2024
Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation.
IEEE Trans. Netw. Serv. Manag., August, 2024

Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems.
CoRR, 2024

Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

MAS-SAM: Segment Any Marine Animal with Aggregated Features.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Towards Fine-Grained Webpage Fingerprinting at Scale.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Recurrent Multi-scale Transformer for High-Resolution Salient Object Detection.
CoRR, 2023

Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Recurrent Multi-scale Transformer for High-Resolution Salient Object Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

2022
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022

Practical differentially private online advertising.
Comput. Secur., 2022

2020
FISE: A Forwarding Table Structure for Enterprise Networks.
IEEE Trans. Netw. Serv. Manag., 2020

2019
Two Dimensional Router: Design and Implementation.
CoRR, 2019