Fengjun Li

ORCID: 0000-0003-4079-2228
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Privacy-Preserving Technologies in Data
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Smart Grid Security and Resilience
  • Spam and Phishing Detection
  • Privacy, Security, and Data Protection
  • Adversarial Robustness in Machine Learning
  • Metal Alloys Wear and Properties
  • Risk and Safety Analysis
  • Metamaterials and Metasurfaces Applications
  • Neural Networks and Applications
  • Cloud Data Security Solutions
  • Metallurgy and Material Forming
  • Manufacturing Process and Optimization
  • Orbital Angular Momentum in Optics
  • Security and Verification in Computing
  • Geoscience and Mining Technology
  • Advanced Algorithms and Applications
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Recycling and utilization of industrial and municipal waste in materials production
  • Advanced machining processes and optimization
  • Advanced Antenna and Metasurface Technologies
  • Advanced ceramic materials synthesis

China General Nuclear Power Corporation (China)
2016-2025

University of Kansas
2015-2024

China Aerospace Science and Technology Corporation
2024

Jinan University
2019-2024

Ningxia University
2007-2024

Guangdong Ocean University
2023-2024

Dalian Polytechnic University
2024

Changchun University of Chinese Medicine
2024

Health First
2022-2023

Xinjiang University
2007-2023

With the exponential growth of cyber-physical systems (CPSs), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls been introduced for generation CPS. However, there lacks a systematic review CPS literature. In particular, heterogeneity components diversity made it difficult to study problem with one generalized model. this paper, we systematize existing research on under unified framework. The framework consists three orthogonal coordinates: 1) from...

10.1109/jiot.2017.2703172 article EN publisher-specific-oa IEEE Internet of Things Journal 2017-05-12

In this paper, we present a distributed incremental data aggregation approach, in which is performed at all smart meters involved routing the from source meter to collector unit. With carefully constructed tree, route covers entire local neighborhood or any arbitrary set of designated nodes with minimum overhead. To protect user privacy, homomorphic encryption used secure en route. Therefore, participate aggregation, without seeing intermediate final result. way, our approach supports...

10.1109/smartgrid.2010.5622064 article EN 2010-10-01

Abstract Chirality describes mirror symmetry breaking in geometric structures or certain physical quantities. The interaction between chiral structure and light provides a rich collection of means for studying the chirality substances. Recently, optical metasurfaces have emerged as planar quasi-planar photonic devices composed subwavelength unit cells, offering distinct appealing responses to circularly polarized with opposite handedness. chiroptical effects can be manifested absorption,...

10.1038/s44310-024-00018-5 article EN cc-by Deleted Journal 2024-06-28

Federated learning (FL) is promising in supporting collaborative applications that involve large datasets, massively distributed data owners and unreliable network connectivity. To protect privacy, existing FL approaches adopt (k,n)-threshold secret sharing schemes, based on the semi-honest assumption for clients, to enable secure multiparty computation local model update exchange which deals with random client dropouts at cost of increasing size. These therefore they are vulnerable...

10.1145/3319535.3363256 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

In this paper, we present a distributed incremental data aggregation approach, in which is performed at all smart meters involved routing the from source meter to collector unit. With carefully constructed tree, route covers entire local neighbourhood or any arbitrary set of designated nodes with minimum overhead. To protect user privacy, homomorphic encryption used secure enroute. Therefore, participate aggregation, without seeing intermediate final result. way, our approach supports...

10.1504/ijsn.2011.039631 article EN International Journal of Security and Networks 2011-01-01

In smart grid systems, secure in-network data aggregation approaches have been introduced to efficiently collect data, while preserving privacy of individual meters. Nevertheless, it is also important maintain the integrity aggregate in presence accidental errors and internal/external attacks. To ensure correctness against unintentional errors, we introduce an end-to-end signature scheme, which generates a homomorphic for result. The scheme compatible with schemes that are based on...

10.1109/smartgridcomm.2012.6486011 article EN 2012-11-01

Local Transformer-based classification models have recently achieved promising results with relatively low computational costs. However, the effect of aggregating spatial global information local architecture is not clear. This work investigates outcome applying a attention-based module named multi-resolution overlapped attention (MOA) in window-based transformer after each stage. The proposed MOA employs slightly larger and patches key to enable neighborhood pixel transmission, which leads...

10.1109/icpr56361.2022.9956379 article EN 2022 26th International Conference on Pattern Recognition (ICPR) 2022-08-21

Quantitative analysis of complex geological samples was performed by chemometric methods SVR and PLSR coupled with the LIBS technique.

10.1039/c5ja00255a article EN Journal of Analytical Atomic Spectrometry 2015-01-01

Polarizers have always been an important optical component for engineering and played indispensable part of polarization imaging systems. Metasurface polarizers provide excellent platform to achieve miniaturization, high resolution, low cost Here, we proposed freeform metasurface derived by adjoint-based inverse design a full-Jones matrix with gradient-descent optimization. We designed multiple different filtered states (SOPs), including circular polarizers, elliptical linear that could...

10.3788/col202422.023601 article EN Chinese Optics Letters 2024-01-01

To detect fraudulent TLS server certificates and improve the accountability of certification authorities (CAs), certificate transparency (CT) is proposed to record in publicly-visible logs, from which monitors fetch all watch for suspicious ones. However, if monitors, either domain owners themselves or third-party services, fail return a complete set issued interest, potentially may not be detected then CT framework becomes less reliable. This paper presents first systematic study on...

10.1145/3319535.3345653 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

With ChatGPT under the spotlight, utilizing large language models (LLMs) to assist academic writing has drawn a significant amount of debate in community. In this paper, we aim present comprehensive study detectability ChatGPT-generated content within literature, particularly focusing on abstracts scientific papers, offer holistic support for future development LLM applications and policies academia. Specifically, first GPABench2, benchmarking dataset over 2.8 million comparative samples...

10.48550/arxiv.2306.05524 preprint EN cc-by arXiv (Cornell University) 2023-01-01

With the extreme popularity of Web and online social networks, a large amount personal information has been made available over Internet. On other hand, advances in retrieval, data mining knowledge discovery technologies have enabled users to efficiently satisfy their needs Internet or from large-scale sets. However, such also help adversaries as web stalkers discover private about victims mass data.

10.1145/2133601.2133607 article EN 2012-02-07

Fuzzing is one of the most effective approaches to finding software flaws. However, applying it microcontroller firmware incurs many challenges. For example, rehosting-based solutions cannot accurately model peripheral behaviors and thus be used fuzz corresponding driver code. In this work, we present $\mu$AFL, a hardware-in-the-loop approach fuzzing firmware. It leverages debugging tools in existing embedded system development construct an AFL-compatible framework. Specifically, use debug...

10.1145/3510003.3510208 article EN Proceedings of the 44th International Conference on Software Engineering 2022-05-21

Due to the component interaction behavior in control process, startup signal of residual heat removal system secondary side (PRS), and fault tree analysis method may have incomplete identification failure model. Therefore, this paper enhances by introducing System Theory Process Analysis (STPA) as a supplement. The STPA is used for qualitative PRS, identifying more comprehensive set potential factors. Subsequently, quantitative performed building mod el identify weaknesses PRS signal. An...

10.1049/icp.2024.3547 article EN IET conference proceedings. 2025-01-01

Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining privacy while garnering benefits, especially when are required to be published for secondary use. Most current research protecting centered around de-identification and anonymization, which removes identifiable information from prevent adversary reasoning about patients. However, not only source that adversaries can count on: a large amount people voluntarily...

10.1186/1471-2105-12-s12-s7 article EN cc-by BMC Bioinformatics 2011-11-24

Abstract With the growing popularity of online social networks, a large amount private or sensitive information has been posted online. In particular, studies show that users sometimes reveal too much unintentionally release regretful messages, especially when they are careless, emotional, unaware privacy risks. As such, there exist great needs to be able identify potentially-sensitive contents, so could alerted with such findings. this paper, we propose context-aware, text-based...

10.2478/popets-2019-0059 article EN Proceedings on Privacy Enhancing Technologies 2019-07-30
Coming Soon ...