Publications
- Taeho Jung, Xiang-Yang Li, Lan Zhang, He Huang
Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design, arXiv:1308.6202 - Taeho Jung, Xiang-Yang Li
Infinite Choices of Data Aggregations with Linear Number of Keys, arXiv:1308.6198 - He Huang, Xiang-Yang Li, Yu-e Sun, Hongli Xu, Liusheng Huang
PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms, arXiv:1307.7792 - Taeho Jung, Xiang-Yang Li, Lan Zhang
A General Framework for Privacy-Preserving Distributed Greedy Algorithm, arXiv:1307.2294 - Taeho Jung*, Xiang-Yang Li, Meng Wan
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel,
IEEE Transactions on Dependable and Secure Computing (TDSC), 2014, Feb. Here is a revised version that address a small issue in the previous version. - Qian Wang, Ping Xu*, Kui Ren, Xiang-Yang Li
Towards Optimal Adaptive UFH-based Anti-jamming Wireless Communication
IEEE JSAC, June, 2011. - Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, and Xiangke Liao
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks,
IEEE/ACM Transactions on Networking, 2011, March. - Xiang-Yang Li, Shang-Hua Teng
Practical Human-Machine Identification over Insecure Channels,
Journal of Combinatorial Optimization (Official site)
Kluwer Publications, Vol.3 Issue 4, 1999. - Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, YongGuang Zhang, Feng Zhao
Privacy.Tag: Privacy Concern Expressed and Respected
ACM SenSys 2014. - Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, ShaoJie Tang, Jizhong Zhao, Kun Zhao
KEEP: Fast Secret Key Extraction Protocol for D2D Communication,
IEEE IWQoS 2014, HongKong. - Xi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, YunHao Li
Privacy-preserving High-quality Map Generation with Participatory sensing,
IEEE INFOCOM 2014 - Jing Zhao*, Taeho Jung*, Yu Wang*, Xiang-Yang Li,
Achieving Differential Privacy of Data Disclosure in the Smart Grid,
IEEE INFOCOM 2014 - Zhiping Jiang^, JiZhong Zhao, Xiang-Yang Li, JinLong Han, Wei Xi^
Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information ,
IEEE INFOCOM 2013 - Lan Zhang^, Xiang-Yang Li, and YunHao Liu
Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks,
IEEE ICDCS 2013. - Taeho Jung*, Xiang-Yang Li, and Zhiguo Wan
Privacy Preserving Cloud Data Access With Multi-Authorities,
IEEE INFOCOM 2013 - Taeho Jung*, Xiang-Yang Li, and ShaoJie Tang
Privacy-Preserving Data Aggregation without Secure Channel: Multivariate Polynomial Evaluation,
IEEE INFOCOM 2013 - Taeho Jung*, and Xiang-Yang Li
Search Me If You Can: Privacy-preserving Location Query Service,
IEEE INFOCOM 2013. - Lan Zhang^, Xiang-Yang Li, and YunHao Liu
Verifiable Private Multi-party Computation: Ranging and Ranking,
IEEE INFOCOM 2013 mini conference. - Haitao Zhang**, ShaoJie Tang*, Xiang-Yang Li, and HuaDong Ma
Tracking and Identifying Burglar using Collaborative Sensor-Camera Networks
IEEE INFOCOM 2012 mini conference. - ShaoJie Tang*, Xiang-Yang Li, Haitao Zhang**, JianKang Han, GuoJun Dai, XingFa Shen
TelosCAM: Identifying Burglar Through Networked Sensor-Camera Mates with Privacy Protection
IEEE RTSS 2011 - DeZun Dong^, Mo Li, YunHao Liu, and Xiang-Yang Li and JiZhong Zhao
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
IEEE ICNP 2009. (36 papers out of 197 submissions) - Xiang-Yang Li, Yu Wang* and Ophir Frieder
Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks,
ICCCN 2002, Miami, FL.