1. Taeho Jung, Xiang-Yang Li, Lan Zhang, He Huang
    Efficient, Verifiable and Privacy-Preserving Combinatorial Auction Design, arXiv:1308.6202
  2. Taeho Jung, Xiang-Yang Li
    Infinite Choices of Data Aggregations with Linear Number of Keys, arXiv:1308.6198
  3. He Huang, Xiang-Yang Li, Yu-e Sun, Hongli Xu, Liusheng Huang
    PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms, arXiv:1307.7792
  4. Taeho Jung, Xiang-Yang Li, Lan Zhang
    A General Framework for Privacy-Preserving Distributed Greedy Algorithm, arXiv:1307.2294
  5. Taeho Jung*, Xiang-Yang Li, Meng Wan
    Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel,
    IEEE Transactions on Dependable and Secure Computing (TDSC), 2014, Feb. Here is a revised version that address a small issue in the previous version.
  6. Qian Wang, Ping Xu*, Kui Ren, Xiang-Yang Li
    Towards Optimal Adaptive UFH-based Anti-jamming Wireless Communication
    IEEE JSAC, June, 2011.
  7. Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, and Xiangke Liao
    Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks,
    IEEE/ACM Transactions on Networking, 2011, March.
  8. Xiang-Yang Li, Shang-Hua Teng
    Practical Human-Machine Identification over Insecure Channels,
    Journal of Combinatorial Optimization (Official site)
    Kluwer Publications, Vol.3 Issue 4, 1999.
  9. Cheng Bo, Guobin Shen, Jie Liu, Xiang-Yang Li, YongGuang Zhang, Feng Zhao
    Privacy.Tag: Privacy Concern Expressed and Respected
    ACM SenSys 2014.
  10. Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, ShaoJie Tang, Jizhong Zhao, Kun Zhao
    KEEP: Fast Secret Key Extraction Protocol for D2D Communication,
    IEEE IWQoS 2014, HongKong.
  11. Xi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, YunHao Li
    Privacy-preserving High-quality Map Generation with Participatory sensing,
  12. Jing Zhao*, Taeho Jung*, Yu Wang*, Xiang-Yang Li,
    Achieving Differential Privacy of Data Disclosure in the Smart Grid,
  13. Zhiping Jiang^, JiZhong Zhao, Xiang-Yang Li, JinLong Han, Wei Xi^
    Rejecting the Attack: Source Authentication for Wi-Fi Management Frames using CSI Information ,
  14. Lan Zhang^, Xiang-Yang Li, and YunHao Liu
    Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks,
    IEEE ICDCS 2013.
  15. Taeho Jung*, Xiang-Yang Li, and Zhiguo Wan
    Privacy Preserving Cloud Data Access With Multi-Authorities,
  16. Taeho Jung*, Xiang-Yang Li, and ShaoJie Tang
    Privacy-Preserving Data Aggregation without Secure Channel: Multivariate Polynomial Evaluation,
  17. Taeho Jung*, and Xiang-Yang Li
    Search Me If You Can: Privacy-preserving Location Query Service,
    IEEE INFOCOM 2013.
  18. Lan Zhang^, Xiang-Yang Li, and YunHao Liu
    Verifiable Private Multi-party Computation: Ranging and Ranking,
    IEEE INFOCOM 2013 mini conference.
  19. Haitao Zhang**, ShaoJie Tang*, Xiang-Yang Li, and HuaDong Ma
    Tracking and Identifying Burglar using Collaborative Sensor-Camera Networks
    IEEE INFOCOM 2012 mini conference.
  20. ShaoJie Tang*, Xiang-Yang Li, Haitao Zhang**, JianKang Han, GuoJun Dai, XingFa Shen
    TelosCAM: Identifying Burglar Through Networked Sensor-Camera Mates with Privacy Protection
    IEEE RTSS 2011
  21. DeZun Dong^, Mo Li, YunHao Liu, and Xiang-Yang Li and JiZhong Zhao
    Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
    IEEE ICNP 2009. (36 papers out of 197 submissions)
  22. Xiang-Yang Li, Yu Wang* and Ophir Frieder
    Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks,
    ICCCN 2002, Miami, FL.