Qi Li
Orcid: 0000-0001-8776-8730Affiliations:
- Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
- Beijing National Research Center for Information Science and Technology, Beijing, China
- Tsinghua University, Graduate School at Shenzhen, China (former)
- Tsinghua University, Department of Computer Science, Beijing, China (former)
- Chinese Academy and Sciences, Institute of Software, Beijing, China (former)
According to our database1,
Qi Li
authored at least 338 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns.
IEEE Trans. Mob. Comput., October, 2024
IEEE/ACM Trans. Netw., August, 2024
IEEE/ACM Trans. Netw., August, 2024
Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation.
IEEE Trans. Netw. Serv. Manag., August, 2024
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning.
IEEE/ACM Trans. Netw., June, 2024
IEEE Trans. Mob. Comput., June, 2024
Dataset, May, 2024
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning.
IEEE Trans. Netw. Serv. Manag., April, 2024
IEEE/ACM Trans. Netw., February, 2024
IEEE/ACM Trans. Netw., February, 2024
ACM Trans. Knowl. Discov. Data, February, 2024
Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary.
IEEE Internet Things J., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
The Power of Bias: Optimizing Client Selection in Federated Learning with Heterogeneous Differential Privacy.
CoRR, 2024
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks.
CoRR, 2024
CoRR, 2024
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models.
CoRR, 2024
CoRR, 2024
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems.
CoRR, 2024
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features.
Proceedings of the 33rd USENIX Security Symposium, 2024
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Proceedings of the 33rd USENIX Security Symposium, 2024
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Commun. Mag., December, 2023
IEEE Trans. Knowl. Data Eng., October, 2023
Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features.
Inf. Sci., October, 2023
IEEE/ACM Trans. Netw., August, 2023
IEEE Trans. Circuits Syst. Video Technol., August, 2023
IEEE/ACM Trans. Netw., June, 2023
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction.
Sci. China Inf. Sci., May, 2023
IEEE/ACM Trans. Netw., February, 2023
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur., 2023
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR, 2023
CoRR, 2023
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
CoRR, 2023
IEEE Commun. Surv. Tutorials, 2023
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Self-supervision meets kernel graph neural models: From architecture to augmentations.
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Advanced Parallel Processing Technologies, 2023
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
2022
IEEE/ACM Trans. Netw., 2022
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022
IEEE/ACM Trans. Netw., 2022
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Knowl. Data Eng., 2022
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR, 2022
Sci. China Inf. Sci., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
FlyLISL: Traffic Balance Awared Routing for Large-scale Mixed-Reality Telepresence over Reconfigurable Mega-Constellation.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021
IEEE Trans. Parallel Distributed Syst., 2021
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks.
IEEE/ACM Trans. Netw., 2021
IEEE/ACM Trans. Netw., 2021
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw., 2021
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services.
IEEE Trans. Netw. Serv. Manag., 2021
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proc. IEEE, 2021
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles.
IEEE Internet Things J., 2021
CoRR, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE/ACM Trans. Netw., 2020
IEEE Trans. Netw. Serv. Manag., 2020
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems.
IEEE Trans. Netw. Serv. Manag., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Netw., 2020
IEEE Netw., 2020
IEEE Commun. Mag., 2020
A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises.
Proceedings of the Security and Privacy in Communication Networks, 2020
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Dependable Secur. Comput., 2019
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019
Comput. Networks, 2019
A novel method to find important apps base on the analysis of components relationship.
Clust. Comput., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Wirel. Pers. Commun., 2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Parallel Distributed Syst., 2018
IEEE/ACM Trans. Netw., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Netw., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
CellPAD: Detecting Performance Anomalies in Cellular Networks via Regression Analysis.
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 47th International Conference on Parallel Processing, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE/ACM Trans. Netw., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Secur. Comput., 2017
Inf. Sci., 2017
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code.
Future Gener. Comput. Syst., 2017
IEEE Commun. Mag., 2017
IEEE Commun. Mag., 2017
An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs.
IEEE Access, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Data verification in information-centric networking with efficient revocable certificateless signature.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
ACM Comput. Surv., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Tunneling on demand: A lightweight approach for IP fast rerouting against multi-link failures.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
KSII Trans. Internet Inf. Syst., 2015
Privacy Information Security Classification for Internet of Things Based on Internet Data.
Int. J. Distributed Sens. Networks, 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
2014
IEEE/ACM Trans. Netw., 2014
Directional communication with movement prediction in mobile wireless sensor networks.
Pers. Ubiquitous Comput., 2014
Perform. Evaluation, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Proceedings of the International Conference on Identification, 2014
Proceedings of the Frontiers in Internet Technologies, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013
2012
IEEE Trans. Netw. Serv. Manag., 2012
IEEE Trans. Inf. Forensics Secur., 2012
VegaNet: a virtualized experimentation platform for production networks with connectivity consistency.
IEEE Netw., 2012
Comput. Commun., 2012
Comput. Networks, 2012
2011
J. Parallel Distributed Comput., 2011
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
Proceedings of the 19th International Workshop on Quality of Service, 2011
Compact Route Computation: Improving Parallel BGP Route Processing for Scalable Routers.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011
An efficient parallel TCAM scheme for the forwarding engine of the next-generation router.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Global Communications Conference, 2010
2009
Comput. Secur., 2009
Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer Perspective.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
2008
Analysis and case study on multi-dimensional scalability of the Internet architecture.
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
Proceedings of the 2008 International Conference on Information Networking, 2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005