Jun Li
Orcid: 0000-0002-5308-5672Affiliations:
- University of Oregon, Eugene, OR, USA
- University of California at Los Angeles, CA, USA (PhD 2002)
According to our database1,
Jun Li
authored at least 99 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
5
10
4
2
2
3
1
2
2
4
2
3
1
1
1
1
3
1
1
1
1
3
8
3
8
4
1
1
10
3
6
1
2
1
4
1
4
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Internet Things, May, 2024
ACM Trans. Internet Things, February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
CoRR, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Dependable Secur. Comput., 2021
2020
Comput. Networks, 2020
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020
Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Mob. Comput., 2019
Soc. Netw. Anal. Min., 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
SVDC: A Highly Scalable Isolation Architecture for Virtualized Layer-2 Data Center Networks.
IEEE Trans. Cloud Comput., 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems.
IEEE Trans. Serv. Comput., 2017
IEEE/ACM Trans. Netw., 2017
The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks.
Comput. Commun., 2017
Comput. Networks, 2017
Thank You For Being A Friend: An Attacker View on Online-Social-Network-Based Sybil Defenses.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
2016
IEEE/ACM Trans. Netw., 2016
Comput. Networks, 2016
An expectation-based approach to policy-based security of the Border Gateway Protocol.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
2015
Comput. Commun., 2015
Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability.
Comput. Commun., 2015
Proceedings of the 14th IFIP Networking Conference, 2015
2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014
Proceedings of the 20th IEEE International Workshop on Local & Metropolitan Area Networks, 2014
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
NCShield: Securing decentralized, matrix factorization-based network coordinate systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
2011
mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients.
Peer-to-Peer Netw. Appl., 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
2008
2007
Comput. Secur., 2007
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007
2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
An internet routing forensics framework for discovering rules of abnormal BGP events.
Comput. Commun. Rev., 2005
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
IEEE J. Sel. Areas Commun., 2004
2002
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
Advances in Information Security 8, Springer, 2002
1999
Proceedings of the 1999 Workshop on New Security Paradigms, 1999