Ding Li
Orcid: 0000-0001-7558-9137Affiliations:
- Peking University, Beijing, China
- NEC Labs, USA (former)
- University of Southern California, Department of Computer Science, Los Angeles, CA USA (former)
According to our database1,
Ding Li
authored at least 66 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
<i>Adonis</i>: Practical and Efficient Control Flow Recovery through OS-level Traces.
ACM Trans. Softw. Eng. Methodol., January, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense.
CoRR, 2024
FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware Capability.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
<i>FaaSLight</i>: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing.
ACM Trans. Softw. Eng. Methodol., September, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 4th Workshop on Resource Disaggregation and Serverless, 2023
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android Apps.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems, 2023
2022
LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing.
CoRR, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
Proceedings of the WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification.
Proceedings of the 2019 SIAM International Conference on Data Mining, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Remove RATs from your code: automated optimization of resource inefficient database writes for mobile applications.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Softw. Test. Verification Reliab., 2017
2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 5th International Workshop on Green and Sustainable Software, 2016
2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015
Proceedings of the 8th IEEE International Conference on Software Testing, 2015
Proceedings of the Sixth ACM Symposium on Cloud Computing, 2015
2014
Proceedings of the International Symposium on Software Testing and Analysis, 2014
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
Proceedings of the 36th International Conference on Software Engineering, 2014
An investigation into energy-saving programming practices for Android smartphone app development.
Proceedings of the 3rd International Workshop on Green and Sustainable Software, 2014
2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the International Symposium on Software Testing and Analysis, 2013
Proceedings of the 35th International Conference on Software Engineering, 2013
Proceedings of the 2nd International Workshop on Green and Sustainable Software, 2013
2012
Proceedings of the First International Workshop on Green and Sustainable Software, 2012