Jianfeng Li

Orcid: 0000-0002-3453-0195

Affiliations:
  • Xi'an Jiaotong University, Faculty of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an, China
  • Hong Kong Polytechnic University, Department of Computing, Hong Kong (2019 - 2022)
  • Xi'an Jiaotong University, Xi'an, China (PhD 2018)


According to our database1, Jianfeng Li authored at least 35 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures.
IEEE/ACM Trans. Netw., June, 2024

On Smartly Scanning of the Internet of Things.
IEEE/ACM Trans. Netw., April, 2024

ABC-Channel: An Advanced Blockchain-based Covert Channel.
CoRR, 2024

TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation.
CoRR, 2024

DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Demystifying DeFi MEV Activities in Flashbots Bundle.
IACR Cryptol. ePrint Arch., 2023

An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Proceedings of the 32nd USENIX Security Symposium, 2023

Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DeepInfer: Deep Type Inference from Smart Contract Bytecode.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

CydiOS: A Model-Based Testing Framework for iOS Apps.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.
IEEE/ACM Trans. Netw., 2022

FOAP: Fine-Grained Open-World Android App Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022

SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Proceedings of the 31st USENIX Security Symposium, 2022

Packet-Level Open-World App Fingerprinting on Wireless Traffic.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Landing Reinforcement Learning onto Smart Scanning of The Internet of Things.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers.
IEEE Commun. Mag., 2021

On Modeling Link Flooding Attacks and Defenses.
IEEE Access, 2021

Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Context-aware Website Fingerprinting over Encrypted Proxies.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Structural Attack against Graph Based Android Malware Detection.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Taming energy cost of disk encryption software on data-intensive mobile devices.
Future Gener. Comput. Syst., 2020

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019

2018
Camera Placement Based on Vehicle Traffic for Better City Security Surveillance.
IEEE Intell. Syst., 2018

Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks.
Proceedings of the Network and System Security - 12th International Conference, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance.
CoRR, 2017

2015
Accurate DNS query characteristics estimation via active probing.
J. Netw. Comput. Appl., 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014

2013
Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

2012
Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...