top of page

PUBLICATIONS

[1] Fengjiao Li, Xingyu Zhou, and Bo Ji, "Differentially Private Linear Bandits with Partial Distributed Feedback", Proceedings of IEEE WiOpt 2022, Turin, Italy, September 2022. [Technical Report (arxiv)](Best Student Paper Award)

[2] Fengjiao Li, Jia Liu, and Bo Ji, “Federated Learning with Fair Worker Selection: A Multi-Round Submodular Maximization Approach,” Proceedings of IEEE MASS 2021, Virtual Event, October 2021. [Technical Report (arXiv)]

[3] Fengjiao Li, Jia Liu, and Bo Ji, Combinatorial Sleeping Bandits with Fairness Constraints, IEEE Trans-

actions on Network Science and Engineering (TNSE), vol. 7, no. 3, pp. 1799-1813, 1 July-Sept. 2020. (Invited Fast Track Submission)

[4] Fengjiao Li, Jia Liu, and Bo Ji, “Combinatorial Sleeping Bandits with Fairness Constraints,” Proceedings of IEEE INFOCOM 2019, Paris, France, May 2019. [PDF]  [Technical Report (arXiv)]. (Best Paper Award, Best-in-Session Presentation Award)

 

[5] Fengjiao Li, Yu Sang, Zhongdong Liu, Bin Li, Huasen Wu, and Bo Ji, Waiting but not Aging: Age-of-Information and Utility Optimization Under the Pull Model, IEEE/ACM Transactions on Networking (ToN), vol. 29, no. 1, pp. 465-478, Feb. 2021. [Technical Report (arXiv)]

[6] Fengjiao Li, Luyong Zhang and Dianjun Chen, “Vulnerability Mining of Cisco Router based on Fuzzing,” Proc of 2nd IEEE International Conference on System and Informatics (ICSAI), Shanghai, China, 2014.

Department of Computer&Information Science, Temple University

  • Facebook Clean Grey
  • Twitter Clean Grey
  • LinkedIn Clean Grey
bottom of page