Hong Li

Orcid: 0000-0003-1353-7838

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing Key Laboratory of IOT Information Security, China


According to our database1, Hong Li authored at least 91 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FeaShare: Feature Sharing for Computation Correctness in Edge Preprocessing.
IEEE Trans. Mob. Comput., December, 2024

Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers.
ACM Trans. Softw. Eng. Methodol., May, 2024

LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries.
ACM Trans. Softw. Eng. Methodol., February, 2024

Towards Unconstrained Vocabulary Eavesdropping With mmWave Radar Using GAN.
IEEE Trans. Mob. Comput., January, 2024

Multi-granularity cross-modal representation learning for named entity recognition on social media.
Inf. Process. Manag., January, 2024

TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves.
CoRR, 2024

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024

Hierarchical Aligned Multimodal Learning for NER on Tweet Posts.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023

Model Poisoning Attack on Neural Network Without Reference Data.
IEEE Trans. Computers, October, 2023

Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023

Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks.
Comput. Secur., September, 2023

Owner name entity recognition in websites based on multiscale features and multimodal co-attention.
Expert Syst. Appl., August, 2023

Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023

DevTag: A Benchmark for Fingerprinting IoT Devices.
IEEE Internet Things J., April, 2023

Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023

Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.
Int. J. Intell. Syst., 2023

A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.
CoRR, 2023

CL-GAN: A GAN-based continual learning model for generating and detecting AGDs.
Comput. Secur., 2023

DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.
Proceedings of the IEEE Military Communications Conference, 2023

Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.
Proceedings of the International Joint Conference on Neural Networks, 2023

CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises.
Proceedings of the International Joint Conference on Neural Networks, 2023

FlowEmbed: Binary function embedding model based on relational control flow graph and byte sequence.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023

Intrusion Detection Based on Sampling and Improved OVA Technique on Imbalanced Data.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022

Reinforcement learning based adversarial malware example generation against black-box detectors.
Comput. Secur., 2022

Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Inferring Device Interactions for Attack Path Discovery in Smart Home IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Proceedings of the Security and Privacy in Communication Networks, 2022

Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Automatic Construction of Large-Scale IoT Datasets with Multi-strategy Fusion.
Proceedings of the Wireless Sensor Networks - 16th China Conference, 2022

2021
Multi-Source Knowledge Reasoning for Data-Driven IoT Security.
Sensors, 2021

Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021

Firmware Re-hosting Through Static Binary-level Porting.
CoRR, 2021

FIUD: A Framework to Identify Users of Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Robust IoT Device Identification Method with Unknown Traffic Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Threat Analysis of IoT Security Knowledge Graph Based on Confidence.
Proceedings of the Emerging Technologies for Education - 6th International Symposium, 2021

2020
Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2020

Location-Aware Wi-Fi Authentication Scheme Using Smart Contract.
Sensors, 2020

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Future Gener. Comput. Syst., 2020

EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

VES: A Component Version Extracting System for Large-Scale IoT Firmwares.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

The Mining of IP Landmarks for Internet Webcams.
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020

2019
Blockchain for Large-Scale Internet of Things Data Storage and Protection.
IEEE Trans. Serv. Comput., 2019

Coin Hopping Attack in Blockchain-Based IoT.
IEEE Internet Things J., 2019

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
EURASIP J. Wirel. Commun. Netw., 2019

Towards IP geolocation with intermediate routers based on topology discovery.
Cybersecur., 2019

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Side-Channel Information Leakage of Traffic Data in Instant Messaging.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

SCTM: A Multi-View Detecting Approach Against Industrial Control Systems Attacks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Anonymous Blockchain-Based Logging System for Cloud Computing.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2018
A Secure and Scalable Data Communication Scheme in Smart Grids.
Wirel. Commun. Mob. Comput., 2018

A survey: Reward distribution mechanisms and withholding attacks in Bitcoin pool mining.
Math. Found. Comput., 2018

Who owns Internet of Thing devices?
Int. J. Distributed Sens. Networks, 2018

A survey of intrusion detection on industrial control systems.
Int. J. Distributed Sens. Networks, 2018

A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications.
IEEE Access, 2018

A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications.
IEEE Access, 2018

Robust Network-Based Binary-to-Vector Encoding for Scalable IoT Binary File Retrieval.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Check-In System Leveraging Face Recognition.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence.
Wirel. Commun. Mob. Comput., 2017

Mitigating Data Sparsity Using Similarity Reinforcement-Enhanced Collaborative Filtering.
ACM Trans. Internet Techn., 2017

Mobility Intention-Based Relationship Inference from Spatiotemporal Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Bitcoin Based Incentive Mechanism for Distributed P2P Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Poster: Towards Fully Distributed User Authentication with Blockchain.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Personal Information Inference in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Inference attacks based on neural networks in social networks.
Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, 2017

2016
Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization.
EURASIP J. Wirel. Commun. Netw., 2016

An Enhanced Structure-Based De-anonymization of Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Side-channel information leakage of encrypted video stream in video surveillance systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Lightweight Location Privacy-Preserving Scheme for WiFi Fingerprint-Based Localization.
Proceedings of the International Conference on Identification, 2016

2015
Security and privacy in localization for underwater sensor networks.
IEEE Commun. Mag., 2015

2014
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

LARES: latency-reduced neighbour discovery for contagious diseases prevention.
Int. J. Ad Hoc Ubiquitous Comput., 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

Security of Cyber Physical System.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014


  Loading...