Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation.
IEEE Trans. Netw. Serv. Manag., August, 2024
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, 2024
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
MAS-SAM: Segment Any Marine Animal with Aggregated Features.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Towards Fine-Grained Webpage Fingerprinting at Scale.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Recurrent Multi-scale Transformer for High-Resolution Salient Object Detection.
CoRR, 2023
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Recurrent Multi-scale Transformer for High-Resolution Salient Object Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022
Practical differentially private online advertising.
Comput. Secur., 2022
FISE: A Forwarding Table Structure for Enterprise Networks.
IEEE Trans. Netw. Serv. Manag., 2020
Two Dimensional Router: Design and Implementation.
CoRR, 2019