Ding Li

Orcid: 0000-0001-7558-9137

Affiliations:
  • Peking University, Beijing, China
  • NEC Labs, USA (former)
  • University of Southern California, Department of Computer Science, Los Angeles, CA USA (former)


According to our database1, Ding Li authored at least 66 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
<i>Adonis</i>: Practical and Efficient Control Flow Recovery through OS-level Traces.
ACM Trans. Softw. Eng. Methodol., January, 2024

Detecting Malicious Websites From the Perspective of System Provenance Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense.
CoRR, 2024

FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
<i>FaaSLight</i>: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing.
ACM Trans. Softw. Eng. Methodol., September, 2023

Beyond Fine-Tuning: Efficient and Effective Fed-Tuning for Mobile/Web Users.
Proceedings of the ACM Web Conference 2023, 2023

Towards Efficient Hugepage-aware Memory Deduplication.
Proceedings of the 4th Workshop on Resource Disaggregation and Serverless, 2023

Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.
Proceedings of the 32nd USENIX Security Symposium, 2023

DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Proceedings of the 32nd USENIX Security Symposium, 2023

Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Shared Account Problem in Super Apps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

How Android Apps Break the Data Minimization Principle: An Empirical Study.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence Matching.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android Apps.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Towards OS Heterogeneity Aware Cluster Management for HPC.
Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems, 2023

2022
LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing.
CoRR, 2022

ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
DistFL: Distribution-aware Federated Learning for Mobile Scenarios.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

SIGL: Securing Software Installations Through Deep Graph Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
Proceedings of the 30th USENIX Security Symposium, 2021

Structural Temporal Graph Neural Networks for Anomaly Detection in Dynamic Graphs.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Temporal Context-Aware Representation Learning for Question Routing.
Proceedings of the WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, 2020

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Heterogeneous Graph Matching Networks.
CoRR, 2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019

Countering Malicious Processes with Process-DNS Association.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Heterogeneous Graph Matching Networks for Unknown Malware Detection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Progressive processing of system-behavioral query.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Deep Program Reidentification: A Graph Neural Network Solution.
CoRR, 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Remove RATs from your code: automated optimization of resource inefficient database writes for mobile applications.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Detecting display energy hotspots in Android apps.
Softw. Test. Verification Reliab., 2017

Detecting Low Rating Android Apps Before They Have Reached the Market.
CoRR, 2017

2016
Automated energy optimization of HTTP requests for mobile applications.
Proceedings of the 38th International Conference on Software Engineering, 2016

Lightweight measurement and estimation of mobile ad energy consumption.
Proceedings of the 5th International Workshop on Green and Sustainable Software, 2016

2015
Optimizing display energy consumption for hybrid Android apps (invited talk).
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

Nyx: a display energy optimizer for mobile web apps.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

String analysis for Java and Android applications.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Optimizing energy of HTTP requests in Android applications.
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

Detecting Display Energy Hotspots in Android Apps.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Domino: understanding wide-area, asynchronous event causality in web applications.
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015

2014
Integrated energy-directed test suite optimization.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

An Empirical Study of the Energy Consumption of Android Applications.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Making web applications more energy efficient for OLED smartphones.
Proceedings of the 36th International Conference on Software Engineering, 2014

An investigation into energy-saving programming practices for Android smartphone app development.
Proceedings of the 3rd International Workshop on Green and Sustainable Software, 2014

2013
SIF: a selective instrumentation framework for mobile applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Calculating source line level energy information for Android applications.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

Estimating mobile application energy consumption using program analysis.
Proceedings of the 35th International Conference on Software Engineering, 2013

Energy-directed test suite optimization.
Proceedings of the 2nd International Workshop on Green and Sustainable Software, 2013

2012
Estimating Android applications' CPU energy usage via bytecode profiling.
Proceedings of the First International Workshop on Green and Sustainable Software, 2012


  Loading...