Zhi Li

Orcid: 0000-0001-7071-2976

Affiliations:
  • Chinese Academy of Science, Institute of Information Engineering, State Key Laboratory of Information Security, China


According to our database1, Zhi Li authored at least 36 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Batch-transformer for scene text image super-resolution.
Vis. Comput., October, 2024

Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers.
ACM Trans. Softw. Eng. Methodol., May, 2024

Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge.
ACM Trans. Softw. Eng. Methodol., January, 2024

Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning.
Proc. ACM Softw. Eng., 2024

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Concrete Constraint Guided Symbolic Execution.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023

Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023

Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution.
IEEE Trans. Dependable Secur. Comput., 2023

Harnessing the Power of LLM to Support Binary Taint Analysis.
CoRR, 2023

HackMentor: Fine-Tuning Large Language Models for Cybersecurity.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023

2022
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2022

Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction.
IEEE Internet Things J., 2022

Compromised IoT Devices Detection in Smart Home via Semantic Information.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

2020
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2018
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph).
计算机科学, 2018

MIAC: A mobility intention auto-completion model for location prediction.
Intell. Syst. Account. Finance Manag., 2018

Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
MIAC: A Mobility Intention Auto-Completion Model for Location Prediction.
Proceedings of the Knowledge Science, Engineering and Management, 2017

2016
Influential spatial facility prediction over large scale cyber-physical vehicles in smart city.
EURASIP J. Wirel. Commun. Netw., 2016

Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

GUIDE: Graphical user interface fingerprints physical devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Veh. Technol., 2015

A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2015

Fog Computing: Focusing on Mobile Users at the Edge.
CoRR, 2015

A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

2014
An optimal privacy-preserving mechanism for crowdsourced traffic monitoring.
Proceedings of the 10th ACM International Workshop on Foundations of Mobile Computing, 2014

2013
Amortized Fairness for Drive-Thru Internet.
Int. J. Distributed Sens. Networks, 2013

2010
Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2010


  Loading...