Dr. Longfei Wu

Dr. Longfei Wu

   Associate Professor in Computer Science

   Office: Science & Technology 215

   Phone: (910) 672-1020

   Email: lwu@uncfsu.edu

   Personal Homepage: 


BIOGRAPHY

Dr. Longfei Wu joined the Dept. of Math and Computer Science in August 2017. He received his Ph.D. degree in computer and information sciences from Temple University in July 2017. He obtained his B.E. degree in telecommunication engineering from Beijing University of Posts and Telecommunications in July 2012. Dr. Wu's research interests are the security and privacy of networked systems and modern computing devices, including wireless networks, mobile devices, implantable medical devices, and Internet-of-Things. Dr. Wu has served as a technical program committee member and reviewer in a number of international conferences and journals.

TEACHING

CSC 105 Introduction to Computer Science for Technical Majors
CSC 120 Introduction to Programming Methodology
CSC 130 Program Design and Implementation
CSC 280 Computer Security Basics
CSC 281 Mobile and Web Applications Security
CSC 282 Exploring Threats, Malwares and Mitigation
CSC 290 Information Security and Privacy
CSC 311 Network Security
CSC 381 Penetration Testing and Ethical Hacking
CSC 433 Digital Forensics

RESEARCH INTERESTS

Security & Privacy
Mobile Computing 
Internet-of-Things 
Wireless Networks

SELECTED PUBLICATIONS

W. Yang, Z. Guan, L. Wu, and Z. He, "A Secure Neural Network Inference Framework for Intelligent Connected Vehicles", IEEE Network, 2024.
X. Wang, Z. Guan, L. Wu, and K. Gai, "Toward Secure and Robust Federated Distillation in Distributed Cloud: Challenges and Design Issues", IEEE Network, vol. 38, no. 4, Jul. 2024.
L. Wu and J. Du, "Designing novel proxy-based access control scheme for implantable medical devices", Computer Standards & Interfaces, vol. 87, 2024.
X. Wang, L. Wu, and Z. Guan, "GradDiff: Gradient-based membership inference attacks against federated distillation with differential comparison", Information Sciences, vol 658, 2024.
H. Dong, L. Wu, and Z. Guan, "FeatureMix: A General Adversarial Defense Method for Pretrained Language Models", IEEE Global Communications Conference (GLOBECOM), 2023.
X. Wang, N. Wang, L. Wu, Z. Guan, X. Du, and M. Guizani, "GBMIA: Gradient-based Membership Inference Attack in Federated Learning", IEEE International Conference on Communications (ICC), 2023.
J. Dong, S. Wang, L. Wu, H. Dong, and Z. Guan, "A textual adversarial attack scheme for domain-specific models", International Conference on Machine Learning for Cyber Security, 2022.
W. Yang, N. Wang, Z. Guan, L. Wu, X. Du, and M. Guizani, "A Practical Cross-Device Federated Learning Framework over 5G Networks", IEEE Wireless Communications, vol. 29, no. 6, Dec. 2022.
L. Shi, L. Wu, and Z. Guan, "Three-layer hybrid intrusion detection model for smart home malicious attacks", Computers & Electrical Engineering, vol. 96, Dec. 2021.
J. Dong, Z. Guan, L. Wu, X. Du, and M. Guizani, "A sentence-level text adversarial attack algorithm against IIoT based smart grid", Computer Networks, volume 190, May 2021.
W. Yang, Z. Guan, L. Wu, X. Du, and M. Guizani, "Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach", IEEE Internet of Things Journal, vol. 8, no. 10, pp. 8632-8643, May. 2021.
X. Sun, R. Xu, L. Wu, and Z. Guan, "A differentially private distributed data mining scheme with high efficiency for edge computing", Journal of Cloud Computing, vol. 10, no. 7, 2021.
Z. Guan, X. Sun, L. Shi, L. Wu, and X. Du, "A differentially private greedy decision forest classification algorithm with high utility", Computers & Security, Volume 96, Sep. 2020.
Z. Guan, X. Liu, L. Wu, J. Wu, R. Xu, J. Zhang, and Y. Li, "Cross-Lingual Multi-Keyword Rank Search with Semantic Extension over Encrypted Data", Information Sciences, vol. 514, pp. 523-540, Apr. 2020.
H. Cao, S. Liu, L. Wu, Z. Guan, and X. Du, "Achieving Differential Privacy against Non-Intrusive Load Monitoring in Smart Grid: a Fog Computing approach", Concurrency and Computation: Practice and Experience, vol. 31, no. 22, Nov. 2019.
Z. Guan, Z. Lv, X. Du, L. Wu, and M. Guizani, "Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach", Future Generation Computer Systems, vol. 98, pp. 60-68, Sep. 2019.
Z. Guan, Y. Zhang, L. Wu, J. Wu, J. Li, Y. Ma, and J. Hu, "APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT", Journal of Network and Computer Applications, vol. 125, pp. 82-92, Jan. 2019.
H. Cao, S. Liu, L. Wu, and Z. Guan, "SCRAPPOR: An Efficient Privacy-Preserving Algorithm base on Sparse Coding for Information-Centric IoT", IEEE Access, vol. 6, pp. 63143-63154, Oct. 2018.
Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, "Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid", IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1934-1944, Dec. 2017.
L. Wu, et al., "An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology", International Conference on Computing, Networking and Communications (ICNC), 2018.
L. Wu, et al., "Access Control Schemes for Implantable Medical Devices: A Survey", IEEE Internet of Things Journal, 2017.
L. Wu, et al., "Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks", International Conference on Computer Communication and Networks (ICCCN), 2017.
L. Wu, et al., "Effective Defense Schemes for Phishing Attacks on Mobile Platforms", IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6678-6691. 2016.
L. Wu, et al., "Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices", IEEE Conference on Communications and Network Security (CNS), 2016.
L. Wu, et al., "Effective Task Scheduling in Proximate Mobile Device based Communication Systems", IEEE International Conference on Communications (ICC), 2015.
L. Wu, et al., "An Effective Access Control Scheme for Preventing Permission Leak in Android", International Conference on Computing, Networking and Communications (ICNC), 2015.
L. Wu, et al., "Security Threats to Mobile Multimedia Applications: Camera-based Attacks on Mobile Phones", IEEE Communications Magazine, vol. 52, no. 3, pp. 80-87, 2014.
L. Wu, et al., "Analyzing Mobile Phone Vulnerabilities Caused by Camera", IEEE Global communications Conference (GLOBECOM), 2014.
L. Wu, et al., "MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones", International Conference on Computer Communication and Networks (ICCCN), 2014.