Skip to main navigation
Skip to search
Skip to main content
University of Arizona Home
Home
Profiles
Departments and Centers
Scholarly Works
Activities
Grants
Datasets
Prizes
Search by expertise, name or affiliation
View Scopus Profile
Ming Li
Electrical and Computer Engineering
h-index
8238
Citations
41
h-index
Calculated based on number of publications stored in Pure and citations from Scopus
2006
2025
Research activity per year
Overview
Fingerprint
Network
Scholarly Works
(170)
Similar Profiles
(6)
Fingerprint
Dive into the research topics where Ming Li is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Computer Science
Privacy Preserving
100%
reconfigurable antenna
82%
Attackers
66%
Physical Layer
60%
Differential Privacy
57%
Encrypted Data
50%
Cloud Computing
44%
Experimental Result
44%
MIMO Systems
42%
Cognitive Radio Networks
42%
Location Privacy
42%
Key Generation
42%
Wireless Channel
42%
spectrum sharing
40%
Encrypted Cloud Data
39%
Authentication
37%
User Privacy
37%
Network Coding
36%
Social Network
36%
Wireless Device
34%
Wi-Fi
33%
Physical Layer Security
32%
Searchable Encryption Scheme
32%
Range Query
31%
Input-Stream
30%
Man-in-the-Middle Attack
30%
Spectrum Access
30%
Confidence Bound
30%
vehicular ad-hoc network
29%
Commercial off the Shelf
28%
Event Pattern
28%
Data Aggregation
28%
Plaintext Attack
28%
Spectrum Resource
28%
Stream Processing
28%
Dynamic Spectrum Access
28%
Testbed
28%
Autonomous System
28%
Privacy Leakage
28%
Security and Privacy
27%
multi-hop network
27%
User Data
27%
Convergence Rate
26%
Location Data
26%
Privacy Protection
25%
Cryptographic Primitive
25%
Radiation Pattern
25%
Authentication Device
24%
Theoretic Approach
24%
Event Stream Processing
24%
Keyphrases
XML Stream
24%
Passive Traffic Monitoring
24%
Thompson Sampling
24%
V2V Communication
24%
Secret-free
24%
Out-of-order Events
24%
Local Differential Privacy
24%
Cognitive Radio Networks
24%
Unreliable Link
24%
Localized Routing
24%
Privacy-preserving
24%
Security Properties
22%
Off-the-shelf Devices
20%
Antenna States
19%
Trust Establishment
18%
Search Efficiency
18%
Manipulation Attack
18%
Signal Manipulation
18%
Access Rules
18%
Device Pairing
18%
Proximity Verification
18%
Joining Strategy
17%
Broadcast Overhead
16%
Structural Joining
16%
Commercial-off-the-shelf Components
16%
Network Applications
16%
Privacy-utility Tradeoff
15%
Encrypted Database
14%
State Selection
14%
Dishonest Majority
14%
Privacy Requirements
14%
Wireless Channel
14%
Differentially Private
13%
Secondary User
13%
Known-plaintext Attack
12%
Privacy-preserving Data Aggregation
12%
Nearest Neighbor Search
12%
Reliable Broadcast
12%
Lossy Links
12%
Physical Layer Key Generation
12%
Range Searching
12%
QR Code
12%
Retrospective Interference Alignment
12%
Text Search
12%
Smart Lock
12%
Encrypted Search
12%
Key-value Data Collection
12%
Wireless Devices
12%
XQuery
12%
Data Trust
12%