default search action
Qi Li 0002
Person information
- affiliation: Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
- affiliation: Beijing National Research Center for Information Science and Technology, Beijing, China
- affiliation (former): Tsinghua University, Graduate School at Shenzhen, China
- affiliation (former): Tsinghua University, Department of Computer Science, Beijing, China
- affiliation (former): Chinese Academy and Sciences, Institute of Software, Beijing, China
- not to be confused with: Qi Li 0040
Other persons with the same name
- Qi Li — disambiguation page
- Qi Li 0001 — Western Kentucky University, Department of Mathematics and Computer Science, Bowling Green, KY, USA (and 1 more)
- Qi Li 0003 — China Earthquake Administration, China (and 1 more)
- Qi Li 0004 — SUNY New Paltz, School of Business, NY, USA (and 3 more)
- Qi Li 0005 — Chinese Academy of Sciences, Institute of Automation, CAS Center for Excellence in Brain Science and Intelligence Technology, Beijing, China
- Qi Li 0006 — Tsinghua University, Institute of Data Science, Centre for Computational Mental Healthcare Research, Beijing, China
- Qi Li 0007 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Qi Li 0008 — Beijing Jiaotong University, Department of Mechanical Engineering, China (and 1 more)
- Qi Li 0009 — Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qi Li 0010 — National Grid UK, Electricity National Control Centre, Wokingham, UK (and 1 more)
- Qi Li 0011 — Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China (and 1 more)
- Qi Li 0012 — Iowa State University, Ames, IA, USA (and 2 more)
- Qi Li 0013 — Hong Kong University of Science and Technology, Hong Kong
- Qi Li 0014 — Rensselaer Polytechnic Institute, Department of Computer Science, Troy, NY USA (and 1 more)
- Qi Li 0015 — University of Pittsburgh, Department of Mechanical Engineering and Materials Science, PA, USA (and 1 more)
- Qi Li 0016 — University of Notre Dame, IN, USA
- Qi Li 0017 — Southeast University, Key Laboratory of Measurement and Control of Complex Systems of Engineering, Nanjing, China
- Qi Li 0018 — Zhejiang University, State Key Laboratory of Modern Optical Instrumentation, Hangzhou, China
- Qi Li 0019 — Partners HealthCare System, Clinical Informatics Research & Development, Boston, MA, USA
- Qi Li 0020 — University of Southern California, Center for Systems and Software Engineering, Los Angeles, CA, USA
- Qi Li 0021 — Hangzhou Normal University, Institute of Service Engineering, China (and 1 more)
- Qi Li 0022 — Beijing Institute of Technology, School of Software, China
- Qi Li 0023 — Chalmers University of Technology, Department of Microtechnology and Nanoscience, Gothenburg, Sweden
- Qi Li 0024 — China University of Petroleum (East China), College of Information and Control Engineering, Qingdao, China
- Qi Li 0025 — Shaoxing University, Department of Computer Science and Engineering, China (and 1 more)
- Qi Li 0026 — Xi'an Jiaotong University, School of Electrical Engineering, State Key Laboratory of Electrical Insulation and Power Equipment, China
- Qi Li 0027 — Harbin Institute of Technology (Weihai Campus), School of Automotive Engineering, China
- Qi Li 0028 — Changchun University of Science and Technology, School of Computer Science and Technology, China
- Qi Li 0029 — Dalian Maritime University, School of Information Science and Technology, China (and 1 more)
- Qi Li 0030 — Tianjin University, School of Electrical and Information Engineering, China
- Qi Li 0031 — Central South University, School of Information Science and Engineering, Changsha, China
- Qi Li 0032 — Zhongyuan University of Technology, School of Electronic and Information Engineering, Zhengzhou, China
- Qi Li 0033 — University of Guelph, School of Computer Science, Canada
- Qi Li 0034 — University of Science and Technology of China, Department of Computer Science and Technology, Hefei, China
- Qi Li 0035 — Virginia Commonwealth University, Computer Science Department, Richmond, VA, USA
- Qi Li 0036 — Xi'an Jiaotong University, School of Economics and Finance, China
- Qi Li 0037 — Dalian University of Technology, School of Control Science and Engineering, China
- Qi Li 0038 — Fuzhou University, College of Computer and Data Science, China
- Qi Li 0039 — University of Science and Technology of China, School of Computer Science and TechnologyHefei, China
- Qi Li 0040 — Zhongguancun Laboratory, Tsinghua University, Beijing, Chinas
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j121]Jianjin Zhao, Qi Li, Jintao Sun, Mianxiong Dong, Kaoru Ota, Meng Shen:
Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary. IEEE Internet Things J. 11(3): 5129-5142 (2024) - [j120]Jie Wang, Kun Sun, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, Qi Li:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. IEEE Trans. Dependable Secur. Comput. 21(1): 254-269 (2024) - [j119]Meng Shen, Changyue Li, Hao Yu, Qi Li, Liehuang Zhu, Ke Xu:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 1740-1753 (2024) - [j118]Jingyi Deng, Chenhao Lin, Pengbin Hu, Chao Shen, Qian Wang, Qi Li, Qiming Li:
Towards Benchmarking and Evaluating Deepfake Detection. IEEE Trans. Dependable Secur. Comput. 21(6): 5112-5127 (2024) - [j117]Xiaoli Zhang, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng, Chengjun Cai, Helei Cui, Qi Li:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. IEEE Trans. Inf. Forensics Secur. 19: 2517-2532 (2024) - [j116]Man Zhou, Wenyu Zhou, Jie Huang, Junhui Yang, Minxin Du, Qi Li:
Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving. IEEE Trans. Inf. Forensics Secur. 19: 6795-6809 (2024) - [j115]Renjie Xie, Jiahao Cao, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. IEEE Trans. Inf. Forensics Secur. 19: 7659-7673 (2024) - [j114]Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du:
Graph Mining for Cybersecurity: A Survey. ACM Trans. Knowl. Discov. Data 18(2): 47:1-47:52 (2024) - [j113]Man Zhou, Yuting Zhou, Shuao Su, Qian Wang, Qi Li, Shengshan Hu, Chunwu Yu, Zhengxiong Li:
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound. IEEE Trans. Mob. Comput. 23(6): 7210-7224 (2024) - [j112]Man Zhou, Qian Wang, Qi Li, Wenyu Zhou, Jingxiao Yang, Chao Shen:
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns. IEEE Trans. Mob. Comput. 23(10): 9772-9788 (2024) - [j111]Jianjin Zhao, Qi Li, Yueping Hong, Meng Shen:
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning. IEEE Trans. Netw. Serv. Manag. 21(2): 2460-2476 (2024) - [j110]Xinhao Deng, Mingwei Xu, Qi Li, Weijie Wu, Yuan Yang, Menghao Zhang, Yu Zhou, Jianping Wu:
Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation. IEEE Trans. Netw. Serv. Manag. 21(4): 4830-4843 (2024) - [j109]Xiaoli Zhang, Wei Geng, Yiqiao Song, Hongbing Cheng, Ke Xu, Qi Li:
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds. IEEE/ACM Trans. Netw. 32(1): 159-174 (2024) - [j108]Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, Xinghua Li:
Interface-Based Side Channel in TEE-Assisted Networked Services. IEEE/ACM Trans. Netw. 32(1): 613-626 (2024) - [j107]Guangmeng Zhou, Qi Li, Yang Liu, Yi Zhao, Qi Tan, Su Yao, Ke Xu:
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning. IEEE/ACM Trans. Netw. 32(3): 1873-1887 (2024) - [j106]Chuanpu Fu, Qi Li, Ke Xu:
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection. IEEE/ACM Trans. Netw. 32(4): 2972-2987 (2024) - [j105]Xiaoliang Wang, Ke Xu, Yangfei Guo, Haiyang Wang, Songtao Fu, Qi Li, Bin Wu, Jianping Wu:
Toward Practical Inter-Domain Source Address Validation. IEEE/ACM Trans. Netw. 32(4): 3126-3141 (2024) - [c197]Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun:
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. AsiaCCS 2024 - [c196]Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. CCS 2024: 423-436 - [c195]Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. CCS 2024: 630-644 - [c194]Xinhao Deng, Qi Li, Ke Xu:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. CCS 2024: 1997-2011 - [c193]Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. CCS 2024: 2087-2101 - [c192]Chenghan Jiang, Jinjiang Yang, Xinyi Li, Qi Li, Xinyu Zhang, Ju Ren:
RISiren: Wireless Sensing System Attacks via Metasurface. CCS 2024: 3332-3345 - [c191]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns. CCS 2024: 3659-3673 - [c190]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. CCS 2024: 4032-4046 - [c189]Neil Gong, Qi Li, Xiaoli Zhang:
AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense. CCS 2024: 4884-4885 - [c188]Ao Wang, Xuewei Feng, Qi Li, Yuxiang Yang, Ke Xu:
A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem. IWQoS 2024: 1-10 - [c187]Ye Wang, Yunpeng Liu, Ningtao Wang, Peiyang Li, Jiahao Hu, Xing Fu, Weiqiang Wang, Kun Sun, Qi Li, Ke Xu:
Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records. IWQoS 2024: 1-10 - [c186]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. LAMPS@CCS 2024: 69-76 - [c185]Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang:
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks. NDSS 2024 - [c184]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. NDSS 2024 - [c183]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. NDSS 2024 - [c182]Yingying Su, Dan Li, Li Chen, Qi Li, Sitong Ling:
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository. NDSS 2024 - [c181]Shu Wang, Kun Sun, Qi Li:
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. NDSS 2024 - [c180]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [c179]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. NDSS 2024 - [c178]Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li:
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound. NDSS 2024 - [c177]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. NSDI 2024: 419-440 - [c176]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. SP 2024: 2534-2552 - [c175]Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu:
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. SP 2024: 3238-3256 - [c174]Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li:
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. SP 2024: 4459-4477 - [c173]Xiang Li, Dashuai Wu, Haixin Duan, Qi Li:
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses. SP 2024: 4478-4496 - [c172]Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu:
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services. USENIX Security Symposium 2024 - [c171]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. USENIX Security Symposium 2024 - [c170]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Network by Analyzing Training Data. USENIX Security Symposium 2024 - [c169]Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen:
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. USENIX Security Symposium 2024 - [c168]Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li:
Demystifying the Security Implications in IoT Device Rental Services. USENIX Security Symposium 2024 - [c167]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. USENIX Security Symposium 2024 - [c166]Jialai Wang, Chao Zhang, Longfei Chen, Yi Rong, Yuxiao Wu, Hao Wang, Wende Tan, Qi Li, Zongpeng Li:
Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features. USENIX Security Symposium 2024 - [c165]Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang:
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. USENIX Security Symposium 2024 - [c164]Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li:
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check. USENIX Security Symposium 2024 - [c163]Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li:
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. USENIX Security Symposium 2024 - [d1]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts). Zenodo, 2024 - [i55]Tianyu Cui, Yanling Wang, Chuanpu Fu, Yong Xiao, Sijia Li, Xinhao Deng, Yunpeng Liu, Qinglin Zhang, Ziyi Qiu, Peiyang Li, Zhixing Tan, Junwu Xiong, Xinyu Kong, Zujie Wen, Ke Xu, Qi Li:
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems. CoRR abs/2401.05778 (2024) - [i54]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Networks by Analyzing Training Data. CoRR abs/2401.09740 (2024) - [i53]Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. CoRR abs/2402.12716 (2024) - [i52]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. CoRR abs/2402.16025 (2024) - [i51]Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu:
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. CoRR abs/2402.19011 (2024) - [i50]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. CoRR abs/2403.01268 (2024) - [i49]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. CoRR abs/2403.11090 (2024) - [i48]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. CoRR abs/2403.11166 (2024) - [i47]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i46]Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang:
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks. CoRR abs/2404.04098 (2024) - [i45]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. CoRR abs/2404.04601 (2024) - [i44]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024) - [i43]Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan:
A Survey of Deep Learning Library Testing Methods. CoRR abs/2404.17871 (2024) - [i42]Yi He, Yuan Zhou, Yacong Gu, Purui Su, Qi Li, Yajin Zhou, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. CoRR abs/2405.00526 (2024) - [i41]Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. CoRR abs/2405.17987 (2024) - [i40]Yanling Wang, Haoyang Li, Hao Zou, Jing Zhang, Xinlei He, Qi Li, Ke Xu:
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models. CoRR abs/2406.05328 (2024) - [i39]Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. CoRR abs/2406.19311 (2024) - [i38]Xinhao Deng, Qi Li, Ke Xu:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. CoRR abs/2407.00918 (2024) - [i37]Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li:
Jailbreak Attacks and Defenses Against Large Language Models: A Survey. CoRR abs/2407.04295 (2024) - [i36]Zesen Liu, Tianshuo Cong, Xinlei He, Qi Li:
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks. CoRR abs/2407.04794 (2024) - [i35]Jiating Ma, Yipeng Zhou, Qi Li, Quan Z. Sheng, Laizhong Cui, Jiangchuan Liu:
The Power of Bias: Optimizing Client Selection in Federated Learning with Heterogeneous Differential Privacy. CoRR abs/2408.08642 (2024) - [i34]Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. CoRR abs/2409.04341 (2024) - [i33]Xuewei Feng, Yuxiang Yang, Qi Li, xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu:
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks. CoRR abs/2410.21984 (2024) - [i32]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. IACR Cryptol. ePrint Arch. 2024: 987 (2024) - 2023
- [j104]Haibin Li, Yi Zhao, Wenbing Yao, Ke Xu, Qi Li:
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction. Sci. China Inf. Sci. 66(5) (2023) - [j103]Yunjie Ge, Qian Wang, Jiayuan Yu, Chao Shen, Qi Li:
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems. IEEE Commun. Mag. 61(12): 176-182 (2023) - [j102]Meng Shen, Ke Ye, Xingtong Liu, Liehuang Zhu, Jiawen Kang, Shui Yu, Qi Li, Ke Xu:
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 791-824 (2023) - [j101]Yueping Hong, Qi Li, Yanqing Yang, Meng Shen:
Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features. Inf. Sci. 644: 119229 (2023) - [j100]Dongheng Zhang, Jia Meng, Jian Zhang, Xinzhe Deng, Shouhong Ding, Man Zhou, Qian Wang, Qi Li, Yan Chen:
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4401-4414 (2023) - [j99]Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j98]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Trans. Dependable Secur. Comput. 20(2): 1609-1623 (2023) - [j97]Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j96]Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, Qi Li:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j95]Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun:
Automatic Generation of Adversarial Readable Chinese Texts. IEEE Trans. Dependable Secur. Comput. 20(2): 1756-1770 (2023) - [j94]Chenhao Lin, Jingyi He, Chao Shen, Qi Li, Qian Wang:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023) - [j93]Xiangyun Tang, Meng Shen, Qi Li, Liehuang Zhu, Tengfei Xue, Qiang Qu:
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations. IEEE Trans. Dependable Secur. Comput. 20(6): 5005-5023 (2023) - [j92]Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j91]Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, Ke Xu:
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems. IEEE Trans. Inf. Forensics Secur. 18: 4561-4576 (2023) - [j90]Qingyuan Gong, Yushan Liu, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui:
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. IEEE Trans. Knowl. Data Eng. 35(10): 10633-10649 (2023) - [j89]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Frequency Domain Feature Based Robust Malicious Traffic Detection. IEEE/ACM Trans. Netw. 31(1): 452-467 (2023) - [j88]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang:
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. IEEE/ACM Trans. Netw. 31(3): 1416-1431 (2023) - [j87]Songtao Fu, Qi Li, Min Zhu, Xiaoliang Wang, Su Yao, Yangfei Guo, Xinle Du, Ke Xu:
MASK: Practical Source and Path Verification Based on Multi-AS-Key. IEEE/ACM Trans. Netw. 31(4): 1478-1493 (2023) - [c162]Renjie Xie, Yixiao Wang, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. ACM TUR-C 2023: 131-132 - [c161]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. ACM TUR-C 2023: 141-142 - [c160]Qi Li, Mingyu Cheng:
Spear-Phishing Detection Method Based on Few-Shot Learning. APPT 2023: 351-371 - [c159]Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. CCS 2023: 1005-1019 - [c158]Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CCS 2023: 1020-1034 - [c157]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CCS 2023: 1496-1510 - [c156]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CCS 2023: 1496-1510 - [c155]Ning Zhang, Qi Li:
MTD '23: 10th ACM Workshop on Moving Target Defense. CCS 2023: 3653-3654 - [c154]Jialai Wang, Wenjie Qu, Yi Rong, Han Qiu, Qi Li, Zongpeng Li, Chao Zhang:
MPass: Bypassing Learning-based Static Malware Detectors. DAC 2023: 1-6 - [c153]Xiaoli Zhang, Zhicheng Xu, Hongbing Cheng, Tong Che, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Chunping Wang, Qi Li:
Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification. ICDCS 2023: 794-805 - [c152]Jiawang Dan, Ruofan Wu, Yunpeng Liu, Baokun Wang, Changhua Meng, Tengfei Liu, Tianyi Zhang, Ningtao Wang, Xing Fu, Qi Li, Weiqiang Wang:
Self-supervision meets kernel graph neural models: From architecture to augmentations. ICDM (Workshops) 2023: 1076-1083 - [c151]Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. NDSS 2023 - [c150]Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. NDSS 2023 - [c149]Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Robust Multi-tab Website Fingerprinting Attacks in the Wild. SP 2023: 1005-1022 - [c148]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - [c147]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. SP 2023: 3162-3177 - [c146]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264 - [c145]Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu:
Subverting Website Fingerprinting Defenses with Robust Traffic Representation. USENIX Security Symposium 2023: 607-624 - [c144]Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. USENIX Security Symposium 2023: 625-642 - [c143]Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang:
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. USENIX Security Symposium 2023: 2329-2346 - [c142]Xiang Li, Chaoyi Lu, Baojun Liu, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
The Maginot Line: Attacking the Boundary of DNS Caching Protection. USENIX Security Symposium 2023: 3153-3170 - [c141]Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li:
Cross Container Attacks: The Bewildered eBPF on Clouds. USENIX Security Symposium 2023: 5971-5988 - [c140]Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu:
An Efficient Design of Intelligent Network Data Plane. USENIX Security Symposium 2023: 6203-6220 - [c139]Yunpeng Liu, Kexin Li, Zhuotao Liu, Bihan Wen, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Qi Li:
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification. WWW 2023: 1980-1990 - [e3]Ning Zhang, Qi Li:
Proceedings of the 10th ACM Workshop on Moving Target Defense, MTD 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - [i31]Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. CoRR abs/2301.13686 (2023) - [i30]Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang:
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. CoRR abs/2302.13520 (2023) - [i29]Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du:
Graph Mining for Cybersecurity: A Survey. CoRR abs/2304.00485 (2023) - [i28]Shu Wang, Kun Sun, Qi Li:
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. CoRR abs/2308.09546 (2023) - [i27]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CoRR abs/2309.01098 (2023) - [i26]Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CoRR abs/2309.03660 (2023) - [i25]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. CoRR abs/2309.04798 (2023) - [i24]Xiaoliang Wang, Zhuotao Liu, Qi Li, Yangfei Guo, Sitong Ling, Jiangou Zhan, Yi Xu, Ke Xu:
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments. CoRR abs/2309.13271 (2023) - [i23]Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li:
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. CoRR abs/2310.03202 (2023) - [i22]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Chao Shen:
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights. CoRR abs/2310.11850 (2023) - [i21]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. CoRR abs/2312.07870 (2023) - [i20]Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun:
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. CoRR abs/2312.07921 (2023) - 2022
- [j86]Yi Zhao, Ke Xu, Qi Li, Haiyang Wang, Dan Wang, Min Zhu:
Intelligent networking in adversarial environment: challenges and opportunities. Sci. China Inf. Sci. 65(7): 1-11 (2022) - [j85]Jie Sun, Lingchen Zhao, Zhuotao Liu, Qi Li, Xinhao Deng, Qian Wang, Yong Jiang:
Practical differentially private online advertising. Comput. Secur. 112: 102504 (2022) - [j84]Qi Li, Mingyu Cheng, Junfeng Wang, Bowen Sun:
LSTM Based Phishing Detection for Big Email Data. IEEE Trans. Big Data 8(1): 278-288 (2022) - [j83]Yi He, Yuan Zhou, Yajin Zhou, Qi Li, Kun Sun, Yacong Gu, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 19(1): 607-619 (2022) - [j82]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [j81]Lingchen Zhao, Jianlin Jiang, Bo Feng, Qian Wang, Chao Shen, Qi Li:
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 19(5): 3329-3342 (2022) - [j80]Qilei Yin, Zhuotao Liu, Qi Li, Tao Wang, Qian Wang, Chao Shen, Yixiao Xu:
An Automated Multi-Tab Website Fingerprinting Attack. IEEE Trans. Dependable Secur. Comput. 19(6): 3656-3670 (2022) - [j79]Pengfei Wu, Qi Li, Jianting Ning, Xinyi Huang, Wei Wu:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. IEEE Trans. Dependable Secur. Comput. 19(6): 3741-3758 (2022) - [j78]Qi Li, Xinhao Deng, Zhuotao Liu, Yuan Yang, Xiaoyue Zou, Qian Wang, Mingwei Xu, Jianping Wu:
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling. IEEE Trans. Inf. Forensics Secur. 17: 486-499 (2022) - [j77]Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun, Qi Li:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. IEEE Trans. Inf. Forensics Secur. 17: 1069-1082 (2022) - [j76]Haoda Li, Qiyang Song, Guoliang Li, Qi Li, Rengui Wang:
GPSC: A Grid-Based Privacy-Reserving Framework for Online Spatial Crowdsourcing. IEEE Trans. Knowl. Data Eng. 34(11): 5378-5390 (2022) - [j75]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Fulvio Valenza, Cristian Hesselman:
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management. IEEE Trans. Netw. Serv. Manag. 19(3): 2251-2254 (2022) - [j74]Xuewei Feng, Qi Li, Kun Sun, Chuanpu Fu, Ke Xu:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. IEEE/ACM Trans. Netw. 30(1): 409-422 (2022) - [j73]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Wei Wang, Qi Li, Guangshen Cheng, Jiwu Jing, Congli Wang:
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild. IEEE/ACM Trans. Netw. 30(2): 749-765 (2022) - [j72]Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Trans. Netw. 30(5): 2158-2172 (2022) - [c138]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CCS 2022: 1427-1441 - [c137]Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, Qi Li:
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. CNS 2022: 236-244 - [c136]Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun, Qi Li:
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. DIMVA 2022: 197-217 - [c135]Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. ESORICS (2) 2022: 126-144 - [c134]Guoqiang Zhang, Jiahao Cao, Mingwei Xu, Qi Li:
Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection. HPCC/DSS/SmartCity/DependSys 2022: 538-545 - [c133]Ruoyi Zhang, Jing Deng, Qi Li, Xinlei Xie, Qingyuan Gong, Chao Zhu:
FlyLISL: Traffic Balance Awared Routing for Large-scale Mixed-Reality Telepresence over Reconfigurable Mega-Constellation. ICDCS Workshops 2022: 260-265 - [c132]Songtao Fu, Qi Li, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang, Xinle Du, Kao Wan, Ke Xu:
D3: Lightweight Secure Fault Localization in Edge Cloud. ICDCS 2022: 515-525 - [c131]Yike Zhan, Baolin Zheng, Qian Wang, Ningping Mou, Binqing Guo, Qi Li, Chao Shen, Cong Wang:
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems. ICME 2022: 1-6 - [c130]Xu He, Jiahao Cao, Shu Wang, Kun Sun, Lisong Xu, Qi Li:
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks. INFOCOM 2022: 1689-1698 - [c129]Jialai Wang, Han Qiu, Yi Rong, Hengkai Ye, Qi Li, Zongpeng Li, Chao Zhang:
BET: black-box efficient testing for convolutional neural networks. ISSTA 2022: 164-175 - [c128]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. NDSS 2022 - [c127]Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun:
BinProv: Binary Code Provenance Identification without Disassembly. RAID 2022: 350-363 - [c126]Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan:
Encrypted Malware Traffic Detection via Graph-based Network Analysis. RAID 2022: 495-509 - [c125]Sainan Li, Qilei Yin, Guoliang Li, Qi Li, Zhuotao Liu, Jinwei Zhu:
Unsupervised Contextual Anomaly Detection for Database Systems. SIGMOD Conference 2022: 788-802 - [c124]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [c123]Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu:
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. USENIX Security Symposium 2022: 2619-2636 - [i19]Chenhao Lin, Jingyi Deng, Pengbin Hu, Chao Shen, Qian Wang, Qi Li:
Towards Benchmarking and Evaluating Deepfake Detection. CoRR abs/2203.02115 (2022) - [i18]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. CoRR abs/2203.09374 (2022) - [i17]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CoRR abs/2209.01688 (2022) - [i16]Jiahui Chen, Yi Zhao, Qi Li, Ke Xu:
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage. CoRR abs/2210.04052 (2022) - 2021
- [j71]Meng Shen, Huan Wang, Bin Zhang, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du:
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing. IEEE Internet Things J. 8(4): 2265-2275 (2021) - [j70]Laizhong Cui, Ziteng Chen, Shu Yang, Zhongxing Ming, Qi Li, Yipeng Zhou, Shiping Chen, Qinghua Lu:
A Blockchain-Based Containerized Edge Computing Platform for the Internet of Vehicles. IEEE Internet Things J. 8(4): 2395-2408 (2021) - [j69]Qi Li, Jiaxin Mi, Weishi Li, Junfeng Wang, Mingyu Cheng:
CNN-Based Malware Variants Detection Method for Internet of Things. IEEE Internet Things J. 8(23): 16946-16962 (2021) - [j68]Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, Kui Ren:
Building In-the-Cloud Network Functions: Security and Privacy Challenges. Proc. IEEE 109(12): 1888-1919 (2021) - [j67]Chalee Vorakulpipat, Ryan K. L. Ko, Qi Li, Ahmed Meddahi:
Security and Privacy in Smart Cities. Secur. Commun. Networks 2021: 9830547:1-9830547:2 (2021) - [j66]Pengfei Wu, Robert H. Deng, Qingni Shen, Ximeng Liu, Qi Li, Zhonghai Wu:
ObliComm: Towards Building an Efficient Oblivious Communication System. IEEE Trans. Dependable Secur. Comput. 18(5): 2331-2348 (2021) - [j65]Qian Wang, Baolin Zheng, Qi Li, Chao Shen, Zhongjie Ba:
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 896-908 (2021) - [j64]Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [j63]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Jiankun Hu:
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 4063-4077 (2021) - [j62]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Peipei Jiang, Yanjiao Chen, Zhibo Wang:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j61]Rémi Badonnel, Carol J. Fung, Sandra Scott-Hayward, Qi Li, Jie Zhang, Cristian Hesselman:
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services. IEEE Trans. Netw. Serv. Manag. 18(2): 1120-1124 (2021) - [j60]Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang:
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud. IEEE/ACM Trans. Netw. 29(1): 78-91 (2021) - [j59]Peng Zhang, Fangzheng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, Chao Shen, Chengchen Hu:
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks. IEEE/ACM Trans. Netw. 29(1): 332-345 (2021) - [j58]Guanyu Li, Menghao Zhang, Shicheng Wang, Chang Liu, Mingwei Xu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. IEEE/ACM Trans. Netw. 29(4): 1509-1526 (2021) - [j57]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Bo Feng:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. IEEE Trans. Parallel Distributed Syst. 32(10): 2524-2540 (2021) - [j56]Qi Li, Yunpeng Liu, Zhuotao Liu, Peng Zhang, Chunhui Pang:
Efficient Forwarding Anomaly Detection in Software-Defined Networks. IEEE Trans. Parallel Distributed Syst. 32(11): 2676-2690 (2021) - [c122]Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. ACSAC 2021: 260-272 - [c121]Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu:
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. ACSAC 2021: 297-310 - [c120]Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang:
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. AsiaCCS 2021: 565-577 - [c119]Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. AsiaCCS 2021: 931-943 - [c118]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CCS 2021: 86-107 - [c117]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CCS 2021: 108-125 - [c116]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CCS 2021: 3431-3446 - [c115]Na Shi, Bo Tang, Ravi S. Sandhu, Qi Li:
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things. DBSec 2021: 278-290 - [c114]Xiang Li, Baojun Liu, Xiaofeng Zheng, Haixin Duan, Qi Li, Youjun Huang:
Fast IPv6 Network Periphery Discovery and Security Implications. DSN 2021: 88-100 - [c113]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c112]Jie Sun, Qi Li, Yong Jiang:
Privacy-Preserving Convex Factorization Machine. IJCNN 2021: 1-8 - [c111]Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu:
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. INFOCOM 2021: 1-10 - [c110]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. INFOCOM 2021: 1-10 - [c109]Songtao Fu, Ke Xu, Qi Li, Xiaoliang Wang, Su Yao, Yangfei Guo, Xinle Du:
MASK: Practical Source and Path Verification based on Multi-AS-Key. IWQoS 2021: 1-10 - [c108]Nan Geng, Mingwei Xu, Yuan Yang, Chenyi Liu, Jiahai Yang, Qi Li, Shize Zhang:
Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning. IWQoS 2021: 1-10 - [c107]Xiao Liang, Zheng Yang, Binghui Wang, Shaofeng Hu, Zijie Yang, Dong Yuan, Neil Zhenqiang Gong, Qi Li, Fang He:
Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach. KDD 2021: 3240-3250 - [c106]Yunjie Ge, Qian Wang, Baolin Zheng, Xinlu Zhuang, Qi Li, Chao Shen, Cong Wang:
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. ACM Multimedia 2021: 826-834 - [c105]Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu:
Data Poisoning Attacks to Deep Learning Based Recommender Systems. NDSS 2021 - [c104]Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. NDSS 2021 - [e2]Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12918, Springer 2021, ISBN 978-3-030-86889-5 [contents] - [e1]Debin Gao, Qi Li, Xiaohong Guan, Xiaofeng Liao:
Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12919, Springer 2021, ISBN 978-3-030-88051-4 [contents] - [i15]Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu:
Data Poisoning Attacks to Deep Learning Based Recommender Systems. CoRR abs/2101.02644 (2021) - [i14]Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li:
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis. CoRR abs/2102.05241 (2021) - [i13]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i12]Man Zhou, Qian Wang, Qi Li, Peipei Jiang, Jingxiao Yang, Chao Shen, Cong Wang, Shouhong Ding:
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns. CoRR abs/2106.08013 (2021) - [i11]Guangmeng Zhou, Ke Xu, Qi Li, Yang Liu, Yi Zhao:
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning. CoRR abs/2106.14126 (2021) - [i10]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CoRR abs/2106.14707 (2021) - [i9]Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu:
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks. CoRR abs/2108.09513 (2021) - [i8]Baolin Zheng, Peipei Jiang, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, Shenyi Zhang:
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information. CoRR abs/2110.09714 (2021) - 2020
- [j55]Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo:
SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Commun. Mag. 58(1): 47-53 (2020) - [j54]Xiaoli Zhang, Cong Wang, Qi Li, Jianping Wu:
Toward Comprehensive Network Verification: Practices, Challenges and Beyond. IEEE Netw. 34(1): 108-115 (2020) - [j53]Bo Wu, Ke Xu, Qi Li, Shoushou Ren, Zhuotao Liu, Zhichao Zhang:
Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Netw. 34(2): 30-36 (2020) - [j52]Xiaoliang Wang, Ke Xu, Wenlong Chen, Qi Li, Meng Shen, Bo Wu:
ID-Based SDN for the Internet of Things. IEEE Netw. 34(4): 76-83 (2020) - [j51]Dong Yuan, Qi Li, Guoliang Li, Qian Wang, Kui Ren:
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 15: 299-314 (2020) - [j50]Rémi Badonnel, Carol J. Fung, Qi Li, Sandra Scott-Hayward:
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems. IEEE Trans. Netw. Serv. Manag. 17(1): 12-14 (2020) - [j49]Shu Yang, Laizhong Cui, Xinhao Deng, Qi Li, Yulei Wu, Mingwei Xu, Dan Wang, Jianping Wu:
FISE: A Forwarding Table Structure for Enterprise Networks. IEEE Trans. Netw. Serv. Manag. 17(2): 1181-1196 (2020) - [j48]Peng Zhang, Hui Wu, Dan Zhang, Qi Li:
Verifying Rule Enforcement in Software Defined Networks With REV. IEEE/ACM Trans. Netw. 28(2): 917-929 (2020) - [c103]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CCS 2020: 1103-1119 - [c102]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CCS 2020: 1323-1335 - [c101]Jianhua Sun, Kun Sun, Qi Li:
Towards a Believable Decoy System: Replaying Network Activities from Real System. CNS 2020: 1-9 - [c100]Yunzhe Guo, Dan Wang, Arun Vishwanath, Cheng Xu, Qi Li:
Towards Federated Learning for HVAC Analytics: A Measurement Study. e-Energy 2020: 68-73 - [c99]Xuankai Liu, Fengting Li, Bihan Wen, Qi Li:
Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. ICPR 2020: 10149-10156 - [c98]Zihan Zhang, Mingxuan Liu, Chao Zhang, Yiming Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun:
Argot: Generating Adversarial Readable Chinese Texts. IJCAI 2020: 2533-2539 - [c97]Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu:
Enabling Execution Assurance of Federated Learning at Untrusted Participants. INFOCOM 2020: 1877-1886 - [c96]Ruming Tang, Zheng Yang, Zeyan Li, Weibin Meng, Haixin Wang, Qi Li, Yongqian Sun, Dan Pei, Tao Wei, Yanfei Xu, Yan Liu:
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. INFOCOM 2020: 2479-2488 - [c95]Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen:
I Know If the Journey Changes: Flexible Source and Path Validation. IWQoS 2020: 1-6 - [c94]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c93]Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. NDSS 2020 - [c92]Shu Wang, Jiahao Cao, Kun Sun, Qi Li:
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. RAID 2020: 365-379 - [c91]Ruming Tang, Cheng Huang, Yanti Zhou, Haoxian Wu, Xianglin Lu, Yongqian Sun, Qi Li, Jinjin Li, Weiyao Huang, Siyuan Sun, Dan Pei:
A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises. SecureComm (2) 2020: 1-21 - [c90]Songsong Liu, Qiyang Song, Kun Sun, Qi Li:
SGX-Cube: An SGX-Enhanced Single Sign-On System Against Server-Side Credential Leakage. SecureComm (2) 2020: 275-290 - [i7]Xuankai Liu, Fengting Li, Bihan Wen, Qi Li:
Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. CoRR abs/2008.00407 (2020) - [i6]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CoRR abs/2008.12981 (2020) - [i5]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CoRR abs/2009.00718 (2020) - [i4]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du:
Robust Attacks on Deep Learning Face Recognition in the Physical World. CoRR abs/2011.13526 (2020)
2010 – 2019
- 2019
- [j47]Qi Li, Weishi Li, Junfeng Wang, Mingyu Cheng:
A SQL Injection Detection Method Based on Adaptive Deep Forest. IEEE Access 7: 145385-145394 (2019) - [j46]Qi Li, Chengze Li, Guangyu Gao, Yanyi Huang:
A novel method to find important apps base on the analysis of components relationship. Clust. Comput. 22(Supplement): 5479-5489 (2019) - [j45]Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen, Kui Ren:
RFL: Robust fault localization on unreliable communication channels. Comput. Networks 158: 158-174 (2019) - [j44]Tao Lei, Zhan Qin, Zhibo Wang, Qi Li, Dengpan Ye:
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4): 6668-6680 (2019) - [j43]Qi Li, Jiajia Liu, Yih-Chun Hu, Mingwei Xu, Jianping Wu:
BGP with BGPsec: Attacks and Countermeasures. IEEE Netw. 33(4): 194-200 (2019) - [j42]Qi Li, Xiaoyue Zou, Qun Huang, Jing Zheng, Patrick P. C. Lee:
Dynamic Packet Forwarding Verification in SDN. IEEE Trans. Dependable Secur. Comput. 16(6): 915-929 (2019) - [j41]Yanjiao Chen, Xin Tian, Qian Wang, Minghui Li, Minxin Du, Qi Li:
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum. IEEE Trans. Mob. Comput. 18(10): 2270-2284 (2019) - [j40]Qi Li, Fang Wang, Junfeng Wang, Weishi Li:
LSTM-Based SQL Injection Detection Method for Intelligent Transportation System. IEEE Trans. Veh. Technol. 68(5): 4182-4191 (2019) - [c89]Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen:
Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. ASPLOS 2019: 93-105 - [c88]Dong Yuan, Yuanli Miao, Neil Zhenqiang Gong, Zheng Yang, Qi Li, Dawn Song, Qian Wang, Xiao Liang:
Detecting Fake Accounts in Online Social Networks at the Time of Registrations. CCS 2019: 1423-1438 - [c87]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c86]Qingyuan Gong, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui:
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. CIKM 2019: 1251-1260 - [c85]Xingliang Yuan, Chengjun Cai, Qian Wang, Qi Li:
Towards a Ledger-Assisted Architecture for Secure Query Processing over Distributed IoT Data. DSC 2019: 1-8 - [c84]Shengye Wan, Jianhua Sun, Kun Sun, Ning Zhang, Qi Li:
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors. DSN 2019: 289-301 - [c83]Shengsheng Yao, Mingwei Xu, Qi Li, Jiahao Cao, Qiyang Song:
cSFC: Building Credible Service Function Chain on the Cloud. GLOBECOM 2019: 1-6 - [c82]Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang:
Analyzing the Browser Security Warnings on HTTPS Errors. ICC 2019: 1-6 - [c81]Renjie Xie, Mingwei Xu, Jiahao Cao, Qi Li:
SoftGuard: Defend Against the Low-Rate TCP Attack in SDN. ICC 2019: 1-6 - [c80]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [c79]Songrui Wu, Qi Li, Guoliang Li, Dong Yuan, Xingliang Yuan, Cong Wang:
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. ICDE 2019: 626-637 - [c78]Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. INFOCOM 2019: 1162-1170 - [c77]Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. INFOCOM 2019: 2062-2070 - [c76]Wenbing Yao, Ke Xu, Qi Li:
Exploring the Influence of News Articles on Bitcoin Price with Machine Learning. ISCC 2019: 1-6 - [c75]Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, Dawn Song:
Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study. KDD 2019: 2012-2022 - [c74]Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - [c73]Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, Ravi S. Sandhu:
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. SACMAT 2019: 83-92 - [c72]Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. SecureComm (1) 2019: 429-449 - [c71]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - [i3]Shu Yang, Laizhong Cui, Xinhao Deng, Qi Li, Yulei Wu, Mingwei Xu, Dan Wang, Jianping Wu:
Two Dimensional Router: Design and Implementation. CoRR abs/1908.04374 (2019) - [i2]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - 2018
- [j39]Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, Xuan Cao:
Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains. IEEE Netw. 32(2): 138-143 (2018) - [j38]Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K. Y. Yau, Jianping Wu:
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. IEEE Trans. Inf. Forensics Secur. 13(7): 1838-1853 (2018) - [j37]Yuan Yang, Mingwei Xu, Qi Li:
Fast Rerouting Against Multi-Link Failures Without Topology Constraint. IEEE/ACM Trans. Netw. 26(1): 384-397 (2018) - [j36]Qi Li, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, Kui Ren:
Security Policy Violations in SDN Data Plane. IEEE/ACM Trans. Netw. 26(4): 1715-1727 (2018) - [j35]Jie Zhu, Qi Li, Cong Wang, Xingliang Yuan, Qian Wang, Kui Ren:
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Trans. Parallel Distributed Syst. 29(8): 1721-1735 (2018) - [j34]Peng Zhang, Chengchen Hu, Di Chen, Hao Li, Qi Li:
ShiftRoute: Achieving Location Privacy for Map Services on Smartphones. IEEE Trans. Veh. Technol. 67(5): 4527-4538 (2018) - [j33]Feng Dong, Junfeng Wang, Qi Li, Guoai Xu, Shaodong Zhang:
Defect Prediction in Android Binary Executables Using Deep Neural Network. Wirel. Pers. Commun. 102(3): 2261-2285 (2018) - [c70]Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang:
A Multi-tab Website Fingerprinting Attack. ACSAC 2018: 327-341 - [c69]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CCS 2018: 1775-1787 - [c68]Peng Zhang, Shimin Xu, Zuoru Yang, Hao Li, Qi Li, Huanzhao Wang, Chengchen Hu:
FOCES: Detecting Forwarding Anomalies in Software Defined Networks. ICDCS 2018: 830-840 - [c67]Helei Cui, Yajin Zhou, Cong Wang, Qi Li, Kui Ren:
Towards Privacy-Preserving Malware Detection Systems for Android. ICPADS 2018: 545-552 - [c66]Qian Liu, Haipeng Dai, Alex X. Liu, Qi Li, Xiaoyu Wang, Jiaqi Zheng:
Cache Assisted Randomized Sharing Counters in Network Measurement. ICPP 2018: 40:1-40:10 - [c65]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c64]Bo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu:
SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection. MASS 2018: 308-316 - [c63]Jun Wu, Patrick P. C. Lee, Qi Li, Lujia Pan, Jianfeng Zhang:
CellPAD: Detecting Performance Anomalies in Cellular Networks via Regression Analysis. Networking 2018: 19-27 - [c62]Yemian Lu, Qi Li, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo:
A Comprehensive Study of Permission Usage on Android. NSS 2018: 64-79 - [i1]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CoRR abs/1810.02242 (2018) - 2017
- [j32]Yao Du, Junfeng Wang, Qi Li:
An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs. IEEE Access 5: 17478-17486 (2017) - [j31]Chengze Li, Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu, Yanhui Guo:
CRSPR: PageRank for Android Apps. IEEE Access 5: 18004-18015 (2017) - [j30]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 1. IEEE Commun. Mag. 55(3): 60-61 (2017) - [j29]Linghe Kong, Kui Ren, Muhammad Khurram Khan, Qi Li, Ammar Rayes, Mérouane Debbah, Yuichi Nakamura:
Sustainable Incentive Mechanisms for Mobile Crowdsensing: Part 2. IEEE Commun. Mag. 55(6): 118-119 (2017) - [j28]Yanyu Chen, Yuan Yang, Xiaoyue Zou, Qi Li, Yong Jiang:
Adaptive Distributed Software Defined Networking. Comput. Commun. 102: 120-129 (2017) - [j27]Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu:
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. Future Gener. Comput. Syst. 72: 219-226 (2017) - [j26]Qing Li, Mingwei Xu, Qi Li, Dan Wang, Yong Jiang, Shu-Tao Xia, Qingmin Liao:
Scale the Internet routing table by generalized next hops of strict partial order. Inf. Sci. 412: 101-115 (2017) - [j25]Qi Li, Ravi S. Sandhu, Xinwen Zhang, Mingwei Xu:
Mandatory Content Access Control for Privacy Protection in Information Centric Networks. IEEE Trans. Dependable Secur. Comput. 14(5): 494-506 (2017) - [j24]Peng Zhang, Qi Li, Patrick P. C. Lee:
Achieving Content-Oriented Anonymity with CRISP. IEEE Trans. Dependable Secur. Comput. 14(6): 578-590 (2017) - [j23]Qi Li, Patrick P. C. Lee, Peng Zhang, Purui Su, Liang He, Kui Ren:
Capability-Based Security Enforcement in Named Data Networking. IEEE/ACM Trans. Netw. 25(5): 2719-2730 (2017) - [c61]Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng:
Vulnerable Implicit Service: A Revisit. CCS 2017: 1051-1063 - [c60]Dong Yuan, Guoliang Li, Qi Li, Yudian Zheng:
Sybil Defense in Crowdsourcing Platforms. CIKM 2017: 1529-1538 - [c59]Jianhua Sun, Kun Sun, Qi Li:
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms. CNS 2017: 1-9 - [c58]Qingji Zheng, Qi Li, Aytac Azgin, Jian Weng:
Data verification in information-centric networking with efficient revocable certificateless signature. CNS 2017: 1-9 - [c57]Lingguang Lei, Jianhua Sun, Kun Sun, Chris Shenefiel, Rui Ma, Yuewu Wang, Qi Li:
SPEAKER: Split-Phase Execution of Application Containers. DIMVA 2017: 230-251 - [c56]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - [c55]Qian Wang, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. Financial Cryptography 2017: 79-97 - [c54]Lang Liu, Yacong Gu, Qi Li, Purui Su:
RealDroid: Large-Scale Evasive Malware Detection on "Real Devices". ICCCN 2017: 1-8 - [c53]Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li:
Truthful Auctions for User Data Allowance Trading in Mobile Networks. ICDCS 2017: 1271-1280 - [c52]Bo Wu, Ke Xu, Qi Li, Fan Yang:
Robust and lightweight fault localization. IPCCC 2017: 1-8 - [c51]Jing Zheng, Jianhua Sun, Kun Sun, Bo Wu, Qi Li:
Cookie-based amplification repression protocol. IPCCC 2017: 1-8 - [c50]Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang:
Generic and agile service function chain verification on cloud. IWQoS 2017: 1-10 - [c49]Zheng Liu, Mingwei Xu, Jiahao Cao, Qi Li:
TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN. MSN 2017: 483-496 - [c48]Yi He, Qi Li, Kun Sun:
LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection. SecureComm 2017: 291-311 - [c47]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng:
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. SecureComm 2017: 356-376 - 2016
- [j22]Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, Rajkumar Buyya:
Ensuring Security and Privacy Preservation for Cloud Data Services. ACM Comput. Surv. 49(1): 13:1-13:39 (2016) - [j21]Yacong Gu, Qi Li, Hongtao Zhang, Purui Su, Xinwen Zhang, Dengguo Feng:
Direct Resource Hijacking in Android. IEEE Internet Comput. 20(5): 46-56 (2016) - [j20]Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini, Alexey V. Vinel:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 13(4): 409-410 (2016) - [c46]Jieming Gu, Chengze Li, Dian Lei, Qi Li:
Combination attack of android applications analysis scheme based on privacy leak. CCIS 2016: 62-66 - [c45]Dian Lei, Yang Liu, Chengze Li, Jieming Gu, Qi Li:
Defect trigger model: Analysis method of mobile application defect. CCIS 2016: 72-76 - [c44]Chunhui Pang, Yong Jiang, Qi Li:
FADE: Detecting forwarding anomaly in software-defined networks. ICC 2016: 1-6 - [c43]Yuan Yang, Mingwei Xu, Qi Li:
Tunneling on demand: A lightweight approach for IP fast rerouting against multi-link failures. IWQoS 2016: 1-6 - [c42]Xiaomei Sun, Qi Li, Mingwei Xu, Yuan Yang:
Achieving Stable iBGP with Only One Add-Path. LCN 2016: 688-696 - [c41]Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su:
Exploiting Android System Services Through Bypassing Service Helpers. SecureComm 2016: 44-62 - 2015
- [j19]Bo Tang, Ravi S. Sandhu, Qi Li:
Multi-tenancy authorization models for collaborative cloud services. Concurr. Comput. Pract. Exp. 27(11): 2851-2868 (2015) - [j18]Xiaofeng Lu, Zhaowei Qu, Qi Li, Pan Hui:
Privacy Information Security Classification for Internet of Things Based on Internet Data. Int. J. Distributed Sens. Networks 11: 932941:1-932941:8 (2015) - [j17]Xi Xiao, Zhenlong Wang, Qi Li, Qing Li, Yong Jiang:
ANNs on Co-occurrence Matrices for Mobile Malware Detection. KSII Trans. Internet Inf. Syst. 9(7): 2736-2754 (2015) - [j16]Qi Li, Xinwen Zhang, Xin Zhang, Purui Su:
Invalidating Idealized BGP Security Proposals and Countermeasures. IEEE Trans. Dependable Secur. Comput. 12(3): 298-311 (2015) - [j15]Qi Li, Xinwen Zhang, Qingji Zheng, Ravi S. Sandhu, Xiaoming Fu:
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking. IEEE Trans. Inf. Forensics Secur. 10(2): 308-320 (2015) - [c40]Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li:
TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks. ICDCS 2015: 804-805 - [c39]Yanyu Chen, Qing Li, Yuan Yang, Qi Li, Yong Jiang, Xi Xiao:
Towards adaptive elastic distributed Software Defined Networking. IPCCC 2015: 1-8 - [c38]Sheng Guo, Shu Yang, Qi Li, Yong Jiang:
Towards Controller Placement for robust Software-Defined Networks. IPCCC 2015: 1-8 - [c37]Zhen Feng, Mingwei Xu, Yuan Yang, Qi Li, Yu Wang, Qing Li, Börje Ohlman, Meng Chen:
Joint optimization of content replication and Traffic Engineering in ICN. LCN 2015: 55-63 - [c36]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - 2014
- [j14]Yuan Yang, Mingwei Xu, Qi Li:
Towards fast rerouting-based energy efficient routing. Comput. Networks 70: 1-15 (2014) - [j13]Qi Li, Dah Ming Chiu, Mingwei Xu, Jianping Wu:
An economic analysis of routing conflict and its resolution. Perform. Evaluation 71: 25-43 (2014) - [j12]Xiaofeng Lu, Zhaowei Qu, Pietro Liò, Pan Hui, Qi Li, Peng Lu, Rongfang Bie:
Directional communication with movement prediction in mobile wireless sensor networks. Pers. Ubiquitous Comput. 18(8): 1941-1953 (2014) - [j11]Qi Li, Mingwei Xu, Yuan Yang, Lixin Gao, Yong Cui, Jianping Wu:
Safe and Practical Energy-Efficient Detour Routing in IP Networks. IEEE/ACM Trans. Netw. 22(6): 1925-1937 (2014) - [c35]Gautier Bayzelon, Shu Yang, Mingwei Xu, Qi Li:
Multi-dimensional Forwarding Tables. ICoC 2014: 68-79 - [c34]Xiaofeng Lu, Qi Li, Zhaowei Qu, Pan Hui:
Privacy Information Security Classification Study in Internet of Things. IIKI 2014: 162-165 - [c33]Yu Wang, Mingwei Xu, Zhen Feng, Qing Li, Qi Li:
Session-based access control in information-centric networks: Design and analyses. IPCCC 2014: 1-8 - [c32]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:
Revisiting Node Injection of P2P Botnet. NSS 2014: 124-137 - [c31]Tong Yang, Gaogang Xie, Yanbiao Li, Qiaobin Fu, Alex X. Liu, Qi Li, Laurent Mathy:
Guarantee IP lookup performance with FIB explosion. SIGCOMM 2014: 39-50 - 2013
- [j10]Qi Li, Miao Zhang, Guoai Xu:
A Novel Element Detection Method in Audio Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c30]Hai-Tao Zheng, Qi Li, Yong Jiang, Shu-Tao Xia, Lanshan Zhang:
Exploiting Multiple Features for Learning to Rank in Expert Finding. ADMA (2) 2013: 219-230 - [c29]Bo Tang, Ravi S. Sandhu, Qi Li:
Multi-tenancy authorization models for collaborative cloud services. CTS 2013: 132-138 - [c28]Bo Tang, Qi Li, Ravi S. Sandhu:
A multi-tenant RBAC model for collaborative cloud services. PST 2013: 229-238 - [c27]Qi Li, Dan Wang, Wenzeng Zhang, Zhenguo Sun:
Switchable under-actuated finger with multiple grasping modes. ROBIO 2013: 716-721 - [c26]Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - 2012
- [j9]Mingwei Xu, Yuan Yang, Qi Li:
Selecting shorter alternate paths for tunnel-based IP Fast ReRoute in linear time. Comput. Networks 56(2): 845-857 (2012) - [j8]Mingwei Xu, Qing Li, Lingtao Pan, Qi Li, Dan Wang:
Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme. Comput. Commun. 35(17): 2082-2092 (2012) - [j7]Mingwei Xu, Qi Li, Patrick P. C. Lee, Yanhai Peng, Jianping Wu:
VegaNet: a virtualized experimentation platform for production networks with connectivity consistency. IEEE Netw. 26(5): 15-21 (2012) - [j6]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. IEEE Trans. Inf. Forensics Secur. 7(2): 691-703 (2012) - [j5]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee, Xingang Shi, Dah Ming Chiu, Yuan Yang:
A Unified Approach to Routing Protection in IP Networks. IEEE Trans. Netw. Serv. Manag. 9(3): 306-319 (2012) - 2011
- [j4]Mingwei Xu, Qi Li, Yuan Yang, Meijia Hou, Lingtao Pan:
Self-healing routing: failure, modeling and analysis. Sci. China Inf. Sci. 54(3): 609-622 (2011) - [j3]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee, Dah-Ming Chiu:
Toward a practical approach for BGP stability with root cause check. J. Parallel Distributed Comput. 71(8): 1098-1110 (2011) - [c25]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu:
Enhancing the trust of internet routing with lightweight route attestation. AsiaCCS 2011: 92-101 - [c24]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee, Ke Xu:
An Algebraic Approach to Computing the Reliability of Internet Routing. ICCCN 2011: 1-6 - [c23]Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li, Donghong Qin:
An efficient parallel TCAM scheme for the forwarding engine of the next-generation router. Integrated Network Management 2011: 454-461 - [c22]Xue Zhi Jiang, Mingwei Xu, Qi Li:
Compact Route Computation: Improving Parallel BGP Route Processing for Scalable Routers. IPDPS Workshops 2011: 1496-1501 - [c21]Mingwei Xu, Qing Li, Lingtao Pan, Qi Li:
MPCT: Minimum protection cost tree for IP fast reroute using Tunnel. IWQoS 2011: 1-3 - [c20]Min Zhu, Ke Xu, Qi Li:
Access Path Based Source Address Validation in Mobile IPv6. NPC 2011: 334-349 - 2010
- [c19]Qing Li, Mingwei Xu, Qi Li, Dan Wang, Yong Cui:
IP Fast Reroute: NotVia with Early Decapsulation. GLOBECOM 2010: 1-6 - [c18]Yilin Song, Min Liu, Anfu Zhou, Zhongcheng Li, Qi Li:
PCLF: A Practical Cross-Layer Fast Handover Mechanism in IEEE 802.11 WLANs. ICC 2010: 1-5 - [c17]Yuan Yang, Mingwei Xu, Qi Li:
A Lightweight IP Fast Reroute Algorithm with Tunneling. ICC 2010: 1-5 - [c16]Qi Li, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu, Patrick P. C. Lee:
Achieving Unified Protection for IP Routing. ICCCN 2010: 1-6 - [c15]Bin Zhang, Jianping Wu, Qi Li, Jiahai Yang:
Efficient parallel searching with TCAMs. IWQoS 2010: 1-2 - [c14]Bin Zhang, Jiahai Yang, Jianping Wu, Qi Li:
Efficient searching with parallel TCAM chips. LCN 2010: 228-321
2000 – 2009
- 2009
- [j2]Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu:
Towards secure dynamic collaborations with group-based RBAC model. Comput. Secur. 28(5): 260-275 (2009) - [c13]Xue Zhi Jiang, Mingwei Xu, Qi Li, Lingtao Pan:
Improving IGP Convergence through Distributed OSPF in Scalable Router. HPCC 2009: 438-443 - [c12]Yilin Song, Min Liu, Zhongcheng Li, Qi Li:
Handover Latency of Predictive FMIPv6 in IEEE 802.11 WLANs: A Cross Layer Perspective. ICCCN 2009: 1-6 - 2008
- [j1]Ke Xu, Mingwei Xu, Qi Li, Song Lin:
Analysis and case study on multi-dimensional scalability of the Internet architecture. Sci. China Ser. F Inf. Sci. 51(11): 1661-1680 (2008) - [c11]Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang:
Usage control platformization via trustworthy SELinux. AsiaCCS 2008: 245-248 - [c10]Qi Li, Mingwei Xu, Xinwen Zhang:
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. ICDCS Workshops 2008: 441-446 - [c9]Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Evaluating Service Scalability of Network Architectures. ICN 2008: 434-438 - [c8]Qi Li, Mingwei Xu, Ke Xu:
Toward A Practical Scheme for IPSec Management. ICOIN 2008: 1-5 - [c7]Xiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y. Yau, Sihan Qing, Huanguo Zhang:
A hash-TLB approach for MMU virtualization in xen/IA64. IPDPS 2008: 1-8 - [c6]Qi Li, Mingwei Xu, Xinwen Zhang:
Access control in Group Communication Systems. ISCC 2008: 380-385 - [c5]Qi Li, Mingwei Xu, Lingtao Pan, Yong Cui:
A Study of Path Protection in Self-Healing Routing. Networking 2008: 554-561 - [c4]Xiantao Zhang, Qi Li, Sihan Qing, Huanguo Zhang:
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. WKDD 2008: 594-600 - 2007
- [c3]Xinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu:
Flexible Authorization with Decentralized Access Control Model for Grid Computing. HASE 2007: 156-165 - 2006
- [c2]Qi Li, Xinwen Zhang, Sihan Qing, Mingwei Xu:
Supporting Ad-hoc Collaboration with Group-based RBAC Model. CollaborateCom 2006 - 2005
- [c1]Qi Li, Jingpu Shi, Sihan Qing:
An Administration Model of DRBAC on the Web. ICEBE 2005: 364-367
Coauthor Index
aka: Haixin Duan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint