Qr code
中文
Yantao Li

Professor

Supervisor of Doctorate Candidates

Supervisor of Master's Candidates


E-Mail:

School/Department:College of Computer Science, Chongqing University

Administrative Position:Professor

Education Level:Postgraduate (Postdoctoral)

Business Address:重庆大学计算机学院

Gender:Male

Degree:Doctoral degree

Status:Employed

Alma Mater:Chongqing University

Discipline:Computer Architecture

Honors and Titles:

2019-11-01   Chongqing Bayu Young Scholar

Click:Times

The Last Update Time: ..

Profile

Yantao Li is a Professor at the College of Computer Science, Chongqing University, Chongqing, China. He received the PhD degree from the College of Computer Science, Chongqing University, in December 2012. His research interests include mobile computing and security, the Internet of things, sensor networks, and ubiquitous computing. He received the 2023 Best Paper Award from ACM Transactions on Computing for Healthcare and the 2020 Best Paper Award from IEEE Internet Computing. He was honored with the Outstanding PhD Thesis Award in Chongqing in 2014 and the Outstanding Master’s Thesis Award in Chongqing in 2011. He serves as an Associate Editor for the IEEE Internet of Things Journal (IoT-J) and Scientific Reports. 

Publications

  Full list: Google Scholar, DBLPORCID

  Selected publications (*Corresponding author)                                                                             Last updated: March 2025

[1]Y. Li, Y. Wang, H. Huang, RPWAEAuth: Sensor-Based Continuous Authentication Using Reconstruction Probability in Wasserstein AutoencoderACM Transactions on Sensor Networks, Accepted in February 2025

[2]Y. Li, C. Fan, H. Qin, S. Deng, M. A. El-Yacoubi, G. Zhou, Deep Reinforcement Learning-based Feature Extraction and Encoding for Finger-vein VerificationIEEE Transactions on Emerging Topics in Computational Intelligence, Volume 9, Issue 1, February 2025, Pages 522-536

[3]Y. Li, C. Chen, K. Zhang, D. Li, Q. Lü, S. Deng, H. Li, Q-DADAM: A Quantized Distributed Online Optimization Algorithm with Adaptive MomentumIEEE Transactions on Control of Network Systems, Accepted in November 2024

[4]H. Ren, K. Liu, G. Yan, C. Liu, Y. Li, C. Li, W. Wu, Truthful Auction Mechanisms for Dependent Task Offloading in Vehicular Edge ComputingIEEE Transactions on Mobile Computing, Volume 23, Issue 12, December 2024, Pages 14987-15002 

[5]S. Ruan, Y. Li*, H. Qin*, LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition, IEEE Transactions on Information Forensics and SecurityVolume 19, October 2024, Pages 9598-9612

[6]H. Qin, Z. Xiong, Y. Li*, M. A. El-Yacoubi, J. Wang, Attention BLSTM-Based Temporal-Spatial Vein Transformer for Multi-View Finger-Vein Recognition, IEEE Transactions on Information Forensics and SecurityVolume 19, October 2024, Pages 9330-9343

[7]Y. Li, S. Ling, H. Huang, F. H. Rabevohitra, Progressive Growth-based Momentum Contrast for Unsupervised Representative Learning in Classification Tasks, IEEE Networking Letters, DOI: 10.1109/LNET.2024.3482295, Accepted in October 2024

[8]Z. Yang, Y. Li*, G. Zhou, Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank AlgorithmsIEEE Transactions on Mobile Computing, Volume 23, Issue 9, September 2024, Pages 8839-8854 

[9]Y. Li, X. Li, X. Lei, H. Qin, Y. Hu, G. Zhou, On the Inference of Original Graph Information from Graph Embeddings, ACM Transactions on Sensor Networks, Volume 20, Issue 5, Article 111, September 2024, 28 Pages

[10]Y. Li, K. Dan, X. Lei, H. Qin, S. Deng, G. Zhou, Using Reinforcement Learning to Escape Automatic Filter-based Adversarial Example Defense, ACM Transactions on Sensor NetworksVolume 20, Issue 5, Article 113, September 2024, 26 Pages

[11]Y. Li, L. Liu, S. Deng, H. Qin, M. A. El-Yacoubi, G. Zhou, Memory-Augmented Autoencoder based Continuous Authentication on Smartphones with Conditional Transformer GANsIEEE Transactions on Mobile ComputingVolume 23, Issue 5, May 2024, Pages 4467-4482

[12]Y. Li, C. Ouyang, H. Huang, AEGANAuth: Autoencoder GAN-Based Continuous Authentication With Conditional Variational Autoencoder Generative Adversarial Network, IEEE Internet of Things JournalVolume 11, Issue 16, August 2024, Pages 27635- 27650

[13]Y. Li, Y. Huang, H. Huang, FuMeAuth: Sensor-Based Continuous Authentication Using Fused Memory-Augmented Transformer Autoencoder, IEEE Internet of Things JournalVolume 11, Issue 15, August 2024, Pages 26340-26351

[14]H. Qin, C. Gong, Y. Li*, M. A. El-Yacoubi, X. Gao, J. Wang, Attention Label Learning to Enhance Interactive Vein Transformer for Palm-Vein RecognitionIEEE Transactions on Biometrics, Behavior, and Identity Science, Volume 6, Issue 3, July 2024, Pages 341-351

[15]H. Qin, H. Xi, Y. Li*, M. A. El-Yacoubi, J. Wang, X. Gao, Adversarial Learning-based Data Augmentation for Palm-vein Identification, IEEE Transactions on Circuits and Systems for Video TechnologyVolume 34, Issue 6, June 2024, Pages 4325-4341

[16]Y. Li, C. Tang,  S. Deng, H. Qin, H. Huang, Mixed Automatic Adversarial Augmentation Network for Finger-Vein RecognitionIEEE Transactions on Instrumentation and Measurement, Volume 73, Article 5021010, May 2024, 10 Pages

[17]Y. Li, X. Sun, Z. Yang, H. Huang, SNNAuth: Sensor-Based Continuous Authentication On Smartphones Using Spiking Neural Networks, IEEE Internet of Things JournalVolume 11, Issue 9, May 2024, Pages 15957-15968

[18]H. Ren, K. Liu, C. Liu, G. Yan, Y. Li, An Approximation Algorithm for Joint Data Uploading and Task Offloading in IoVIEEE Transactions on Consumer ElectronicsVolume 70, Issue 1, February 2024, Pages 3018-3030

[19]H. Qin, C. Fan, S. Deng, Y. Li*, M. A. El-Yacoubi, G. Zhou, AG-NAS: An Attention GRU-based Neural Architecture Search for Finger-Vein RecognitionIEEE Transactions on Information Forensics and Security, Volume 19, December 2023, Pages 1699-1713

[20]Y. Li, L. Liu, H. Qin, S. Deng,  M. A. El-Yacoubi, G. Zhou, Adaptive Deep Feature Fusion for Continuous Authentication With Data AugmentationIEEE Transactions on Mobile ComputingVolume 22, Issue 10, October 2023, Pages 5690-5705

[21]Y. Li, J. Luo, S. Deng, G. Zhou, SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation SearchACM Transactions on Sensor NetworksVolume 19, Issue 4, Article 92, July 2023, 23 Pages

[22]Q. Lü, K. Zhang, S. Deng, Y. Li, H. Li, S. Gao, Y. Chen, Privacy-Preserving Decentralized Dual Averaging for Online Optimization Over Directed NetworksIEEE Transactions on Industrial Cyber-Physical Systems, Volume 1, July 2023, Pages 79-91

[23]H. Qin, R. Hu, M. A. El-Yacoubi, Y. Li*, X. Gao, Local Attention Transformer-Based Full-View Finger-Vein IdentificationIEEE Transactions on Circuits and Systems for Video Technology, Volume 33, Issue 6, June 2023, Pages 2767-2782

[24]Z. Yang, Y. Li*, G. Zhou, TS-GAN: Time-series GAN for Sensor-based Health Data AugmentationACM Transactions on Computing for Healthcare, Volume 4, Issue 2, Article 12, April 2023, 21 Pages (2023 Best Paper Award)

[25]H. Qin, C. Gong, Y. Li*, X. Gao, M. A. El-Yacoubi, Label Enhancement-Based Multiscale Transformer for Palm-Vein RecognitionIEEE Transactions on Instrumentation and Measurement, Volume 72, Article 2509217, March 2023, 17 Pages

[26]Y. Li, S. Ruan, H. Qin, S. Deng, M. A. El-Yacoubi, Transformer Based Defense GAN Against Palm-Vein Adversarial AttacksIEEE Transactions on Information Forensics and Security, Volume 18, February 2023, Pages 1509-1523

[27]H. Ren, K. Liu, G. Yan, Y. Li, C. Zhan, S. Guo, A Memetic Algorithm for Cooperative Complex Task Offloading in Heterogeneous Vehicular NetworksIEEE Transactions on Network Science and Engineering, Volume 10, Issue 1, January-February 2023, Pages 189-204

[28]Y. Li, P. Tao, S. Deng, G. Zhou, DeFFusion: CNN-based Continuous Authentication Using Deep Feature FusionACM Transactions on Sensor Networks, Volume 18, Issue 2, Article 18, May 2022, 20 Pages

[29]Y. Li, J. Luo, S. Deng, G. Zhou, CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial NetworkIEEE Internet of Things Journal, Volume 9, Issue 7, April 2022, Pages 5447-5460

[30]H. Qin, M. A. El-Yacoubi, Y. Li*, C. Liu, Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification, IEEE Transactions on Information Forensics and SecurityVolume 16,  March 2021, Pages 2652-2666

[31]H. Huang, D. Chen, Y. Li*IM-LDP: Incentive Mechanism of Mobile Crowd Sensing Based on Local Differential PrivacyIEEE Communications LettersVolume 25, Issue 3, March 2021, Pages 960-964

[32]Y. Li, H. Hu, Z. Zhu, G. Zhou, SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural NetworksACM Transactions on Sensor Networks, Volume 16, Issue 3, Article 29, July 2020, 27 Pages

[33]Y. Li, B. Zou, S. Deng, G. Zhou, Using Feature Fusion Strategies in Continuous Authentication on SmartphonesIEEE Internet Computing, Volume 24, Issue 2, March-April 2020, Pages 49-56 (2020 Best Paper Award by IEEE Computer Society 2022)

[34]Y. Li, X. Peng, G. Zhou, H. Zhao, SmartJump: A Continuous Jump Detection Framework on SmartphonesIEEE Internet Computing, Volume 24, Issue 2, March-April 2020, Pages 18-26

[35]Y. Li, H. Hu, G. Zhou, Using Data Augmentation in Continuous Authentication on Smartphones, IEEE Internet of Things Journal, Volume 6, Issue 1, February 2019, Pages 628-640

[36]X. Niu, H. Huang*, Y. Li*A Real-Time Data Collection Mechanism With Trajectory Privacy in Mobile Crowd-SensingIEEE Communications Letters, Volume 24, Issue 10, October 2020, Pages 2114-2118

[37]Q. Yang, G. Peng, P. Gasti, K. Balagani, Y. Li, G. Zhou, MEG: Memory and Energy Efficient Garbled Circuit Evaluation on SmartphonesIEEE Transactions on Information Forensics and Security, Volume 14, Issue 4, April 2019, Pages 913-922

[38]X. Qi, Q. Yang, D. T. Nguyen, G. Peng, G. Zhou, B. Dai, D. Zhang, Y. LiA Context-Aware Framework for Reducing Bandwidth Usage of Mobile Video Chats, IEEE Transactions on Multimedia, Volume 18, Issue 8, August 2016, Pages 1640-1649

[39]Y. Li, X. Qi, M. Keally, Z. Ren, G. Zhou, D. Xiao, Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi NetworksIEEE Transactions on Parallel and Distributed Systems, Volume 24, Issue 9, September 2013, Pages 1741-1751


Work Experience

  • 2025.3 -- Now

    重庆大学      计算机学院      “百人计划”学者,教授

  • 2019.3 -- 2025.2

    重庆大学      计算机学院      “百人计划”学者,研究员

  • 2013.3 -- 2019.3

    Southwest University      College of Computer and Information Science      Associate Professor      教学科研型

Other Contact Information:

  • Telephone:

  • Email: