For wisdom will enter your heart, and knowledge will be pleasant to your soul.


Yingjiu (Joe) Li

Ripple Professor


Department of Computer Science


University of Oregon

Office:

256 Deschutes Hall

1477 E. 13th Ave.

Eugene, OR 97403-1202

Phone:

+1 541-346-4428

 

Email:

yingjiul(at)uoregon.edu


I graduated from George Mason University in 2003, and had been a faculty member at Singapore Management University from 2003 to 2019 (my previous webpage).

My research interests: Blockchain security and privacy, IoT Security and Privacy, Mobile and System Security, Applied Cryptography and Cloud Security, Data Applications Security and Privacy

Current bio and updated CV

My publications and citations on Google Scholar

My publications on DBLP


Recent publications

 

2024

 

  1. Sanidhay Arora, Yingjiu Li, Yebo Feng, Jiahua Xu: SecPLF: Secure Protocols for Loanable Funds against Oracle  Manipulation Attacks. The 19th ACM ASIA Conference on Computer and Communications Security (AsiaCCS), pages 1394-1405, Singapore, Jul 1 - 5, 2024.
  2. Yang Yang, Robert Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng: PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. The Network and Distributed System Security Symposium (NDSS), San Diego, USA, Feb 26 - March 1, 2024.
  3. Yingjiu Li, Binanda Sengupta, Yangguang Tian, Jiaming Yuan, Tsz Hon Yuen: Message Control for Blockchain Rewriting, IEEE Transactions on Dependable and Secure Computing (TDSC), 1-14, early access, 2024.
  4. Yangguang Tian, Bowen Liu, Yingjiu Li, Pawel Szalachowski, Jianying Zhou: Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting. IEEE Transactions on Information Forensics and Security (TIFS), 19: 1756-1766, 2024.
  5. Yuxian Li, Jian Weng, Junzuo Lai, Yingjiu Li, Jiahe Wu, Ming Li, Jianfei Sun, Pengfei Wu, Robert Deng: AuditPCH: Auditable Payment Channel Hub with Privacy Protection. Accepted by IEEE Transactions on Information Forensics and Security (TIFS), 2024.
  6. Sijiang Xie, Rui Shi , Yang Yang , Huiqin Xie , Yingjiu Li , Robert Deng: AccCred: Improved Accountable Anonymous Credentials with Dynamic Triple-Hiding Committees. IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  7. Nan Li, Yingjiu Li, Mark Manulis, Yangguang Tian, Guomin Yang: Practical and Secure Policy-based Chameleon Hash for Redactable Blockchains. Accepted by The Computer Journal, 2024.
  8. Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Hwee Hwa Pang, Robert H. Deng: AnoPas: Practical Anonymous Transit Pass from Group Signatures with Time-Bound Keys. Journal of Systems Architecture, 153: 103184, 2024.
  9. Yang Yang, Wenyi Xue, Jianfei Sun, Guomin Yang, Yingjiu Li, HweeHua Pang, Robert H. Deng: PkT-SIN: A Secure Communication Protocol for Space Information Networks with Periodic k-Time Anonymous Authentication. IEEE Transactions on Information Forensics and Security (TIFS), 19: 6097-6112, 2024.
  10. Yang Yang, Wenyi Xue, Yonghua Zhan, Minming Huang, Yingjiu Li, Robert Deng: AnoPay: Anonymous Payment for Vehicle Parking with Updatable Credential. IEEE Transactions on Dependable and Secure Computing (TDSC), 21(4): 1621-1638, 2024.
  11. Yangguang Tian, Yingjiu Li, Robert Deng, Guomin Yang, Nan Li: Policy-based Remote User Authentication from Multi-biometrics. The Computer Journal, 67(5): 1814-1825, 2024.
  12. Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert Deng: Double Issuer-Hiding Attribute-Based Credentials from Tag-Based Aggregatable Mercurial Signatures. IEEE Transactions on Dependable and Secure Computing (TDSC), 21(4): 2585-2602, 2024.

 

 

2023

  1. Nan Li, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen: A Practical Forward-Secure DualRing. The 22nd International Conference on Cryptology and Network Security (CANS), 516-537, Augusta, Georgia, USA, October 31 - November 2, 2023.
  2. Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert Deng: Double Issuer-Hiding Attribute-Based Credentials from Tag-Based Aggregatable Mercurial Signatures. Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
  3. Bowen Zhao, Xiaoguo Li, Ximeng Liu, Qingqi Pei, Yingjiu Li, Robert Deng: CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics. IEEE Transactions on Information Forensics and Security (TIFS), 18: 5416-5430, 2023.
  4. Yang Yang, Wenyi Xue, Yonghua Zhan, Minming Huang, Yingjiu Li, Robert Deng: AnoPay: Anonymous Payment for Vehicle Parking with Updatable Credential. Accepted by IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
  5. Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert Deng: PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. Journal of Parallel and Distributed Computing, 180: 104721, 2023.
  6. Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, Hwee Hwa Pang, Robert Deng: Threshold Attribute-based Credentials with Redactable Signature. IEEE Transactions on Services Computing (TSC), 16(5): 3751-3765, 2023.
  7. Wenyi Xue, Yang Yang, Yingjiu Li, Hwee Hwa Pang, Robert Deng. ACB-Vote: Efficient, Flexible, and Privacy-Preserving Blockchain-Based Score Voting with Anonymously Convertible Ballots. IEEE Transactions on Information Forensics and Security (TIFS), 18: 3720-3734, 2023.
  8. Bowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hwa Pang, Robert Deng: Identifiable, But Not Visible: A Privacy-Preserving Person Re-Identification Scheme. IEEE Transactions on Reliability (TRel), 72(4): 1295-1307, 2023.
  9. Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li: A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Transactions on Dependable and Secure Computing (TDSC), 20(6): 5214-5229, 2023
  10. Shengmin Xu, Xinyi Huang, Jiaming Yuan, Yingjiu Li, Robert Deng: Accountable and Fine-Grained Controllable Rewriting in Blockchains. IEEE Transactions on Information Forensics and Security (TIFS), 18: 101-116, 2023.
  11. Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng: A Secure EMR Sharing System with Tamper Resistance and Expressive Access Control. IEEE Transactions on Dependable and Secure Computing (TDSC), 20(1): 53-67, 2023.
  12. Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng: SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Transactions on Dependable and Secure Computing (TDSC), 18: 101-116, 2023.

 

2022

  1. Bowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hwa Pang, Robert Deng: FREED: An Efficient Privacy-Preserving Solution for Person Re-Identification. 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC), Edinburgh, UK, June 22 - 24, 2022. (Best Paper Award)
  2. Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert Deng: M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. The 17th International Conference on Information Security Practice and Experience (ISPEC), 606-623, Taipei, Taiwan, November 23 - 25, 2022
  3. Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Yingjiu Li, Bowen Zhao, Yang Yang, Ximeng Liu, Robert Deng: ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning. IEEE Transactions on Information Forensics and Security (TIFS), 17: 1639-1654, 2022.
  4. Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu: Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Transactions on Dependable and Secure Computing (TDSC), 19(6): 3759-3773, 2022.
  5. Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng: Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Transactions on Dependable and Secure Computing (TDSC), 19(2): 1064-1077, 2022.
  6. Jiayun Xu, Yingjiu Li, Robert H. Deng, Ke Xu: SDAC: A Slow-Aging Solution for Android Malware Detection Using Semantic Distance Based API Clustering. IEEE Transactions on Dependable and Secure Computing (TDSC), 19(2): 1149-1163, 2022.
  7. Yao Cheng, Chang Xu, Zhen Hai, Yingjiu Li: DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model. IEEE Transactions on Dependable and Secure Computing (TDSC), 19(1):77-90, 2022.
  8. Li Song, Qiongxiao Wang, Jingqiang Lin, Yingjiu Li, Shijie Jia: Approach then connect: A Physical Location-based Wi-Fi Password Dynamic Update Scheme. IEEE Wireless Communications and Networking Conference (WCNC), 1010-1015, Austin, TX, USA, April 10-13, 2022.
  9. Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert Deng, Zheng Yang: Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification. The Computer Journal (COMPJ), 5(10): 2570-2588, Oxford Academic, 2022.

 

2021

  1. Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng: LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. The ACM Conference on Computer and Communications Security (ACM CCS), 2307-2320, Seoul, South Korea, November 14-19, 2021.
  2. Jiayun Xu, Yingjiu Li, Robert Deng: Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. The Network and Distributed System Security Symposium (NDSS), February 21-24, 2021.
  3. Ximing Liu, Yingjiu Li, Robert H. Deng: UltraPIN: Inferring PIN Entries via Ultrasound. The ACM Asia Conference on Computer and Communications Security (ACM ASIACCS), 944-957, Hong Kong, June 7-11, 2021.
  4. Yan Li, Yao Cheng, Weizhi Meng, Yingjiu Li, Robert H. Deng: Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices. IEEE Transactions on Information Forensics and Security (TIFS), 16: 307-321, 2021.
  5. Yangguang Tian, Yingjiu Li, Robert Deng, Binanda Sengupta, Guomin Yang: Lattice-Based Remote User Authentication from Reusable Fuzzy Signature. Journal of Computer Security (JCS), 29(3): 273-298, IOS Press, 2021.

 

2020

  1. Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou: Policy-Based Chameleon Hash for Blockchain Rewriting with Black-Box Accountability. The 36th Annual Computer Security Applications Conference (ACSAC), 813-828, Austin, Texas, December 7-11, 2020.
  2. Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng: GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. The 36th Annual Computer Security Applications Conference (ACSAC), 582-596, Austin, Texas, December 7-11, 2020.
  3. Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert Deng: A New Tool for Editing Authenticated Data. IEEE Internet of Things (IoT) Journal, 7(6): 4997-5007, 2020.
  4. Binanda Sengupta, Yingjiu Li, Kai Bu, Robert Deng: Privacy-Preserving Network Path Validation. ACM Transactions on Internet Technology (TOIT), 20(1): 5:1-5:27, 2020.
  5. Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren: Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Computing Survey (CSUR) 53(5): 104:1-104:34, 2020.
  6. Shengmin Xu, Jiaming Yuan, Guowen Xu, Yingjiu Li, Ximeng Liu, Yinghui Zhang, Zuobin Ying: Efficient ciphertext-policy attribute-based encryption with blackbox traceability. Information Science, 538: 19-38, 2020.
  7. Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang: Unlinkable and Revocable Secret Handshake for IoT. The Computer Journal (COMPJ), 63(4): 536-548, Oxford University, 2020.
  8. Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang: A New Construction for Linkable Secret Handshake. The Computer Journal (COMPJ), 63(4): 536-548, Oxford Academic, 2020.
  9. Yang Yang, Ximeng Liu, Robert H. Deng, Yingjiu Li: Lightweight Sharable and Traceable Secure Mobile Health System. IEEE Transactions on Dependable and Secure Computing (TDSC), 17(1): 78-91, 2020.
  10. Yangguang Tian, Yingjiu Li, Robert Deng, Pengfei Wu, Nan Li, Anyi Liu: A New Framework for Privacy-Preserving Biometric-Based Remote User Authentication. Journal of Computer Security (JCS), 28(4): 469-498, 2020.
  11. Yangguang Tian, Yingjiu Li, Binanda Sengupta, Nan Li, Chunhua Su: Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theoretical Computer Science, 814: 223-233, 2020.

It's worth mentioning

 

1.     Best Paper Award (DSC 2022)

Bowen Zhao, Yingjiu Li, Ximeng Liu, Hwee Hwa Pang, Robert Deng: FREED: An Efficient Privacy-Preserving Solution for Person Re-Identification. 5th IEEE Conference on Dependable and Secure Computing (IEEE DSC), Edinburgh, UK, June 22 - 24, 2022.

 

2.     UBRI Educator Award (Ripple 2021)

Yingjiu Li received the 2021 UBRI Educator Award, Ripple's University Blockchain Research Initiative (UBRI), UBRI Connect 2021, October 11 - 12, 2021.

 

3.     Android Security Flaws Identified (Google 2016)

We discovered a series of Android framework vulnerabilities and attacks on Android 5.1.0 and 4.4.4 and reported to Google in November 2015. Google acknowledged our findings in its Android Security Acknowledgements - 2016 and in its Nexus Security Bulletin - March 2016. In particular, our finding on Information Disclosure Vulnerability in Telephony is given a common vulnerabilities and exposures (CVE) number CVE-2016-0831.

 

4.     Book Authored (Springer 2015)

Yingjiu Li, Qiang Yan, Robert H. Deng: Leakage Resilient Password Systems. 64 pages, ISBN 978-3-319-17502-7, Springer Briefs in Computer Science, Springer, April 2015. [buy this book at Springer]

https://images.springer.com/sgw/books/medium/9783319175027.jpg

 

5.     Book Authored (Morgan & Claypool 2013)

Yingjiu Li, Robert H. Deng, Elisa Bertino: RFID Security and Privacy. 158 pages, ISBN-13: 978-1627053259, Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, December 2013. [purchase hardcopy at Amazon] [purchase softcopy at M&C]

http://ecx.images-amazon.com/images/I/41ZqbVgr0dL.jpg

 

6.     iOS Security Flaws Identified (Apple 2013)

We identified seven attacks which can be performed by third-party applications on iOS 5 and iOS 6. We reported our findings to Apple's security team in October 2012. Three attacks, which include passcode cracking (CVE-2013-0957), interference with or control of telephony functionality (CVE-2013-5156) and sending tweets without the user's awareness and permission (CVE-2013-5157), were rectified by Apple in its release of iOS 7 in Sept 2013.

 

7.     Distinguished Paper Award (NDSS 2012).

Qiang Yan, Jin Han, Yingjiu Li, Robert Deng: On Limitations of Designing Usable Leakage-Resilient Password Systems: Attacks, Principles and Usability. 19th Network & Distributed System Security Symposium (NDSS), San Diego, California, USA, February 5-8, 2012.


Recent events and services:

 

1.     I serve on the editorial board for IEEE Transactions on Reliability (TRel), 2022-present.

2.     I serve on the editorial board for IEEE Transactions on Secure and Dependable Computing (TDSC), 2021-present.

3.     I served as the chair of Graduate Education Committee (GEC), Computer Science Department, University of Oregon, August 2022-June 2023.

4.     I served as the director of Center for Cyber Security and Privacy (CCSP), University of Oregon, January 2023-September 2023.

5.     I gave a keynote talk "Accountable Blockchain Rewriting" at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), Kolkata, India, December 2-4, 2021.

6.     I gave a keynote talk "Robust Android Malware Detection" at the 23rd International Conference on Information Security (ISC), 16-20 December 2020.

7.     I gave a spitfire talk "Blockchain Rewriting Made Fine-Grained and Accountable" at Ripple's University Blockchain Research Initiative (UBRI) Connect, October 11-13, 2020.


Recent conference program committees:

 

1.     ACM Symposium on Access Control Models and Technologies (SACMAT), 2024.

2.     IEEE Global Blockchain Conference (GBC), 2024.

3.     The 17th International Conference on Network and System Security (NSS), 2023.

4.     The Australasian Conference on Information Security and Privacy (ACISP), 2022 - 2024.

5.     The 5th International Conference on Science of Cyber Security (SciSec), 2023.

6.     The Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC), 2020 - 2022.

7.     The 17th International Conference on Information Security Practice and Experience (ISPEC), 2022.

8.     The 4th International Conference on Science of Cyber Security (SciSec), 2022.

9.     The 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2021, 2024.

10.  The IFIP TC-11 SEC International Information Security and Privacy Conference (IFIP SEC), 2020 - 2021.

11.  The 25th European Symposium on Research in Computer Security (ESORICS), 2020.

12.  The 18th International Conference on Applied Cryptography and Network Security (ACNS), 2020.

13.  The 16th International Conference on Information Security and Cryptology (Inscrypt), 2020.



Last updated: November 2024.