2025

  • Jia Zhao, Yanjing Ren, Jingwei Li, and Patrick P. C. Lee, “SGX-Enabled Encrypted Cross-Cloud Data Synchronization,” in Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), 2025. (AR: 104/529 = 19.7%)

  • Zheyuan He, Zihao Li, Jiahao Luo, Feng Luo, Junhan Duan, Jingwei Li, Shuwei Song, Xiapu Luo, Ting Chen, and Xiaosong Zhang, “Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain,” in Proceedings of the USENIX Security Symposium (Security), 2025.

  • Zheyuan He, Zihao Li, Ao Qiao, Jingwei Li, Feng Luo, Sen Yang, Gelei Deng, Shuwei Song, Xiaosong Zhang, Ting Chen, and Xiapu Luo, “Maat: Analyzing and Optimizing Overcharge on Blockchain Storage,” in Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2025. (AR: 36/167 = 21.5%)

  • 王瑞锦, 王金波, 张凤荔, 李经纬, 李增鹏, 陈厅, “联邦原型学习的特征图中毒攻击和双重防御机制,” 软件学报, vol. 36, no. 3, pp. 1355-1374, 2025.

  • 李经纬, 孙嘉, 杨劲远, 沈志荣, 杨浩淼, 方华, 陈厅, 张小松, “云边融合安全存储架构及技术挑战,” 中国科学:信息科学, vol. 55, no. 3, pp. 516-527, 2025.

  • Haomiao Yang, Dongyun Xue, Mengyu Ge, Jingwei Li, Guowen Xu, Hongwei Li, and Rongxing Lu, “Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient,” IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 1, pp. 132-145, 2025.

2024

  • Yanjing Ren, Yuanming Ren, Xiaolu Li, Yuchong Hu, Jingwei Li, and Patrick P. C. Lee, “ELECT: Enabling Erasure Coding Tiering for LSM-tree-based Storage,” in Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2024. (AR: 22/123 = 17.9%)

  • Hengying Xiao, Jingwei Li, Yanjing Ren, Ruijin Wang, and Xiaosong Zhang, “CDCache: Space-efficient Flash Caching via Compression-before-Deduplication,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2024. (AR: 256/1307 = 19.6%)

  • Yuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang, Ruicong Shi, Jingwei Li, Yu Jiang, and Zhuo Su, “UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2024. (AR: 331/1964 = 16.9%)

  • Jia Zhao, Zuoru Yang, Jingwei Li, and Patrick P. C. Lee, “Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage,” ACM Transactions on Storage, vol. 20, no. 4, pp. 1-30, 2024.

  • Fan Wu, Xiong Li, Jingwei Li, Pandi Vijayakumar, Brij B. Gupta, and Varsha Arya, “HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems,” IEEE Transactions on Green Communications and Networking, vol. 8, no. 3, pp. 1141-1155, 2024.

2023

  • Jiajing Wu, Jieli Liu, Jinze Chen, Ting Chen, Jingwei Li, Shuwei Song, and Jiahao He, “ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning,” in Proceedings of the Asia Service Sciences and Software Engineering Conference, 2023, pp. 155–162. Best Paper Award

  • Dongyun Xue, Haomiao Yang, Mengyu Ge, Jingwei Li, Guowen Xu, and Hongwei Li, “Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2023. (AR: 252/1312 = 19.2%)

  • Jingwei Li, Yanjing Ren, Patrick P. C. Lee, Yuyu Wang, Ting Chen, and Xiaosong Zhang, “FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2023. (AR: 252/1312 = 19.2%)

  • Shipeng Li, Jingwei Li, Yuxing Tang, Xiapu Luo, Zheyuan He, Zihao Li, Xi Cheng, Yang Bai, Ting Chen, Yuzhe Tang, Zhe Liu, and Xiaosong Zhang, “BlockExplorer: Exploring Blockchain Big Data via Parallel Processing,” IEEE Transactions on Computers, vol. 72, no. 8, pp. 2377-2389, 2023.

2022

  • Xingpeng Tang and Jingwei Li, “Improving Online Restore Performance of Backup Storage via Historical File Access Pattern,” in Proceedings of the Frontiers in Cyber Security (FCS), 2022.

  • Zuoru Yang, Jingwei Li, and Patrick P. C. Lee, “Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption,” in Proceedings of the USENIX Annual Technical Conference (ATC), 2022. (AR: 64/393 = 16.3%)

  • Jingwei Li, Guancheng Wei, Jiaheng Liang, Yanjing Ren, Patrick P. C. Lee, and Xiaosong Zhang, “Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2022. (AR: 225/1129 = 19.9%)

  • Haomiao Yang, Mengyu Ge, Kai Xiang, and Jingwei Li, “Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 818-830, 2022.

  • Zuoru Yang, Jingwei Li, Yanjing Ren, and Patrick P. C. Lee, “Tunable Encrypted Deduplication with Attack-Resilient Key Management,” ACM Transactions on Storage, vol. 18, no. 4, pp. 32:1-32:38, 2022.

  • Sixuan Dang, Sheng Cao, Jingwei Li, and Xiaosong Zhang, “Dynamic Incentive Mechanism Design for Regulation-aware Systems,” International Journal of Intelligent Systems, vol. 32, no. 2, pp. 1299-1321, 2022.

  • Jingwei Li, Suyu Huang, Yanjing Ren, Zuoru Yang, Patrick P. C. Lee, Xiaosong Zhang, and Yao Hao, “Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication,” IEEE Transactions on Computers, vol. 71, no. 4, pp. 959-970, 2022.

2021

  • Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick P. C. Lee, and Xiaosong Zhang, “Accelerating Encrypted Deduplication via SGX,” in Proceedings of the USENIX Annual Technical Conference (ATC), 2021. (AR: 64/341 = 18.8%)

2020

  • Jingwei Li, Zuoru Yang, Yanjing Ren, Patrick P. C. Lee, and Xiaosong Zhang, “Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication,” in Proceedings of the European Conference on Computer Systems (EuroSys), 2020. (AR: 43/234 = 18.4%)

  • Yuan Wang, Yake Wei, Hao Yang, Jingwei Li, Yubo Zhou and Qin Wu, “Utilizing Imbalanced Electronic Health Records to Predict Acute Kidney Injury by Ensemble Learning and Time Series Model,” BMC Medical Informatics and Decision Making, 2020.

  • Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, and Jing Qin, “EVA: Efficient Versatile Auditing Scheme for IoT-based Datamarket in Jointcloud,” IEEE Internet of Things Journal (IoTJ), vol. 7, no. 2, pp. 882-892, 2020.

2019

  • Jingwei Li, Patrick P. C. Lee, Yanjing Ren, and Xiaosong Zhang, “Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection,” in Proceeding of the International Conference on Massive Storage Systems and Technology (MSST), 2019. (AR: 21/71 = 29.6%)

  • Yuan Wang, Yake Wei, Qin Wu, Hao Yang, and Jingwei Li, “An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm,” in Proceeding of the 10th International Conference on Information Technology in Medicine and Education (ITME), 2019.

  • Dong Wang, Xiaosong Zhang, Ting Chen, and Jingwei Li, “Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface,” Security and Communication Networks, vol. 2019, pp. 5076324:1-5076324:19, 2019.

2017

  • Jingwei Li, Chuan Qin, Patrick P. C. Lee, and Xiaosong Zhang, “Information Leakage in Encrypted Deduplication via Frequency Analysis,” in Proceedings of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017. (AR: 49/220 = 22.3%) Best Paper Nomination

  • Jingwei Li, Anna Squicciarini, Dan Lin, and Chunfu Jia, “MMB^cloud-tree: Authenticated Index for Verifiable Cloud Service Selection,” IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 14, no. 2, pp. 185-198, 2017.

  • Jingwei Li, Dan Lin, Anna Squicciarini, Jin Li, and Chunfu Jia, “Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 499-509, 2017.

  • Chuan Qin, Jingwei Li, and Patrick P. C. Lee, “The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System,” ACM Transactions on Storage (ToS), vol. 13, no. 1, pp. 1-30, 2017.

  • Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang, and Wei Jiang, “PAS: Policy-based Assistance in Sensor Networks,” Computing, vol. 99, no. 10, pp. 915-928, 2017.

2016

  • Jingwei Li, Chuan Qin, Patrick P. C. Lee, and Jin Li, “Rekeying for Encrypted Deduplication Storage,” in Proceedings of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016. (AR: 58/259 = 22.4%)

  • Sushama Karumanchi, Jingwei Li, and Anna Squicciarini, “Efficient Network Path Verification for Policy Routed Queries,” in Proceeding of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016.

  • Mingqiang Li, Chuan Qin, Jingwei Li, and Patrick P. C. Lee, “CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal,” IEEE Internet Computing (IC), vol. 20, no. 3, pp. 45-53, 2016.

  • Jingwei Li, Jin Li, Dongqing Xie, and Zhang Cai, “Secure Auditing and Deduplicating Data in Cloud,” IEEE Transactions on Computers (TC), vol. 65, no. 8, pp. 2386-2396, 2016.

2015

  • Jingwei Li, Anna Squicciarini, Dan Lin, Shuang Liang, and Chunfu Jia, “SecLoc: Securing Location-sensitive Storage in the Cloud,” in Proceeding of the ACM Symposium on Access Control Models and Technologies (SACMAT), 2015.

  • 李经纬, 李柏晴, 张小松, “数据安全重删系统与关键技术研究”, 信息安全研究, vol. 1, no. 3, pp. 245–252, 2015.

  • 李经纬, 贾春福, 刘哲理, 李进, 李敏, “可搜索加密技术研究综述”, 软件学报, vol. 26, no. 1, pp. 109–128, 2015.

  • Jingwei Li, Xiaofeng Chen, Jin Li, Chunfu Jia, and Wenjing Lou, “Identity-based Encryption with Outsourced Revocation in Cloud Computing,” IEEE Transactions on Computers (TC), vol. 64, no. 2, pp. 425-437, 2015.

  • Fatos Xhafa, Jingwei Li, Gansen Zhao, Jin Li, Xiaofeng Chen, and Duncan S. Wong, “Designing Cloud-based Electronic Health Record System with Attribute-based Encryption,” Multimedia Tools and Applications (MTA), vol. 74, no. 10, pp. 3441-3458, 2015.

  • Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, and Wenjing Lou, “New Access Control Systems based on Outsourced Attribute-based Encryption,” Journal of Computer and Security (JCS), vol. 23, no. 6, pp. 659-683, 2015.

2014

  • Anna Squicciarini, Dan Lin, Smitha Sundareswaran, and Jingwei Li, “Policy Driven Node Selection in MapReduce,” in Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.

  • Sushama Karumanchi, Jingwei Li, and Anna Squicciarini, “Securing Resource Discovery in Content Hosting Networks,” in Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.

  • Jingwei Li, Dan Lin, Anna Squicciarini, and Chunfu Jia, “STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds,” in Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.

  • Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, and Chunfu Jia, “MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks,” Journal of Internet Services Information Security, vol. 4, no. 1, pp. 25-36, 2014.

  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, and Duncan S. Wong, “Secure Outsourced Attribute-based Signatures,” IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 12, pp. 3285-3294, 2014.

  • Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, and Chunfu Jia, “Privacy-Preserving Data Utilization in Hybrid Clouds,” Future Generation Computer Systems, vol. 30, pp. 98-106, 2014.

  • Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, and Wenjing Lou, “Secure Deduplication with Efficient and Reliable Convergent Key Management,” IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 6, pp. 1615-1625, 2014.

  • Zheli Liu, Jin Li, Jingwei Li, and Chunfu Jia, “SQL-Based Fuzzy Query Mechanism over Encrypted Database,” International Journal of Data Warehousing and Mining, vol. 10, no. 4, pp. 71-81, 2014.

2013

  • Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, and Wenjing Lou, “Fine-grained Access Control System Based on Outsourced Attribute-based Encryption,” in Proceeding of the European Symposium on Research in Computer Security (ESORICS), 2013.

  • Jingwei Li, Chunfu Jia, Zheli Liu, and Zongqing Dong, “Cycle-Walking Revisited: Consistency, Security, and Efficiency,” Security and Communication Networks, vol. 6, no. 8, pp. 985-992, 2013.

2012

  • Jingwei Li, Jin Li, Zheli Liu, and Chunfu Jia, “Enabling Efficient and Secure Data Sharing in Cloud Computing,” Concurrency and Computation: Practice and Experience, vol. 25, no. 5, pp. 1052-1066, 2012.

  • Min Li, Zheli Liu, Jingwei Li, and Chunfu Jia, “Format-Preserving Encryption for Character Data,” Journal of Networks, vol. 7, no. 8, pp. 1239-1244, 2012.

  • Jingwei Li, Zheli Liu, Li Xu, and Chunfu Jia, “An Efficient Format-preserving Encryption Mode for Practical Domains,” Wuhan University Journal of Natural Sciences, vol. 17, no. 5, pp. 428-434, 2012.

  • 李敏, 贾春福, 李经纬, 刘哲理, 董宗庆, “变长编码字符型数据的保留格式加密”, 吉林大学学报 (工学版), vol. 42, no. 5, pp. 1257–1261, 2012.

  • 李经纬, 贾春福, 刘哲理, “基于k-Feistel网络的FPE方案”, 通信学报, vol. 33, no. 4, pp. 62–68, 2012.

  • 刘哲理, 贾春福, 李经纬, “保留格式加密技术研究”, 软件学报, vol. 23, no. 1, pp. 152–170, 2012.

2011

  • 刘哲理, 贾春福, 孙涛, 李经纬, 纪鸿舜, “基于对技术身份密码学的构造方法”, 天津大学学报, vol. 44, no. 12, pp. 1050–1056, 2011.

  • 刘哲理, 贾春福, 李经纬, “保留格式加密模型研究”, 通信学报, vol. 32, no. 6, pp. 184–190, 2011.

2010

  • Zheli Liu, Chunfu Jia, Jingwei Li, and Xiaochun Cheng, “Format-preserving Encryption for DateTime,” in Proceeding of the IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010.