default search action
Jiahao Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Renjie Xie, Jiahao Cao, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. IEEE Trans. Inf. Forensics Secur. 19: 7659-7673 (2024) - [c27]Yizhi Li, Jiang Li, Jiahao Cao, Renjie Xie, Yangyang Wang, Mingwei Xu:
Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training. CCS 2024: 4970-4972 - [c26]Jiahao Cao, Xiaodong Zhang, Runsheng Yin, Zhichun Ma:
Feature extraction method of rolling bearing fault based on VMD optimized by enhanced SSA and envelope analysis. CIVEMSA 2024: 1-5 - [c25]Shiguang Zhang, Jiahao Cao, Menghao Zhang, Mingwei Xu, Wei Han, Yanbin Zhai, Zhiming Zhang:
POSTER: Co4U: Efficient and Robust HTTP Message Compression for Edge Computing Networks. SIGCOMM (Posters and Demos) 2024: 81-82 - [i3]Weiliang Qi, Jiahao Cao, Darsh Poddar, Sophia Li, Xinda Wang:
Enhancing Pre-Trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation. CoRR abs/2410.00249 (2024) - 2023
- [j9]Jiahao Cao, Shiyuan He, Bohai Zhang:
Spatial Linear Regression with Covariate Measurement Errors: Inference and Scalable Computation in a Functional Modeling Approach. J. Comput. Graph. Stat. 32(4): 1588-1599 (2023) - [j8]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang:
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. IEEE/ACM Trans. Netw. 31(3): 1416-1431 (2023) - [c24]Renjie Xie, Yixiao Wang, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. ACM TUR-C 2023: 131-132 - [c23]Jiang Li, Jiahao Cao, Zili Meng, Renjie Xie, Mingwei Xu:
RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features. ICC 2023: 5240-5246 - [c22]Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. USENIX Security Symposium 2023: 625-642 - 2022
- [j7]Songsong Liu, Pengbin Feng, Shu Wang, Kun Sun, Jiahao Cao:
Enhancing malware analysis sandboxes with emulated user behavior. Comput. Secur. 115: 102613 (2022) - [j6]Yunlong Xing, Jiahao Cao, Kun Sun, Fei Yan, Shengye Wan:
The devil is in the detail: Generating system call whitelist for Linux seccomp. Future Gener. Comput. Syst. 135: 105-113 (2022) - [j5]Zijie Yang, Jiahao Cao, Zhuotao Liu, Xiaoli Zhang, Kun Sun, Qi Li:
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems. IEEE Trans. Inf. Forensics Secur. 17: 1069-1082 (2022) - [j4]Renjie Xie, Jiahao Cao, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. IEEE/ACM Trans. Netw. 30(5): 2158-2172 (2022) - [c21]Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, Qi Li:
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. CNS 2022: 236-244 - [c20]Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun, Qi Li:
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. DIMVA 2022: 197-217 - [c19]Guoqiang Zhang, Jiahao Cao, Mingwei Xu, Qi Li:
Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection. HPCC/DSS/SmartCity/DependSys 2022: 538-545 - [c18]Xu He, Jiahao Cao, Shu Wang, Kun Sun, Lisong Xu, Qi Li:
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks. INFOCOM 2022: 1689-1698 - [c17]Kun Peng, Nannan Sun, Jiahao Cao, Rui Liu, Jiaqian Ren, Lei Jiang:
Prompt as a Knowledge Probe for Chinese Spelling Check. KSEM (3) 2022: 516-527 - [c16]Jiahao Cao, Rui Liu, Huailiang Peng, Lei Jiang, Xu Bai:
Aspect Is Not You Need: No-aspect Differential Sentiment Framework for Aspect-based Sentiment Analysis. NAACL-HLT 2022: 1599-1609 - [c15]Rui Liu, Jiahao Cao, Nannan Sun, Lei Jiang:
Aspect Feature Distillation and Enhancement Network for Aspect-based Sentiment Analysis. SIGIR 2022: 1577-1587 - 2021
- [j3]Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, Cong Wang:
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. IEEE Trans. Inf. Forensics Secur. 16: 1795-1809 (2021) - [c14]Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. ACSAC 2021: 260-272 - [c13]Haibo Wang, Tao Gao, Weizhen Dang, Jing'an Xue, Jiahao Cao, Fenghua Li, Jilong Wang:
Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network. ICNP 2021: 1-11 - 2020
- [j2]Peiyi Han, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan, Zekun Cao, Binxing Fang:
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 8: 68449-68459 (2020) - [c12]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CCS 2020: 1103-1119 - [c11]Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, Chuanyi Liu:
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding. CIAT 2020: 407-413 - [c10]Xinyu Yang, Jiahao Cao, Mingwei Xu:
SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags. IPCCC 2020: 1-8 - [c9]Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. NDSS 2020 - [c8]Shu Wang, Jiahao Cao, Kun Sun, Qi Li:
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. RAID 2020: 365-379 - [i2]Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li:
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. CoRR abs/2009.00718 (2020) - [i1]Xiaofei Mao, Jiahao Cao, Dongfang Li, Xia Jia, Qingfang Zheng:
Integrating Coarse Granularity Part-level Features with Supervised Global-level Features for Person Re-identification. CoRR abs/2010.07675 (2020)
2010 – 2019
- 2019
- [c7]Shengsheng Yao, Mingwei Xu, Qi Li, Jiahao Cao, Qiyang Song:
cSFC: Building Credible Service Function Chain on the Cloud. GLOBECOM 2019: 1-6 - [c6]Renjie Xie, Mingwei Xu, Jiahao Cao, Qi Li:
SoftGuard: Defend Against the Low-Rate TCP Attack in SDN. ICC 2019: 1-6 - [c5]Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, Peiyi Han:
Fingerprinting SDN Applications via Encrypted Control Traffic. RAID 2019: 501-515 - [c4]Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. SecureComm (1) 2019: 429-449 - [c3]Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, Yuan Yang:
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. USENIX Security Symposium 2019: 19-36 - 2018
- [j1]Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K. Y. Yau, Jianping Wu:
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. IEEE Trans. Inf. Forensics Secur. 13(7): 1838-1853 (2018) - 2017
- [c2]Zheng Liu, Mingwei Xu, Jiahao Cao, Qi Li:
TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN. MSN 2017: 483-496 - [c1]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, Jing Zheng:
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. SecureComm 2017: 356-376
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint