Xiang-Yang Li, Ph.D. (CS @ UIUC)

Professor
Department of Computer Science,
Illinois Institute of Technology
10, West 31st Street, Chicago, IL, 60616

[Bio. html] [CV. pdf] [Contact. html, txt]

General Education Talks

1.  You and Your Research, 2014中国未来网络暑期研讨班, 中国未来网络产业创新联盟, Nanjing, 2014/07/14,

2.  You and Your Research, 高端系列学术讲座, Nanjing University of Information Science and Technology, 2014/06/13,

3.  You and Your Research, Department of Computer Science, University of Science and Technology, (UST, HeFei), March 13, 2014,

4.  You and Your Research, Department of Computer Science, HIT (Harbin), Jan 13, 2014

5.  You and Your Research, Network research group, CS Department, Tsinghua University, Jan 8, 2014

6.  You and Your Research, International Conference for Internet of Things, WuXi Research Center of Internet of Things, Dec 21, 2013

7.  You and Your Research, Department of Computer Science, Tsinghua University, Dec 14, 2013,

8.  From student to researcher and more, WenZhou University, 2009/06/15.

9.  From student to researcher and more, ZheJiang Forest University, 2009/05/20.

10.                        How To Do Good Research, HangZhou DianZi University, Janauary 8, 2009.

11.                        From student to researcher and more, Dalian University of Technology, June 26, 2008.

12.                        From student to researcher and more, Microsoft Research Asia, 2007/10/26.

Conference Keynote Talks

1.     KEYNOTE: Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing,
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, September 26, 2014.

2.     KEYNOTE: Large Scale Wireless Network Systems: Theory, Experience, and Lessons,
the 3rd International Symposium on Networked Embedded System for Internet of Things (http://www.u-aizu.ac.jp/~sguo/nest2014/), Aizuwakamatsu, Japan on Sep. 23-25, 2014. The symposium is a part of MCSoC (http://www.mcsoc-forum.org/).

3.     KEYNOTE: Large Scale Wireless Network Systems: Experience, Lessons, and Theories, WuXi Research Center of Internet of Things, April 9th, 2014

4.     Invited talk, Push the Limit of Wireless Network Capacity: A Tale of Cognitive and Coexistence, ACM MobiCom workshop CRAB, Oct 4, 2013.

5.     KEYNOTE for ACM China ShangHai Chapter, Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, ShangHai, China, December 21, 2012.

6.     KEYNOTE: Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, 2012 Advanced Symposium of IOT and Big Data, ChenDu, China, December 16, 2012.

7.     Keynote: Some Research Issues in Wireless Networking, Second China Wireless Sensor Networking Conference, and First China-Korea Wireless Sensor Networking Forum, Beijing, (China CCF Technical Committee on Sensor Network), July 10, 2008.

8.     KEYNOTE: Multicast Capacity for Large Scale Wireless Ad Hoc Networks Key-Note Address, First National Conference of China on Sensor Network (CWSN), August, 31, 2007, China, Harbin.

Tutorial Talks or Meeting Talks

1.     TUTORIAL: Participatory Wireless Networking, Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China); Xiang-Yang Li (Illinois Institute of Technology, USA), June 10, 2014. ICC 2014

2.     PI-Meeting: EARS: Providing Predictable Service and Spectrum Access With Realtime Decision in Cognitive Multihop Wireless Networks, PI meeting, Oct 6, 2013.

3.     TUTORIAL: Algorithm and Graph Issues in Wireless Networks, Tutorial, ACM MobiHoc, May 29th, 2005

Colloquium Talks

1.  Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, CS Department, UT Dallas, November 7, 2014

2.  Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, ECE Department, UIUC, October 23, 2014

3.  Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Rutgers, September 17, 2014

4.  Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, School of Computer Science, TuZhou College, June 26, 2014

5.  Real-Time Tracking of Mobile RFID Tags to Millimeter-Level Accuracy Using COTS, Bejing Institute of Technology, June 20, 2014

6.  Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Department of Computer Science, Nanjing University of Information Science and Technology, June 17, 2014

7.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of Computer Science, Northeastern University, China, April 14, 2014.

8.  Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Department of Computer Science, Nanjing University, March 19, 2014

9.  Large Scale Wireless Network Systems: Experience, Lessons, and Theories, AnHui University, March 13, 2014.

10.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Purdue Calumet, Nov 14, 2013

11.  Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing. Bejing Institute of Technology, July 3, 2013, The Keynote Series for 21st Century Research Frontier.

12.  Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Dalian University of Technology, Dalian, May 17, 2013

13.  Privacy Preserving Computation in Mobile, Crowd-sourcing, and Computing, Shanghai University of Electric Power, ShangHai, May 14, 2013

14.  Smoothing the Energy Consumption: Peak Demand Reduction in Smart Grid, Shanghai University of Electric Power, ShangHai, May 14, 2013

15.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of CS, SIS Seminar, University of North Carolina at Charlotte, February 8, 2013.

16.  Privacy Preserving Computation in Mobile Crowd-sourcing and Computing, Tsinghua National Lab on Information and Technology, 2012/12/22.

17.  Privacy Preserving Computation in Mobile Crowd-sourcing and Computing, XiAn JiaoTong University, 2012/12/17

18.  Privacy Preserving Computation in Mobile Crowd-sourcing and Computing, ShangHai JiaoTong University, 2012/12/7

19.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, University of Science and Technology, Anhui, China, Oct 30, 2012. talk news

20.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of Computer Science, August 15th, 2012, Simon Fraser University.

21.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, Department of ECE, Clemson University, February 7, 2012.

22.  Large Scale Wireless Network Systems: Theory, Experience, and Lessons, CSE Department, University of Notre Dame, February 2, 2012.

23.  Efficient Spectrum Allocation and Auction for Wireless Networks, University of Iowa, March 30, 2009.

24.  Asymptotic Capacity of Large Scale Wireless Networks, University of Electronic Science and Technology of China (formerly Chengdu Institute of Radio Engineering) , January 10, 2009.

25.  Multicast Capacity for Large Scale Wireless Ad Hoc Networks Computer Science Department, HKUST. HongKong, Oct. 29, 2007.

26.  How Much Is It Worth? Computer Science Department, NanJing University. China, Sept. 25, 2007.

27.  Well-Shaped Delaunay Mesh Generation, Invited talk, Computer Science Department, University of Illinois at Chicago, USA. September 26th, 2005.

28.     Wireless Ad hoc/Sensor Networks: Energy Efficiency and Cooperativeness, CS department, IIT, Sept 19th, 2005.

29.  Strategyproof Network Protocol Design, Invited talk at Computer Science Department, Kent State University, USA. Feb 18th, 2005.

30.  Price of Anarchy and Strategyproof Network Protocols, Invited talk at Mathmatics Department, BeiJing University of Science of Technology, China. January 5th, 2005.

31.  Truthful Multicast in Selfish Wireless Ad Hoc Networks, Department of Computer Science, HongKong Baptist University, March, 2004.

32.  Strategyproof Routing in Selfish Wireless Networks, Invited talk at IIMAS-UNAM, Mexico. May 11th 2004.

33.  Wireless Ad Hoc Networks: a computational Geometric Approach, Invited talk at IIMAS-UNAM, Mexico. May 13th, 2004.

34.  Price of Anarchy and Strategyproof Network Protocols, Invited talk at Computer Science Department, HongKong City University, HongKong. Aug 10th, 2004.

35.  Strategyproof Network Protocol Design, Invited talk at Computer Science Department of NanJing University of Aeronautics and Astronautics (NUAA), China. Aug 25th, 2004.

36.  Price of Anarchy and Strategyproof Network Protocols, Invited talk at Computer Science Department, Wayne State University, USA. Sept 14th, 2004.

37.  Price of Anarchy and Strategyproof Network Protocols, Invited talk at Computer Science Department of TianJing University, China. December 20th, 2004.

38.  Application of Computational Geometry in Wireless Networks, Invited talk at Computer Science Department of TianJin University, China. December 27th, 2004.

39.  Communications in Selfish Wireless Ad Hoc Networks, Department of Computer Science, Tsinghua University, December, 2003.

40.  Communications in Selfish Wireless Ad Hoc Networks Department of Computer Science, TianJin University, December, 2003.

41.  Computational Geometry and Wireless Ad Hoc Networks, Department of Computer Science, TianJin University, December, 2003.

42.  Geometric and Game Theoretical Approaches for Wireless Networks Department of Computer Science, University of Illinois at Urbana-Champaign, October, 2003.

43.  Computational Geometry and Wireless Ad Hoc Networks Computer Science Department, Purdue University. Indiana, Nov. 15-16, 2001.