2025
-
Z. He, Z. Li, J. Luo, F. Luo, J. Duan, J. Li, S. Song, X. Luo, T. Chen, and X. Zhang, “Auspex: Unveiling Inconsistency Bugs of Transaction Fee Mechanism in Blockchain,” in Proceedings of the USENIX Security Symposium (Security), 2025.
-
Z. He, Z. Li, A. Qiao, J. Li, F. Luo, S. Yang, G. Deng, S. Song, X. Zhang, T. Chen, and Xiapu Luo, “Maat: Analyzing and Optimizing Overcharge on Blockchain Storage,” in Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2025.
-
王瑞锦, 王金波, 张凤荔, 李经纬, 李增鹏, 陈厅, “联邦原型学习的特征图中毒攻击和双重防御机制,” 软件学报, vol. 36, no. 3, pp. 1355-1374, 2025.
-
李经纬, 孙嘉, 杨劲远, 沈志荣, 杨浩淼, 方华, 陈厅, 张小松, “云边融合安全存储架构及技术挑战,” 中国科学:信息科学, vol. 55, no. 3, pp. 516-527, 2025.
-
H. Yang, D. Xue, M. Ge, J. Li, G. Xu, H. Li, and R. Lu, “Fast Generation-Based Gradient Leakage Attacks: An Approach to Generate Training Data Directly From the Gradient,” IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 1, pp. 132-145, 2025.
2024
-
Y. Ren, Y. Ren, X. Li, Y. Hu, J. Li, and P. P. C. Lee, “ELECT: Enabling Erasure Coding Tiering for LSM-tree-based Storage,” in Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2024.
-
H. Xiao, J. Li, Y. Ren, R. Wang, and X. Zhang, “CDCache: Space-efficient Flash Caching via Compression-before-Deduplication,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2024.
-
Y. Yang, Z. Wu, Y. Zhang, T. Chen, J. Li, J. Yang, W. Liu, X. Zhang, R. Shi, J. Li, Y. Jiang, and Z. Su, “UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2024.
-
J. Zhao, Z. Yang, J. Li, and P. P. C. Lee, “Encrypted Data Reduction: Removing Redundancy from Encrypted Data in Outsourced Storage,” ACM Transactions on Storage, vol. 20, no. 4, pp. 1-30, 2024.
-
F. Wu, X. Li, J. Li, P. Vijayakumar, B. B. Gupta, and V. Arya, “HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems,” IEEE Transactions on Green Communications and Networking, vol. 8, no. 3, pp. 1141-1155, 2024.
2023
-
J. Wu, J. Liu, J. Chen, T. Chen, J. Li, S. Song, and J. He, “{ContraPonzi}: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning,” in Proceedings of the Asia Service Sciences and Software Engineering Conference, 2023, pp. 155–162. Best Paper Award
-
D. Xue, H. Yang, M. Ge, J. Li, G. Xu, and H. Li, “Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2023.
-
J. Li, Y. Ren, P. P. C. Lee, Y. Wang, T. Chen, and X. Zhang, “FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2023.
-
S. Li, J. Li, Y. Tang, X. Luo, Z. He, Z. Li, X. Cheng, Y. Bai, T. Chen, Y. Tang, Z. Liu, and X. Zhang, “BlockExplorer: Exploring Blockchain Big Data via Parallel Processing,” IEEE Transactions on Computers, vol. 72, no. 8, pp. 2377-2389, 2023.
2022
-
X. Tang and J. Li, “Improving Online Restore Performance of Backup Storage via Historical File Access Pattern,” in Proceedings of the Frontiers in Cyber Security (FCS), 2022.
-
Z. Yang, J. Li, and P. P. C. Lee, “Secure and Lightweight Deduplicated Storage via Shielded Deduplication-Before-Encryption,” in Proceedings of the USENIX Annual Technical Conference (ATC), 2022.
-
J. Li, G. Wei, J. Liang, Y. Ren, P. P. C. Lee, and X. Zhang, “Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2022.
-
H. Yang, M. Ge, K. Xiang, and J. Li, “Using Highly Compressed Gradients in Federated Learning for Data Reconstruction Attacks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 818-830, 2022.
-
Z. Yang, J. Li, Y. Ren, and P. P. C. Lee, “Tunable Encrypted Deduplication with Attack-Resilient Key Management,” ACM Transactions on Storage, vol. 18, no. 4, pp. 32:1-32:38, 2022.
-
S. Dang, S. Cao, J. Li, and X. Zhang, “Dynamic Incentive Mechanism Design for Regulation-aware Systems,” International Journal of Intelligent Systems, vol. 32, no. 2, pp. 1299-1321, 2022.
-
J. Li, S. Huang, Y. Ren, Z. Yang, P. P. C. Lee, X. Zhang, and Y. Hao, “Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication,” IEEE Transactions on Computers, vol. 71, no. 4, pp. 959-970, 2022.
2021
- Y. Ren, J. Li, Z. Yang, P. P. C. Lee, and X. Zhang, “Accelerating Encrypted Deduplication via SGX,” in Proceedings of the USENIX Annual Technical Conference (ATC), 2021.
2020
-
J. Li, Z. Yang, Y. Ren, P. P. C. Lee, and X. Zhang, “Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication,” in Proceedings of the European Conference on Computer Systems (EuroSys), 2020.
-
Y. Wang, Y. Wei, H. Yang, J. Li, and Y. Zhou, “Utilizing Imbalanced Electronic Health Records to Predict Acute Kidney Injury by Ensemble Learning and Time Series Model,” BMC Medical Informatics and Decision Making, 2020.
-
K. Huang, X. Zhang, Y. Mu, F. Rezaeibagha, X. Wang, J. Li, Q. Xia, and J. Qin, “EVA: Efficient Versatile Auditing Scheme for IoT-based Datamarket in Jointcloud,” IEEE Internet of Things Journal (IoTJ), vol. 7, no. 2, pp. 882-892, 2020.
2019
-
J. Li, P. P. C. Lee, Y. Ren, and X. Zhang, “Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection,” in Proceeding of the International Conference on Massive Storage Systems and Technology (MSST), 2019.
-
Y. Wang, Y. Wei, Q. Wu, H. Yang, and J. Li, “An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm,” in Proceeding of the 10th International Conference on Information Technology in Medicine and Education (ITME), 2019.
-
D. Wang, X. Zhang, T. Chen, and J. Li, “Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface,” Security and Communication Networks, vol. 2019, pp. 5076324:1-5076324:19, 2019.
2017
-
J. Li, C. Qin, P. P. C. Lee, and X. Zhang, “Information Leakage in Encrypted Deduplication via Frequency Analysis,” in Proceedings of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017. Best Paper Nomination
-
J. Li, A. Squicciarini, D. Lin, and C. Jia, “MMB^cloud-tree: Authenticated Index for Verifiable Cloud Service Selection,” IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 14, no. 2, pp. 185-198, 2017.
-
J. Li, D. Lin, A. Squicciarini, J. Li, and C. Jia, “Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 499-509, 2017.
-
C. Qin, J. Li, and P. P. C. Lee, “The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System,” ACM Transactions on Storage (ToS), vol. 13, no. 1, pp. 1-30, 2017.
-
J. Li, A. Bowers, D. Lin, P. Jiang, and W. Jiang, “PAS: Policy-based Assistance in Sensor Networks,” Computing, vol. 99, no. 10, pp. 915-928, 2017.
2016
-
J. Li, C. Qin, P. P. C. Lee, and J. Li, “Rekeying for Encrypted Deduplication Storage,” in Proceedings of the Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.
-
S. Karumanchi, J. Li, and A. Squicciarini, “Efficient Network Path Verification for Policy Routed Queries,” in Proceeding of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2016.
-
M. Li, C. Qin, J. Li, and P. P. C. Lee, “CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal,” IEEE Internet Computing (IC), vol. 20, no. 3, pp. 45-53, 2016.
-
J. Li, J. Li, D. Xie, and Z. Cai, “Secure Auditing and Deduplicating Data in Cloud,” IEEE Transactions on Computers (TC), vol. 65, no. 8, pp. 2386-2396, 2016.
2015
-
J. Li, A. Squicciarini, D. Lin, S. Liang, and C. Jia, “SecLoc: Securing Location-sensitive Storage in the Cloud,” in Proceeding of the ACM Symposium on Access Control Models and Technologies (SACMAT), 2015.
-
李经纬, 李柏晴, 张小松, “数据安全重删系统与关键技术研究”, 信息安全研究, vol. 1, no. 3, pp. 245–252, 2015.
-
李经纬, 贾春福, 刘哲理, 李进, 李敏, “可搜索加密技术研究综述”, 软件学报, vol. 26, no. 1, pp. 109–128, 2015.
-
J. Li, X. Chen, J. Li, C. Jia, and W. Lou, “Identity-based Encryption with Outsourced Revocation in Cloud Computing,” IEEE Transactions on Computers (TC), vol. 64, no. 2, pp. 425-437, 2015.
-
F. Xhafa, J. Li, G. Zhao, J. Li, X. Chen, and D. S. Wong, “Designing Cloud-based Electronic Health Record System with Attribute-based Encryption,” Multimedia Tools and Applications (MTA), vol. 74, no. 10, pp. 3441-3458, 2015.
-
J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “New Access Control Systems based on Outsourced Attribute-based Encryption,” Journal of Computer and Security (JCS), vol. 23, no. 6, pp. 659-683, 2015.
2014
-
A. Squicciarini, D. Lin, S. Sundareswaran, and J. Li, “Policy Driven Node Selection in MapReduce,” in Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.
-
S. Karumanchi, J. Li, and A. Squicciarini, “Securing Resource Discovery in Content Hosting Networks,” in Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.
-
J. Li, D. Lin, A. Squicciarini, and C. Jia, “STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds,” in Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm), 2014.
-
J. Li, J. Li, X. Chen, Z. Liu, and C. Jia, “MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks,” Journal of Internet Services Information Security, vol. 4, no. 1, pp. 25-36, 2014.
-
X. Chen, J. Li, X. Huang, J. Li, Y. Xiang, and D. S. Wong, “Secure Outsourced Attribute-based Signatures,” IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 12, pp. 3285-3294, 2014.
-
J. Li, J. Li, X. Chen, Z. Liu, and C. Jia, “Privacy-Preserving Data Utilization in Hybrid Clouds,” Future Generation Computer Systems, vol. 30, pp. 98-106, 2014.
-
J. Li, X. Chen, M. Li, J. Li, P. P.C. Lee, and W. Lou, “Secure Deduplication with Efficient and Reliable Convergent Key Management,” IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 25, no. 6, pp. 1615-1625, 2014.
-
Z. Liu, J. Li, J. Li, and C. Jia, “SQL-Based Fuzzy Query Mechanism over Encrypted Database,” International Journal of Data Warehousing and Mining, vol. 10, no. 4, pp. 71-81, 2014.
2013
-
J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “Fine-grained Access Control System Based on Outsourced Attribute-based Encryption,” in Proceeding of the European Symposium on Research in Computer Security (ESORICS), 2013.
-
J. Li, C. Jia, Z. Liu, and Z. Dong, “Cycle-Walking Revisited: Consistency, Security, and Efficiency,” Security and Communication Networks, vol. 6, no. 8, pp. 985-992, 2013.
2012
-
J. Li, J. Li, Z. Liu, and C. Jia, “Enabling Efficient and Secure Data Sharing in Cloud Computing,” Concurrency and Computation: Practice and Experience, vol. 25, no. 5, pp. 1052-1066, 2012.
-
M. Li, Z. Liu, J. Li, and C. Jia, “Format-Preserving Encryption for Character Data,” Journal of Networks, vol. 7, no. 8, pp. 1239-1244, 2012.
-
J. Li, Z. Liu, L. Xu, and C. Jia, “An Efficient Format-preserving Encryption Mode for Practical Domains,” Wuhan University Journal of Natural Sciences, vol. 17, no. 5, pp. 428-434, 2012.
-
李敏, 贾春福, 李经纬, 刘哲理, 董宗庆, “变长编码字符型数据的保留格式加密”, 吉林大学学报 (工学版), vol. 42, no. 5, pp. 1257–1261, 2012.
-
李经纬, 贾春福, 刘哲理, “基于k-Feistel网络的FPE方案”, 通信学报, vol. 33, no. 4, pp. 62–68, 2012.
-
刘哲理, 贾春福, 李经纬, “保留格式加密技术研究”, 软件学报, vol. 23, no. 1, pp. 152–170, 2012.
2011
-
刘哲理, 贾春福, 孙涛, 李经纬, 纪鸿舜, “基于对技术身份密码学的构造方法”, 天津大学学报, vol. 44, no. 12, pp. 1050–1056, 2011.
-
刘哲理, 贾春福, 李经纬, “保留格式加密模型研究”, 通信学报, vol. 32, no. 6, pp. 184–190, 2011.
2010
- Z. Liu, C. Jia, J. Li, and X. Cheng, “Format-preserving Encryption for DateTime,” in Proceeding of the IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), 2010.