KMap
Ming Li (S'08-M'11) received the PhD degree in electrical and computer engineering from Worcester Polytechnic Institute, the ME and BE degrees in electronic and information engineering from Beihang University, China. He joined the Computer Science Department, Utah State University, as an assistant professor in 2011. His research interests include the general areas of cyber security and privacy, with current emphases on data security and privacy in cloud computing, security in wireless networks and cyber-physical systems. He is a member of IEEE and ACM.

VOSviewer

Courses
  • FINS
    Fundamentals of Information and Network Security

  • FCN
    Fundamentals of Computer Networks

  • CPEAII
    Computer Programming for Engineering Applications II

Grants
  • Funding agency logo
    Achieving Cyber-Resilience for Power Systems using a Learning Model-Assisted Blockchain Framework

    Principal Investigator (PI)

    2021

    $145.0K
    Active
  • Funding agency logo
    Radio-Frequency Interference for Fault Injection and Sensor Manipulation

    Principal Investigator (PI)

    2021

    $124.9K
    Active
  • Funding agency logo
    A Millimeter-Wave Communication System for Wireless Security and Networking Research and Education

    Principal Investigator (PI)

    2021

    $249.9K
  • Funding agency logo
    In-band Wireless Trust Establishment Resistant to Advanced Signal Manipulations

    Principal Investigator (PI)

    2018

    $515.0K
  • Funding agency logo
    SaTC: CORE: Medium: Collaborative: Enforcement of Geofencing Policies for Commercial Unmanned Aircraft Systems

    Principal Investigator (PI)

    2018

    $230.0K
  • Funding agency logo
    SpecEES: Secure and Fair Spectrum Sharing for Heterogeneous Coexistent Systems

    Co-Investigator (COI)

    2017

    $600.0K
  • Funding agency logo
    Toward High Performance Tactical Multi-Hop Wireless Networks via Exploiting Antenna Reconfigurability

    Principal Investigator (PI)

    2016

    $509.4K
  • Funding agency logo
    CAREER: Toward Cooperative Interference Mitigation for Heterogeneous Multi-Hop MIMO Wireless Networks

    Principal Investigator (PI)

    2015

    $445.8K
  • Funding agency logo
    EARS: Collaborative Research: Crowdsourcing-Based Spectrum Etiquette Enforcement in Dynamic Spectrum Access

    Principal Investigator (PI)

    2015

    $329.3K
  • Funding agency logo
    Secure and Resilient Vehicular Platooning

    Principal Investigator (PI)

    2015

    $207.3K
Publications (121)
Recent
  • Secure and collusion-resistant data aggregation from convertible tags

    2021

  • Data inference from encrypted databases: a multi-dimensional order-preserving matching approach

    2020

  • Aggregation-based location privacy: An information theoretic approach

    2020

  • GhostImage: Remote Perception Attacks against Camera-based Image Classification Systems

    2020

  • Wireless federated learning with local differential privacy

    2020

  • Regret Analysis of Stochastic Multi-armed Bandit Problem with Clustered Information Feedback

    2020

  • Impacts of constrained sensing and communication based attacks on vehicular platoons

    2020

  • In-band Secret-Free Pairing for COTS Wireless Devices

    2020

  • SVM: secure vehicle motion verification with a single wireless receiver

    2020

  • ART: Automatic Recovery of Trust for Mobile Devices

    2020

  • StegoNet: Turn Deep Neural Network into a Stegomalware

    2020

  • iJam with channel randomization

    2020

  • ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization

    2020

  • Providing Input-Discriminative Protection for Local Differential Privacy

    2020

  • PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility

    2020

  • Local information privacy and its application to privacy-preserving data aggregation

    2020

  • GhostImage: Perception Domain Attacks against Vision-based Object Classification Systems

    2020

  • “Privacy-Utility Tradeoff in Dynamic Spectrum Sharing with Non-Cooperative Incumbent Users

    2020

  • Enhancing LAA/Wi-Fi Coexistence via Concurrent Transmissions and Interference Cancellation

    2019

  • Context Aware Laplacian Mechanism for Local Information Privacy

    2019

  • Secure retrospective interference alignment

    2019

  • SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks

    2019

  • Collusion Resistant Aggregation from Convertible Tags

    2019

  • Fast Reconfigurable Antenna State Selection with Hierarchical Thompson Sampling

    2019

  • Supporting both range queries and frequency estimation with local differential privacy

    2019

  • Trading Privacy for Utility in Database-Assisted Dynamic Spectrum Access

    2019

  • Poster: Perceived Adversarial Examples

    2019

  • Randex: Mitigating Range Injection Attacks on Searchable Encryption

    2019

  • In-band Secret-Free Pairing Protocol for COTS Wireless Devices

    2019

  • Crowdsourced measurements for device fingerprinting

    2019

  • Online reconfigurable antenna state selection based on Thompson sampling

    2019

  • Local Information Privacy with Bounded Prior

    2019

  • On the Secure Degrees of Freedom of 2 x 2 x 2 Multi-Hop Network with Untrusted Relays

    2018

  • Pseudonym Inference in Cooperative Vehicular Traffic Scenarios

    2018

  • Online location trace privacy: An information theoretic approach

    2018

  • Are friends of my friends too social? limitations of location privacy in a socially-connected world

    2018

  • Truth-aware Optimal Decision-making Framework with Driver Preferences for V2V Communications

    2018

  • Storage efficient substring searchable symmetric encryption

    2018

  • Analysis of friendly jamming for secure location verification of vehicles for intelligent highways

    2018

  • Secure device bootstrapping without secrets resistant to signal manipulation attacks

    2018

  • LTE misbehavior detection in Wi-Fi/LTE coexistence under the LAA-LTE standard

    2018

  • On the secure degrees of freedom of the K-user interference channel with delayed CSIT

    2018

  • On the privacy and utility tradeoff in database-assisted dynamic spectrum access

    2018

  • On the throughput limit of multi-hop wireless networks with reconfigurable antennas

    2018

  • SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices

    2018

  • Context-aware data aggregation with localized information privacy

    2018

  • SpecWatch: A framework for adversarial spectrum monitoring with unknown statistics

    2018

  • Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks

    2017

  • The Onion Name System: Tor-powered Decentralized DNS for Tor Onion Services

    2017

  • Throughput Optimization in Multi-hop Wireless Networks with Reconfigurable Antennas

    2017

  • Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles

    2017

  • Cooperative Interference Mitigation for Heterogeneous Multi-hop Wireless Networks Coexistence

    2016

  • Enabling Mutually Private Location Proximity Services in Smart Cities: A Comparative Assessment

    2016

  • Making Wireless Body Area Networks Robust under Cross-Technology Interference

    2016

  • A game theoretical approach to coexistence of heterogeneous mimo wireless networks with interference cancellation

    2016

  • Analysis of Friendly Jamming for Secure Location Verification of Vehicles

    2016

  • SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics

    2016

  • Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data

    2016

  • Jamming Resilient Communication Using MIMO Interference Cancellation

    2016

  • FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

    2016

  • Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets

    2016

  • SecReach: Secure Reachability Computation on Encrypted Location Check-in Data

    2016

  • MASK-BAN: movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks

    2015

  • Location Based Handshake and Private Proximity Test with Location Tags

    2015

  • Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice

    2015

  • Privacy-preserving inference of social relationships from location data: a vision paper

    2015

  • Multidimensional signal constellation design for channel dominated with nonlinear phase noise

    2015

  • Signal Constellation Design for Cross-Phase Modulation Dominated Channels (Invited Paper)

    2015

  • Identity-Based Private Matching over Outsourced Encrypted Datasets

    2015

  • A tale of two clouds: Computing on data encrypted under multiple keys

    2014

  • Poster: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems

    2014

  • SpecMonitor: Towards Efficient Passive Traffic Monitoring for Cognitive Radio Network

    2014

  • Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks

    2014

  • Friendly Jamming for Secure Localization in Vehicular Transportation

    2014

  • Toward privacy-assured and searchable cloud data storage services

    2013

  • Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel

    2013

  • Storing shared data on the cloud via security-mediator

    2013

  • Secure ad hoc trust initialization and key management in wireless body area networks

    2013

  • MIMO-based Jamming Resilient Communication in Wireless Networks

    2013

  • Surviving the RF smog: Making Body Area Networks robust to cross-technology interference

    2013

  • Non-parametric passive traffic monitoring in cognitive radio networks

    2013

  • Computing encrypted cloud data efficiently under multiple keys

    2013

  • Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

    2013

  • Enforcing spectrum access rules in cognitive radio networks through cooperative jamming

    2013

  • Privacy-preserving public auditing for shared cloud data supporting group dynamics

    2013

  • Privacy-preserving distributed profile matching in proximity-based mobile social networks

    2013

  • ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks

    2013

  • Sharp: Private proximity test and secure handshake with cheat-proof location tags

    2012

  • BANA: Body Area Network Authentication Exploiting Channel Characteristics

    2012

  • Throughput analysis of cooperative mobile content distribution in vehicular network using symbol level network coding

    2012

  • Mushi: Toward multiple level security cloud with strong hardware level isolation

    2012

  • Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks

    2012

  • Authenticated secret key extraction using channel characteristics for body area networks

    2012

  • R-Code: Network coding-based reliable broadcast in wireless mesh networks

    2011

  • Distributed data mining with differential privacy

    2011

  • Findu: Privacy-preserving personal profile matching in mobile social networks

    2011

  • Group device pairing based secure sensor association and key management for body area networks

    2010

  • Adaptive local routing strategy on a scale-free network

    2010

  • Codeplay: Live multimedia streaming in vanets using symbol-level network coding

    2010

  • Data security and privacy in wireless body area networks

    2010

  • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings

    2010

  • A network coding approach to reliable broadcast in wireless mesh networks

    2009

  • Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks

    2008

  • A rapid antenna selection for MIMO-diversity systems

    2007

  • Routing strategy on a two-dimensional small-world network model

    2007

Grants
Citations
H-Index
Patents
News
Books
Opportunities