. 2013
    (Acceptance ratio: 280/1613=17%).
  60. Yao Zheng, Ming Li, Wenjing Lou and Y. Thomas Hou,
    “SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags”,
    the 17th European Symposium on Research in Computer Security
    (ESORICS’12), Pisa, Italy, Sept. 10-14, 2012.
    (Acceptance ratio: 50/248=20%)
  61. Lu Shi, Ming Li, Shucheng Yu and Jiawei Yuan,
    “BANA: Body Area Network Authentication Exploiting Channel Characteristics“,
    The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
    (WiSec’12), Tucson, AZ, Apr. 2012.
    (Acceptance ratio: 17/63=27%)
  62. Qiben Yan, Ming Li, Tingting Jiang, Wenjing Lou and Y. Thomas Hou,
    “Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks,”
    the 31st IEEE International Conference on Computer Communication
    (INFOCOM’12), Orlando, FL, Mar. 2012.
    (Acceptance ratio: 278/1547=18%)
  63. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,”
    the 31st International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, MN, Jun. 21-24, 2011.
    (Acceptance ratio: 15%) (#1 top accessed ICDCS’11 article in IEEE Xplore as of January, Feburary, and March 2012)
  64. Ning Zhang, Ming Li and Wenjing Lou,
    “Distributed Data Mining with Differential Privacy,”
    IEEE International Conference on Communications (ICC’11) (Communication and Information System Security Symposium), Kyoto, Japan, Jun. 2011.
  65. Ming Li, Ning Cao, Shucheng Yu and Wenjing Lou,
    “FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks,”
    The 30th IEEE International Conference on Computer Communications
    (INFOCOM’11), Shanghai, China, Apr. 2011.
    (Acceptance ratio: 291/1823 = 16%)
  66. Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,
    “Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,”
    The 30th IEEE International Conference on Computer Communications (INFOCOM’11), Shanghai, China, Apr. 2011.
    (Acceptance ratio: 291/1823 = 16%)
  67. Ming Li, Shucheng Yu, Kui Ren and Wenjing Lou,
    “Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings“,
    The 6th International ICST Conference on Security and Privacy in Communication Networks
    (SecureComm’10), Singapore, Sept. 7-10. (Acceptance ratio: 28/112=25%)
  68. Ming Li, Shucheng Yu, Wenjing Lou and Kui Ren,
    “Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks,”
    The 29th IEEE International Conference on Computer Communications
    (INFOCOM’10), San Diego, CA., Mar. 15-19, 2010.
    (Acceptance ratio: 276/1575=17.5%) [Video demonstration]
  69. Zhenyu Yang, Ming Li and Wenjing Lou,
    “CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding,”
    The 18th IEEE International Conference on Network Protocols
    (ICNP’10), Kyoto, Japan, Oct. 5-8, 2010.
    (Acceptance ratio: 31/170 =18%).
  70. Ming Li, Wenjing Lou and Kai Zeng,
    “OppCast: Opportunistic Broadcast of Warning Messages in VANETs with Unreliable Links,”
    The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems
    (MASS’09), Macau SAR, China, Oct. 12-15, 2009. (Acceptance ratio: 62/245=25.3%)

Technical Reports

Drivers Gerdes Aktiengesellschaft Network Inc

  1. Boyang Wang, Ming Li, Haitao Wang and Hui Li,
    “Circular Range Search on Encrypted Spatial Data“,
    Technical report, May. 2015.
  2. Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou and Wenjing Lou,
    “Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop Networks“,
    Technical report, Aug. 2013.
  3. Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou and Y. Thomas Hou,
    “MIMO-based Jamming Resilient Communication in Wireless Networks“,
    Technical Report, 2013.
  4. Boyang Wang, Yantian Hou, Ming Li, Haitao Wang and Hui Li,
    “Privacy-Preserving Multi-Dimensional Range Search over Encrypted Cloud Data within Sublinear Time”,Technical report, 2013.
  5. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    “Authorized Private Keyword Search over Encrypted Data in Cloud Computing,”
    Technical report
    , 2011.
  6. Ming Li, Shucheng Yu, Ning Cao and Wenjing Lou,
    “Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks,”
    Technical report
    , 2012.
  7. Ming Li, Zhenyu Yang and Wenjing Lou,
    “CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding,”
    Technical report
    , 2010.