Xiang-Yang Li, Ph.D. (CS @ UIUC)
Professor
Department of Computer Science,
Illinois Institute of Technology
10, West 31st Street, Chicago, IL, 60616
[Bio. html] [CV. pdf] [Contact. html, txt]
General Education Talks
3. You
and Your Research, Department of Computer Science, University of Science and
Technology, (UST, HeFei), March 13, 2014,
4. You
and Your Research, Department of Computer Science, HIT (Harbin), Jan 13, 2014
5. You
and Your Research, Network research group, CS Department, Tsinghua University,
Jan 8, 2014
6. You
and Your Research, International Conference for Internet of Things, WuXi
Research Center of Internet of Things, Dec 21, 2013
7. You
and Your Research, Department of Computer Science, Tsinghua University, Dec 14,
2013,
8. From
student to researcher and more, WenZhou University, 2009/06/15.
9. From
student to researcher and more, ZheJiang Forest University, 2009/05/20.
10.
How To
Do Good Research, HangZhou DianZi University, Janauary 8, 2009.
11.
From student to researcher and
more, Dalian University of Technology, June 26, 2008.
12.
From student to researcher
and more, Microsoft Research Asia, 2007/10/26.
Conference Keynote Talks
1.
KEYNOTE: Privacy Preserving
Computation in Mobile, Crowd-sourcing, and Computing,
13th IEEE International Conference on Trust, Security and Privacy in Computing
and Communications (IEEE TrustCom-14), Beijing, September 26, 2014.
2.
KEYNOTE: Large Scale Wireless
Network Systems: Theory, Experience, and Lessons,
the 3rd International Symposium on Networked Embedded System for Internet of
Things (http://www.u-aizu.ac.jp/~sguo/nest2014/), Aizuwakamatsu, Japan on Sep.
23-25, 2014. The symposium is a part of MCSoC (http://www.mcsoc-forum.org/).
3.
KEYNOTE: Large Scale Wireless
Network Systems: Experience, Lessons, and Theories, WuXi Research Center of
Internet of Things, April 9th, 2014
4.
Invited talk, Push the Limit
of Wireless Network Capacity: A Tale of Cognitive and Coexistence, ACM MobiCom
workshop CRAB, Oct 4, 2013.
5.
KEYNOTE for ACM China ShangHai
Chapter, Privacy Preserving Computation in Mobile, Crowd-sourcing, and
Computing, ShangHai, China, December 21, 2012.
6.
KEYNOTE: Privacy Preserving
Computation in Mobile, Crowd-sourcing, and Computing, 2012 Advanced Symposium
of IOT and Big Data, ChenDu, China, December 16, 2012.
7.
Keynote: Some Research Issues
in Wireless Networking, Second China Wireless Sensor Networking Conference, and
First China-Korea Wireless Sensor Networking Forum, Beijing, (China CCF
Technical Committee on Sensor Network), July 10, 2008.
8.
KEYNOTE: Multicast Capacity
for Large Scale Wireless Ad Hoc Networks Key-Note Address, First National
Conference of China on Sensor Network (CWSN), August, 31, 2007, China, Harbin.
Tutorial Talks or Meeting Talks
1.
TUTORIAL: Participatory Wireless
Networking, Panlong Yang (Institute of Communication Engineering, PLAUST, P.R.
China); Xiang-Yang Li (Illinois Institute of Technology, USA), June 10, 2014.
ICC 2014
2.
PI-Meeting: EARS: Providing
Predictable Service and Spectrum Access With Realtime
Decision in Cognitive Multihop Wireless Networks, PI meeting, Oct 6, 2013.
3.
TUTORIAL: Algorithm and Graph
Issues in Wireless Networks, Tutorial, ACM MobiHoc, May 29th, 2005
Colloquium Talks
1. Real-Time
Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, CS
Department, UT Dallas, November 7,
2014
2. Real-Time
Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, ECE
Department, UIUC, October 23, 2014
3. Real-Time
Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Rutgers, September 17, 2014
4. Real-Time
Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, School of
Computer Science, TuZhou
College, June 26, 2014
5. Real-Time
Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Bejing
Institute of Technology, June 20, 2014
6. Privacy
Preserving Computation in Mobile, Crowd-sourcing, and Computing, Department of
Computer Science, Nanjing University of Information Science and Technology,
June 17, 2014
7. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of
Computer Science, Northeastern University, China, April 14, 2014.
8. Privacy
Preserving Computation in Mobile, Crowd-sourcing, and Computing, Department of
Computer Science, Nanjing University, March 19, 2014
9. Large
Scale Wireless Network Systems: Experience, Lessons, and Theories, AnHui University, March 13, 2014.
10. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, Purdue
Calumet, Nov 14, 2013
11. Privacy
Preserving Computation in Mobile, Crowd-sourcing, and Computing. Bejing
Institute of Technology, July 3, 2013, The Keynote Series for 21st Century
Research Frontier.
12. Privacy
Preserving Computation in Mobile, Crowd-sourcing, and Computing, Dalian
University of Technology, Dalian, May 17, 2013
13. Privacy
Preserving Computation in Mobile, Crowd-sourcing, and Computing, Shanghai
University of Electric Power, ShangHai, May 14, 2013
14. Smoothing
the Energy Consumption: Peak Demand Reduction in Smart Grid, Shanghai
University of Electric Power, ShangHai, May 14, 2013
15. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of
CS, SIS Seminar, University of North Carolina at Charlotte, February 8, 2013.
16. Privacy
Preserving Computation in Mobile Crowd-sourcing and Computing, Tsinghua
National Lab on Information and Technology, 2012/12/22.
17. Privacy
Preserving Computation in Mobile Crowd-sourcing and Computing, Xi’An
JiaoTong University, 2012/12/17
18. Privacy
Preserving Computation in Mobile Crowd-sourcing and Computing, ShangHai
JiaoTong University, 2012/12/7
19. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, University of
Science and Technology, Anhui, China, Oct 30, 2012. talk news
20. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of
Computer Science, August 15th, 2012, Simon
Fraser University.
21. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of
ECE, Clemson University, February 7,
2012.
22. Large
Scale Wireless Network Systems: Theory, Experience, and Lessons, CSE
Department, University of Notre Dame,
February 2, 2012.
23. Efficient
Spectrum Allocation and Auction for Wireless Networks, University of Iowa, March 30, 2009.
24. Asymptotic
Capacity of Large Scale Wireless Networks, University of Electronic Science and
Technology of China (formerly Chengdu Institute of Radio Engineering) , January 10, 2009.
25. Multicast
Capacity for Large Scale Wireless Ad Hoc Networks Computer Science Department, HKUST. HongKong, Oct. 29, 2007.
26. How
Much Is It Worth? Computer Science Department, NanJing
University. China, Sept. 25, 2007.
27. Well-Shaped
Delaunay Mesh Generation, Invited talk, Computer Science Department, University of Illinois at Chicago, USA.
September 26th, 2005.
28. Wireless
Ad hoc/Sensor Networks: Energy Efficiency and Cooperativeness, CS department,
IIT, Sept 19th, 2005.
29. Strategyproof
Network Protocol Design, Invited talk at Computer Science Department, Kent State University, USA. Feb 18th,
2005.
30. Price
of Anarchy and Strategyproof Network Protocols, Invited talk at Mathmatics
Department, BeiJing University of Science of Technology, China. January 5th,
2005.
31. Truthful
Multicast in Selfish Wireless Ad Hoc Networks, Department of Computer Science, HongKong Baptist University, March,
2004.
32. Strategyproof
Routing in Selfish Wireless Networks, Invited talk at IIMAS-UNAM, Mexico. May
11th 2004.
33. Wireless
Ad Hoc Networks: a computational Geometric Approach, Invited talk at
IIMAS-UNAM, Mexico. May 13th, 2004.
34. Price
of Anarchy and Strategyproof Network Protocols, Invited talk at Computer
Science Department, HongKong City
University, HongKong. Aug 10th, 2004.
35. Strategyproof
Network Protocol Design, Invited talk at Computer Science Department of NanJing
University of Aeronautics and Astronautics (NUAA), China. Aug 25th, 2004.
36. Price
of Anarchy and Strategyproof Network Protocols, Invited talk at Computer
Science Department, Wayne State University,
USA. Sept 14th, 2004.
37. Price
of Anarchy and Strategyproof Network Protocols, Invited talk at Computer
Science Department of TianJing University, China. December 20th, 2004.
38. Application
of Computational Geometry in Wireless Networks, Invited talk at Computer
Science Department of TianJin University, China. December 27th, 2004.
39. Communications
in Selfish Wireless Ad Hoc Networks, Department of Computer Science, Tsinghua University, December, 2003.
40. Communications
in Selfish Wireless Ad Hoc Networks Department of Computer Science, TianJin
University, December, 2003.
41. Computational
Geometry and Wireless Ad Hoc Networks, Department of Computer Science, TianJin
University, December, 2003.
42. Geometric
and Game Theoretical Approaches for Wireless Networks Department of Computer
Science, University of Illinois at
Urbana-Champaign, October, 2003.
43. Computational
Geometry and Wireless Ad Hoc Networks Computer Science Department, Purdue University. Indiana, Nov. 15-16,
2001.