Meng Li (李萌), Associate Professor, IEEE Senior Member, ERCIM Fellow
1. Education
01/09/2015-06/30/2019, Ph.D., Computer Science and Technology, Beijing Institute of Technology, China,
supervised by Liehuang Zhu
01/09/2017-31/08/2018, visiting Ph.D., China Scholarship Council (CSC) Program, BBCR Lab at University of Waterloo, Wilfrid
Laurier University, Canada, supervised by IEEE Fellow Xiaodong Lin
01/09/2010-01/02/2013, Master, Computer Science and Technology, Beijing Institute of Technology, China,
supervised by Liehuang Zhu
01/09/2006-30/06/2010, Bachelor, Information Security, Hefei University of Technology, China
2. Professional experience
06/09/2021-Now, Dean Assistant, School of Computer Science and Information Engineering, Hefei University of Technology, China
01/10/2020-31/03/2021, Postdoc Research Fellow, European Research Consortium for Informatics and Mathematics (ERCIM), The National Research Council-Institute for Informatics and Telematics (CNR-IIT), Italy, work with Fabio Martinelli
01/09/2020-Now, Postdoc Research Fellow, SPRITZ Security and Privacy Research Group, Department of Mathematics, University of Padua, Italy, working with IEEE Fellow Mauro Conti
11/07/2019-Now, Associate Professor, School of Computer Science and Information Engineering, Hefei University of Technology, China
01/07/2013-15/05/2015, Employee, Industrial and Commercial Bank of China (ICBC) Anhui Branch, China
3. Research Interests
Security, privacy, fairness, applied cryptography, cloud computing, edge computing, blockchain, SGX, Vehicular Networks.
4. Fundings
- [2] 01/01/2021-31/12/2023, National Nature Science Foundation of China (NFSC), Youth Program, “Research on Strong Privacy Preservation for User Matching in Ride-Hailing Services” (240,000 yuan), Principal Investigator.
- [1] 01/07/2020-30/06/2023, Nature Science Foundation of Anhui Province, General Program, “Research on Privacy-preserving Ride-Hailing Protocols based on Encrypted Data Processing” (120,000 yuan), Principal Investigator.
5. Selected publications
5.1 Monographs
- [2] L. Zhu, K. Gai, and M. Li, Blockchain of Internet of Things, Springer, 2019.
- [1] M. Li, Encyclopedia of Wireless Networks - Differential Privacy, Springer, 2018.
5.2 Selected publications on transactions, journals, and magazines
- [38] M. Li, Y. Chen, L. Zhu*, Z. Zhang*, J. Ni, C. Lal, and M. Conti, "Astraea: Anonymous and Secure Auditing based on Private Smart Contracts for Donation Systems," IEEE Transactions on Dependable and Secure Computing (TDSC), 2022, Online. (Q1, CCF A)
- [37] M. Li, Y. Chen*, C. Lal, M. Conti, F. Martinelli, and M. Alazab, "Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts," IEEE Trans. Dependable and Secure Computing (TDSC), 2022, Online. (Q1, CCF A)
- [36] M. Li, Y. Chen, C. Lal, and M. Conti, M. Alazab, and D. Hu*, "Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain," IEEE Trans. Dependable and Secure Computing (TDSC), 2023, 20 (1): 225-241. (Q1, CCF A, Featured Article from the January/February 2023 Issue)
- [35] M. Li, Y. Chen, S. Zheng*, D. Hu*, C. Lal, and M. Conti, "Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks," IEEE Trans. Dependable and Secure Computing (TDSC), 2022, 19 (2): 1133-1148. (Q1, CCF A)
- [34] L. Zhu, M. Li, Z. Zhang*, and Z. Qin, "ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks," IEEE Trans. Dependable and Secure Computing (TDSC), 2020, 17 (4): 703-715. (Q1, CCF A, ESI Highly Cited Paper)
- [33] Z. Zhang, X. Liu, M. Li*, H. Yin, L. Zhu*, B. Khoussainov, and K. Gai, "HCA: Hashchain-based Consensus Acceleration via Re-voting," IEEE Trans. Dependable and Secure Computing (TDSC), 2023, Accepted. (Q1, CCF A)
- [32] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack," IEEE/ACM Trans. Networking (ToN), 2023, 30 (5): 2060-2073. (Q1, CCF A)
- [31] M. Li, L. Zhu*, and X. Lin, "Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing," IEEE Trans. Services Computing (TSC), 2021, 14 (6): 1902-1913. (Q1, CCF A)
- [30] D. Hu, Q. Wang, S. Yan, X. Liu, M. Li*, and S. Zheng, "Reversible Database Watermarking based on Order-Preserving Encryption for Data Sharing," ACM Trans. Database Systems (TODS), 2023, Accepted. (Q3, CCF A)
- [29] M. Li, J. Gao, L. Zhu*, Z. Zhang*, C. Lal, M. Conti, and M. Alazab, "Mnemosyne: Privacy-Preserving Ride Matching with Collusion-Resistant Driver Exclusion," IEEE Trans. Vehicular Technology (TVT), 2022, Online.
- [28] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain," IEEE Trans. Network and Service Management (TNSM), 2021, 18 (4): 4434-4449.
- [27] M. Li, D. Hu, C. Lal*, M. Conti, and Z. Zhang, "Blockchain-Enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things," IEEE Trans. Industrial Informatics (TII), 2020, 16 (10): 6564-6574.
- [26] M. Li, Y. Chen, N. Kumar, C. Lal, M. Conti, and M. Alazab*, "Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks," IEEE Trans. Green Communications and Networking (TGCN), 2022, 6 (3): 1267-1275.
- [25] M. Li, L. Zhu*, and X. Lin, "Efficient and Privacy-preserving Carpooling using Blockchain-assisted Vehicular Fog Computing," IEEE Internet of Things Journal, 2019, 6 (3): 4573-4584.
- [24] M. Li, C. Lal, M. Conti, and D. Hu*, "LEChain: A Blockchain-based Lawful Evidence Management Scheme for Digital Forensics," Future Generation Computer Systems (FGCS), 2021, 115: 405-420.
- [23] M. Li, L. Zhu, Z. Zhang*, and R. Xu, "Achieving Differential Privacy of Trajectory Data Publishing in Participatory Sensing," Information Sciences, 2017, 400-401: 1-13.
- [22] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and F. Martinelli, "Privacy for 5G-Supported Vehicular Networks," IEEE Open Journal of Communications Society (OJ-COMS), 2021, 2: 1935-1956.
- [21] M. Li, K. Zhang, J. Liu, H. Gong, and Z. Zhang*, "Blockchain-based Anomaly Detection of Electricity Consumption in Smart Grids," Pattern Recognition Letters, 2020, 138: 476-482.
- [20] D. Hu, Y. Li, L. Pan, M. Li*, and S. Zheng, "A Blockchain-Based Trading System for Big Data,” Computer Networks, 2021, 191 (107994): 1-13.
- [19] L. Zhu, M. Li, Z. Zhang*, "Secure Fog-assisted Crowdsensing with Collusion Resistance: From Data Reporting to Data Requesting," IEEE Internet of Things Journal, 2019, 6 (3): 5473-5484.
- [18] L. Zhu, M. Li, Z. Zhang*, C. Xu, R. Zhang, X. Du, and N. Guizani, "Privacy-preserving Authentication and Data Aggregation for Fog-based Smart Grid," IEEE Communications Magazine, 2019, 57 (6): 80-85.
- [17] L. Zhu, M. Li, Z. Zhang*, X. Du, and M. Guizani, "Big Data Mining of Users' Energy Consumption Pattern in Wireless Smart Grid," IEEE Wireless Communications, 2018, 25 (1): 84-89.
- [16] C. Gu, X. Cui, M. Li, and D. Hu, "An Efficient and Privacy-preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks," IEEE Transactions on Vehicular Technology (TVT), 2023, Online.
- [15] J. He, Z. Zhang*, L. Ma, Z. Zhang, M. Li, B. Khoussainov, J. Liu, and L. Zhu*, "InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring through Self-Attention Mechanisms," IEEE Trans. Smart Grid (TSG), 2023, Online.
- [14] H. Yin Z. Zhang*, L. Zhu*, M. Li, X. Du, M. Guizani, and B. Khoussainov, "A Blockchain-Based Storage System With Financial Incentives for Load-balancing," IEEE Trans. Network Science and Engineering (TNSE), 2021, 8 (2): 1178-1188.
- [13] H. Yin, Z. Zhang*, J. He, L. Ma, L. Zhu*, M. Li, B.Khoussainov, "Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain," IEEE Internet of Things Journal, 2022, 9 (10): 7866-7875.
5.3 Selected publications on conferences
- [12] L. Zhu and M. Li, "DoS-Resilient Secure Data Aggregation in Wireless Sensor Networks," Posters of the 17th ACM Annual International Conference on Mobile Computing and Networking (MobiCom), September 2011: 1-2, Las Vegas, USA. (CCF A)
- [11] M. Li, J. Gao, Z. Zhang, C. Fu, C. Lal, and M. Conti, "Graph Encryption for Shortest Path Queries With k Unsorted Nodes," Proc. 21st IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), October 2022: 89-96, Wuhan, China.
- [10] M. Li*, M. Zhang, J. Gao, C. Lal, M. Conti, and M. Alazab, "Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud", Proc. 24th International Conference on Information and Communications Security (ICICS), September 2022, Canterbury, UK.
- [9] Y. Chen, M. Li*, S. Zheng*, D. Hu, C. Lal, and M Conti, "One-Time, Oblivious, and Unlinkable Query Processing over Encrypted Data On Cloud," Proc. 22nd International Conference on Information and Communication Security (ICICS), August 2020: 350-365, Copenhagen, Denmark.
- [8] M. Li, L. Zhu*, and X. Lin, "CoRide: A Privacy-preserving Collaborative-Ride Hailing Service using Blockchain-assisted Vehicular Fog Computing," Proc. 15th International Conference on Security and Privacy in Communication Systems (SecureComm), November 2019: 408-422, Orlando, USA.
- [7] M. Li, J. Gao, Y. Chen, J. Zhao, and M. Alazab*, "Privacy-preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks," Proc. 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2020: 599-606, Guangzhou, China.
- [6] M. Li, F. Wu, G. Chen, L. Zhu, and Z. Zhang*, "How to Protect Query and Report Privacy without Sacrificing Service Quality in Participatory Sensing," Proc. 34th IEEE International Performance Computing and Communications Conference (IPCCC), December 2015: 1-7, Nanjing, China.
- [5] L. Zhu and M. Li, "An Energy Efficient and Integrity-Preserving Aggregation Protocol in Wreless Sensor Networks," Proc. 30th IEEE International Performance Computing and Communications Conference (IPCCC), December 2011: 1-6, Orlando, USA.
- [4] Z. Zhang, M. Li, L. Zhu*, and X. Li, "SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning," Proc. 3rd International Conference on Smart Computing and Communication (SmartCom), December 2018: 1-10, Tokyo, Japan. Best Paper Award.
- [3] S. Zheng, L. Pan, D. Hu*, M. Li, Y. Fan, "A Blockchain-Based Trading Platform for Big Data," Proc. 8th International Workshop on Security and Privacy in Big Data (INFOCOM WKSHPS BigSecurity), July 2020: 991-996, Toronto, Canada.
- [2] Y. Chen, M. Li*, S. Zheng, C. Lal, and M. Conti, "Where to Meet a Driver Privately: Recom-mending Pick-Up Locations for Ride-Hailing Services," Proc. 17th International Workshop on Security and Trust Management (STM) (Co-located with ESORICS 2021), October 2021: 1-18, Darmstadt, Germany.
- [1] P. Su, N. Sun*, L. Zhu, Y. Li, R. Bi, M. Li, and Z. Zhang, "A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System," Proc. 5th International Workshop on Security in Cloud Computing (SCC) (Co-located with ASIACCS), April 2017: 1-8, Abu Dhabi, UAE.
6. Invited presentations to internationally established conferences
- [3] M. Li, "Security and Privacy in Vehicular Networks, Anhui Normal University", 2022.9.10.
- [2] M. Li, "Blockchain: Powerful Boost to Privacy Preservation in Vehicular Networks", CCF YOCSEF-Qingdao, 2022.4.9.
- [1] M. Li, "Security and Privacy in Vehicular Digital Forensics", International Conference on Forensic Science and Research, 2021.11.15, https://www.pagesconferences.com/forensic-science.
7. Acedemic Memberships and Positions
7.1 Associate Editor
- IEEE Transactions on Information Forensics and Security (TIFS)
7.2 Guest Editor
- Mathematics-Special Issue "New Advances in Coding Theory and Cryptography" (https://www.mdpi.com/journal/mathematics/special_issues/82U7V861WY)
7.3 Memberships
- IEEE Senior Member (2022.8.16)
- IEEE Communications Society (ComSoc) Senior Member (2022.8.16)
- IEEE Signal Processing Society (SPS) Member (2023.2.17)
- IEEE Technical Committee on Services Computing (TCSVC) Member (2021.3)
- ACM Member (2021.2)
- China Computer Federation (CCF) Member (2019.9.4)
- China Association for Cryptographic Research (CACR) Member (2019.8)
- CCF "Blockchain Committee" Corresponding Memmber (2020.12.18)/Executive Member (2021.12.25)
- CCF "Computer Applications Committee" Executive Member (2022.07.31)
- Chinese Information Processing Society of China "Big Data Security and Privacy Preservation Committee" Member (2022.1.30)/Standing Member (2022.5.17)
- Chinese Association for Artificial Intelligence (CAAI) Intelligent information Network Committee Member (2021.11)
- CAAI Youth Work Committee Member (2022.6.28)
- Cyber Security Association of China Intelligent Vehicular Network Security Expert Group Member (2021.2.10)/Personal Information Protection Expert Group (2021.2.18)
7.4 Conference Co-organizer
- 1st Conference on China Multimedia Forensics and Security (CHINAMFS) 2020, Hefei, China
- 2nd International Workshop on Mobile Communications and Networking (WMCN) 2017, Waterloo, Canada
- 13th International Conference on Mobile Ad-hoc and Sensor Network (MSN) 2017, Beijing, China
- 3rd International Conference on Trusted Systems (INTRUST) 2011, Beijing, China
7.5 Special Session Proposer
- The International Conference on Cyber-physical Social Intelligence (ICCSI) 2023-Big Data Techniques for Computer Vision
7.6 Session Chair
- 23rd International Conference on Information and Communications Security (ICICS 2021)-Parallel Session B: Post-Quantum Cryptography
- 22nd International Conference on Information and Communications Security (ICICS 2020)-Crypto IV
7.7 Technical Program Committee Member
- 16th International Conference on Knowledge Science, Engineering and Management (KSEM 2023)
- 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
- 15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022)
- 9th IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (MAPE 2022)
- 44th International Conference on Telecommunications and Signal Processing (TSP 2021)
- 30th International Conference on Computing and Communication Networks (ICCCN 2021)
- 8th IEEE International Conference on Smart City and Informatization (iSCI 2020)
- 8th International Symposium on Security in Computing and Communications (SSCC 2020)
- Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS) 2019
7.8 Reviewer for transactions, journals, magazines, and conferences:
- IEEE Transactions on Information Forensics and Security (TIFS)
- IEEE Transactions Dependable and Secure Computing (TDSC)
- IEEE Transactions on Mobile Computing (TMC)
- IEEE Transactions on Services Computing (TSC)
- IEEE Transactions on Industrial Informatics (TII)
- IEEE Transactions on Vehicular Technology (TVT)
- IEEE Transactions on Network and Service Management (TNSM)
- IEEE Transactions on Intelligent Transportation Systems (TITS)
- IEEE Communications Surveys & Tutorials
- IEEE Wireless Communications Magazine
- IEEE Network
- IEEE Vehicular Technology Magazine
- IEEE Internet of Things Journal
- IEEE Journal of Biomedical and Health Informatics
- Science China-Information Sciences
- Computer Networks
- Journal of Computer Science and Technology
- Journal of Parallel and Distributed Computing
- Sustainable Energy Technologies and Assessments
- IEEE Transactions on Network Science and Engineering
- IEEE Transactions on Engineering Management
- IEEE Intelligent Systems
- Journal of Parallel and Distributed Computing
- Pervasive and Mobile Computing
- Computer Communications
- China Communications
- Computers and Electrical Engineering
- Sensors
- Frontiers in Environmental Science
- Security and Communication Networks
- Wireless Networks
- Transactions on Emerging Telecommunications Technologies
- International Journal of Communication Systems
- International Journal of Information Technology & Decision Making
- Computer Modeling in Engineering & Sciences
- Blockchain: Research and Applications
- IEEE Transactions on Computational Social Systems
- The 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
- The 21th IEEE International Conference on Computer and Information Technology (CIT 2022)
- IEEE International Conference on Communications (ICC) 2022
- 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2021)
- International Conference on Medical Imaging Science and Technology (MIST 2021)
- 44th International Conference on Telecommunications and Signal Processing (TSP 2021)
- 14th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2021)
- 25th IEEE Symposium on Computers and Communications (ISCC 2020)
- 43rd International Conference on Telecommunications and Signal Processing (TSP 2020)
- 16th Annual International Conference on Wireless Communications & Mobile Computing (IWCMC 2020)
- 37th IEEE Global Communications Conference (Globecom 2018)
- 37th IEEE International Performance Computing and Communications Conference (IPCCC 2018)
- 20th International Conference on Information and Communications Security (ICICS 2018)
- 4th International Conference on Computer and Communications (ICCC 2018)
8. Supervising and mentoring activities
Seven graduated master students, eight master students, and one Ph.D student
9. Prizes and Awards
- 2022.1.21, Anhui Computer Federation Outstanding Young Scientist
- 2021.10.30, ACM China Council (Hefei Chapter) Rising Star Award
Other links
Google Scholar: https://scholar.google.com/citations?user=k-z_PtwAAAAJ&hl=en
Source codes: https://github.com/UbiPLab
Homepage in Chinese: http://faculty.hfut.edu.cn/limeng/zh_CN/index.htm