Jianfeng Li

ORCID: 0000-0002-3453-0195
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cellular and Composite Structures
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Refrigeration and Air Conditioning Technologies
  • Polymer composites and self-healing
  • Structural Response to Dynamic Loads
  • Mechanical Behavior of Composites
  • Blockchain Technology Applications and Security
  • Wireless Sensor Networks and IoT
  • High-Velocity Impact and Material Behavior
  • Civil and Geotechnical Engineering Research
  • Software-Defined Networks and 5G
  • Software System Performance and Reliability
  • Tribology and Lubrication Engineering
  • Anomaly Detection Techniques and Applications
  • Smart Grid Security and Resilience
  • Advanced Sensor and Control Systems
  • Education and Work Dynamics
  • Transportation and Mobility Innovations
  • Hydraulic and Pneumatic Systems
  • Advanced Thermodynamic Systems and Engines
  • Traffic Prediction and Management Techniques
  • Anaerobic Digestion and Biogas Production
  • Advanced Research in Systems and Signal Processing
  • Energy Harvesting in Wireless Networks

China Coal Research Institute (China)
2024-2025

Tianma Microelectronics (China)
2024-2025

Shandong University of Science and Technology
2024

China University of Mining and Technology
2024

Xi'an Jiaotong University
2009-2024

China Railway Group (China)
2023

Hong Kong Polytechnic University
2021-2022

Hebei University of Economics and Business
2019

Air Force Engineering University
2018

Chang'an University
2015

10.1016/j.ijmecsci.2020.106107 article EN International Journal of Mechanical Sciences 2020-09-22

Decentralized Finance, mushrooming in permissionless blockchains, has attracted a recent surge popularity. Due to the transparency of opportunistic traders can compete earn revenue by extracting Miner Extractable Value (MEV), which undermines both consensus security and efficiency blockchain systems. The Flashbots bundle mechanism further aggravates MEV competition because it empowers with capability designing more sophisticated extraction. In this paper, we conduct first systematic study on...

10.1145/3576915.3616590 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Recently, power banks for smartphones have begun to support wireless charging. Although these charging appear be immune most reported vulnerabilities in either or charging, we found a new contactless side channel that leaks user privacy from their without compromising victim smartphones. We proposed BankSnoop demonstrate the practicality of newly discovered banks. Specifically, it leverages coil whine and magnetic field disturbance emitted by bank when wirelessly smartphone adopts few-shot...

10.1145/3570361.3613288 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2023-09-30

The displacement and stiffness of a roller bearing affect the reliability remaining life bearing. In order to establish method for predicting needle bearing, experimental numerical analyses were performed on an NA4848 under different conditions. tested varies from 0.0029 mm 0.0125 radial load in range 10-50kN. Test results also showed that effect rotational speeds is not significant. minimum based occurs when loading 20kN. Finite element analysis was performed, which displacements von...

10.1038/s41598-025-87276-1 article EN cc-by-nc-nd Scientific Reports 2025-02-21

Security surveillance is important in smart cities. Deploying numerous cameras a common approach. Given the importance of vehicles metropolis, using vehicle traffic patterns to strategically place could potentially facilitate security surveillance. This article constitutes first effort toward building link between and camera placement for better

10.1109/mis.2018.223110904 article EN IEEE Intelligent Systems 2018-05-04

Smart contracts play an increasingly important role in Ethereum platform. It provides various functions implementing numerous services, whose bytecode runs on Virtual Machine. To use services by invoking corresponding functions, the callers need to know function signatures. Moreover, such signatures provide crucial information for many downstream applications, e.g., identifying smart contracts, fuzzing, detecting vulnerabilities, etc. However, it is challenging infer from due a lack of type...

10.1145/3611643.3616343 article EN 2023-11-30

With the popularization of Internet Things (IoT) devices in smart home and industry fields, a huge number IoT are connected to Internet. However, what network may not be known by Service Provider (ISP), since many placed within small networks (e.g., networks) hidden behind address translation (NAT). Without pinpointing network, it is unlikely for ISP appropriately configure security policies effectively manage network. Additionally, inferring fine-grained user interactions also an...

10.1109/tnet.2021.3112480 article EN IEEE/ACM Transactions on Networking 2021-09-27

Cyber search engines, such as Shodan and Censys, have gained popularity due to their strong capability of indexing the Internet Things (IoT). They actively scan fingerprint IoT devices for unearthing IP-device mapping. Because large address space mapping's mutative nature, efficiently tracking evolution mapping with a limited budget scans is essential building timely cyber engines. An intuitive solution use reinforcement learning schedule more networks high churn rates However, an has never...

10.1109/tnet.2023.3312162 article EN IEEE/ACM Transactions on Networking 2023-09-13

In order to make the process more sustainability and efficient in co-digestion of kitchen waste (KW) cow manure (CM), effect pH controlling at initial fermentation time (I), first gas stagnation (A), combination both times (C) were investigated. Five values (6.5, 7.0, 7.5, 8.0 8.5) set each case find out optimal way regulation with consideration changes biogas methane production, volatile solid (VS) reduction, lag-phase time. The results show that adjusting system could significantly improve...

10.1080/15567036.2019.1667457 article EN Energy Sources Part A Recovery Utilization and Environmental Effects 2019-09-17

Cyber search engines, such as Shodan and Censys, have gained popularity due to their strong capability of indexing the Internet Things (IoT). They actively scan fingerprint IoT devices for unearthing IP-device mapping. Because large address space mapping's mutative nature, efficiently tracking evolution mapping with a limited budget scans is essential building timely cyber engines. An intuitive solution use reinforcement learning schedule more networks high churn rates However, an has never...

10.1109/infocom48880.2022.9796737 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2022-05-02
Coming Soon ...