[List by Year] [List by Type]

Conference and Workshop Papers

  1. Jingwei Li, Zuoru Yang, Yanjing Ren, Patrick P. C. Lee, and Xiaosong Zhang, Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication, in Proceedings of the 15th European Conference on Computer Systems (EuroSys), 2020.

  2. Yuan Wang, Yake Wei, Qin Wu, Hao Yang, and Jingwei Li, An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm, in Proceeding of the 10th International Conference on Information Technology in Medicine and Education (ITME), 2019.

  3. Jingwei Li, Patrick P. C. Lee, Yanjing Ren, and Xiaosong Zhang, Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection, in Proceeding of the 35th International Conference on Massive Storage Systems and Technology (MSST), 2019.

  4. Jingwei Li, Chuan Qin, Patrick P. C. Lee, and Xiaosong Zhang, Information Leakage in Encrypted Deduplication via Frequency Analysis, in Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017.
    One of three nominations for the Best Paper Award

  5. Sushama Karumanchi, Jingwei Li, and Anna Squicciarini, Efficient Network Path Verification for Policy Routed Queries, in Proceeding of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY), 2016.

  6. Jingwei Li, Chuan Qin, Patrick P. C. Lee, and Jin Li, Rekeying for Encrypted Deduplication Storage, in Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.

  7. Jingwei Li, Anna Squicciarini, Dan Lin, Shuang Liang, and Chunfu Jia, SecLoc: Securing Location-sensitive Storage in the Cloud, in Proceeding of the 20th ACM Symposium on Access Control Models and Technologies (SACMAT), 2015.

  8. Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Jingwei Li, Policy Driven Node Selection in MapReduce, in Proceeding of 10th International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.

  9. Sushama Karumanchi, Jingwei Li, and Anna Squicciarini, Securing Resource Discovery in Content Hosting Networks, in Proceeding of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.

  10. Jingwei Li, Dan Lin, Anna Squicciarini, and Chunfu Jia, STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds, in Proceeding of the 10th International Conference on Security and Privacy in Communication Networks (SecureComm) (short paper), 2014.

  11. Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, and Ke Yuan, Secure Storage and Fuzzy Query over Encrypted Databases, in Proceeding of the 7th International Conference on Network and System Security, 2013.

  12. Zheli Liu, Jin Li, Xiaofeng Chen, Jingwei Li, and Chunfu Jia, New Privacy-Preserving Location Sharing System for Mobile Online Social Networks, in Proceeding of the 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013.

  13. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, and Wenjing Lou, Fine-grained Access Control System Based on Outsourced Attribute-based Encryption, in Proceeding of the 18th European Symposium on Research in Computer Security (ESORICS), 2013.

  14. Chunfu Jia, Zheli Liu, Jingwei Li, Zongqing Dong, and Xiaoying You, A New Integer FPE Scheme Based on Feistel Network, in Proceeding of International Conference on Services Science, Management and Engineering (SSME), 2012.

  15. Jingwei Li, Chunfu Jia, Jin Li, and Zheli Liu, A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud, in Proceeding of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2012.

  16. Jingwei Li, Chunfu Jia, Jin Li, and Xiaofeng Chen, Outsourcing Encryption of Attribute-Based Encryption with MapReduce, in Proceeding of the 14th International Conference on Information and Communications Security (ICICS), 2012.

  17. Jingwei Li, Jin Li, Xiaofeng Chen, Chunfu Jia, and Zheli Liu, Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud, in Proceeding of the 6th International Conference on Network and System Security (NSS), 2012.

  18. Zheli Liu, Chunfu Jia, Jingwei Li, and Xiaochun Cheng, Format-preserving Encryption for DateTime, in Proceeding of IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010.

Journal Articles

  1. Jingwei Li, Patrick P. C. Lee, Chufeng Tan, Chuan Qin, and Xiaosong Zhang, Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses, ACM Transactions on Storage, vol. 16, no. 1, pp. 4:1–4:30, 2020. An earlier version appeared in DSN 2017

  2. Ke Huang et al., EVA: Efficient Versatile Auditing Scheme for IoT-based Datamarket in Jointcloud, IEEE Internet of Things Journal, vol. 7, no. 2, pp. 882–892, 2020.

  3. Dong Wang, Xiaosong Zhang, Ting Chen, and Jingwei Li, Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface, Security and Communication Networks, vol. 2019, pp. 5076324:1–5076324:19, 2019.

  4. Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Chunfu Jia, MMB^cloud-tree: Authenticated Index for Verifiable Cloud Service Selection, IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 14, no. 2, pp. 185–198, 2017.

  5. Jingwei Li, Dan Lin, Anna Squicciarini, Jin Li, and Chunfu Jia, Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds, IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 499–509, 2017. An earlier version appeared in SecureComm 2014

  6. Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang, and Wei Jiang, PAS: Policy-based Assistance in Sensor Networks, Computing, vol. 99, no. 10, pp. 915–928, 2017.

  7. Chuan Qin, Jingwei Li, and Patrick P. C. Lee, The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System, ACM Transactions on Storage (ToS), vol. 13, no. 1, pp. 1–30, 2017. An earlier version appeared in DSN 2016

  8. Jingwei Li, Jin Li, Dongqing Xie, and Zhang Cai, Secure Auditing and Deduplicating Data in Cloud, IEEE Transactions on Computers (TC) (Special Issue: Advanced Techniques for Efficient and Reliable Cloud Storage), vol. 65, no. 8, pp. 2386–2396, 2016.

  9. Mingqiang Li, Chuan Qin, Jingwei Li, and Patrick P. C. Lee, CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal, IEEE Internet Computing (IC) (Special Issue: Cloud Storage), vol. 20, no. 3, pp. 45–53, 2016. An earlier version appeared in USENIX ATC 2015

  10. 李经纬, 李柏晴, and 张小松, 数据安全重删系统与关键技术研究, 信息安全研究, vol. 1, no. 3, pp. 245–252, 2015.

  11. 李经纬, 贾春福, 刘哲理, 李进, and 李敏, 可搜索加密技术研究综述, 软件学报, vol. 26, no. 1, pp. 109–128, 2015.

  12. Fatos Xhafa, Jingwei Li, Gansen Zhao, Jin Li, Xiaofeng Chen, and Duncan S. Wong, Designing Cloud-based Electronic Health Record System with Attribute-based Encryption, Multimedia Tools and Applications (MTA), vol. 74, no. 10, pp. 3441–3458, 2015.

  13. Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, and Wenjing Lou, Identity-based Encryption with Outsourced Revocation in Cloud Computing, IEEE Transactions on Computers (TC), vol. 64, no. 2, pp. 425–437, 2015.
    Awarded for Highly Cited Paper (Mar 2018)

  14. Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, and Wenjing Lou, New Access Control Systems based on Outsourced Attribute-based Encryption, Journal of Computer and Security (JCS), vol. 23, no. 6, pp. 659–683, 2015. An earlier version appeared in ESORICS 2013

  15. Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, and Yang Xiang, Securely Outsourcing Attribute-based Encryption with Checkability, IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 8, pp. 2201–2210, 2014.
    Awarded for Highly Cited Paper (Mar 2018)

  16. Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, and Chunfu Jia, Privacy-Preserving Data Utilization in Hybrid Clouds, Future Generation Computer Systems (Special Issue: Extreme Scale Parallel Architectures and Systems, Cryptography in Cloud Computing and Recent Advances in Parallel and Distributed Systems), vol. 30, pp. 98–106, 2014.

  17. Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, and Wenjing Lou, Secure Deduplication with Efficient and Reliable Convergent Key Management, IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 6, pp. 1615–1625, 2014.
    Awarded for Highly Cited Paper (Mar 2018)

  18. Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, and Chunfu Jia, MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks, Journal of Internet Services Information Security, vol. 4, no. 1, pp. 25–36, 2014.

  19. Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, and Duncan S. Wong, Secure Outsourced Attribute-based Signatures, IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 12, pp. 3285–3294, 2014.

  20. Zheli Liu, Jingwei Li, Jin Li, and Chunfu Jia, SQL-Based Fuzzy Query Mechanism over Encrypted Database, International Journal of Data Warehousing and Mining, vol. 10, no. 4, pp. 71–81, 2014.

  21. Jingwei Li, Chunfu Jia, Zheli Liu, and Zongqing Dong, Cycle-Walking Revisited: Consistency, Security, and Efficiency, Security and Communication Networks, vol. 6, no. 8, pp. 985–992, 2013.

  22. 李敏, 贾春福, 李经纬, 刘哲理, and 董宗庆, 变长编码字符型数据的保留格式加密, 吉林大学学报 (工学版), vol. 42, no. 5, pp. 1257–1261, 2012.

  23. 李经纬, 贾春福, and 刘哲理, 基于k-Feistel网络的FPE方案, 通信学报, vol. 33, no. 4, pp. 62–68, 2012.

  24. 刘哲理, 贾春福, and 李经纬, 保留格式加密技术研究, 软件学报, vol. 23, no. 1, pp. 152–170, 2012.

  25. Jingwei Li, Zheli Liu, Li Xu, and Chunfu Jia, An Efficient Format-preserving Encryption Mode for Practical Domains, Wuhan University Journal of Natural Sciences (English version), vol. 17, no. 5, pp. 428–434, 2012.

  26. Min Li, Zheli Liu, Jingwei Li, and Chunfu Jia, Format-Preserving Encryption for Character Data, Journal of Networks, vol. 7, no. 8, pp. 1239–1244, 2012.

  27. Jingwei Li, Jin Li, Zheli Liu, and Chunfu Jia, Enabling Efficient and Secure Data Sharing in Cloud Computing, Concurrency and Computation: Practice and Experience (Special Issue: INCoS 2012), vol. 25, no. 5, pp. 1052–1066, 2012. An earlier version appeared in INCoS 2012

  28. 刘哲理, 贾春福, 孙涛, 李经纬, and 纪鸿舜, 基于对技术身份密码学的构造方法, 天津大学学报, vol. 44, no. 12, pp. 1050–1056, 2011.

  29. 刘哲理, 贾春福, and 李经纬, 保留格式加密模型研究, 通信学报, vol. 32, no. 6, pp. 184–190, 2011.