Qi Li

Orcid: 0000-0001-8776-8730

Affiliations:
  • Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
  • Beijing National Research Center for Information Science and Technology, Beijing, China
  • Tsinghua University, Graduate School at Shenzhen, China (former)
  • Tsinghua University, Department of Computer Science, Beijing, China (former)
  • Chinese Academy and Sciences, Institute of Software, Beijing, China (former)


According to our database1, Qi Li authored at least 338 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns.
IEEE Trans. Mob. Comput., October, 2024

Toward Practical Inter-Domain Source Address Validation.
IEEE/ACM Trans. Netw., August, 2024

Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection.
IEEE/ACM Trans. Netw., August, 2024

Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation.
IEEE Trans. Netw. Serv. Manag., August, 2024

FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning.
IEEE/ACM Trans. Netw., June, 2024

FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound.
IEEE Trans. Mob. Comput., June, 2024

CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts).
Dataset, May, 2024

MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning.
IEEE Trans. Netw. Serv. Manag., April, 2024

Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw., February, 2024

Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds.
IEEE/ACM Trans. Netw., February, 2024

Graph Mining for Cybersecurity: A Survey.
ACM Trans. Knowl. Discov. Data, February, 2024

Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary.
IEEE Internet Things J., February, 2024

Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving.
IEEE Trans. Inf. Forensics Secur., 2024

EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
IEEE Trans. Inf. Forensics Secur., 2024

Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side.
IEEE Trans. Inf. Forensics Secur., 2024

CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Towards Benchmarking and Evaluating Deepfake Detection.
IEEE Trans. Dependable Secur. Comput., 2024

CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
IACR Cryptol. ePrint Arch., 2024

ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
CoRR, 2024

The Power of Bias: Optimizing Client Selection in Federated Learning with Heterogeneous Differential Privacy.
CoRR, 2024

On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks.
CoRR, 2024

Jailbreak Attacks and Defenses Against Large Language Models: A Survey.
CoRR, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
CoRR, 2024

Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models.
CoRR, 2024

JNI Global References Are Still Vulnerable: Attacks and Defenses.
CoRR, 2024

A Survey of Deep Learning Library Testing Methods.
CoRR, 2024

Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
CoRR, 2024

Hijacking Attacks against Neural Networks by Analyzing Training Data.
CoRR, 2024

Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems.
CoRR, 2024

ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Proceedings of the 33rd USENIX Security Symposium, 2024

What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check.
Proceedings of the 33rd USENIX Security Symposium, 2024

Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
Proceedings of the 33rd USENIX Security Symposium, 2024

Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features.
Proceedings of the 33rd USENIX Security Symposium, 2024

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Proceedings of the 33rd USENIX Security Symposium, 2024

Demystifying the Security Implications in IoT Device Rental Services.
Proceedings of the 33rd USENIX Security Symposium, 2024

More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Proceedings of the 33rd USENIX Security Symposium, 2024

Hijacking Attacks against Neural Network by Analyzing Training Data.
Proceedings of the 33rd USENIX Security Symposium, 2024

Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
Proceedings of the 33rd USENIX Security Symposium, 2024

Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Proceedings of the 33rd USENIX Security Symposium, 2024

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

Towards Fine-Grained Webpage Fingerprinting at Scale.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

RISiren: Wireless Sensing System Attacks via Metasurface.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems.
IEEE Commun. Mag., December, 2023

Detecting Malicious Accounts in Online Developer Communities Using Deep Learning.
IEEE Trans. Knowl. Data Eng., October, 2023

Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features.
Inf. Sci., October, 2023

MASK: Practical Source and Path Verification Based on Multi-AS-Key.
IEEE/ACM Trans. Netw., August, 2023

SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices.
IEEE Trans. Circuits Syst. Video Technol., August, 2023

The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate.
IEEE/ACM Trans. Netw., June, 2023

Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction.
Sci. China Inf. Sci., May, 2023

Frequency Domain Feature Based Robust Malicious Traffic Detection.
IEEE/ACM Trans. Netw., February, 2023

Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur., 2023

FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur., 2023

PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput., 2023

PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations.
IEEE Trans. Dependable Secur. Comput., 2023

Automatic Generation of Adversarial Readable Chinese Texts.
IEEE Trans. Dependable Secur. Comput., 2023

SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals.
IEEE Trans. Dependable Secur. Comput., 2023

CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput., 2023

Securing Liveness Detection for Voice Authentication via Pop Noises.
IEEE Trans. Dependable Secur. Comput., 2023

A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput., 2023

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR, 2023

Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments.
CoRR, 2023

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
CoRR, 2023

Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification.
Proceedings of the ACM Web Conference 2023, 2023

An Efficient Design of Intelligent Network Data Plane.
Proceedings of the 32nd USENIX Security Symposium, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Cross Container Attacks: The Bewildered eBPF on Clouds.
Proceedings of the 32nd USENIX Security Symposium, 2023

Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Proceedings of the 32nd USENIX Security Symposium, 2023

GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Self-supervision meets kernel graph neural models: From architecture to augmentations.
Proceedings of the IEEE International Conference on Data Mining, 2023

Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

MPass: Bypassing Learning-based Static Malware Detectors.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

MTD '23: 10th ACM Workshop on Moving Target Defense.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Spear-Phishing Detection Method Based on Few-Shot Learning.
Proceedings of the Advanced Parallel Processing Technologies, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw., 2022

Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw., 2022

Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag., 2022

GPSC: A Grid-Based Privacy-Reserving Framework for Online Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2022

Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur., 2022

SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput., 2022

Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput., 2022

Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

JNI Global References Are Still Vulnerable: Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput., 2022

LSTM Based Phishing Detection for Big Email Data.
IEEE Trans. Big Data, 2022

FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR, 2022

Towards Benchmarking and Evaluating Deepfake Detection.
CoRR, 2022

Practical differentially private online advertising.
Comput. Secur., 2022

Intelligent networking in adversarial environment: challenges and opportunities.
Sci. China Inf. Sci., 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Unsupervised Contextual Anomaly Detection for Database Systems.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

BinProv: Binary Code Provenance Identification without Disassembly.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Encrypted Malware Traffic Detection via Graph-based Network Analysis.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

BET: black-box efficient testing for convolutional neural networks.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

FlyLISL: Traffic Balance Awared Routing for Large-scale Mixed-Reality Telepresence over Reconfigurable Mega-Constellation.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

D3: Lightweight Secure Fault Localization in Edge Cloud.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Verifying the Quality of Outsourced Training on Clouds.
Proceedings of the Computer Security - ESORICS 2022, 2022

Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

On the Privacy Risks of Cell-Based NAS Architectures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst., 2021

Efficient Forwarding Anomaly Detection in Software-Defined Networks.
IEEE Trans. Parallel Distributed Syst., 2021

Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks.
IEEE/ACM Trans. Netw., 2021

vSFC: Generic and Agile Verification of Service Function Chains in the Cloud.
IEEE/ACM Trans. Netw., 2021

Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw., 2021

Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services.
IEEE Trans. Netw. Serv. Manag., 2021

Stealing Your Android Patterns via Acoustic Signals.
IEEE Trans. Mob. Comput., 2021

Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

ObliComm: Towards Building an Efficient Oblivious Communication System.
IEEE Trans. Dependable Secur. Comput., 2021

Security and Privacy in Smart Cities.
Secur. Commun. Networks, 2021

Building In-the-Cloud Network Functions: Security and Privacy Challenges.
Proc. IEEE, 2021

Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021

CNN-Based Malware Variants Detection Method for Internet of Things.
IEEE Internet Things J., 2021

A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles.
IEEE Internet Things J., 2021

AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning.
CoRR, 2021

Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns.
CoRR, 2021

OblivSketch: Oblivious Network Measurement as a Cloud Service.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Data Poisoning Attacks to Deep Learning Based Recommender Systems.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

MASK: Practical Source and Path Verification based on Multi-AS-Key.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Privacy-Preserving Convex Factorization Machine.
Proceedings of the International Joint Conference on Neural Networks, 2021

CARTL: Cooperative Adversarially-Robust Transfer Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Fast IPv6 Network Periphery Discovery and Security Implications.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Verifying Rule Enforcement in Software Defined Networks With REV.
IEEE/ACM Trans. Netw., 2020

FISE: A Forwarding Table Structure for Enterprise Networks.
IEEE Trans. Netw. Serv. Manag., 2020

Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems.
IEEE Trans. Netw. Serv. Manag., 2020

PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2020

Toward Comprehensive Network Verification: Practices, Challenges and Beyond.
IEEE Netw., 2020

Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks.
IEEE Netw., 2020

ID-Based SDN for the Internet of Things.
IEEE Netw., 2020

Robust Attacks on Deep Learning Face Recognition in the Physical World.
CoRR, 2020

SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards.
IEEE Commun. Mag., 2020

A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises.
Proceedings of the Security and Privacy in Communication Networks, 2020

SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage.
Proceedings of the Security and Privacy in Communication Networks, 2020

SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

I Know If the Journey Changes: Flexible Source and Path Validation.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Enabling Execution Assurance of Federated Learning at Untrusted Participants.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Argot: Generating Adversarial Readable Chinese Texts.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Removing Backdoor-Based Watermarks in Neural Networks with Limited Data.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Towards Federated Learning for HVAC Analytics: A Measurement Study.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

Towards a Believable Decoy System: Replaying Network Activities from Real System.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Off-Path TCP Exploits of the Mixed IPID Assignment.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
LSTM-Based SQL Injection Detection Method for Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2019

ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum.
IEEE Trans. Mob. Comput., 2019

Dynamic Packet Forwarding Verification in SDN.
IEEE Trans. Dependable Secur. Comput., 2019

BGP with BGPsec: Attacks and Countermeasures.
IEEE Netw., 2019

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019

Two Dimensional Router: Design and Implementation.
CoRR, 2019

RFL: Robust fault localization on unreliable communication channels.
Comput. Networks, 2019

A novel method to find important apps base on the analysis of components relationship.
Clust. Comput., 2019

A SQL Injection Detection Method Based on Adaptive Deep Forest.
IEEE Access, 2019

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts.
Proceedings of the Security and Privacy in Communication Networks, 2019

IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Fingerprinting SDN Applications via Encrypted Control Traffic.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Exploring the Influence of News Articles on Bitcoin Price with Machine Learning.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

SoftGuard: Defend Against the Low-Rate TCP Attack in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Analyzing the Browser Security Warnings on HTTPS Errors.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

cSFC: Building Credible Service Function Chain on the Cloud.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Detecting Malicious Accounts in Online Developer Communities Using Deep Learning.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Defect Prediction in Android Binary Executables Using Deep Neural Network.
Wirel. Pers. Commun., 2018

ShiftRoute: Achieving Location Privacy for Map Services on Smartphones.
IEEE Trans. Veh. Technol., 2018

Enabling Generic, Verifiable, and Secure Data Search in Cloud Services.
IEEE Trans. Parallel Distributed Syst., 2018

Fast Rerouting Against Multi-Link Failures Without Topology Constraint.
IEEE/ACM Trans. Netw., 2018

Security Policy Violations in SDN Data Plane.
IEEE/ACM Trans. Netw., 2018

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains.
IEEE Netw., 2018

A Comprehensive Study of Permission Usage on Android.
Proceedings of the Network and System Security - 12th International Conference, 2018

CellPAD: Detecting Performance Anomalies in Cellular Networks via Regression Analysis.
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018

SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Cache Assisted Randomized Sharing Counters in Network Measurement.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Towards Privacy-Preserving Malware Detection Systems for Android.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

FOCES: Detecting Forwarding Anomalies in Software Defined Networks.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Multi-tab Website Fingerprinting Attack.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Capability-Based Security Enforcement in Named Data Networking.
IEEE/ACM Trans. Netw., 2017

Achieving Content-Oriented Anonymity with CRISP.
IEEE Trans. Dependable Secur. Comput., 2017

Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Secur. Comput., 2017

Scale the Internet routing table by generalized next hops of strict partial order.
Inf. Sci., 2017

TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code.
Future Gener. Comput. Syst., 2017

Adaptive Distributed Software Defined Networking.
Comput. Commun., 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2.
IEEE Commun. Mag., 2017

Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1.
IEEE Commun. Mag., 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs.
IEEE Access, 2017

LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Proceedings of the Security and Privacy in Communication Networks, 2017

TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Generic and agile service function chain verification on cloud.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Cookie-based amplification repression protocol.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Robust and lightweight fault localization.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Truthful Auctions for User Data Allowance Trading in Mobile Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

RealDroid: Large-Scale Evasive Malware Detection on "Real Devices".
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Proceedings of the Financial Cryptography and Data Security, 2017

JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Data verification in information-centric networking with efficient revocable certificateless signature.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Sybil Defense in Crowdsourcing Platforms.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Editor's Note.
IEEE Trans. Dependable Secur. Comput., 2016

Direct Resource Hijacking in Android.
IEEE Internet Comput., 2016

Ensuring Security and Privacy Preservation for Cloud Data Services.
ACM Comput. Surv., 2016

Exploiting Android System Services Through Bypassing Service Helpers.
Proceedings of the Security and Privacy in Communication Networks, 2016

Achieving Stable iBGP with Only One Add-Path.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Tunneling on demand: A lightweight approach for IP fast rerouting against multi-link failures.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

FADE: Detecting forwarding anomaly in software-defined networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Defect trigger model: Analysis method of mobile application defect.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Combination attack of android applications analysis scheme based on privacy leak.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2015

Invalidating Idealized BGP Security Proposals and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2015

ANNs on Co-occurrence Matrices for Mobile Malware Detection.
KSII Trans. Internet Inf. Syst., 2015

Privacy Information Security Classification for Internet of Things Based on Internet Data.
Int. J. Distributed Sens. Networks, 2015

Multi-tenancy authorization models for collaborative cloud services.
Concurr. Comput. Pract. Exp., 2015

Xede: Practical Exploit Early Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Joint optimization of content replication and Traffic Engineering in ICN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Towards Controller Placement for robust Software-Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Towards adaptive elastic distributed Software Defined Networking.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Safe and Practical Energy-Efficient Detour Routing in IP Networks.
IEEE/ACM Trans. Netw., 2014

Directional communication with movement prediction in mobile wireless sensor networks.
Pers. Ubiquitous Comput., 2014

An economic analysis of routing conflict and its resolution.
Perform. Evaluation, 2014

Towards fast rerouting-based energy efficient routing.
Comput. Networks, 2014

Guarantee IP lookup performance with FIB explosion.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Revisiting Node Injection of P2P Botnet.
Proceedings of the Network and System Security - 8th International Conference, 2014

Session-based access control in information-centric networks: Design and analyses.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Privacy Information Security Classification Study in Internet of Things.
Proceedings of the International Conference on Identification, 2014

Multi-dimensional Forwarding Tables.
Proceedings of the Frontiers in Internet Technologies, 2014

2013
A Novel Element Detection Method in Audio Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Automatic Polymorphic Exploit Generation for Software Vulnerabilities.
Proceedings of the Security and Privacy in Communication Networks, 2013

Switchable under-actuated finger with multiple grasping modes.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

A multi-tenant RBAC model for collaborative cloud services.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Exploiting Multiple Features for Learning to Rank in Expert Finding.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
A Unified Approach to Routing Protection in IP Networks.
IEEE Trans. Netw. Serv. Manag., 2012

Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
IEEE Trans. Inf. Forensics Secur., 2012

VegaNet: a virtualized experimentation platform for production networks with connectivity consistency.
IEEE Netw., 2012

Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme.
Comput. Commun., 2012

Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time.
Comput. Networks, 2012

2011
Toward a practical approach for BGP stability with root cause check.
J. Parallel Distributed Comput., 2011

Self-healing routing: failure, modeling and analysis.
Sci. China Inf. Sci., 2011

Access Path Based Source Address Validation in Mobile IPv6.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

MPCT: Minimum protection cost tree for IP fast reroute using Tunnel.
Proceedings of the 19th International Workshop on Quality of Service, 2011

Compact Route Computation: Improving Parallel BGP Route Processing for Scalable Routers.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

An efficient parallel TCAM scheme for the forwarding engine of the next-generation router.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

An Algebraic Approach to Computing the Reliability of Internet Routing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Efficient searching with parallel TCAM chips.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Efficient parallel searching with TCAMs.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Achieving Unified Protection for IP Routing.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

A Lightweight IP Fast Reroute Algorithm with Tunneling.
Proceedings of IEEE International Conference on Communications, 2010

PCLF: A Practical Cross-Layer Fast Handover Mechanism in IEEE 802.11 WLANs.
Proceedings of IEEE International Conference on Communications, 2010

IP Fast Reroute: NotVia with Early Decapsulation.
Proceedings of the Global Communications Conference, 2010

2009
Towards secure dynamic collaborations with group-based RBAC model.
Comput. Secur., 2009

Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer Perspective.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Improving IGP Convergence through Distributed OSPF in Scalable Router.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

2008
Analysis and case study on multi-dimensional scalability of the Internet architecture.
Sci. China Ser. F Inf. Sci., 2008

VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

A Study of Path Protection in Self-Healing Routing.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Access control in Group Communication Systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A hash-TLB approach for MMU virtualization in xen/IA64.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Toward A Practical Scheme for IPSec Management.
Proceedings of the 2008 International Conference on Information Networking, 2008

Evaluating Service Scalability of Network Architectures.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Towards a Group-Based RBAC Model and Decentralized User-Role Administration.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Usage control platformization via trustworthy SELinux.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Flexible Authorization with Decentralized Access Control Model for Grid Computing.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Supporting Ad-hoc Collaboration with Group-based RBAC Model.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
An Administration Model of DRBAC on the Web.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005


  Loading...