Follow
Fengjun Li
Fengjun Li
Verified email at ku.edu - Homepage
Title
Cited by
Cited by
Year
Cyber-physical systems security—A survey
A Humayed, J Lin, F Li, B Luo
IEEE Internet of Things Journal 4 (6), 1802-1831, 2017
11952017
Secure information aggregation for smart grids using homomorphic encryption
F Li, B Luo, P Liu
2010 first IEEE international conference on smart grid communications, 327-332, 2010
7382010
Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain
S Awan, F Li, B Luo, M Liu
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1602019
CONTRA: Defending Against Poisoning Attacks in Federated Learning
S Awan, B Luo, F Li
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
1522021
Secure and privacy-preserving information aggregation for smart grids
F Li, B Luo, P Liu
International Journal of Security and Networks 6 (1), 28-39, 2011
1122011
Preserving data integrity for smart grid data aggregation
F Li, B Luo
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
1112012
Stalking online: on user privacy in social networks
Y Yang, J Lutes, F Li, B Luo, P Liu
Proceedings of the second ACM conference on Data and Application Security …, 2012
692012
New threats to health data privacy
F Li, X Zou, P Liu, JY Chen
BMC bioinformatics 12, 1-7, 2011
672011
Certificate transparency in the wild: Exploring the reliability of monitors
B Li, J Lin, F Li, Q Wang, Q Li, J Jing, C Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
652019
μAFL: non-intrusive feedback-driven fuzzing for microcontroller firmware
W Li, J Shi, F Li, J Lin, W Wang, L Guan
Proceedings of the 44th International Conference on Software Engineering, 1-12, 2022
552022
Aggregating global features into local vision transformer
K Patel, AM Bur, F Li, G Wang
2022 26th International Conference on Pattern Recognition (ICPR), 1141-1147, 2022
472022
Detecting false data injection in smart grid in-network aggregation
L Yang, F Li
2013 IEEE international conference on smart grid communications …, 2013
452013
Enforcing secure and privacy-preserving information brokering in distributed information sharing
F Li, B Luo, P Liu, D Lee, CH Chu
IEEE transactions on information forensics and security 8 (6), 888-900, 2013
452013
Trust-aware review spam detection
H Xue, F Li, H Seo, R Pluretti
2015 IEEE Trustcom/BigDataSE/ISPA 1, 726-733, 2015
432015
In-broker access control: Towards efficient end-to-end performance of information brokerage systems
F Li, B Luo, P Liu, D Lee, P Mitra, WC Lee, CH Chu
IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006
432006
# DontTweetThis: Scoring Private Information in Social Networks
Q Wang, H Xue, F Li, D Lee, B Luo
Proceedings on Privacy Enhancing Technologies 2019 (4), 72-92, 2019
422019
Privacy-preserving data sharing in smart grid systems
L Yang, H Xue, F Li
2014 IEEE International Conference on Smart Grid Communications …, 2014
412014
mTor: A multipath Tor routing beyond bandwidth throttling
L Yang, F Li
2015 IEEE Conference on Communications and Network Security (CNS), 479-487, 2015
392015
Check me if you can: Detecting ChatGPT-generated academic writing using CheckGPT
Z Liu, Z Yao, F Li, B Luo
arXiv preprint arXiv:2306.05524, 2023
352023
From library portability to para-rehosting: Natively executing microcontroller software on commodity hardware
W Li, L Guan, J Lin, J Shi, F Li
arXiv preprint arXiv:2107.12867, 2021
342021
The system can't perform the operation now. Try again later.
Articles 1–20