Skip to main navigation
Skip to search
Skip to main content
University of Arizona Home
Home
Profiles
Departments and Centers
Scholarly Works
Activities
Grants
Datasets
Prizes
Search by expertise, name or affiliation
View Scopus Profile
Ming Li
Electrical and Computer Engineering
h-index
7761
Citations
39
h-index
Calculated based on number of publications stored in Pure and citations from Scopus
2006
2025
Research activity per year
Overview
Fingerprint
Network
Scholarly Works
(164)
Similar Profiles
(6)
Fingerprint
Dive into the research topics where Ming Li is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Privacy Preserving
100%
reconfigurable antenna
94%
Attackers
73%
Physical Layer
68%
Differential Privacy
65%
Encrypted Data
57%
Cloud Computing
50%
MIMO Systems
48%
Cognitive Radio Networks
48%
Location Privacy
48%
Key Generation
48%
Wireless Channel
48%
spectrum sharing
46%
Experimental Result
46%
Encrypted Cloud Data
45%
Authentication
42%
User Privacy
42%
Network Coding
41%
Social Network
41%
Wireless Device
39%
Wi-Fi
38%
Physical Layer Security
37%
Searchable Encryption Scheme
37%
Range Query
35%
Input-Stream
34%
Man-in-the-Middle Attack
34%
Spectrum Access
34%
Confidence Bound
34%
vehicular ad-hoc network
33%
Commercial off the Shelf
32%
Event Pattern
32%
Data Aggregation
32%
Plaintext Attack
32%
Spectrum Resource
32%
Stream Processing
32%
Dynamic Spectrum Access
32%
Testbed
32%
Security and Privacy
31%
multi-hop network
31%
User Data
30%
Convergence Rate
30%
Location Data
29%
Cryptographic Primitive
28%
Radiation Pattern
28%
Authentication Device
27%
Theoretic Approach
27%
Event Stream Processing
27%
Reliable Broadcast
27%
Decision-Making
27%
XQuery
27%
Keyphrases
XML Stream
27%
Passive Traffic Monitoring
27%
Thompson Sampling
27%
V2V Communication
27%
Secret-free
27%
Out-of-order Events
27%
Local Differential Privacy
27%
Cognitive Radio Networks
27%
Unreliable Link
27%
Localized Routing
27%
Security Properties
25%
Off-the-shelf Devices
23%
Antenna States
22%
Trust Establishment
20%
Search Efficiency
20%
Manipulation Attack
20%
Signal Manipulation
20%
Access Rules
20%
Device Pairing
20%
Proximity Verification
20%
Joining Strategy
19%
Broadcast Overhead
18%
Structural Joining
18%
Commercial-off-the-shelf Components
18%
Network Applications
18%
Encrypted Database
16%
State Selection
16%
Dishonest Majority
16%
Privacy Requirements
16%
Wireless Channel
16%
Secondary User
15%
Known-plaintext Attack
13%
Privacy-preserving Data Aggregation
13%
Nearest Neighbor Search
13%
Reliable Broadcast
13%
Lossy Links
13%
Physical Layer Key Generation
13%
Range Searching
13%
QR Code
13%
Retrospective Interference Alignment
13%
Text Search
13%
Smart Lock
13%
Encrypted Search
13%
Key-value Data Collection
13%
Differentially Private
13%
Wireless Devices
13%
XQuery
13%
Data Trust
13%
Trusted Frameworks
13%
False Data Detection
13%