Meng Li (李萌), Ph.D., Associate Professor, Ph.D. Supervisor, IEEE Senior Member, ERCIM Fellow
1. Education
01/09/2015-06/30/2019, Ph.D., Computer Science and Technology, Beijing Institute of Technology, China,
supervised by Liehuang Zhu
01/09/2017-31/08/2018, visiting Ph.D., China Scholarship Council (CSC) Program, BBCR Lab at University of Waterloo, Wilfrid
Laurier University, Canada, supervised by Xiaodong Lin (IEEE Fellow)
01/09/2010-01/02/2013, Master, Computer Science and Technology, Beijing Institute of Technology, China,
supervised by Liehuang Zhu
01/09/2006-30/06/2010, Bachelor, Information Security, Hefei University of Technology, China
2. Professional experience
24/11/2023-Now, Ph.D. Supervisor, School of Computer Science and Information Engineering, Hefei University of Technology, China
06/09/2021-Now, Dean Assistant, School of Computer Science and Information Engineering, Hefei University of Technology, China
01/10/2020-31/03/2021, Postdoc Research Fellow, European Research Consortium for Informatics and Mathematics (ERCIM), The National Research Council-Institute for Informatics and Telematics (CNR-IIT), Italy, work with Fabio Martinelli
01/09/2020-Now, Postdoc Research Fellow, SPRITZ Security and Privacy Research Group, Department of Mathematics, University of Padua, Italy, working with Prof. Mauro Conti (IEEE Fellow)
11/07/2019-Now, Associate Professor, School of Computer Science and Information Engineering, Hefei University of Technology, China
01/07/2013-15/05/2015, Employee, Industrial and Commercial Bank of China (ICBC) Anhui Branch, China
3. Research Interests
Data Security, Privacy Preservation, Applied Cryptography, Blockchain, TEE, Internet of Vehicles.
4. Fundings
- [4] 2024.01.01-2027.12.31, The Joint Funds of the Regional Innovation and Development of National Natural Science Foundation of China (NSFC), "Integrated Data Security Protection Based on Communication-Sensing-Computation Fusion in Intelligent Vehicle Network", 528, 000 Yuan/2, 640, 000 Yuan, Subject Facilitator.
- [3] 2024.01.01-2027.12.31, The General Program of National Nature Science Foundation of China (NSFC), "Research on Privacy-Preserving Model and Key Technologies for IoV Services", 500,000 Yuan, Principal Investigator.
- [2] 2021.01.01-2023.12.31, The Youth Fund of National Nature Science Foundation of China (NSFC), "Research on Strong Privacy Preservation for User Matching in Ride-Hailing Services", 240,000 Yuan, Principal Investigator.
- [1] 2020.07.01-2023.06.30, The General Program of Anhui Provincial Natural Science Foundation, "Research on Privacy-preserving Ride-Hailing Protocols based on Encrypted Data Processing", 120,000 Yuan, Principal Investigator.
5. Selected publications
5.1 Monographs
- [2] L. Zhu, K. Gai, and M. Li, Blockchain Technology in Internet of Things, Springer, 2019.
- [1] M. Li, Encyclopedia of Wireless Networks - Differential Privacy, Springer, 2018.
5.2 Selected publications on transactions, journals, and magazines
- [40] M. Li, Y. Chen, L. Zhu*, Z. Zhang*, J. Ni, C. Lal, and M. Conti, "Astraea: Anonymous and Secure Auditing based on Private Smart Contracts for Donation Systems," IEEE Trans. Dependable and Secure Computing (TDSC), 2023, 20 (4): 3002-3018. (Q1, CCF A)
- [39] M. Li, Y. Chen*, C. Lal, M. Conti, F. Martinelli, and M. Alazab, "Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts," IEEE Trans. Dependable and Secure Computing (TDSC), 2023, 20 (4): 2849-2866. (Q1, CCF A)
- [38] M. Li, Y. Chen, C. Lal, and M. Conti, M. Alazab, and D. Hu*, "Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain," IEEE Trans. Dependable and Secure Computing (TDSC), 2023, 20 (1): 225-241. (Q1, CCF A, TDSC Featured Article, ESI Highly Cited Paper)
- [37] M. Li, Y. Chen, S. Zheng*, D. Hu*, C. Lal, and M. Conti, "Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks," IEEE Trans. Dependable and Secure Computing (TDSC), 2022, 19 (2): 1133-1148. (Q1, CCF A)
- [36] L. Zhu, M. Li, Z. Zhang*, and Z. Qin, "ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks," IEEE Trans. Dependable and Secure Computing (TDSC), 2020, 17 (4): 703-715. (Q1, CCF A, ESI Highly Cited Paper)
- [35] Z. Zhang, X. Lu, M. Li*, J. An, Y. Yu, H. Yin, L. Zhu, Y. Liu, J. Liu, and B. Khoussainov, "A Blockchain-based Privacy-Preserving Scheme for Sealed-bid Auction," IEEE Trans. Dependable and Secure Computing (TDSC), 2024, Online. (Q1, CCF A)
- [34] Z. Zhang, X. Liu, M. Li*, H. Yin, L. Zhu*, B. Khoussainov, and K. Gai, "HCA: Hashchain-based Consensus Acceleration via Re-voting," IEEE Trans. Dependable and Secure Computing (TDSC), 2024, 21 (2): 775-788. (Q1, CCF A)
- [33] Z. Liu, Y. Miao, X. Li, M. Li, H. Li, K.-K. R. Choo, and R. H. Deng, "Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation," IEEE Trans. Dependable and Secure Computing (TDSC), 2023, Online. (Q1, CCF A)
- [32] M. Li, H. Ding, Q. Wang, M. Zhang, W. Meng, L. Zhu, Z. Zhang*, and X. Lin, "Decentralized Threshold Signatures with Dynamically Private Accountability," IEEE Trans. Information Forensics and Security (TIFS), 2024, 19: 2217-2230. (Q1, CCF A)
- [31] Z. Guo, X. Li, J. Liu, Z. Zhang*, M. Li*, J. Hu, and L. Zhu, "Graph-based Covert Transaction Detection and Protection in Blockchain," IEEE Trans. Information Forensics and Security (TIFS), 2024, 19: 2244-2257. (Q1, CCF A)
- [30] Q. Jiang, G. Zhao, X. Ma, M. Li, Y. Tian, and X. Li, "Cross-modal Learning based Flexible Bimodal Biometric Authentication with Template Protection," IEEE Trans. Information Forensics and Security (TIFS), 2023, Online. (Q1, CCF A)
- [29] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack," IEEE/ACM Trans. Networking (ToN), 2023, 30 (5): 2060-2073. (Q1, CCF A)
- [28] M. Li, Y. Shen, G. Ye, J. He, X. Zheng, Z. Zhang*, L. Zhu*, and M. Conti, "Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics," IEEE Trans. Knowledge and Data Engineering (TKDE), 2023, Online. (Q1, CCF A)
- [27] M. Li, J. Gao, L. Zhu, Z. Zhang*, C. Lal, and M. Conti, "Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud," IEEE Trans. Services Computing (TSC), 2023, Online. (Q1, CCF A)
- [26] M. Li, L. Zhu*, and X. Lin, "Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing," IEEE Trans. Services Computing (TSC), 2021, 14 (6): 1902-1913. (Q1, CCF A)
- [25] Z. Zhang, X. Liu, K. Feng, M. Wan, M. Li*, J. Dong*, and L. Zhu, "Phantasm: Adaptive Scalable Mining Toward Stable BlockDAG," IEEE Trans. Services Computing (TSC), 2023, Online. (Q1, CCF A)
- [24] D. Hu, Q. Wang, S. Yan, X. Liu, M. Li*, and S. Zheng, "Reversible Database Watermarking based on Order-Preserving Encryption for Data Sharing," ACM Trans. Database Systems (TODS), 2023, 48 (2): 1-25. (Q3, CCF A)
- [23] M. Li, J. Gao, L. Zhu*, Z. Zhang*, C. Lal, M. Conti, and M. Alazab, "Mnemosyne: Privacy-Preserving Ride Matching with Collusion-Resistant Driver Exclusion," IEEE Trans. Vehicular Technology (TVT), 2023, 72 (4): 5139-5155.
- [22] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain," IEEE Trans. Network and Service Management (TNSM), 2021, 18 (4): 4434-4449.
- [21] M. Li, D. Hu, C. Lal*, M. Conti, and Z. Zhang, "Blockchain-Enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things," IEEE Trans. Industrial Informatics (TII), 2020, 16 (10): 6564-6574.
- [20] M. Li, Y. Chen, N. Kumar, C. Lal, M. Conti, and M. Alazab*, "Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks," IEEE Trans. Green Communications and Networking (TGCN), 2022, 6 (3): 1267-1275.
- [19] S. Khan, F. Luo, Z. Zhang, F. Ullah, F. Amin, S. F. Qadri, M. B. Bin Heyat, R. Ruby, L. Wang, S. Ullah, M. Li, V. C. M. Leung, and K. Wu, "A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies," IEEE Communications Surveys and Tutorials (COMST), 2023, 25 (4): 2529-2568. (Q1)
- [18] M. Li, L. Zhu*, and X. Lin, "Efficient and Privacy-preserving Carpooling using Blockchain-assisted Vehicular Fog Computing," IEEE Internet of Things Journal, 2019, 6 (3): 4573-4584.
- [17] M. Li, C. Lal, M. Conti, and D. Hu*, "LEChain: A Blockchain-based Lawful Evidence Management Scheme for Digital Forensics," Future Generation Computer Systems (FGCS), 2021, 115: 405-420.
- [16] M. Li, L. Zhu, Z. Zhang*, and R. Xu, "Achieving Differential Privacy of Trajectory Data Publishing in Participatory Sensing," Information Sciences, 2017, 400-401: 1-13.
- [15] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and F. Martinelli, "Privacy for 5G-Supported Vehicular Networks," IEEE Open Journal of Communications Society (OJ-COMS), 2021, 2: 1935-1956.
- [14] M. Li, K. Zhang, J. Liu, H. Gong, and Z. Zhang*, "Blockchain-based Anomaly Detection of Electricity Consumption in Smart Grids," Pattern Recognition Letters, 2020, 138: 476-482.
- [13] D. Hu, Y. Li, L. Pan, M. Li*, and S. Zheng, "A Blockchain-Based Trading System for Big Data,” Computer Networks, 2021, 191 (107994): 1-13.
- [12] L. Zhu, M. Li, Z. Zhang*, "Secure Fog-assisted Crowdsensing with Collusion Resistance: From Data Reporting to Data Requesting," IEEE Internet of Things Journal, 2019, 6 (3): 5473-5484.
- [11] L. Zhu, M. Li, Z. Zhang*, C. Xu, R. Zhang, X. Du, and N. Guizani, "Privacy-preserving Authentication and Data Aggregation for Fog-based Smart Grid," IEEE Communications Magazine, 2019, 57 (6): 80-85.
- [10] L. Zhu, M. Li, Z. Zhang*, X. Du, and M. Guizani, "Big Data Mining of Users' Energy Consumption Pattern in Wireless Smart Grid," IEEE Wireless Communications, 2018, 25 (1): 84-89.
- [9] M. He, J. Ni, M. Li, A. Brighente, and M. Conti, "Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach," IEEE Trans. Wireless Communications (TWC), 2024, 23 (1): 276-289.
- [8] C. Gu, X. Cui, M. Li, and D. Hu, "An Efficient and Privacy-preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks," IEEE Trans. Vehicular Technology (TVT), 2023, 72 (6): 7900-7913.
- [7] J. He, Z. Zhang*, L. Ma, Z. Zhang, M. Li, B. Khoussainov, J. Liu, and L. Zhu*, "InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring through Self-Attention Mechanisms," IEEE Trans. Smart Grid (TSG), 2023, 14 (5): 3828-3840.
- [6] H. Yin Z. Zhang*, L. Zhu*, M. Li, X. Du, M. Guizani, and B. Khoussainov, "A Blockchain-Based Storage System With Financial Incentives for Load-balancing," IEEE Trans. Network Science and Engineering (TNSE), 2021, 8 (2): 1178-1188.
- [5] X. Lu, Z. Zhang*, T. Zhou, T. Niu, L. Zhu, M. Li*, Z. Guan, and T. Ma, "Decentralized Fair IoT Data Trading Via Searchable Proxy Re-Encryption," IEEE Internet of Things Journal (IoTJ), 2024, Online.
- [4] Y. Xia, Y. Liu*, S. Dong, M. Li, and C. Guo, "SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning," IEEE Internet of Things Journal (IoTJ), 2024, Online.
- [3] F. Li, T. Chen*, M. Li, and C. Lin, "Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State," IEEE Internet of Things Journal (IoTJ), 2024, 11 (8): 14127-14135.
- [2] H. Yin, Z. Zhang*, J. He, L. Ma, L. Zhu*, M. Li, B.Khoussainov, "Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain," IEEE Internet of Things Journal (IoTJ), 2022, 9 (10): 7866-7875.
- [1] M. Wang, Z. Zhang*, J. He, F. Gao, M. Li, S. Xu, and L. Zhu, "Practical Blockchain-based Steganographic Communication via Adversarial AI: A Case Study in Bitcoin," The Computer Journal, 2022, 65 (11): 2926-2938.
5.3 Selected publications on conferences
- [15] T. Hu, G. Ye, Z. Tang, S. Tan, H. Wang, M. Liu, Z. Wang, "UPBEAT: Test Input Checks of Q# Quantum Libraries," Proc. 33rd International Symposium on Software Testing and Analysis (ISSTA), 2024, Accepted, Vienna, Austria. (CCF A)
- [14] L. Zhu and M. Li, "DoS-Resilient Secure Data Aggregation in Wireless Sensor Networks," Posters of the 17th ACM Annual International Conference on Mobile Computing and Networking (MobiCom), September 2011: 1-2, Las Vegas, USA. (CCF A)
- [13] M. Li, H. Ding, Q. Wang, Z. Zhang*, and M. Conti, "Threshold Signatures with Private Accountability via Secretly Designated Witnesses", Proc. 29th Australasian Conference on Information Security and Privacy (ACISP), 2024, Accepted, Sydney, Australia.
- [12] M. Li, J. Gao, Z. Zhang*, M. Conti, M. Alazab, ``Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets," Proc. 30th IEEE International Conferences on Communications (ICC), June 2024: 1-6, Denver, USA.
- [11] M. Li, J. Gao, Z. Zhang, C. Fu, C. Lal, and M. Conti, "Graph Encryption for Shortest Path Queries With k Unsorted Nodes," Proc. 21st IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), October 2022: 89-96, Wuhan, China.
- [10] M. Li*, M. Zhang, J. Gao, C. Lal, M. Conti, and M. Alazab, "Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud", Proc. 24th International Conference on Information and Communications Security (ICICS), September 2022, Canterbury, UK.
- [9] Y. Chen, M. Li*, S. Zheng*, D. Hu, C. Lal, and M Conti, "One-Time, Oblivious, and Unlinkable Query Processing over Encrypted Data On Cloud," Proc. 22nd International Conference on Information and Communication Security (ICICS), August 2020: 350-365, Copenhagen, Denmark.
- [8] M. Li, L. Zhu*, and X. Lin, "CoRide: A Privacy-preserving Collaborative-Ride Hailing Service using Blockchain-assisted Vehicular Fog Computing," Proc. 15th International Conference on Security and Privacy in Communication Systems (SecureComm), November 2019: 408-422, Orlando, USA.
- [7] M. Li, J. Gao, Y. Chen, J. Zhao, and M. Alazab*, "Privacy-preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks," Proc. 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2020: 599-606, Guangzhou, China.
- [6] M. Li, F. Wu, G. Chen, L. Zhu, and Z. Zhang*, "How to Protect Query and Report Privacy without Sacrificing Service Quality in Participatory Sensing," Proc. 34th IEEE International Performance Computing and Communications Conference (IPCCC), December 2015: 1-7, Nanjing, China.
- [5] L. Zhu and M. Li, "An Energy Efficient and Integrity-Preserving Aggregation Protocol in Wreless Sensor Networks," Proc. 30th IEEE International Performance Computing and Communications Conference (IPCCC), December 2011: 1-6, Orlando, USA.
- [4] Z. Zhang, M. Li, L. Zhu*, and X. Li, "SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning," Proc. 3rd International Conference on Smart Computing and Communication (SmartCom), December 2018: 1-10, Tokyo, Japan. Best Paper Award.
- [3] S. Zheng, L. Pan, D. Hu*, M. Li, Y. Fan, "A Blockchain-Based Trading Platform for Big Data," Proc. 8th International Workshop on Security and Privacy in Big Data (INFOCOM WKSHPS BigSecurity), July 2020: 991-996, Toronto, Canada.
- [2] Y. Chen, M. Li*, S. Zheng, C. Lal, and M. Conti, "Where to Meet a Driver Privately: Recom-mending Pick-Up Locations for Ride-Hailing Services," Proc. 17th International Workshop on Security and Trust Management (STM) (Co-located with ESORICS 2021), October 2021: 1-18, Darmstadt, Germany.
- [1] P. Su, N. Sun*, L. Zhu, Y. Li, R. Bi, M. Li, and Z. Zhang, "A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System," Proc. 5th International Workshop on Security in Cloud Computing (SCC) (Co-located with ASIACCS), April 2017: 1-8, Abu Dhabi, UAE.
6. Invited presentations
- [6] M. Li, "Security and Privacy Preservation for IoV SerVices," Anhui-Taiwan Cross-Strait Conference on Internet of Things, 2023.7.11.
- [5] M. Li, "Decentralized and Secure Vehicular Digital Forensics and Tracing", CCF YOCSEF-Qingdao, 2023.6.17.
- [4] M. Li, "Security and Privacy in Vehicular Networks: Drawing Inspiration from Life", CCF YOCSEF-Hefei, 2023.4.13.
- [3] M. Li, "Security and Privacy in Vehicular Networks", Anhui Normal University, 2022.9.10.
- [2] M. Li, "Blockchain: Powerful Boost to Privacy Preservation in Vehicular Networks", CCF YOCSEF-Qingdao, 2022.4.9.
- [1] M. Li, "Security and Privacy in Vehicular Digital Forensics", International Conference on Forensic Science and Research, 2021.11.15, https://www.pagesconferences.com/forensic-science.
7. Academic Memberships and Positions
Memberships
- IEEE Senior Member (2022.8.16)
- IEEE Communications Society (ComSoc) Senior Member (2022.8.16)
- IEEE Signal Processing Society (SPS) Member (2023.2.17)
- IEEE Technical Committee on Services Computing (TCSVC) Member (2021.3)
- ACM Member (2021.2)
- China Institute of Electronics (CIE) Senior Member (2024.1.30)
- China Computer Federation (CCF) Senior Member (2023.4.18)
- China Association for Cryptographic Research (CACR) Member (2019.8)
- China Information Processing Society of China (CIPSC) Member (2024.3.27)
- China Association for Artificial Intelligence (CAAI) Life Member (2023.3.1)
- CIE Cybersecurity Committee Member (2023.6.2)
- CCF Blockchain Committee Corresponding Member (2020.12.18)/Executive Member (2021.12.25)
- CCF Services Computing Executive Member (2023.9.17)
- CIPSC Big Data Security and Privacy Preservation Committee Member (2022.1.30)/Standing Member (2022.5.17)
- CAAI Intelligent Information Network Committee Member (2021.11)
- CAAI Youth Work Committee Member (2022.6.28)
- Cyber Security Association of China (CSAC) Personal Information Protection Expert Group Member (2021.2.10)/Intelligent Vehicular Network Security Expert Group Member (2021.2.18)
Associate Editor
Guest Editor
Conference Steering Committee Member
- The 16th IEEE International Conference on Internet of Things (iThings 2023) Workshop "Secure and Robust Distributed Machine Learning for Aritificial Intelligence of Things"
Conference Co-Chair
- The 18th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies (EAI TRIDENTCOM 2023)
Conference Co-Organizer
- 1st Conference on China Multimedia Forensics and Security (CHINAMFS) 2020, Hefei, China
- 2nd International Workshop on Mobile Communications and Networking (WMCN) 2017, Waterloo, Canada
- 13th International Conference on Mobile Ad-hoc and Sensor Network (MSN) 2017, Beijing, China
- 3rd International Conference on Trusted Systems (INTRUST) 2011, Beijing, China
Conference Special Session Co-Proposer
- The International Conference on Cyber-physical Social Intelligence (ICCSI) 2023-Big Data Techniques for Computer Vision
Conference Session Chair
- 25th International Conference on Information and Communications Security (ICICS 2023)-Session 3: Blockchain and Cryptocurrencies
- 23rd International Conference on Information and Communications Security (ICICS 2021)-Parallel Session B: Post-Quantum Cryptography
- 22nd International Conference on Information and Communications Security (ICICS 2020)-Crypto IV
Conference Technical Program Committee Member
- The 1st IEEE Global Blockchain Conference (GBC 2024)
- The 9th IEEE International Conference on Smart Cloud (IEEE SmartCloud 2024)
- The 21st Annual International Conference on Privacy, Security, and Trust (PST 2024)
- The 17th International Conference on Knowledge Science, Engineering and Management (KSEM 2024)
- The 43rd IEEE Global Communications Conference (GLOBECOM 2024)
- The 24th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2024)
- The 44th IEEE International Conference on Distributed Computing Systems (ICDCS 2024)
- The 33rd International Conference on Computer and Communication Networks (ICCCN 2024)
- The 30th IEEE International Conference on Communications (ICC 2024)
- The International Conference on Computing, Networking and Communications (ICNC) 2024
- The 12th IEEE/CIC lnternational Conference on Communications in China (ICCC 2024)
- The 42nd IEEE Global Communications Conference (GLOBECOM 2023)
- The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023)
- The 21st IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA 2023)
- The 23rd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2023)
- The 12th IEEE International Conference on Cloud Networking (CloudNet 2023)
- The 16th International Conference on Knowledge Science, Engineering and Management (KSEM 2023)
- The 3rd International Conference on Computing and Communication Networks (ICCCNet 2023)
- The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
- The 5th China Blockchain Conference (CBCC 2022)
- The 21st IEEE International Conference on Computer and Information Technology (CIT 2022)
- The 9th IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (MAPE 2022)
- The 15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022)
- The 28th IEEE International Conference on Communications (ICC 2022)
- The 44th International Conference on Telecommunications and Signal Processing (TSP 2021)
- The International Conference on Computing and Communication Networks (ICCCN) 2021
- The 8th IEEE International Conference on Smart City and Informatization (iSCI 2020)
- The 8th International Symposium on Security in Computing and Communications (SSCC 2020)
- The 43rd International Conference on Telecommunications and Signal Processing (TSP 2020)
- The 16th Annual International Conference on Wireless Communications & Mobile Computing (IWCMC 2020)
- Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS) 2019
Reviewer for transactions, journals, magazines
- IEEE Transactions on Information Forensics and Security (TIFS)
- IEEE Transactions Dependable and Secure Computing (TDSC)
- IEEE Transactions on Mobile Computing (TMC)
- IEEE Transactions on Services Computing (TSC)
- IEEE Transactions on Intelligent Transportation Systems (TITS)
- IEEE Transactions on Industrial Informatics (TII)
- IEEE Transactions on Vehicular Technology (TVT)
- IEEE Transactions on Cloud Computing (TCC)
- IEEE Transactions on Network and Service Management (TNSM)
- IEEE Transactions on Network Science and Engineering (TNSE)
- IEEE Transactions on Computational Social Systems (TCSS)
- IEEE Transactions on Engineering Management (TEM)
- IEEE Transactions on Games (ToG)
- IEEE Communications Surveys & Tutorials
- IEEE Wireless Communications Magazine
- IEEE Network
- IEEE Vehicular Technology Magazine
- IEEE Internet of Things Journal
- IEEE Journal of Biomedical and Health Informatics
- Industrial Electronics Magazine
- ACM Computing Surveys
- IEEE System Journal
- Science China-Information Sciences
- Computer Networks
- Journal of Computer Science and Technology
- Journal of Parallel and Distributed Computing
- Sustainable Energy Technologies and Assessments
- Computer Standards & Interfaces
- IEEE Intelligent Systems
- Journal of Parallel and Distributed Computing
- Pervasive and Mobile Computing
- Computer Communications
- China Communications
- Computers and Electrical Engineering
- Sensors
- ACM Transactions on Sensor Networks
- IEEE Consumer Electronics Magazine
- Security and Communication Networks
- Wireless Networks
- Transactions on Emerging Telecommunications Technologies
- International Journal of Communication Systems
- International Journal of Information Technology & Decision Making
- Computer Modeling in Engineering & Sciences
- Mobile Networks and Applications
- IETE Journal of Research
- IET Communications
- IT Professional
- IEEE Open Journal of Communications Society
- Journal of Computer Security
- Blockchain: Research and Applications
- Distributed Ledger Technologies
- IET Blockchain
- Forensic Science International: Digital Investigation
Reviewer for conferences
- The 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
- The 12th Workshop on Privacy in the Electronic Society (WPES 2022)
- The 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2021)
- The International Conference on Medical Imaging Science and Technology (MIST 2021)
- The 14th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2021)
- The 25th IEEE Symposium on Computers and Communications (ISCC 2020)
- The 37th IEEE Global Communications Conference (Globecom 2018)
- The 37th IEEE International Performance Computing and Communications Conference (IPCCC 2018)
- The 20th International Conference on Information and Communications Security (ICICS 2018)
- The 4th International Conference on Computer and Communications (ICCC 2018)
- The 7th International Conference on Wireless Communications and Signal Processing (WCSP 2015)
8. Supervising and mentoring activities
Seven graduated master students, eight master students, and one Ph.D student
9. Prizes and Awards
- 2024.04.20, "Five Four" Outstanding Youth Model of Hefei University of Technology
- 2023.10.11, Stanford/Elsevier's Top 2% Scientist
- 2023.01.21, Anhui Computer Federation Outstanding Young Scientist
- 2021.10.30, ACM China Council (Hefei Chapter) Rising Star Award
Other links
Google Scholar
Source codes
Homepage in Chinese