Meng Li (李萌)
Professor, Ph.D. Supervisor
School of Computer Science and Information Engineering
Hefei University of Technology, China
ERCIM Fellow, IEEE Senior Member, CCF Senior Member
SAE for IEEE T-IFS, AE for IEEE TDSC
1. Education
2015.09-2019.06, Beijing Institute of Technology, School of Computer Science and Technology, Ph.D., supervised by Prof. Liehuang Zhu
2017.09-2018.08, BBCR Lab at University of Waterloo and Wilfrid Laurier University, CSC Jointly-Trained Ph.D., supervised by Prof. Xiaodong Lin (IEEE Fellow)
2010.09-2013.02, Beijing Institute of Technology, School of Computer Science and Technology, Master, supervised by Prof. Liehuang Zhu
2006.09-2010.06, Hefei University of Technology, School of Computer Science and Information Engineering, Bachelor
2. Professional Experiences
2024.12-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Professor
2025.03-2025.06, University of Padua, SPRITZ Security and Privacy Research Group, Department of Mathematics and Human Inspired Technology Center, CSC Visiting Scholar, working with Prof. Mauro Conti (IEEE Fellow)
2023.11-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Ph.D. Supervisor
2022.03-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Leader of Cryptography Course Group
2021.09-2024.09, Hefei University of Technology, School of Computer Science and Information Engineering, Secretary Personnel
2020.10-2021.03, The National Research Council-Institute for Informatics and Telematics (CNR-IIT), European Research Consortium for Informatics and Mathematics (ERCIM), Postdoc Research Fellow, work with Fabio Martinelli
2020.09-Now, University of Padua, SPRITZ Security and Privacy Research Group, Department of Mathematics and Human Inspired Technology Center, Postdoc Research Fellow, working with Prof. Mauro Conti (IEEE Fellow)
2019.07.11-Now, Hefei University of Technology, School of Computer Science and Information Engineering, Associate Professor
2013.07-2015.05, Industrial and Commercial Bank of China (ICBC) Anhui Branch, Employee
3. Research Interests
Data Sharing, Internet of Vehicles, Information Security, Privacy Preservation, Applied Cryptography, Blockchain, and TEE.
4. Fundings
- 2024.01.01-2027.12.31, The Joint Funds of the Regional Innovation and Development of National Natural Science Foundation of China (NSFC), "Integrated Data Security Protection Based on Communication-Sensing-Computation Fusion in Intelligent Vehicle Network", 528, 000 Yuan/2, 640, 000 Yuan, Subject Facilitator.
- 2024.01.01-2027.12.31, The General Program of National Nature Science Foundation of China (NSFC), "Research on Privacy-Preserving Model and Key Technologies for IoV Services", 500,000 Yuan, Principal Investigator.
- 2021.01.01-2023.12.31, The Youth Fund of National Nature Science Foundation of China (NSFC), "Research on Strong Privacy Preservation for User Matching in Ride-Hailing Services", 240,000 Yuan, Principal Investigator.
- 2020.07.01-2023.06.30, The General Program of Anhui Provincial Natural Science Foundation, "Research on Privacy-preserving Ride-Hailing Protocols based on Encrypted Data Processing", 120,000 Yuan, Principal Investigator.
5. Selected Publications
5.1 Monographs
- L. Zhu, K. Gai, and M. Li, Blockchain Technology in Internet of Things, Springer, 2019.
- M. Li, Encyclopedia of Wireless Networks - Differential Privacy, Springer, 2018.
5.2 Selected Publications on Transactions, Journals, and Magazines
- M. Li, Y. Chen, Y. Qiao*, G. Ye, Z. Zhang*, L. Zhu, and M. Conti*, "Trust in a Decentralized World: Data Governance from Faithful, Private, Verifiable, and Traceable Data Feeds," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 10818-10833. (CCF A)
- M. Li, H. Ding, Y. Chen, Y. Qiao*, Z. Zhang*, L. Zhu, and M. Conti, "Threshold Signatures with Verifiably Timed Combining and Message-Dependent Tracing," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 9477-9491. (CCF A)
- M. Li, H. Ding, Q. Wang, M. Zhang, W. Meng, L. Zhu, Z. Zhang*, and X. Lin, "Decentralized Threshold Signatures with Dynamically Private Accountability," IEEE Transactions on Information Forensics and Security (T-IFS), 2024, 19: 2217-2230. (CCF A)
- Z. Wang, Z. Zhang*, Z. Li, Y. Wu, Y. Liu, M. Li*, X. Li, Y. Liu, J. An, W. Liang, and L. Zhu, "Resisting Poisoning Attacks in Federated Learning via Dual-Domain Distance and Trust Assessment," 2025, Accepted.
- X. Liu, Z. Zhang*, Z. Li, P. Jiang, Y. Wang, M. Li*, and L. Zhu, "The Deferred Byzantine Generals Problem," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 7777-7792. (CCF A)
- Q. Wang, D. Hu*, M. Li*, and G. Yang, "Secure and Flexible Wildcard Queries," IEEE Transactions on Information Forensics and Security (T-IFS), 2024, 19: 7374-7388. (CCF A)
- Z. Guo, X. Li, J. Liu, Z. Zhang*, M. Li*, J. Hu, and L. Zhu, "Graph-based Covert Transaction Detection and Protection in Blockchain," IEEE Transactions on Information Forensics and Security (T-IFS), 2024, 19: 2244-2257. (CCF A)
- J. Huang, J.-X. Bai, X. Zhang*, Z. Liu, Y. Feng, J. Liu, X. Sun, M. Dong, and M. Li*, "KeystrokeSniffer: An Off-the-Shelf Smartphone Can Eavesdrop on Your Privacy from Anywhere," IEEE Transactions on Information Forensics and Security (T-IFS), 2024, 19: 6840-6855. (CCF A)
- J. Zhao, K. Xue*, M. Li, Y. Xue, and Y. Huang, "IFAD: Privacy-Preserving Isolation Forest Based Anomaly Detection in Public Cloud Environments," IEEE Transactions on Information Forensics and Security (T-IFS), 2026, Accepted. (CCF A)
- F. Hu, A. Zhang*, M. Li, and C. Wang, "Frequency-Domain Signatures for Proactive Defense Against Model Poisoning Attacks in Federated Learning," IEEE Transactions on Information Forensics and Security (T-IFS), 2026, Accepted. (CCF A)
- Z. Lu, L. Wang*, M. Li, J. Wang, K. Gai, and X. Chen, "DeSA: Decentralized Secure Aggregation for Federated Learning in Zero-Trust D2D Networks," IEEE Transactions on Information Forensics and Security (T-IFS), 2026, Accepted. (CCF A)
- F. Song, C. Zhang*, Z. Fu, M. Li, Z. Qin, and L. Zhu, "Secure and Customized Data Sharing with Identical Sub-Policy and Bilateral Access Control," IEEE Transactions on Information Forensics and Security (T-IFS), 2026, Accepted. (CCF A)
- X. Han, J. Huang, M. Li, C. Cai, and T. Zheng*, "Loki: Physical-World Adversarial Attacks on Wireless Indoor Localization via Differentiable Object Placement," IEEE Transactions on Information Forensics and Security (T-IFS), 2026, Accepted. (CCF A)
- F. Hu, A. Zhang*, X. Liu, and M. Li, "DamPa: Dynamic Adaptive Model Poisoning Attack in Federated Learning," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 12215-12230. (CCF A)
- W. Yang, X. Li, M. Li, Z. Zhang, Z. Guan*, and L. Zhu, "VSecNN: Verifiable and Privacy-Preserving Neural Network Inference in Cloud Service," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 10541-10555. (CCF A)
- Z. Wang, Y. Chen*, Y. Yao, M. Han, W. Xing, M. Li, "IDCNet: Image Decomposition and Cross-view Distillation for Generalizable Deepfake Detection," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 8373-8386. (CCF A)
- X. Zhao, Q. Jiang*, X. Gong, M Li, X. Ma, J. Ma, "Three Birds with One Arrow: Symmetric Two-Factor Authentication Protocol Based on Puncturable Pseudorandom Function," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 10849-10863. (CCF A)
- S. Li, Y. Cao*, G. Peng, M. Li, W. Sun, and L. Chen, "Efficient Intrusion Detection of In-Vehicle Networks Using Knowledge Distillation from BERT to CNN-BiLSTM," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 6398-6412. (CCF A)
- T. Zheng, Q. Hou, X. Chen, H. Ren*, M. Li, H. Li, and C. Shen, "Gupacker: Generalized Unpacking Framework for Android Malware," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 4338-4352. (CCF A)
- L. Wang*, M. Huang, Z. Zhang, M. Li, J. Wang, and K. Gai*, "RaSA: Robust and Adaptive Secure Aggregation for Edge-Assisted Hierarchical Federated Learning," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 4280-4295. (CCF A)
- J. Zhao, K. Xue*, Y. Xue, M. Li, B. Zhu, and S. Yuan, "Privacy-Preserving Statistical Analysis with Low Redundancy over Task-Relevant Microdata", IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 4382-4395. (CCF A)
- C. Pan, D. Hu*, Y. Wang*, K. Chen, Y. Peng, X. Rong, C. Gu, and M. Li, "Rethinking Prefix-based Steganography for Enhanced Security and Efficiency," IEEE Transactions on Information Forensics and Security (T-IFS), 2025, 20: 3287-3301. (CCF A)
- N. Wang, S. Wang, M. Li, L. Wu, Z. Zhang, Z. Guan*, and L. Zhu, "Balancing Differential Privacy and Utility: A Relevance-based Adaptive Private Fine-tuning Framework for Language Models," IEEE Transactions on Information Forensics and Security (T-IFS), 2024, 20: 207-220. (CCF A)
- Q. Jiang, G. Zhao, X. Ma, M. Li, Y. Tian, and X. Li, "Cross-modal Learning based Flexible Bimodal Biometric Authentication with Template Protection," IEEE Transactions on Information Forensics and Security (T-IFS), 2024, 19: 3593-3607. (CCF A)
- M. Li, Y. Chen, J. Gao*, J. Wu, Z. Zhang*, J. He, L. Zhu, M. Conti, and X. Lin, "Accurate, Secure, and Efficient Semi-Constrained Navigation over Encrypted City Maps," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, 22 (3): 2642-2658. (CCF A)
- M. Li, Y. Chen, L. Zhu*, Z. Zhang*, J. Ni, C. Lal, and M. Conti, "Astraea: Anonymous and Secure Auditing based on Private Smart Contracts for Donation Systems," IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, 20 (4): 3002-3018. (CCF A)
- M. Li, Y. Chen*, C. Lal, M. Conti, F. Martinelli, and M. Alazab, "Nereus: Anonymous and Secure Ride-Hailing Service based on Private Smart Contracts," IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, 20 (4): 2849-2866. (CCF A)
- M. Li, Y. Chen, C. Lal, M. Conti, M. Alazab, and D. Hu*, "Eunomia: Anonymous and Secure Vehicular Digital Forensics based on Blockchain," IEEE Transactions on Dependable and Secure Computing (TDSC), 2023, 20 (1): 225-241. (2023 Featured Article, ESI Highly Cited Paper) (CCF A)
- M. Li, Y. Chen, S. Zheng*, D. Hu*, C. Lal, and M. Conti, "Privacy-preserving Navigation Supporting Similar Queries in Vehicular Networks," IEEE Transactions on Dependable and Secure Computing (TDSC), 2022, 19 (2): 1133-1148. (CCF A)
- L. Zhu, M. Li, Z. Zhang*, and Z. Qin, "ASAP: An Anonymous Smart-parking and Payment Scheme in Vehicular Networks," IEEE Transactions on Dependable and Secure Computing (TDSC), 2020, 17 (4): 703-715. (ESI Highly Cited Paper) (CCF A)
- Z. Zhang, X. Lu, M. Li*, J. An, Y. Yu, H. Yin, L. Zhu, Y. Liu, J. Liu, and B. Khoussainov, "A Blockchain-based Privacy-Preserving Scheme for Sealed-bid Auction," IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21 (5): 4668-4683. (CCF A)
- Q. Tong, X. Yao, Z. Ren, Y. Miao, M. Li*, X. Li∗, and R. H. Deng, "Traceable Cross-Domain Data Sharing with Expressive Keyword Search," IEEE Transactions on Dependable and Secure Computing (TDSC), 2026, Accepted. (CCF A)
- Z. Zhang, X. Liu, M. Li*, H. Yin, L. Zhu*, B. Khoussainov, and K. Gai, "HCA: Hashchain-based Consensus Acceleration via Re-voting," IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21 (2): 775-788. (CCF A)
- X. Liu, Z. Zhang*, Z. Li, H. Sun, M. Li*, J. Sun, J. Liu, Y. Liu, L. Xu, J. An, Q. Sun, L. Huang, M. Conti, and L. Zhu, "Hydra: Support Dynamic BFT with Weaker Assumptions and Explicit Request Handling," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, Accepted. (CCF A)
- X. Liu, Z. Zhang∗, Z. Li, X. Lu, M. Li∗, L. Xu, M. Ao, and L. Zhu, "Group BFT: Two-Round BFT Protocols via Replica Grouping," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, 22: 6309-6326. (CCF A)
- J. Huang, Y. Feng, F.-Q. Cui, X. Zhang*, Z. Liu, X. Liu, J. Liu, F. Zhang, and M. Li*, "Identifying Who You Are No Matter What You Write through Abstracting Handwriting Style," IEEE Transactions on Dependable and Secure Computing (TDSC), 2026, Accepted. (CCF A)
- J. Zhao, K. Xue∗, R. Li, B. Zhu, M. Li, Q. Sun, and J. Lu, "Privacy-preserving Truth Discovery of Evolving Truths for Mobile Crowdsensing Systems," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, 22: 6406-6421. (CCF A)
- Z. Lu, L. Wang*, Z. Zhang, M. Huang, J. Wang, and Meng Li, "TMT-FL: Enabling Trustworthy Model Training of Federated Learning with Malicious Participants," IEEE Transactions on Dependable and Secure Computing (TDSC), 2025, 22 (3): 2723-2740. (CCF A)
- Z. Liu, Y. Miao, X. Li, M. Li, H. Li, K.-K. R. Choo, and R. H. Deng, "Robust Asynchronous Federated Learning with Time-weighted and Stale Model Aggregation," IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21 (4): 2361-2375. (CCF A)
- M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack," IEEE/ACM Transactions on Networking (ToN), 2022, 30 (5): 2060-2073. (CCF A)
- Y. Qiao, M. Li, X. Yuan, K. Wu, C. Feng, M. Li*, and K. Xie, "Routing-Oblivious and Data-Efficient Network Tomography with Flow-based Generative Model," IEEE/ACM Transactions on Networking (ToN), 2026, Accepted. (CCF A)
- M. Li, M. Zhang, L. Zhu, Z. Zhang*, M. Conti, and M. Alazab, "Decentralized and Privacy-Preserving Smart Parking with Secure Repetition and Full Verifiability", IEEE Transactions on Mobile Computing (TMC), 2024, 23 (12): 11635-11654. (CCF A)
- N. Xia, S. Wei*, M. Li*, Y. Wang, and J. Wan, "Trust Model for Underwater Wireless Sensor Networks based on Variational Autoencoders," IEEE Transactions on Mobile Computing (TMC), 2025, Accepted. (CCF A)
- X. Liu, K. Feng, Z. Zhang*, M. Li*, X. Chen, W. Lai, and L. Zhu, "Dolphin: Efficient Non-Blocking Consensus via Concurrent Block Generation," IEEE Transactions on Mobile Computing (TMC), 2024, 23 (12): 11824-11838. (CCF A)
- H. Yan, J. Liu, X. Zhang*, Z. Liu, B. Liu, M. Li, Z. Gong, M. Gao, and F. Zhang, "DIFFLOC+: Towards Robust WiFi Hidden Camera Localization Based on Electromagnetic Diffraction," IEEE Journal on Selected Areas in Communications (JSAC), 2026, Accepted. (CCF A)
- M. Li, Y. Shen, G. Ye, J. He, X. Zheng, Z. Zhang*, L. Zhu*, and M. Conti, "Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics," IEEE Transactions on Knowledge and Data Engineering (TKDE), 2024, 36 (5): 1874-1888. (CCF A)
- Q. Wang, D. Hu*, M. Li*, Y. Qiao, G. Yang, and M. Conti, "Secure Multi-Character Searchable Encryption Supporting Rich Search Functionalities," IEEE Transactions on Knowledge and Data Engineering (TKDE), 2026, 38 (3): 1958-1972. (CCF A)
- X. Yuan, Y. Qiao*, M. Li, Z. Wei, C. Feng, Z. Wang*, and W. Chen, "Learning-based Sketches for Frequency Estimation in Data Streams without Ground Truth," IEEE Transactions on Knowledge and Data Engineering (TKDE), 2026, 38 (3): 1958-1972. (CCF A)
- D. Hu, Q. Wang, S. Yan, X. Liu, M. Li*, and S. Zheng, "Reversible Database Watermarking based on Order-Preserving Encryption for Data Sharing," ACM Transactions on Database Systems (TODS), 2023, 48 (2): 1-25. (CCF A)
- X. Liu, Z. Zhang*, Z. Li, H. Yin, M. Li*, J. Liu, M. Conti, and L. Zhu, "ABSE: Adaptive Baseline Score-based Election for Leader-based BFT Systems," IEEE Transactions on Parallel and Distributed Systems (TPDS), 2025, 36 (8): 1634-1650. (CCF A)
- M. Li, J. Gao, L. Zhu, Z. Zhang*, C. Lal, and M. Conti, "Time-Restricted, Verifiable, and Efficient Query Processing over Encrypted Data on Cloud," IEEE Transactions on Services Computing (TSC), 2024, 17 (3): 1239-1251. (CCF A)
- M. Li, L. Zhu*, and X. Lin, "Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing," IEEE Transactions on Services Computing (TSC), 2021, 14 (6): 1902-1913. (CCF A)
- Z. Zhang, X. Liu, K. Feng, M. Wan, M. Li*, J. Dong*, and L. Zhu, "Phantasm: Adaptive Scalable Mining Toward Stable BlockDAG," IEEE Transactions on Services Computing (TSC), 2024, 17 (3): 1084-1096. (CCF A)
- J. He, N. Wang*, T. Xiang, Y. Wei, Z. Zhang, M. Li, and L. Zhu, "ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids," IEEE Transactions on Services Computing (TSC), 2024, 17 (5): 1938-1854. (CCF A)
- Z. Wei, J. Sun, Y. Sun, Y. Liu, D. Wu, Z. Zhang*, X. Zhang, M. Li, Y. Liu, C. Li, M. Wan, J. Dong*, and L. Zhu, "Advanced Smart Contract Vulnerability Detection via LLM-Powered Multi-Agent Systems," IEEE Transactions on Software Engineering (TSE), 2025, 51 (10): 2830-2846. (CCF A)
- X. Zhang, H. Yan, J. Huang, B. Liu, Y. Feng, J. Liu, M. Li, F. Zhang, and Z. Liu, "Beyond Physical Labels: Redefining Domains for Robust WiFi-based Gesture Recognition," Proc. ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2026, Accepted.
- W. Yang, Z. He, M. Li, Z. Zhang, Z. Guan*, and L. Zhu, "VHENN: A Verifiable Homomorphic Encrypted Neural Network Inference Scheme Based on Zero-Knowledge Proof for Ring Computations," Chinese Journal of Computers, 2025, Accepted.
- Y. Feng, J. Huang, Y. Zhang, X. Zhang, M. Li, F. Zhang, T. Zheng, Anran Li, Mianxiong Dong, and Zhi Liu*, "RF-Eye: Commodity RFID Can Know What You Write and Who You Are Wherever You Are," ACM Transactions on Sensor Networks (TOSN), 2025, 21 (4): 1-26.
- M. Li, J. Gao, L. Zhu*, Z. Zhang*, C. Lal, M. Conti, and M. Alazab, "Mnemosyne: Privacy-Preserving Ride Matching with Collusion-Resistant Driver Exclusion," IEEE Transactions on Vehicular Technology (TVT), 2023, 72 (4): 5139-5155.
- H. Ren, T. Zheng*, L. Zhang, W. Wang, M. Li, and H. Li, "VBSF: Vulnerability Behavior Scanning Framework for Intelligent Autonomous Transport Systems", IEEE Transactions on Intelligent Transportation Systems (TITS), 2025, 26 (10): 18225-18237.
- M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and M. Alazab, "Anonymous and Verifiable Reputation System for E-commerce Platforms based on Blockchain," IEEE Transactions on Network and Service Management (TNSM), 2021, 18 (4): 4434-4449.
- N. Xia, L. Chen*, M. Li*, Y. Yin, and K. Zhang, "Joint Double Auction-based Channel Selection in Wireless Monitoring Networks," IEEE Transactions on Network and Service Management (TNSM), 2025, 22 (3): 2412-2426.
- M. Li, D. Hu, C. Lal*, M. Conti, and Z. Zhang, "Blockchain-Enabled Secure Energy Trading with Verifiable Fairness in Industrial Internet of Things," IEEE Transactions on Industrial Informatics (TII), 2020, 16 (10): 6564-6574.
- M. Li, Y. Chen, N. Kumar, C. Lal, M. Conti, and M. Alazab*, "Quantifying Location Privacy for Navigation Services in Sustainable Vehicular Networks," IEEE Transactions on Green Communications and Networking (TGCN), 2022, 6 (3): 1267-1275.
- Z. Xing, Z. Zhang*, Z. Zhang, Z. Li, Z. Li, M. Li*, J. Liu, Z. Zhang, Y. Zhao, Q. Sun, L. Zhu, and G. Russello, "Zero-Knowledge Proof-based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey," IEEE Communications Surveys and Tutorials (COMST), 2025, Accepted.
- S. Khan, F. Luo, Z. Zhang, F. Ullah, F. Amin, S. F. Qadri, M. B. Bin Heyat, R. Ruby, L. Wang, S. Ullah, M. Li, V. C. M. Leung, and K. Wu, "A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies," IEEE Communications Surveys and Tutorials (COMST), 2023, 25 (4): 2529-2568.
- M. Li, L. Zhu*, and X. Lin, "Efficient and Privacy-preserving Carpooling using Blockchain-assisted Vehicular Fog Computing," IEEE Internet of Things Journal (IoTJ), 2019, 6 (3): 4573-4584.
- M. Li, C. Lal, M. Conti, and D. Hu*, "LEChain: A Blockchain-based Lawful Evidence Management Scheme for Digital Forensics," Future Generation Computer Systems (FGCS), 2021, 115: 405-420.
- M. Li, L. Zhu, Z. Zhang*, and R. Xu, "Achieving Differential Privacy of Trajectory Data Publishing in Participatory Sensing," Information Sciences, 2017, 400-401: 1-13.
- M. Li, L. Zhu*, Z. Zhang, C. Lal, M. Conti, and F. Martinelli, "Privacy for 5G-Supported Vehicular Networks," IEEE Open Journal of Communications Society (OJ-COMS), 2021, 2: 1935-1956.
- M. Li, K. Zhang, J. Liu, H. Gong, and Z. Zhang*, "Blockchain-based Anomaly Detection of Electricity Consumption in Smart Grids," Pattern Recognition Letters, 2020, 138: 476-482.
- D. Hu, Y. Li, L. Pan, M. Li*, and S. Zheng, "A Blockchain-Based Trading System for Big Data,” Computer Networks, 2021, 191 (107994): 1-13.
- L. Zhu, M. Li, Z. Zhang*, "Secure Fog-assisted Crowdsensing with Collusion Resistance: From Data Reporting to Data Requesting," IEEE Internet of Things Journal (IoTJ), 2019, 6 (3): 5473-5484.
- L. Zhu, M. Li, Z. Zhang*, C. Xu, R. Zhang, X. Du, and N. Guizani, "Privacy-preserving Authentication and Data Aggregation for Fog-based Smart Grid," IEEE Communications Magazine, 2019, 57 (6): 80-85.
- L. Zhu, M. Li, Z. Zhang*, X. Du, and M. Guizani, "Big Data Mining of Users' Energy Consumption Pattern in Wireless Smart Grid," IEEE Wireless Communications, 2018, 25 (1): 84-89.
- M. Wang, J. Huang*, X. Zhang, Z. Liu, M. Li, P. Zhao, H. Yan, X. Sun, and M. Dong, "Target-Oriented WiFi Sensing for Respiratory Healthcare: from Indiscriminate Perception to In-Area Sensing," IEEE Network, 2025, 39 (5): 201-208.
- M. He, J. Ni, M. Li, A. Brighente, and M. Conti, "Enabling Low Sidelobe Secret Multicast Transmission for mmWave Communication: An Integrated Oblique Projection Approach," IEEE Transactions on Wireless Communications (TWC), 2024, 23 (1): 276-289.
- C. Gu, X. Cui, M. Li, and D. Hu, "An Efficient and Privacy-preserving Information Reporting Framework for Traffic Monitoring in Vehicular Networks," IEEE Transactions on Vehicular Technology (TVT), 2023, 72 (6): 7900-7913.
- J. He, Z. Zhang*, L. Ma, Z. Zhang, M. Li, B. Khoussainov, J. Liu, and L. Zhu*, "InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring through Self-Attention Mechanisms," IEEE Transactions on Smart Grid (TSG), 2023, 14 (5): 3828-3840.
- X. Wang, Y. Dong, M. Li, and Y. Liu*, "Lightweight and Dropout Toleration Aggregation for Privacy Crowdsourcing Federated Learning," IEEE Transactions on Industrial Informatics (TII), 2025, 21 (11): 8662-8672.
- X. Yuan, J. Sun, Z. Chen, M. Li*, C. Zhang∗, Z. Zhang, L. Zhu, "IAAE-Stega: Genericblockchain-based Steganography Framework via Invertible Adversarial Autoencoder," IEEE Transactions on Network Science and Engineering (TNSE), 2025, 12 (6): 4906-4921.
- Y. Zhang, L. Wang*, M. Li, K. Gai, and J. Wang, "'Malicious or Benign?': Enhancing the Contribution of Model Updates in Byzantine-Robust Heterogeneous Federated Learning," IEEE Transactions on Network Science and Engineering (TNSE), 2026.
- Y. Wu, J. Sun, Z. Li, C. Wu, Z. Guo*, Y. Ding*, J. Jin, J. An, C. Zhang, Z. Zhang, M. Li, and L. Zhu, "Fine-grained Detection for Bitcoin Mixing Services using Heterogeneous Representation Learning," IEEE Transactions on Network Science and Engineering (TNSE), 2026, Accepted.
- H. Yin Z. Zhang*, L. Zhu*, M. Li, X. Du, M. Guizani, and B. Khoussainov, "A Blockchain-Based Storage System With Financial Incentives for Load-balancing," IEEE Transactions on Network Science and Engineering (TNSE), 2021, 8 (2): 1178-1188.
- L. Chen, N. Xia*, M. Li*, and X. Liu, "DACL: Double-Anchor Contrastive Learning for IoT Network Intrusion Detection," IEEE Internet of Things Journal (IoTJ), 2026, Accepted.
- L. Chen, N. Xia*, M. Li*, Y. Wang, J. Wan, S. Wei, and X Liu, "Sniffer Channel Selection based on Value Decomposition Networks in CRNs," IEEE Internet of Things Journal (IoTJ), 2025, 12 (20): 42184-42197.
- Y. Liu, L. Zhu, J. Sun, Z. Chen, F. Gao, X. Yuan, Z. Zhang*, and M. Li*, "Covert transmission via Steganography and Smart Contract," IEEE Internet of Things Journal (IoTJ), 2025, 12 (5): 4992-5002.
- X. Lu, Z. Zhang*, T. Ma, M. Li*, T. Zhou, W. Shen, and L. Zhu, "Trusted Execution Environment with Rollback Protection for Smart Contract-Based IoT Data Trading," IEEE Internet of Things Journal (IoTJ), 2024, 11 (20): 32901-32909.
- X. Lu, Z. Zhang*, T. Zhou, T. Niu, L. Zhu, M. Li*, Z. Guan, and T. Ma, "Decentralized Fair IoT Data Trading Via Searchable Proxy Re-Encryption," IEEE Internet of Things Journal (IoTJ), 2024, 11 (11): 19485-19499.
- Y. Xue, Q. Jiang, M. Li, M. Xu, D. Ma, and J. Ma, "PQ3FAKE: Post-Quantum Three-Factor Authentication Against Server Compromise in Mobile Cloud Computing," IEEE Internet of Things Journal (IoTJ), 2025, 12 (23): 50199-50212.
- H. Yan, X. Zhang*, J. Huang, Y. Feng, M. Li, A. Wang, W. Ou, H. Wang, and Z. Liu*, "Wi-SFDAGR: WiFi-based Cross-Domain Gesture Recognition via Source-free Domain Adaptation," IEEE Internet of Things Journal (IoTJ), 2025, 12 (13):24159-24173.
- P. Zhao, J. Huang*, X. Zhang*, Z. Liu, H. Yan, M. Wang, G. Zhuang, Y. Guo, X. Sun, M. Li, "Wi-Pulmo: Commodity WiFi Can Capture Your Pulmonary Function Without Mouth Clinging," IEEE Internet of Things Journal (IoTJ), 2025, 12 (1): 854-868.
- Y. Xia, Y. Liu*, S. Dong, M. Li, and C. Guo, "SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning," IEEE Internet of Things Journal (IoTJ), 2024, 11 (10): 18351-18365.
- F. Li, T. Chen*, M. Li, and C. Lin, "Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State," IEEE Internet of Things Journal (IoTJ), 2024, 11 (8): 14127-14135.
- H. Yin, Z. Zhang*, J. He, L. Ma, and L. Zhu*, M. Li, B. Khoussainov, "Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain," IEEE Internet of Things Journal (IoTJ), 2022, 9 (10): 7866-7875.
- M. Wang, Z. Zhang*, J. He, F. Gao, M. Li, S. Xu, and L. Zhu, "Practical Blockchain-based Steganographic Communication via Adversarial AI: A Case Study in Bitcoin," The Computer Journal, 2022, 65 (11): 2926-2938.
5.3 Selected Publications on Conferences
- X. Zhang, J. Zhang, H. Yan, J. Huang, Z. Ma, B. Liu*, M. Li, K. Chen, Q. Guo, T. Zhang, and Z. Liu, "DiffLoc: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction", Proc. 34th USENIX Security Symposium (USENIX Security), August 2025: 6639-6658. (CCF A)
- X. Zhang, J. Zhang, Z. Ma, J. Huang, M. Li, H. Yan, P. Zhao, Z. Zhang, B. Liu, Q. Guo, T. Zhang, and N. Yu, "CAMLOPA: A Hidden Wireless Camera Localization Framework via Signal Propagation Path Analysis," Proc. 46th IEEE Symposium on Security and Privacy (S&P), May 2025: 3653-3671. (CCF A)
- X. Zhang, Z. Ma, J. Huang, H. Yan, M. Li, Z. Liu, and B. Liu, "Hidden WiFi Camera Localization via Signal Propagation Path Analysis,” Demos of the 30th Annual International Conference on Mobile Computing and Networking (MobiCom), 2025, Hong Kong, China. (CCF A)
- L. Zhu and M. Li, "DoS-Resilient Secure Data Aggregation in Wireless Sensor Networks," Posters of the 17th ACM Annual International Conference on Mobile Computing and Networking (MobiCom), September 2011: 1-2, Las Vegas, USA. (CCF A)
- F. Yan, K. Jiang, Y. Qiao*, M. Li*, Y. Li, P. Yu, and C. Feng, "ARI-LLM: Autoregressive Imputation for Network Traffic Matrix via Large Language Models," Proc. 45th IEEE Conference on Computer Communications (INFOCOM), 2026, Accepted. (CCF A)
- X. Yuan, Y. Qiao, Z. Wang, M. Li, and W. Chen, "LMTE: Putting the 'Reasoning' into WAN Traffic Engineering with Language Models," Proc. 45th IEEE Conference on Computer Communications (INFOCOM), 2026, Accepted. (CCF A)
- T. Hu, G. Ye, Z. Tang, S. Tan, H. Wang, M. Li, and Z. Wang, "UPBEAT: Test Input Checks of Q# Quantum Libraries," Proc. 33rd International Symposium on Software Testing and Analysis (ISSTA), 2024, Accepted, Vienna, Austria. (CCF A)
- M. Li, Y. Hu, Y. Qiao*, Z. Zhang, L. Zhu, and M. Conti, "Accurate, Secure, and Efficient Semi-Constrained Navigation with Multiple Spatial Restrictions," Proc. 56th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2026, Charlotte, USA.
- Z. Hu, Y. Qiao*, Z. Cai, R. Hu, X. Yuan, and M. Li, "Dual Trajectory Revised Diffusion Model for Time Series Forecasting," Proc. 50th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), April 2025, Hyderabad, India.
- M. Li, Z. Li, Y. Chen, Y. Qiao*, and M. Conti, "Artemis: Decentralized, Secure, and Efficient Safety Monitoring with Dynamic Trajectories," Proc. 27th International Conference on Information and Communications Security (ICICS 2025), October 2025:387-404, Nanjing, China. (Best Paper Award)
- M. Li, J. Gao, Z. Zhang*, M. Conti, and M. Alazab, "Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets," Proc. 30th IEEE International Conferences on Communications (ICC), June 2024: 1376-1381, Denver, USA. (Best Paper Award)
- Z. Zhang, M. Li, L. Zhu*, and X. Li, "SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning," Proc. 3rd International Conference on Smart Computing and Communication (SmartCom), December 2018: 1-10, Tokyo, Japan. (Best Paper Award)
- M. Li, H. Ding, Q. Wang, Z. Zhang*, and M. Conti, "Threshold Signatures with Private Accountability via Secretly Designated Witnesses", Proc. 29th Australasian Conference on Information Security and Privacy (ACISP), 2024: 389-407, Sydney, Australia.
- M. Li, L. Zhu*, and X. Lin, "CoRide: A Privacy-preserving Collaborative-Ride Hailing Service using Blockchain-assisted Vehicular Fog Computing," Proc. 15th International Conference on Security and Privacy in Communication Systems (SecureComm), November 2019: 408-422, Orlando, USA.
- M. Li*, M. Zhang, J. Gao, C. Lal, M. Conti, and M. Alazab, "Repetitive, Oblivious, and Unlinkable SkNN over Encrypted-and-Updated Data on Cloud", Proc. 24th International Conference on Information and Communications Security (ICICS), September 2022, Canterbury, UK.
- Y. Chen, M. Li*, S. Zheng*, D. Hu, C. Lal, and M Conti, "One-Time, Oblivious, and Unlinkable Query Processing over Encrypted Data On Cloud," Proc. 22nd International Conference on Information and Communication Security (ICICS), August 2020: 350-365, Copenhagen, Denmark.
- M. Li, J. Gao, Z. Zhang*, C. Fu, C. Lal, and M. Conti, "Graph Encryption for Shortest Path Queries With k Unsorted Nodes," Proc. 21st IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), October 2022: 89-96, Wuhan, China.
- M. Li, J. Gao, Y. Chen, J. Zhao, and M. Alazab*, "Privacy-preserving Ride-Hailing with Verifiable Order-Linking in Vehicular Networks," Proc. 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2020: 599-606, Guangzhou, China.
- K. Jiang, F. Yan, Y. Qiao*, M. Li*, Y. Li, and M. Conti, "Network Traffic Matrix Imputation via Large Language Models," Proc. 30th IEEE Symposium on Computers and Communications (ISCC), July 2025: 1-6, Bologna, Italy.
- M. Li, F. Wu, G. Chen, L. Zhu, and Z. Zhang*, "How to Protect Query and Report Privacy without Sacrificing Service Quality in Participatory Sensing," Proc. 34th IEEE International Performance Computing and Communications Conference (IPCCC), December 2015: 1-7, Nanjing, China.
- L. Zhu and M. Li, "An Energy Efficient and Integrity-Preserving Aggregation Protocol in Wireless Sensor Networks," Proc. 30th IEEE International Performance Computing and Communications Conference (IPCCC), December 2011: 1-6, Orlando, USA.
- Y. Qiao, J. Song, J. Dong, A. Zhang, Z. Hu, and M. Li∗, "C2FFormer: Coarse-to-Fine Time Series Imputation via Autoregressive Transformer," Proc. 30th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), June 2026: , Hong Kong, China. (CCF C, EI)
- X. Li, R. Tang, H. Ren*, and M. Li, "PPNA: Enabling Privacy-Preserving and Efficient Social Network Alignment," Proc. 26th IEEE Global Communications Conference (Globecom), December 2025, Accepted, Taipei, China. (CCF C, EI)
- X. Yu, Y. Qiao*, and M. Li*, "ST-Net: Dual-Branch Encoding with Seasonal-Trend Decomposition for Time Series Forecasting," Proc. 21st International Conference on Intelligent Computing (ICIC), July 2025, Ningbo, China.
- S. Zheng, L. Pan, D. Hu*, M. Li, and Y. Fan, "A Blockchain-Based Trading Platform for Big Data," Proc. 8th International Workshop on Security and Privacy in Big Data (INFOCOM WKSHPS BigSecurity), July 2020: 991-996, Toronto, Canada.
- Y. Chen, M. Li*, S. Zheng, C. Lal, and M. Conti, "Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services," Proc. 17th International Workshop on Security and Trust Management (STM) (Co-located with ESORICS 2021), October 2021: 1-18, Darmstadt, Germany.
- P. Su, N. Sun*, L. Zhu, Y. Li, R. Bi, M. Li, and Z. Zhang, "A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System," Proc. 5th International Workshop on Security in Cloud Computing (SCC) (Co-located with ASIACCS), April 2017: 1-8, Abu Dhabi, UAE.
- W. Huang, Y. Li, C. Kai, S. He, and M. Li, "Fresnel Zones Modeling and Analysis of Motion Detection for Multi-Antenna ISAC Systems," Proc. 16th International Conference on Wireless Communications and Signal Processing (WCSP), October 2024, Hefei, China.
6. Invited Presentations
- M. Li, "Intelligent Attack & Defense and Privacy Preservation in IoV", CNCC 2025, Technology Forum on Intelligent Network Security Attack and Defense Application Technologies, 2025.10.25.
- M. Li, "Intelligent Attack & Defense and Privacy Preservation in IoV", CCF China Service 2025, Young Scholars Forum, 2025.8.19.
- M. Li, "Security and Privacy in Vehicular Networks: Drawing Inspiration from Life", CCF Hefei, 2024.12.11.
- M. Li, "Decentralized and Secure Vehicular Digital Forensics and Tracing", CCF YOCSEF-Qingdao, 2023.6.17.
- M. Li, "Security and Privacy in Vehicular Networks: Drawing Inspiration from Life", CCF YOCSEF-Hefei, 2023.4.13.
- M. Li, "Blockchain: Powerful Boost to Privacy Preservation in Vehicular Networks", CCF YOCSEF-Qingdao, 2022.4.9.
- M. Li, "Security and Privacy in Vehicular Digital Forensics", International Conference on Forensic Science and Research, 2021.11.15, https://www.pagesconferences.com/forensic-science.
7. Academic Memberships and Positions
Memberships
- IEEE Senior Member (2022.8.16)
- IEEE Computer Society (CS) Member
- IEEE Communications Society (ComSoc) Member
- IEEE Signal Processing Society (SPS) Member
- IEEE SPS Information Forensics and Security Technical Committee (IFSTC) Member
- IEEE ComSoc Technical Community on Security and Privacy (TCSP) Member
- IEEE Computer Society Technical Community on Dependable Computing and Fault Tolerance (TCFT) Member
- IEEE ComSoc Technical Community on Cloud Computing Member(TCCLD) Member
- IEEE ComSoc Technical Community on Services Computing (TCSVC) Member
- IEEE Vehicular Technology Society Technical Community on Connected Vehicles (TCCV) Member
- ACM Member (2021.2)
Senior Area Editor
Associate Editor
Guest Editor
Conference Steering Committee Member
- The 16th IEEE International Conference on Internet of Things (iThings 2023) Workshop on "Secure and Robust Distributed Machine Learning for Artificial Intelligence of Things"
Conference Co-Chair
- The 18th EAI International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies (EAI TRIDENTCOM 2023)
Conference Co-Organizing Chair
- The 24th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2024) Workshop on Distributed Machine Learning Security (DMLS 2024)
Conference Area Chair
- IEEE International Workshop on Information Forensics and Security (WIFS) 2026
Conference Track Chair
- The 51th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2026), Applied Cryptography
Conference Session Chair
- The 25th International Conference on Information and Communications Security (ICICS 2023), Session 3: Blockchain and Cryptocurrencies
- The 23rd International Conference on Information and Communications Security (ICICS 2021), Parallel Session B: Post-Quantum Cryptography
- The 22nd International Conference on Information and Communications Security (ICICS 2020), Crypto IV
Conference Co-Organizer
- The 1st Conference on China Multimedia Forensics and Security (CHINAMFS) 2020, Hefei, China
- The 2nd International Workshop on Mobile Communications and Networking (WMCN) 2017, Waterloo, Canada
- The 13th International Conference on Mobile Ad-hoc and Sensor Networks (MSN) 2017, Beijing, China
- The 3rd International Conference on Trusted Systems (INTRUST) 2011, Beijing, China
Reviewer for Transactions, Journals, Magazines
- IEEE Transactions on Information Forensics and Security (T-IFS)
- IEEE Transactions on Dependable and Secure Computing (TDSC)
- IEEE/ACM Transactions on Networking (ToN)
- IEEE Transactions on Mobile Computing (TMC)
- IEEE Journal on Selected Areas in Communications (JSAC)
- IEEE Transactions on Computers (TC)
- IEEE Transactions on Services Computing (TSC)
- ACM Transactions on Privacy and Security (TOPS)
- IEEE Transactions on Multimedia (TMM)
- IEEE Transactions on Intelligent Transportation Systems (TITS)
- IEEE Transactions on Industrial Informatics (TII)
- IEEE Transactions on Cognitive Communications and Networking (TCCN)
- IEEE Transactions on Vehicular Technology (TVT)
- IEEE Transactions on Cloud Computing (TCC)
- IEEE Transactions on Network and Service Management (TNSM)
- IEEE Transactions on Network Science and Engineering (TNSE)
- IEEE Transactions on Computational Social Systems (TCSS)
- IEEE Transactions on Big Data (TBD)
- IEEE Communications Surveys & Tutorials (COMST)
- IEEE Wireless Communications Magazine
- IEEE Network
- IEEE Vehicular Technology Magazine
- IEEE Internet of Things Journal (IoTJ)
- ACM Computing Surveys (CUSR)
Reviewer for Conferences
- The 34th International Conference on Computer Communications and Networks (ICCCN 2025)
- The 27th International Conference on Information and Communications Security (ICICS 2025)
- The 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)
- The 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2021)
- The 25th IEEE Symposium on Computers and Communications (ISCC 2020)
- The 37th IEEE Global Communications Conference (Globecom 2018)
- The 37th IEEE International Performance Computing and Communications Conference (IPCCC 2018)
- The 20th International Conference on Information and Communications Security (ICICS 2018)
Prizes and Awards
- 2021-2024, Stanford/Elsevier's Top 2% Scientist
- 2026.01, Distinguished Reviewer Board (DRB) Member of ACM TOSN
- 2025.12, IEEE Computer Society Computing's Top 30 Early Career Professionals for 2025
- 2025.08, CCF TCAPP Youth Science and Technology Award
- 2025.07, IEEE TCSVC Rising Star Award
- 2024.12, IEEE TNSE Excellent Reviewer
- 2024.09, IEEE-CCF Excellent Paper in the Cloud Computing
- 2024.09, IEEE HITC Award for Excellence in Hyper-Intelligence (Early Career Researcher)
- 2024.07, Ucom 2024 Young Scientis Award
- 2023.01, Anhui Computer Federation Outstanding Young Scientist
- 2021.10, ACM China Council (Hefei Chapter) Rising Star Award