Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song (alphabetical order) . "Robust Physical-World Attacks on Machine Learning Models". Preprint (arXiv:1707.08945) , July 2017
Press: IEEE Spectrum, Yahoo News, Wired, Engagdet, Telegraph, Car and Driver, CNET, Digital Trends, SCMagazine, Schneier on Security, Ars Technica, Fortune
B. Li, K. Roundy, C. Gates and Y. Vorobeychik. “Large-scale identification of malicious singleton files”. In ACM Conference on Data and Application Security and Privacy (CODASPY). Arizona, USA, 2017.
J. Gao, B. Li, G. Schoenebeck and F. Yu. "Engineering Agreement: The Naming Game with Asymmetric and Heterogeneous Agents," In Proceedings of the 30th International Conference on Artificial Intelligence (AAAI). San Francisco, USA, 2017.
B. Li, Y. Wang, A. Singh, Y. Vorobeychik, “Data poisoning attacks on factorization-based collaborative filtering,” In Proc. of the Neural Information Processing Systems (NIPS). Barcelona, Spain, 2016.
C. Yan, B. Li, Y. Chen, D. Liebovitz, and B. Malin, “Learning clinical workflows to identify subgroups of heart failure patients”, In Proc. Of the American Medical Informatics Association Annual Fall Symposium (AMIA), Chicago, USA, 2016.
B. Li, Y. Vorobeychik, M. Li, and B. Malin, “Iterative classification for sanitizing large-scale datasets,” In Proc. of the IEEE International Conference on Data Mining (ICDM). Atlantic City, NJ, USA, 2015.
B. Li, “Secure learning and mining in adversarial environments,” In Proc. of the IEEE International Conference on Data Mining (ICDM) Phd forum. Atlantic City, NJ, USA, 2015.
L. Ke, B. Li , Y. Vorobeychik, “Behavioral Experiments in Email Filter Evasion” In Proc. of the 30th International Conference on Artificial Intelligence (AAAI). Phoenix, AZ, USA, 2016.
B. Li and Y. Vorobeychik, “Scalable Optimization of Randomized Operational Decisions in Adversarial Classification Settings,” in Proc. of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS). San Diego, CA, USA, 2015.
B. Li and Y. Vorobeychik, “Feature corss-substitution in adversarial classification,” In Proc. of the Neural Information Processing Systems (NIPS). Quebec, Canada, 2014.
Y. Vorobeychik and B. Li, “Optimal randomized classification in adversarial settings,” In Proc. of the International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). Paris, France, 2014.
Y. H. Wang, J. S. Lee, B. Li, “A Hybrid Illumination Refinement Technique based on Double Niblack Thresholds”, In Proc. of the International Conference on Communication and Information Systems (ICCIS). Roma, Italy, 2015.
J. S. Lee, K. J. Wei, B. R. Huang, and B. Li, “Note on an anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics,” In Proc. of the Cryptography and Information Security Conference (CISC), Kaohsiung, Taiwan, 2015.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “The impact of family structure and common environment on heritability estimation for neuroimaging genetics studies using SOLAR”, In Proc. of the International Imaging Genetics Conference (GC). Irvine, CA, USA, 2014.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “Neuroimaging Genetics Study Design: A Comparison of the OpenMX and SOLAR Software Packages for Estimating Heritability of Neuroimaging Traits”. In Proc. of the International Imaging Genetics Conference (GC). Irvine, CA, USA, 2014.
M. E. Koran, B. Li, N. Jahanshad, T. A. Thornton-Wells, D. C. Glahn, P. M. Thompson, J. Blangero, T. E. Nichols, P. Kochunov, and B. A. Landman. “On study design in neuroimaging heritability analyses.” In Proc. of the SPIE Medical Imaging Conference. San Diego (SPIE), CA, USA, 2014.
Z. Xu, B. Li, S. Panda, A. J. Asman, K. L. Merkle, P. L. Shanahan, R. G. Abramson, and B. A. Landman. “Shape-Constrained Multi-Atlas Segmentation of Spleen in CT.” In Proc. of the SPIE Medical Imaging Conference. San Diego (SPIE), CA, USA, 2014.
J. S. Lee, K. J. Wei, and B. Li, “On the security of two ECC-based authentication mechanisms for confirming authorization,” In Proc. of the Cryptography- 20 years of Cryptography in Taiwan, McGraw-Hill International Enterprises, LLC., Taiwan, 2014.
Q. Lin, Z. Xu, B. Li, R. Baucom, B. Poulose, B. A. Landman, and R. E. Bodenheimer. “Immersive Virtual Reality for Visualization of Abdominal CT.” In Proc. of the SPIE Medical Imaging Conference. Orlando (SPIE), FL, USA, 2013.
B. Li, S. Panda, Z. Xu, A. J. Asman, P. L. Shanahan, R. G. Abramson, and B. A. Landman. “Regression forest region recognition enhances multi-atlas spleen labeling”. In Proc. of the Medical Image Computing and Computer Assisted Intervention (MICCAI). Nagoya, Japan, 2013.
B. Li, P. Volgyesi, and A. Ledeczi: “Rapid Prototyping of Image Processing Workflows on Massively Parallel Architectures”, In Proc. of Intelligent Solutions in Embedded Systems (WISES), Carinthia, Austria, 2012.
J. S. Lee, B. Li , and H. Y. Tsai. “An Effective Preprocessor for Enhancing Edge Detection in Speckle Images,” In Proc. of the 8th International Conference on Information Science and Digital Content Technology (ICIDT), Jeju, Korea, 2012.
F. P. Lin, B. Li and J. S. Lee. "A neoteric progressive scheme for visual secret sharing," In the Proc. of the First National Conference on Web Intelligence and Applications (CWIA). Kaohsiung, Taiwan, 2011.
B. Li, and J. S. Lee. “A wally watermarking scheme with blind extraction based on structured encoding system,” In Proc. of International Conference on 2nd World Congress on Computer Science and Information Engineering (CSIE), Changchun, China, 2011.
B. Li, J. S. Lee, and C. C. Chang. “Providing Anonymous Channels and Mutual Authentication in GSM,” In Proc. of International Conference on the Fourth International Conference on Genetic and Evolutionary Computing (WCECS), Shenzhen, China, 2010.
J. S. Lee, B. Li and Y. C. Chou. “A Brand-new Mobile Value-added Service: M-Check,” In Proc. of International Conference on Networked Computing, Advanced Information Management and Digital Content and Multimedia Technologies (AICIT), Seoul, Korea, 2009.
B. Li, Y. Vorobeychik, M. Li, B. Malin, "Scalable Iterative Classification for Sanitizing Large-Scale Datasets," IEEE Transactions on Knowledge and Data Engineering (TKDE), Oct. 2016.
J. S. Lee, B. Li, and B. R. Huang, “Oblivious Transfer System for Information Concealing and Recovery in Cloud Computing,” Journal of Internet Technology, vol. 20, pp. 132-145, March 2015.
J. S. Lee, K. R. Wen, and B. Li, “Renovating Contaminative Image Archives based on Patch Propagation and Adaptive Confidence Collation” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 112-134, April 2015.
M. Li, D. Carrell, J. Aberdeen, L. Hirschman, B. Li, Y.Vorobeychik, and B.Malin, “Optimizing Annotation Resources for Natural Language De-identification via a Game Theoretic Framework,” Journal of Biomedical Informatics, vol. 30, pp.142-179, October 2015
J. S. Lee, and B. Li, "Self-recognized Watermarking Technique with Resistance to Large Scale Cropping," IEEE Multimedia, vol. 21, pp. 60-73, March 2014.
J. S. Lee, W. C. Kao, and B. Li, “Aryabhata Remainder Theorem-Based Non-Iterative Electronic Lottery Mechanism with Robustness,” IET Information Security, vol. 7, pp. 172-182, May 2013.
J. S. Lee, and B. Li, “Note on ‘Authentication protocol using an identifier in an ad hoc network environment’,” Mathematical and Computer Modeling, vol. 57, pp. 1572-1575, July 2013.
B. Li, F. Bryan, and B. A. Landman, “Next Generation of the JAVA Image Science Toolkit (JIST) Visualization and Validation”. InSight Journal, vol. 12, pp. 23-34, February 2012.
C. C. Yang, K. J. Wei, B. Li and J. S. Lee, "HORME: Hierarchical-Object-Relational Medical management for Electronic record," Security and Communication Networks, vol. 17, pp. 53-65, November 2012.
C. C. Chang, B. Li and J. S. Lee, “Secret Sharing Using Visual Cryptography,” Journal of Electronic Science and Technology, vol. 8, pp. 289-299, June 2010.
B. Li and J. S. Lee, “A Cryptographic Alternative for Preserving PHI in Compliance with HIPAA Privacy/Security Regulations,” Journal of Computers, vol. 21, pp. 27-36, March 2010.