Meng Li (李萌)
Ph.D., Associate Professor, Ph.D. Supervisor
ERCIM Fellow, IEEE Senior Member, CCF Senior Member, TIFS AE, TDSC AE
1. Education
2015.09-2019.06, Beijing Institute of Technology, School of Computer Science and Technology, Ph.D., supervised by Prof. Liehuang Zhu
2017.09-2018.08, BBCR Lab at University of Waterloo and Wilfrid Laurier University, CSC Jointly-Trained Ph.D., supervised by Prof. Xiaodong Lin (IEEE Fellow)
2010.09-2013.02, Beijing Institute of Technology, School of Computer Science and Technology, Master, supervised by Prof. Liehuang Zhu
2006.09-2010.06, Hefei University of Technology, School of Computer Science and Information Engineering, Bachelor
2. Professional Experiences
2023.11-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Ph.D. Supervisor
2022.03-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Leader of Cryptography Course Group
2021.09-2024.09, Hefei University of Technology, School of Computer Science and Information Engineering, Secretary Personnel
2019.07-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Associate Professor
3. Research Interests
Data Circulation, Internet of Vehicles, Data Security, Privacy Preservation, Applied Cryptography, Blockchain, and TEE.
4. Fundings
- [4] 2024.01.01-2027.12.31, The Joint Funds of the Regional Innovation and Development of National Natural Science Foundation of China (NSFC), "Integrated Data Security Protection Based on Communication-Sensing-Computation Fusion in Intelligent Vehicle Network", 528, 000 Yuan/2, 640, 000 Yuan, Subject Facilitator.
- [3] 2024.01.01-2027.12.31, The General Program of National Nature Science Foundation of China (NSFC), "Research on Privacy-Preserving Model and Key Technologies for IoV Services", 500,000 Yuan, Principal Investigator.
- [2] 2021.01.01-2023.12.31, The Youth Fund of National Nature Science Foundation of China (NSFC), "Research on Strong Privacy Preservation for User Matching in Ride-Hailing Services", 240,000 Yuan, Principal Investigator.
- [1] 2020.07.01-2023.06.30, The General Program of Anhui Provincial Natural Science Foundation, "Research on Privacy-preserving Ride-Hailing Protocols based on Encrypted Data Processing", 120,000 Yuan, Principal Investigator.
5. Selected Publications
5.1 Monographs
- [2] L. Zhu, K. Gai, and M. Li, Blockchain Technology in Internet of Things, Springer, 2019.
- [1] M. Li, Encyclopedia of Wireless Networks - Differential Privacy, Springer, 2018.
5.2 Selected Publications on Transactions, Journals, and Magazines
- [69] M. Li, Y. Chen, J. Gao*, J. Wu, Z. Zhang*, J. He, L. Zhu, M. Conti, and X. Lin, "Accurate, Secure, and Efficient Semi-Constrained Navigation over Encrypted City Maps," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, 22 (3): 2642-2658. (Q1, CCF A)
- [68] M. Li, Y. Chen, L. Zhu*, Z. Zhang*, J. Ni, C. Lal, and M. Conti, "Astraea: Anonymous and Secure Auditing based on Private Smart Contracts for Donation Systems," IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, 20 (4): 3002-3018. (Q1, CCF A)
- [67] M. Li, Y. Chen*, C. Lal, M. Conti, F. Martinelli, and M. Alazab, "Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts," IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, 20 (4): 2849-2866. (Q1, CCF A)
- [66] M. Li, Y. Chen, C. Lal, M. Conti, M. Alazab, and D. Hu*, "Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain," IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, 20 (1): 225-241. (Q1, CCF A, TDSC Featured Article, ESI Highly Cited Paper)
- [65] M. Li, Y. Chen, S. Zheng*, D. Hu*, C. Lal, and M. Conti, "Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks," IEEE Transactions on Dependable and Secure Computing (TDSC), 2022, 19 (2): 1133-1148. (Q1, CCF A)
- [64] L. Zhu, M. Li, Z. Zhang*, and Z. Qin, "ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks," IEEE Transactions on Dependable and Secure Computing (TDSC), 2020, 17 (4): 703-715. (Q1, CCF A, ESI Highly Cited Paper)
- [63] Z. Zhang, X. Lu, M. Li*, J. An, Y. Yu, H. Yin, L. Zhu, Y. Liu, J. Liu, and B. Khoussainov, "A Blockchain-based Privacy-Preserving Scheme for Sealed-bid Auction," IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21 (5): 4668-4683. (Q1, CCF A)
- [62] Z. Zhang, X. Liu, M. Li*, H. Yin, L. Zhu*, B. Khoussainov, and K. Gai, "HCA: Hashchain-based Consensus Acceleration via Re-voting," IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21 (2): 775-788. (Q1, CCF A)
- [61] X. Liu, Z. Zhang∗, Z. Li, X. Lu, M. Li∗, L. Xu, M. Ao, and L. Zhu, "Group BFT: Two-Round BFT Protocols via Replica Grouping," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, Accepted. (Q1, CCF A)
- [60] J. Zhao, K. Xue∗, R. Li, B. Zhu, M. Li, Q. Sun, and J. Lu, "Privacy-preserving Truth Discovery of Evolving Truths for Mobile Crowdsensing Systems," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, Accepted. (Q1, CCF A)
- [59] Z. Lu, L. Wang*, Z. Zhang, M. Huang, J. Wang, and Meng Li, "TMT-FL: Enabling Trustworthy Model Training of Federated Learning with Malicious Participants," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, 22 (3): 2723-2740. (Q1, CCF A)
- [58] Z. Liu, Y. Miao, X. Li, M. Li, H. Li, K.-K. R. Choo, and R. H. Deng, "Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation," IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21 (4): 2361-2375. (Q1, CCF A)
- [57] M. Li, H. Ding, Q. Wang, M. Zhang, W. Meng, L. Zhu, Z. Zhang*, and X. Lin, "Decentralized Threshold Signatures with Dynamically Private Accountability," IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 2217-2230. (Q1, CCF A)
- [56] Z. Wang, Z. Zhang*, Z. Li, Y. Wu, Y. Liu, M. Li*, X. Li, Y. Liu, J. An, W. Liang, and L. Zhu, "Resisting Poisoning Attacks in Federated Learning via Dual-Domain Distance and Trust Assessment," 2025, Accepted. (Q1, CCF A)
- [55] X. Liu, Z. Zhang*, Z. Li, P. Jiang, Y. Wang, M. Li*, and L. Zhu, "The Deferred Byzantine Generals Problem," IEEE Transactions on Information Forensics and Security (TIFS), 2025, Accepted. (Q1, CCF A)
- [54] Q. Wang, D. Hu*, M. Li*, and G. Yang, "Secure and Flexible Wildcard Queries," IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 7374-7388. (Q1, CCF A)
- [53] Z. Guo, X. Li, J. Liu, Z. Zhang*, M. Li*, J. Hu, and L. Zhu, "Graph-based Covert Transaction Detection and Protection in Blockchain," IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 2244-2257. (Q1, CCF A)
- [52] J. Huang, J.-X. Bai, X. Zhang*, Z. Liu, Y. Feng, J. Liu, X. Sun, M. Dong, and M. Li*, "KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy from Anywhere," IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 6840-6855. (Q1, CCF A)
- [51] S. Li, Y. Cao, G. Peng, M. Li, W. Sun, and L. Chen, "Efficient Intrusion Detection of In-Vehicle Networks Using Knowledge Distillation from BERT to CNN-BiLSTM," IEEE Transactions on Information Forensics and Security (TIFS), 2025, 20: 6398-6412. (Q1, CCF A)
- [50] T. Zheng, Q. Hou, X. Chen, H. Ren*, M. Li, H. Li, and C. Shen, "Gupacker: Generalized Unpacking Framework for Android Malware," IEEE Transactions on Information Forensics and Security (TIFS), 2025, 20: 4338-4352. (Q1, CCF A)
- [49] L. Wang*, M. Huang, Z. Zhang, M. Li, J. Wang, and K. Gai*, "RaSA: Robust and Adaptive Secure Aggregation for Edge-Assisted Hierarchical Federated Learning," IEEE Transactions on Information Forensics and Security (TIFS), 2025, 20: 4280-4295. (Q1, CCF A)
- [48] J. Zhao, K. Xue*, Y. Xue, M. Li, B. Zhu, and S. Yuan, "Privacy-Preserving Statistical Analysis with Low Redundancy over Task-Relevant Microdata", IEEE Transactions on Information Forensics and Security (TIFS), 2025, 20: 4382-4395. (Q1, CCF A)
- [47] C. Pan, D. Hu*, Y. Wang*, K. Chen, Y. Peng, X. Rong, C. Gu, and M. Li, "Rethinking Prefix-based Steganography for Enhanced Security and Efficiency," IEEE Transactions on Information Forensics and Security (TIFS), 2025, 20: 3287-3301. (Q1, CCF A)
- [46] N. Wang, S. Wang, M. Li, L. Wu, Z. Zhang, Z. Guan*, and L. Zhu, "Balancing Differential Privacy and Utility: A Relevance-based Adaptive Private Fine-tuning Framework for Language Models," IEEE Transactions on Information Forensics and Security (TIFS), 2024, 20: 207-220. (Q1, CCF A)
- [45] Q. Jiang, G. Zhao, X. Ma, M. Li, Y. Tian, and X. Li, "Cross-modal Learning based Flexible Bimodal Biometric Authentication with Template Protection," IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 3593-3607. (Q1, CCF A)
- [44] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack," IEEE/ACM Transactions on Networking (ToN), 2023, 30 (5): 2060-2073. (Q1, CCF A)
- [43] M. Li, M. Zhang, L. Zhu, Z. Zhang*, M. Conti, and M. Alazab, "Decentralized and Privacy-Preserving Smart Parking with Secure Repetition and Full Verifiability", IEEE Transactions on Mobile Computing (TMC), 2024, 23 (12): 11635-11654. (Q1, CCF A)
- [42] X. Liu, K. Feng, Z. Zhang*, M. Li*, X. Chen, W. Lai, and L. Zhu, "Dolphin: Efficient Non-Blocking Consensus via Concurrent Block Generation," IEEE Transactions on Mobile Computing (TMC), 2024, 23 (12): 11824-11838. (Q1, CCF A)
- [41] M. Li, Y. Shen, G. Ye, J. He, X. Zheng, Z. Zhang*, L. Zhu*, and M. Conti, "Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics," IEEE Transactions on Knowledge and Data Engineering (TKDE), 2024, 36 (5): 1874-1888. (Q1, CCF A)
- [40] D. Hu, Q. Wang, S. Yan, X. Liu, M. Li*, and S. Zheng, "Reversible Database Watermarking based on Order-Preserving Encryption for Data Sharing," ACM Transactions on Database Systems (TODS), 2023, 48 (2): 1-25. (Q3, CCF A)
- [39] X. Liu, Z. Zhang*, Z. Li, H. Yin, M. Li*, J. Liu, M. Conti, and L. Zhu, "ABSE: Adaptive Baseline Score-based Election for Leader-based BFT Systems," IEEE Transactions on Parallel and Distributed Systems (TPDS), 2025, Accepted. (Q1, CCF A)
- [38] M. Li, J. Gao, L. Zhu, Z. Zhang*, C. Lal, and M. Conti, "Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud," IEEE Transactions on Services Computing (TSC), 2024, 17 (3): 1239-1251. (Q1, CCF A)
- [37] M. Li, L. Zhu*, and X. Lin, "Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing," IEEE Transactions on Services Computing (TSC), 2021, 14 (6): 1902-1913. (Q1, CCF A)
- [36] Z. Zhang, X. Liu, K. Feng, M. Wan, M. Li*, J. Dong*, and L. Zhu, "Phantasm: Adaptive Scalable Mining Toward Stable BlockDAG," IEEE Transactions on Services Computing (TSC), 2024, 17 (3): 1084-1096. (Q1, CCF A)
- [35] J. He, N. Wang*, T. Xiang, Y. Wei, Z. Zhang, M. Li, and L. Zhu, "ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids," IEEE Transactions on Services Computing (TSC), 2024, 17 (5): 1938-1854. (Q1, CCF A)
- [34] W. Yang, Z. He, M. Li, Z. Zhang, Z. Guan*, and L. Zhu, "VHENN: A Verifiable Homomorphic Encrypted Neural Network Inference Scheme Based on Zero-Knowledge Proof for Ring Computations," Chinese Journal of Computers, 2025, Accepted. (Q1, CCF A)
- [33] Y. Feng, J. Huang*, X. Zhang, Y. Zhang, M. Li, F. Zhang, T. Zheng, A. Li, M. Dong, Z. Liu*, "RF-Eye: Commodity RFID Can Know What You Write and Who You Are Wherever You Are," ACM Transactions on Sensor Networks (TOSN), 2025, Accepted.
- [32] M. Li, J. Gao, L. Zhu*, Z. Zhang*, C. Lal, M. Conti, and M. Alazab, "Mnemosyne: Privacy-Preserving Ride Matching with Collusion-Resistant Driver Exclusion," IEEE Transactions on Vehicular Technology (TVT), 2023, 72 (4): 5139-5155.
- [31] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain," IEEE Transactions on Network and Service Management (TNSM), 2021, 18 (4): 4434-4449.
- [30] N. Xia, L. Chen*, M. Li*, Y. Yin, and K. Zhang, "Joint Double Auction-based Channel Selection in Wireless Monitoring Networks," IEEE Transactions on Network and Service Management (TNSM), 2025, 22 (3): 2412-2426.
- [29] M. Li, D. Hu, C. Lal*, M. Conti, and Z. Zhang, "Blockchain-Enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things," IEEE Transactions on Industrial Informatics (TII), 2020, 16 (10): 6564-6574.
- [28] M. Li, Y. Chen, N. Kumar, C. Lal, M. Conti, and M. Alazab*, "Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks," IEEE Transactions on Green Communications and Networking (TGCN), 2022, 6 (3): 1267-1275.
- [27] Z. Xing, Z. Zhang*, Z. Zhang, Z. Li, Z. Li, M. Li*, J. Liu, Z. Zhang, Y. Zhao, Q. Sun, L. Zhu, and G. Russello, "Zero-Knowledge Proof-based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey," IEEE Communications Surveys and Tutorials (COMST), 2025, Accepted. (Q1)
- [26] S. Khan, F. Luo, Z. Zhang, F. Ullah, F. Amin, S. F. Qadri, M. B. Bin Heyat, R. Ruby, L. Wang, S. Ullah, M. Li, V. C. M. Leung, and K. Wu, "A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies," IEEE Communications Surveys and Tutorials (COMST), 2023, 25 (4): 2529-2568. (Q1)
- [25] M. Li, L. Zhu*, and X. Lin, "Efficient and Privacy-preserving Carpooling using Blockchain-assisted Vehicular Fog Computing," IEEE Internet of Things Journal (IoTJ), 2019, 6 (3): 4573-4584.
- [24] M. Li, C. Lal, M. Conti, and D. Hu*, "LEChain: A Blockchain-based Lawful Evidence Management Scheme for Digital Forensics," Future Generation Computer Systems (FGCS), 2021, 115: 405-420.
- [23] M. Li, L. Zhu, Z. Zhang*, and R. Xu, "Achieving Differential Privacy of Trajectory Data Publishing in Participatory Sensing," Information Sciences, 2017, 400-401: 1-13.
- [22] M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and F. Martinelli, "Privacy for 5G-Supported Vehicular Networks," IEEE Open Journal of Communications Society (OJ-COMS), 2021, 2: 1935-1956.
- [21] M. Li, K. Zhang, J. Liu, H. Gong, and Z. Zhang*, "Blockchain-based Anomaly Detection of Electricity Consumption in Smart Grids," Pattern Recognition Letters, 2020, 138: 476-482.
- [20] D. Hu, Y. Li, L. Pan, M. Li*, and S. Zheng, "A Blockchain-Based Trading System for Big Data,” Computer Networks, 2021, 191 (107994): 1-13.
- [19] L. Zhu, M. Li, Z. Zhang*, "Secure Fog-assisted Crowdsensing with Collusion Resistance: From Data Reporting to Data Requesting," IEEE Internet of Things Journal (IoTJ), 2019, 6 (3): 5473-5484.
- [18] L. Zhu, M. Li, Z. Zhang*, C. Xu, R. Zhang, X. Du, and N. Guizani, "Privacy-preserving Authentication and Data Aggregation for Fog-based Smart Grid," IEEE Communications Magazine, 2019, 57 (6): 80-85.
- [17] L. Zhu, M. Li, Z. Zhang*, X. Du, and M. Guizani, "Big Data Mining of Users' Energy Consumption Pattern in Wireless Smart Grid," IEEE Wireless Communications, 2018, 25 (1): 84-89.
- [16] M. Wang, J. Huang*, X. Zhang, Z. Liu, M. Li, P. Zhao, H. Yan, X. Sun, and M. Dong, "Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing," IEEE Network, 2024, Online.
- [15] M. He, J. Ni, M. Li, A. Brighente, and M. Conti, "Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach," IEEE Transactions on Wireless Communications (TWC), 2024, 23 (1): 276-289.
- [14] C. Gu, X. Cui, M. Li, and D. Hu, "An Efficient and Privacy-preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks," IEEE Transactions on Vehicular Technology (TVT), 2023, 72 (6): 7900-7913.
- [13] J. He, Z. Zhang*, L. Ma, Z. Zhang, M. Li, B. Khoussainov, J. Liu, and L. Zhu*, "InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring through Self-Attention Mechanisms," IEEE Transactions on Smart Grid (TSG), 2023, 14 (5): 3828-3840.
- [12] X. Wang, Y. Dong, M. Li, and Y. Liu*, "Lightweight and Dropout Toleration Aggregation for Privacy Crowdsourcing Federated Learning," IEEE Transactions on Industrial Informatics (TII), 2025, Accepted.
- [11] X. Yuan, J. Sun, Z. Chen, M. Li∗, C. Zhang∗, Z. Zhang, L. Zhu, "IAAE-Stega: Genericblockchain-based Steganography Framework via Invertible Adversarial Autoencoder," IEEE Transactions on Network Science and Engineering (TNSE), 2025 Accepted.
- [10] H. Yin Z. Zhang*, L. Zhu*, M. Li, X. Du, M. Guizani, and B. Khoussainov, "A Blockchain-Based Storage System With Financial Incentives for Load-balancing," IEEE Transactions on Network Science and Engineering (TNSE), 2021, 8 (2): 1178-1188.
- [9] Y. Liu, L. Zhu, J. Sun, Z. Chen, F. Gao, X. Yuan, Z. Zhang*, and M. Li*, "Covert transmission via Steganography and Smart Contract," IEEE Internet of Things Journal (IoTJ), 2024, Online.
- [8] X. Lu, Z. Zhang*, T. Ma, M. Li*, T. Zhou, W. Shen, and L. Zhu, "Trusted Execution Environment with Rollback Protection for Smart Contract-Based IoT Data Trading," IEEE Internet of Things Journal (IoTJ), 2024, 11 (20): 32901-32909.
- [7] X. Lu, Z. Zhang*, T. Zhou, T. Niu, L. Zhu, M. Li*, Z. Guan, and T. Ma, "Decentralized Fair IoT Data Trading Via Searchable Proxy Re-Encryption," IEEE Internet of Things Journal (IoTJ), 2024, 11 (11): 19485-19499.
- [6] H. Yan, X. Zhang*, J. Huang, Y. Feng, M. Li, A. Wang, W. Ou, H. Wang, and Z. Liu*, "Wi-SFDAGR: WiFi-based Cross-Domain Gesture Recognition via Source-free Domain Adaptation," IEEE Internet of Things Journal (IoTJ), 2025, 12 (13):24159-24173.
- [5] P. Zhao, J. Huang*, X. Zhang*, Z. Liu, H. Yan, M. Wang, G. Zhuang, Y. Guo, X. Sun, M. Li, "Wi-Pulmo: Commodity WiFi Can Capture Your Pulmonary Function Without Mouth Clinging," IEEE Internet of Things Journal (IoTJ), 2025, 12 (1): 854-868.
- [4] Y. Xia, Y. Liu*, S. Dong, M. Li, and C. Guo, "SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning," IEEE Internet of Things Journal (IoTJ), 2024, 11 (10): 18351-18365.
- [3] F. Li, T. Chen*, M. Li, and C. Lin, "Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State," IEEE Internet of Things Journal (IoTJ), 2024, 11 (8): 14127-14135.
- [2] H. Yin, Z. Zhang*, J. He, L. Ma, and L. Zhu*, M. Li, B. Khoussainov, "Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain," IEEE Internet of Things Journal (IoTJ), 2022, 9 (10): 7866-7875.
- [1] M. Wang, Z. Zhang*, J. He, F. Gao, M. Li, S. Xu, and L. Zhu, "Practical Blockchain-based Steganographic Communication via Adversarial AI: A Case Study in Bitcoin," The Computer Journal, 2022, 65 (11): 2926-2938.
5.3 Selected Publications on Conferences
- [19] X. Zhang, J. Zhang, H. Yan, J. Huang, Z. Ma, B. Liu, M. Li, K. Chen, Q. Guo, T. Zhang, and Z. Liu, "DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction", Proc. 34th USENIX Security Symposium (USENIX Security), August 2025, Accepted. (CCF A)
- [18] X. Zhang, J. Zhang, Z. Ma, J. Huang, M. Li, H. Yan, P. Zhao, Z. Zhang, B. Liu, Q. Guo, T. Zhang, and N. Yu, "CAMLOPA: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis," Proc. 46th IEEE Symposium on Security and Privacy (S&P), May 2025: 3653-3671. (CCF A)
- [17] X. Zhang, Z. Ma, J. Huang, H. Yan, M. Li, Z. Liu, and B. Liu, "Hidden WiFi Camera Localization via Signal Propagation Path Analysis,” Demos of the 30th Annual International Conference on Mobile Computing and Networking (MobiCom), 2025, Hong Kong, China. (CCF A)
- [16] T. Hu, G. Ye, Z. Tang, S. Tan, H. Wang, M. Li, and Z. Wang, "UPBEAT: Test Input Checks of Q# Quantum Libraries," Proc. 33rd International Symposium on Software Testing and Analysis (ISSTA), 2024, Accepted, Vienna, Austria. (CCF A)
- [15] L. Zhu and M. Li, "DoS-Resilient Secure Data Aggregation in Wireless Sensor Networks," Posters of the 17th ACM Annual International Conference on Mobile Computing and Networking (MobiCom), September 2011: 1-2, Las Vegas, USA. (CCF A)
- [14] M. Li, J. Gao, Z. Zhang*, M. Conti, and M. Alazab, "Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets," Proc. 30th IEEE International Conferences on Communications (ICC), June 2024: 1376-1381, Denver, USA. (Best Paper Award)
- [13] Z. Zhang, M. Li, L. Zhu*, and X. Li, "SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning," Proc. 3rd International Conference on Smart Computing and Communication (SmartCom), December 2018: 1-10, Tokyo, Japan. (Best Paper Award)
- [12] M. Li, H. Ding, Q. Wang, Z. Zhang*, and M. Conti, "Threshold Signatures with Private Accountability via Secretly Designated Witnesses", Proc. 29th Australasian Conference on Information Security and Privacy (ACISP), 2024: 389-407, Sydney, Australia.
- [11] M. Li, L. Zhu*, and X. Lin, "CoRide: A Privacy-preserving Collaborative-Ride Hailing Service using Blockchain-assisted Vehicular Fog Computing," Proc. 15th International Conference on Security and Privacy in Communication Systems (SecureComm), November 2019: 408-422, Orlando, USA.
- [10] M. Li*, M. Zhang, J. Gao, C. Lal, M. Conti, and M. Alazab, "Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud", Proc. 24th International Conference on Information and Communications Security (ICICS), September 2022, Canterbury, UK.
- [9] Y. Chen, M. Li*, S. Zheng*, D. Hu, C. Lal, and M Conti, "One-Time, Oblivious, and Unlinkable Query Processing over Encrypted Data On Cloud," Proc. 22nd International Conference on Information and Communication Security (ICICS), August 2020: 350-365, Copenhagen, Denmark.
- [8] M. Li, J. Gao, Z. Zhang*, C. Fu, C. Lal, and M. Conti, "Graph Encryption for Shortest Path Queries With k Unsorted Nodes," Proc. 21st IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), October 2022: 89-96, Wuhan, China.
- [7] M. Li, J. Gao, Y. Chen, J. Zhao, and M. Alazab*, "Privacy-preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks," Proc. 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2020: 599-606, Guangzhou, China.
- [6] M. Li, F. Wu, G. Chen, L. Zhu, and Z. Zhang*, "How to Protect Query and Report Privacy without Sacrificing Service Quality in Participatory Sensing," Proc. 34th IEEE International Performance Computing and Communications Conference (IPCCC), December 2015: 1-7, Nanjing, China.
- [5] L. Zhu and M. Li, "An Energy Efficient and Integrity-Preserving Aggregation Protocol in Wireless Sensor Networks," Proc. 30th IEEE International Performance Computing and Communications Conference (IPCCC), December 2011: 1-6, Orlando, USA.
- [4] S. Zheng, L. Pan, D. Hu*, M. Li, and Y. Fan, "A Blockchain-Based Trading Platform for Big Data," Proc. 8th International Workshop on Security and Privacy in Big Data (INFOCOM WKSHPS BigSecurity), July 2020: 991-996, Toronto, Canada.
- [3] Y. Chen, M. Li*, S. Zheng, C. Lal, and M. Conti, "Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services," Proc. 17th International Workshop on Security and Trust Management (STM) (Co-located with ESORICS 2021), October 2021: 1-18, Darmstadt, Germany.
- [2] P. Su, N. Sun*, L. Zhu, Y. Li, R. Bi, M. Li, and Z. Zhang, "A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System," Proc. 5th International Workshop on Security in Cloud Computing (SCC) (Co-located with ASIACCS), April 2017: 1-8, Abu Dhabi, UAE.
- [1] W. Huang, Y. Li, C. Kai, S. He, and M. Li, "Fresnel Zones Modeling and Analysis of Motion Detection for Multi-Antenna ISAC Systems," Proc. 16th International Conference on Wireless Communications and Signal Processing (WCSP), October 2024, Hefei, China.
6. Invited Presentations
- [16] M. Li, "Security and Privacy in Vehicular Networks", Beihang University, 2025.3.31.
- [15] M. Li, "Security and Privacy in Vehicular Networks: Drawing Inspiration from Life", CCF Hefei, 2024.12.11.
- [14] M. Li, "Security and Privacy in Vehicular Networks", Northwest Normal University, 2024.11.2.
- [13] M. Li, "Security and Privacy in Vehicular Networks", Huaqiao University, 2024.10.6.
- [12] M. Li, "Security and Privacy in Vehicular Networks", Guangxi Normal University, 2024.6.6.
- [11] M. Li, "Security and Privacy in Vehicular Networks", Anhui Normal University, 2024.5.30.
- [10] M. Li, "A Talk on Scientific Research and Project Application", Shanghai University of Electric Power, 2023.12.5.
- [9] M. Li, "High-Quality Paper Writing and Publication", Inner Mongolia University, 2023.11.28.
- [8] M. Li, "A Talk on Scientific Research and Project Application", Hefei University of Technology, 2023.9.16.
- [7] M. Li, "Security and Privacy Preservation for IoV Services," Anhui-Taiwan Cross-Strait Conference on Internet of Things, 2023.7.11.
- [6] M. Li, "Decentralized and Secure Vehicular Digital Forensics and Tracing", CCF YOCSEF-Qingdao, 2023.6.17.
- [5] M. Li, "Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain", Shaodong University, 2023.6.16.
- [4] M. Li, "Security and Privacy in Vehicular Networks: Drawing Inspiration from Life", CCF YOCSEF-Hefei, 2023.4.13.
- [3] M. Li, "Security and Privacy in Vehicular Networks", Anhui Normal University, 2022.9.10.
- [2] M. Li, "Blockchain: Powerful Boost to Privacy Preservation in Vehicular Networks", CCF YOCSEF-Qingdao, 2022.4.9.
- [1] M. Li, "Security and Privacy in Vehicular Digital Forensics", International Conference on Forensic Science and Research, 2021.11.15, https://www.pagesconferences.com/forensic-science.
7. Academic Memberships and Positions
Memberships
- IEEE Senior Member (2022.8.16)
- IEEE Computer Society (CS) Member
- IEEE Communications Society (ComSoc) Member
- IEEE Signal Processing Society (SPS) Member
- IEEE SPS Information Forensics and Security Technical Committee (IFS TC) Member
- IEEE ComSoc Technical Community on Security and Privacy (TCSP) Member
- IEEE ComSoc Technical Community on Cloud Computing Member(TCCLD) Member
- IEEE ComSoc Technical Community on Services Computing (TCSVC) Member
- IEEE Vehicular Technology Society Technical Community on Connected Vehicles (TCCV) Member
- ACM Member (2021.2)
- China Institute of Electronics (CIE) Senior Member (2024.1.30)
- China Institute of Communications (CIC) Senior Member (2024.4.19)
- China Computer Federation (CCF) Senior Member (2023.4.18)
- China Association for Cryptographic Research (CACR) Member (2019.8)
- China Information Processing Society of China (CIPSC) Member (2024.3.27)
- China Association for Artificial Intelligence (CAAI) Life Member (2023.3.1)
- CIE Cybersecurity Committee Member (2023.6.2)
- CIC Data Security Committee Member (2024.5.10)
- CCF Blockchain Committee Corresponding Member (2020.12.18)/Executive Member (2021.12.25)
- CCF Services Computing Executive Member (2023.9.17)
- CIPSC Big Data Security and Privacy Preservation Committee Member (2022.1.30)/Standing Member (2022.5.17)
- CAAI Intelligent Information Network Committee Member (2021.11)
- CAAI Youth Work Committee Member (2022.6.28)
- Cyber Security Association of China (CSAC) Personal Information Protection Expert Group Member (2021.2.10)/Intelligent Vehicular Network Security Expert Group Member (2021.2.18)
Associate Editor
Junior Editorial Board Member
Guest Editor
Conference Steering Committee Member
- The 16th IEEE International Conference on Internet of Things (iThings 2023) Workshop on "Secure and Robust Distributed Machine Learning for Artificial Intelligence of Things"
Conference Co-Chair
- The 18th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies (EAI TRIDENTCOM 2023)
Conference Co-Organizing Chair
- The 24th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2024) Workshop on Distributed Machine Learning Security (DMLS 2024)
Conference Special Session Co-Proposer
- The International Conference on Cyber-physical Social Intelligence (ICCSI) 2023-Big Data Techniques for Computer Vision
Conference Area Chair
- IEEE International Workshop on Information Forensics and Security (WIFS) 2026
Conference Session Chair
- 25th International Conference on Information and Communications Security (ICICS 2023)-Session 3: Blockchain and Cryptocurrencies
- 23rd International Conference on Information and Communications Security (ICICS 2021)-Parallel Session B: Post-Quantum Cryptography
- 22nd International Conference on Information and Communications Security (ICICS 2020)-Crypto IV
Conference Technical Program Committee Member
- The 24th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2025)
- The 27th International Conference on Information and Communications Security (ICICS 2025)
- The 11th IEEE International Conference on Privacy Computing and Data Security (PCDS 2025)
- The 27th IEEE International Conference on High Performance Computing and Communications (HPCC 2025)
- The 13th IEEE Conference on Communications and Network Security (CNS 2025)
- The 14th IEEE/CIC International Conference on Communications in China (ICCC 2025)
- The 44rd IEEE Global Communications Conference (GLOBECOM 2025)
- The 21st International Conference on Information Security and Cryptology (Inscrypt 2025)
- The 10th IEEE International Conference on Smart Cloud (SmartCloud 2025)
- The 22nd Annual International Conference on Privacy, Security, and Trust (PST 2025)
- The 13th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec 2025)
- The 31st IEEE International Conference on Communications (ICC 2025)
- Workshop on AI for cyber Threat Intelligence (WAITI) 2024
- The 20th International Conference on Information Security and Crypptology (Inscrypt 2024)
- The 21st IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2024)
- The 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024)
- The 26th IEEE International Conferences on High Performance Computing and Communications (HPCC 2024)
- The 13th IEEE/CIC International Conference on Communications in China (ICCC 2024)
- The 13th IEEE International Conference on Cloud Networking (CloudNet 2024)
- The 1st IEEE Global Blockchain Conference (GBC 2024)
- The 9th IEEE International Conference on Smart Cloud (IEEE SmartCloud 2024)
- The 21st Annual International Conference on Privacy, Security, and Trust (PST 2024)
- The 17th International Conference on Knowledge Science, Engineering and Management (KSEM 2024)
- The 43rd IEEE Global Communications Conference (GLOBECOM 2024)
- The 24th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2024)
- The 44th IEEE International Conference on Distributed Computing Systems (ICDCS 2024)
- The 33rd International Conference on Computer and Communication Networks (ICCCN 2024)
- The 30th IEEE International Conference on Communications (ICC 2024)
- The International Conference on Computing, Networking and Communications (ICNC) 2024
- The 12th IEEE/CIC lnternational Conference on Communications in China (ICCC 2024)
- The 42nd IEEE Global Communications Conference (GLOBECOM 2023)
- The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023)
- The 21st IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA 2023)
- The 23rd International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2023)
- The 12th IEEE International Conference on Cloud Networking (CloudNet 2023)
- The 16th International Conference on Knowledge Science, Engineering and Management (KSEM 2023)
- The 3rd International Conference on Computing and Communication Networks (ICCCNet 2023)
- The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022)
- The 5th China Blockchain Conference (CBCC 2022)
- The 21st IEEE International Conference on Computer and Information Technology (CIT 2022)
- The 9th IEEE International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications (MAPE 2022)
- The 15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022)
- The 28th IEEE International Conference on Communications (ICC 2022)
- The 44th International Conference on Telecommunications and Signal Processing (TSP 2021)
- The International Conference on Computing and Communication Networks (ICCCN) 2021
- The 8th IEEE International Conference on Smart City and Informatization (iSCI 2020)
- The 8th International Symposium on Security in Computing and Communications (SSCC 2020)
- The 43rd International Conference on Telecommunications and Signal Processing (TSP 2020)
- The 16th Annual International Conference on Wireless Communications & Mobile Computing (IWCMC 2020)
- Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS) 2019
Conference Co-Organizer
- 1st Conference on China Multimedia Forensics and Security (CHINAMFS) 2020, Hefei, China
- 2nd International Workshop on Mobile Communications and Networking (WMCN) 2017, Waterloo, Canada
- 13th International Conference on Mobile Ad-hoc and Sensor Network (MSN) 2017, Beijing, China
- 3rd International Conference on Trusted Systems (INTRUST) 2011, Beijing, China
Reviewer for Transactions, Journals, Magazines
- IEEE Transactions on Information Forensics and Security (TIFS)
- IEEE Transactions Dependable and Secure Computing (TDSC)
- IEEE Journal on Selected Areas in Communications (JSAC)
- IEEE/ACM Transactions on Networking (ToN)
- IEEE Transactions on Mobile Computing (TMC)
- IEEE Transactions on Computers (TC)
- IEEE Transactions on Services Computing (TSC)
- ACM Transactions on Privacy and Security (TOPS)
- IEEE Transactions on Multimedia (TMM)
- IEEE Transactions on Intelligent Transportation Systems (TITS)
- IEEE Transactions on Industrial Informatics (TII)
- IEEE Transactions on Cognitive Communications and Networking (TCCN)
- IEEE Transactions on Vehicular Technology (TVT)
- IEEE Transactions on Cloud Computing (TCC)
- IEEE Transactions on Network and Service Management (TNSM)
- IEEE Transactions on Network Science and Engineering (TNSE)
- IEEE Transactions on Computational Social Systems (TCSS)
- IEEE Transactions on Engineering Management (TEM)
- IEEE Transactions on Big Data (TBD)
- IEEE Transactions on Games (ToG)
- IEEE Communications Surveys & Tutorials (COMST)
- IEEE Wireless Communications Magazine
- IEEE Network
- IEEE Vehicular Technology Magazine
- IEEE Internet of Things Journal (IoTJ)
- IEEE Journal of Biomedical and Health Informatics (JBHI)
- ACM Computing Surveys (CUSR)
- Engineering
- Industrial Electronics Magazine
- Information Processing and Management
- Chinese Journal of Aeronautics
- IEEE System Journal
- Science China-Information Sciences
- Computer Networks
- Journal of Computer Science and Technology
- Blockchain: Research and Applications
- Sustainable Energy Technologies and Assessments
- Computer Standards & Interfaces
- IEEE Intelligent Systems
- Journal of Parallel and Distributed Computing
- Pervasive and Mobile Computing
- Computer Communications
- China Communications
- Computers and Electrical Engineering
- Sensors
- ACM Transactions on Sensor Networks
- IEEE Consumer Electronics Magazine
- Security and Communication Networks
- Chinese Journal of Electronics
- Wireless Networks
- Transactions on Emerging Telecommunications Technologies
- International Journal of Communication Systems
- International Journal of Information Technology & Decision Making
- Computer Modeling in Engineering & Sciences
- Mobile Networks and Applications
- IETE Journal of Research
- IET Communications
- IT Professional
- IEEE Open Journal of Communications Society
- Journal of Computer Security
- Distributed Ledger Technologies
- IET Blockchain
- Forensic Science International: Digital Investigation
Reviewer for Conferences
- The 34th International Conference on Computer Communications and Networks (ICCCN 2025)
- The 27th International Conference on Information and Communications Security (ICICS 2025)
- The 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
- The 12th Workshop on Privacy in the Electronic Society (WPES 2022)
- The 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2021)
- The International Conference on Medical Imaging Science and Technology (MIST 2021)
- The 14th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2021)
- The 25th IEEE Symposium on Computers and Communications (ISCC 2020)
- The 37th IEEE Global Communications Conference (Globecom 2018)
- The 37th IEEE International Performance Computing and Communications Conference (IPCCC 2018)
- The 20th International Conference on Information and Communications Security (ICICS 2018)
- The 4th International Conference on Computer and Communications (ICCC 2018)
- The 7th International Conference on Wireless Communications and Signal Processing (WCSP 2015)
8. Supervising and mentoring activities
Three graduated master students, two master students, and four Ph.D students
9. Prizes and Awards
- 2025.07, IEEE TCSVC Rising Star Award
- 2025.01, Netinfo Security Excellent Reviewer
- 2024.12, IEEE TNSE Excellent Reviewer
- 2024.09, Stanford/Elsevier's Top 2% Scientist
- 2024.09, IEEE-CCF Outstanding Paper in the Cloud Computing Area
- 2024.09, IEEE HITC Award for Excellence in Hyper-Intelligence (Early Career Researcher)
- 2024.07, Ucom 2024 Young Scientis Award
- 2024.04, "Five Four" Outstanding Youth Model of Hefei University of Technology
- 2023.10, Stanford/Elsevier's Top 2% Scientist
- 2023.01, Anhui Computer Federation Outstanding Young Scientist
- 2021.10, ACM China Council (Hefei Chapter) Rising Star Award