Zhou Li
Orcid: 0000-0002-9401-1012Affiliations:
- University of California Irvine, Henry Samueli School of Engineering, CA, USA
- RSA Laboratories, Bedford, MA, USA (until 2018)
- Indiana University Bloomington, IN, USA (PhD 2014)
- Wuhan University, College of Computer Science, China (former)
According to our database1,
Zhou Li
authored at least 88 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks.
CoRR, 2024
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Proceedings of the 33rd USENIX Security Symposium, 2024
Understanding and Bridging the Gap Between Unsupervised Network Representation Learning and Security Analytics.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Software Eng., 2022
IEEE Access, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
CoRR, 2021
IEEE Access, 2021
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proceedings of the 10th USENIX Workshop on Free and Open Communications on the Internet, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Internet Measurement Conference, 2019
TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Accessing mobile user's privacy based on IME personalization: Understanding and practical attacks.
J. Comput. Secur., 2018
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment.
Proceedings of the 26th USENIX Security Symposium, 2017
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
Proceedings of the 25th USENIX Security Symposium, 2016
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Catching predators at watering holes: finding and understanding strategically compromised websites.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Every Second Counts: Quantifying the Negative Externalities of Cybercrime via Typosquatting.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Wirel. Commun., 2014
Gateless Treasure: How to Get Sensitive Information from Unprotected External Storage on Android Phones.
CoRR, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
2013
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Sidebuster: automated detection and quantification of side-channel leaks in web application development.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
PerformTrust: Trust model integrated past and current performance in P2P file sharing systems.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007