Dr. Longfei Wu

Dr. Longfei Wu

   Assistant Professor in Computer Science

   Office: Science & Technology 215

   Phone: (910) 672-1020

   Email: lwu@uncfsu.edu

   Personal Homepage: 


Dr. Longfei Wu joined the Dept. of Math and Computer Science in August 2017. He received his Ph.D. degree in computer and information sciences from Temple University in July 2017. He obtained his B.E. degree in telecommunication engineering from Beijing University of Posts and Telecommunications in July 2012. Dr. Wu's research interests are the security and privacy of networked systems and modern computing devices, including wireless networks, mobile devices, implantable medical devices, and Internet-of-Things. Dr. Wu has served as a technical program committee member and reviewer in a number of international conferences and journals.


CSC 105 Introduction to Computer Science for Technical Majors
CSC 120 Introduction to Programming Methodology
CSC 130 Program Design and Implementation
CSC 280 Computer Security Basics
CSC 281 Mobile and Web Applications Security
CSC 282 Exploring Threats, Malwares and Mitigation


Security & Privacy
Mobile Computing 
Wireless Networks


L. Shi, L. Wu, Z. Guan, "Three-layer hybrid intrusion detection model for smart home malicious attacks", Computers & Electrical Engineering, vol. 96, Dec. 2021.
J. Dong, Z. Guan, L. Wu, X. Du, and M. Guizani, "A sentence-level text adversarial attack algorithm against IIoT based smart grid", Computer Networks, Volume 190, May 2021.
W. Yang, Z. Guan, L. Wu, X. Du, and M. Guizani, "Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach", IEEE Internet of Things Journal, vol. 8, no. 10, pp. 8632-8643, May. 2021.
X. Sun, R. Xu, L. Wu, and Z. Guan, "A differentially private distributed data mining scheme with high efficiency for edge computing", Journal of Cloud Computing, vol. 10, no. 7, 2021.
Z. Guan, X. Sun, L. Shi, L. Wu, and X. Du, "A differentially private greedy decision forest classification algorithm with high utility", Computers & Security, Volume 96, Sep. 2020.
Z. Guan, X. Liu, L. Wu, J. Wu, R. Xu, J. Zhang, and Y. Li, "Cross-Lingual Multi-Keyword Rank Search with Semantic Extension over Encrypted Data", Information Sciences, vol. 514, pp. 523-540, Apr. 2020.
H. Cao, S. Liu, L. Wu, Z. Guan, and X. Du, "Achieving Differential Privacy against Non-Intrusive Load Monitoring in Smart Grid: a Fog Computing approach", Concurrency and Computation: Practice and Experience, vol. 31, no. 22, Nov. 2019.
Z. Guan, Z. Lv, X. Du, L. Wu, and M. Guizani, "Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach", Future Generation Computer Systems, vol. 98, pp. 60-68, Sep. 2019.
Z. Guan, Y. Zhang, L. Wu, J. Wu, J. Li, Y. Ma, and J. Hu, "APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT", Journal of Network and Computer Applications, vol. 125, pp. 82-92, Jan. 2019.
H. Cao, S. Liu, L. Wu, and Z. Guan, "SCRAPPOR: An Efficient Privacy-Preserving Algorithm base on Sparse Coding for Information-Centric IoT", IEEE Access, vol. 6, pp. 63143-63154, Oct. 2018.
Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, "Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in Smart Grid", IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1934-1944, Dec. 2017.
L. Wu, et al., "An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology", International Conference on Computing, Networking and Communications (ICNC), 2018.
L. Wu, et al., "Access Control Schemes for Implantable Medical Devices: A Survey", IEEE Internet of Things Journal, 2017.
L. Wu, et al., "Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks", International Conference on Computer Communication and Networks (ICCCN), 2017.
L. Wu, et al., "Effective Defense Schemes for Phishing Attacks on Mobile Platforms", IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6678-6691. 2016.
L. Wu, et al., "Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices", IEEE Conference on Communications and Network Security (CNS), 2016.
L. Wu, et al., "Effective Task Scheduling in Proximate Mobile Device based Communication Systems", IEEE International Conference on Communications (ICC), 2015.
L. Wu, et al., "An Effective Access Control Scheme for Preventing Permission Leak in Android", International Conference on Computing, Networking and Communications (ICNC), 2015.
L. Wu, et al., "Security Threats to Mobile Multimedia Applications: Camera-based Attacks on Mobile Phones", IEEE Communications Magazine, vol. 52, no. 3, pp. 80-87, 2014.
L. Wu, et al., "Analyzing Mobile Phone Vulnerabilities Caused by Camera", IEEE Global communications Conference (GLOBECOM), 2014.
L. Wu, et al., "MobiFish: A Lightweight Anti-Phishing Scheme for Mobile Phones", International Conference on Computer Communication and Networks (ICCCN), 2014.