Journal and Magazine Publications

  1. Qinghua Li, and Guohong Cao, "Providing Privacy-Aware Incentives in Mobile Sensing Systems," IEEE Transactions on Mobile Computing (TMC), Vol. 15, No. 6, pp. 1485-1498, June 2016. [pdf]
  2. Song Han, Shuai Zhao, Qinghua Li, Chun-Hua Ju and Wanlei Zhou, "PPM-HDA: Privacypreserving and multifunctional health data aggregation with fault tolerance for cloud assisted WBANs," IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 9, pp. 1940-1955, September 2016.
  3. Jing Zhao, Xuejun Zhuo, Qinghua Li, Wei Gao, and Guohong Cao, "Contact Duration Aware Data Replication in DTNs with Licensed and Unlicensed Spectrum," IEEE Transactions on Mobile Computing (TMC), Vol. 15, No. 4, pp. 803-816, April 2016. [pdf]
  4. Qinghua Li, and Guohong Cao, "Privacy-Preserving Participatory Sensing," IEEE Communication Magazine, Vol. 53, No. 8, pp. 68-74, August 2015. [pdf]
  5. Ben Niu, Xiaoyan Zhu, Qinghua Li, Jie Chen and Hui Li, "A Novel Attack to Spatial Cloaking Schemes in Location-Based Services," Future Generation Computer Systems (FGCS), Vol. 49, pp. 125-132, August 2015.
  6. Wei Gao, Qinghua Li, and Guohong Cao, "Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation," IEEE Transactions on Mobile Computing (TMC), Vol. 14, No. 4, pp. 714-727, April 2015. [pdf]
  7. Qinghua Li, Guohong Cao, and Tom La Porta, "Efficient and Privacy-Aware Data Aggregation in Mobile Sensing," IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 11, No. 2, pp. 115-129, 2014. [pdf]
  8. Qinghua Li, Wei Gao, Sencun Zhu, and Guohong Cao, "To Lie Or To Comply: Defending against Flood Attacks in Disruption Tolerant Networks," IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 10, No. 3, pp. 168-182, 2013. [pdf]
  9. Eve M. Schooler, Jianqing Zhang, Adedamola Omotosho, Jessica Mccarthy, Meiyuan Zhao, and Qinghua Li, "The Trusted Personal Energy Cloud for the Smart Home," The Intel Technology Journal, Volume 16, Issue 3, 2012.
  10. Wei Gao, Qinghua Li, Bo Zhao, and Guohong Cao, "Social-aware Multicast in Disruption Tolerant Networks," IEEE/ACM Transactions on Networking (ToN), Vol. 20, No. 5, pp. 1553-1566, 2012.
  11. Qinghua Li, and Guohong Cao, "Mitigating Routing Misbehavior in Disruption Tolerant Networks," IEEE Transactions on Information Forensics and Security (TIFS), Vol. 7, No. 2, pp. 664-675, April 2012. [pdf]
  12. Qinghua Li, Wei Gao, Sencun Zhu, and Guohong Cao, "A Routing Protocol for Socially Selfish Delay Tolerant Networks," Ad Hoc Networks, Vol. 10, No. 8, pp. 1619-1632, November 2012. [pdf]
  13. Qinghua Li, and Guohong Cao, "Multicast Authentication in Smart Grid with One-Time Signature," IEEE Transactions on Smart Grid (TSG), Vol. 2, No. 4, pp. 686-696, December 2011. [pdf]
  14. Qinghua Li and Mingwei Xu, "A Collaborative, Reputation-Enhanced Mechanism for Malicious Web Page Detection", Microcomputer Applications, vol. 12, pp. 1250-1255, 2007.

Conference Publications

  1. Wei Bao, and Qinghua Li, "Hiding Critical Targets in Smart Grid Networks," in IEEE International Conference on Computing, Networking and Communications (ICNC) - Communications and Information Security Symposium, 2018. (Acceptance Ratio: 26%)
  2. Fengli Zhang, and Qinghua Li, "Deep Learning-Based Data Forgery Detection in Automatic Generation Control," in IEEE Conference on Communications and Network Security (CNS): International Workshop on Cyber-Physical Systems Security (CPS-Sec), 2017.
  3. Ang Li, Qinghua Li, and Vincent C. Hu, "Access Control for Distributed Processing Systems: Use Cases and General Considerations," in Proceedings of IEEE International Conference on Collaboration and Internet Computing (CIC), 2017.
  4. Fengli Zhang, Michael Mahler, and Qinghua Li, "Flooding Attacks against Secure Time-Critical Communications in the Power Grid," in Proceedings of IEEE International Conference on Smart Grid Communications (SmartGridComm) - Cyber Security and Privacy Symposium, 2017. [pdf]
  5. Wei Du, and Qinghua Li, "Secure and Efficient Outsourcing of Large-Scale Nonlinear Programming," in IEEE Conference on Communications and Network Security (CNS), 2017. (Acceptance Ratio: 41/137=30%) [pdf]
  6. Jingyao Fan, Qinghua Li, and Guohong Cao, "Privacy Disclosure Through Smart Meters: Reactive Power Based Attack and Defense," in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017. (Acceptance Ratio: 49/220=22%) (Best Paper Candidate) [pdf]
  7. Amin R.S. Nugroho, and Qinghua Li, "Inferring Mobile Apps from Resource Usage Patterns," in IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (Mobile Cloud), 2017. [pdf]
  8. Michael Mahler, Qinghua Li, and Ang Li, "A Home Security System Based on Smartphone Sensors," in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), 2017. (Acceptance Ratio: 28/194=14%) [pdf]
  9. Ang Li, Qinghua Li, and Wei Gao, "PrivacyCamera: Privacy-Aware Photographing with Mobile Phones," IEEE International Conference on Sensing, Communication and Networking (SECON), 2016. (Acceptance Ratio: 56/213=26%) [pdf] [slides]
  10. Ang Li, Qinghua Li, Vincent C. Hu, and Jia Di, "Evaluating the Capability and Performance of Access Control Policy Verification Tools," IEEE Military Communications Conference (MILCOM), 2015. [pdf]
  11. Jingyao Fan, Qinghua Li, and Guohong Cao, "Privacy-Aware and Trustworthy Data Aggregation in Mobile Sensing," IEEE Conference on Communications and Network Security (CNS), 2015. (Acceptance Ratio: 48/171=28%) [pdf]
  12. H. Alan Mantooth, Yusi Liu, Chris Farnell, Fengli Zhang, Qinghua Li, and Jia Di, "Securing DC and Hybrid Microgrids," in Proceedings of the IEEE First International Conference On DC Microgrids​ (ICDCM), 2015.
  13. Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li, "Enhancing Privacy through Caching in Location-Based Services," the 34th IEEE Conference on Computer Communications (INFOCOM), 2015. (Acceptance Ratio: 316/1640=19%) [pdf]
  14. Qinghua Li, Chase Ross, Jing Yang, Jia Di, Juan Carlos Balda, and H. Alan Mantooth, "The Effects of Flooding Attacks on Time-Critical Communications in the Smart Grid," the 6th IEEE PES Innovative Smart Grid Technologies Conference (ISGT), 2015. [pdf]
  15. Qinghua Li, and Guohong Cao, "Providing Efficient Privacy-Aware Incentives for Mobile Sensing," International Conference on Distributed Computing Systems (ICDCS), 2014. (Acceptance Ratio: 66/500=13.2%) [pdf]
  16. Ben Niu, Qinghua Li, Xiaoyan Zhu, and Hui Li, "A Fine-Grained Spatial Cloaking Scheme for Privacy-Aware Users in Location-Based Services," the 23rd International Conference on Computer Communications and Networks (ICCCN), 2014. (Acceptance Ratio: 105/375=28%) [pdf]
  17. Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li, "Achieving k-anonymity in Privacy-Aware Location-Based Services," The 33rd IEEE Conference on Computer Communications (INFOCOM), 2014. (Acceptance Ratio: 320/1645=19.4%) [pdf]
  18. Wei Gao, Qinghua Li, and Guohong Cao, "Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination," The 33rd IEEE Conference on Computer Communications (INFOCOM), 2014. (Acceptance Ratio: 320/1645=19.4%) [pdf]
  19. Qinghua Li, and Guohong Cao, "Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error," The 13th Privacy Enhancing Technologies Symposium (PETS), 2013. (Acceptance Ratio: 13/69=18.8%) [pdf]
  20. Qinghua Li, and Guohong Cao, "Providing Privacy-Aware Incentives for Mobile Sensing," IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013. (Acceptance Ratio: 19/170=11.2%) (Best Paper Candidate) [pdf]
  21. Wei Gao, and Qinghua Li, "Wakeup Scheduling For Energy-Efficient Communication in Opportunistic Mobile Networks," IEEE Conference on Computer Communications (INFOCOM), 2013. (Acceptance Ratio: 280/1613=17.4%) [pdf]
  22. Qinghua Li, and Guohong Cao, "Efficient and Privacy-Preserving Data Aggregation in Mobile Sensing," in Proceedings of the 20th IEEE International Conference on Network Protocols (ICNP), 2012. (Acceptance Ratio: 30/131=22.9%) [pdf]
  23. Jianqing Zhang, Qinghua Li, and Eve M. Schooler, "iHEMS: An Information-Centric Approach to Secure Home Energy Management," in Proceedings of the IEEE Third International Conference on Smart Grid Communications (SmartGridComm), 2012. [pdf]
  24. Xuejun Zhuo, Qinghua Li, Wei Gao, Guohong Cao, and Yiqi Dai, "Contact Duration Aware Data Replication in Delay Tolerant Networks," in Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP), 2011. (Acceptance Ratio: 31/189=16.4%) [pdf]
  25. Xuejun Zhuo, Qinghua Li, Guohong Cao, Yiqi Dai, Boleslaw Szymanski, and Tom La Porta, "Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach," in Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2011. (Acceptance Ratio: 51/185=27.6%) (Best Paper Candidate) [pdf]
  26. Qinghua Li, Sencun Zhu, and Guohong Cao, "Routing in Socially Selfish Delay Tolerant Networks," in Proceedings of the 29th IEEE Conference on Computer Communications (INFOCOM), 2010. (Acceptance Ratio: 276/1575=17.5%) [pdf]
  27. Wei Gao, Qinghua Li, Bo Zhao, and Guohong Cao, "Multicasting in Delay Tolerant Networks: A Social Network Perspective," in Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009. (Acceptance Ratio: 31/175=17.7%) [pdf]
  28. Mingwei Xu, Qinghua Li, Xuezhi Jiang, and Yong Cui, "Evading User-Specific Offensive Web Pages via Light- Weight, Large-Scale Collaborations," in Proceedings of the IEEE International Conference on Communications (ICC), 2008.

Tech Reports

  1. Michael Lin, Tim Bolbrock, Qinghua Li, Hosam Rowaihy, Guohong Cao and Thomas La Porta, “Inventory Tracking with Mobile RFID Readers,” Technical Report, The Pennsylvania State University, 2008.