default search action
Jun Li 0001
Person information
- affiliation: University of Oregon, Eugene, OR, USA
- affiliation (PhD 2002): University of California at Los Angeles, CA, USA
Other persons with the same name
- Jun Li — disambiguation page
- Jun Li 0002 — Chinese Academy of Sciences, Computer Network Information Center, Beijing, China (and 1 more)
- Jun Li 0003 — Tsinghua University, RIIT / TNList, Beijing, China
- Jun Li 0004 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, China (and 5 more)
- Jun Li 0005 — Institute for Infocomm Research, Singapore (and 1 more)
- Jun Li 0006 — Communications Research Centre Canada
- Jun Li 0007 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China (and 1 more)
- Jun Li 0008 — eBay, USA (and 1 more)
- Jun Li 0009 — Sun Yat-sen University, School of Geography and Planning, Guangzhou, China (and 2 more)
- Jun Li 0010 — Elephant Tech LLC, Shenzhen, China (and 2 more)
- Jun Li 0011 — Southeast University, School of Automation, Nanjing, China (and 2 more)
- Jun Li 0012 — China West Normal University, School of Mathematics and Information, Nanchong, China
- Jun Li 0013 — University of Cambridge, Department of Land Economy, Cambridge, UK
- Jun Li 0014 — Communication University of China, School of Science, Beijing, China (and 2 more)
- Jun Li 0015 — YINGDATAIHE Property Insurance Co., LTD, Beijing, China (and 2 more)
- Jun Li 0016 — State Grid Energy Research Institute, Beijing, China (and 2 more)
- Jun Li 0017 — City University of New York, Queens College, Department of Computer Science, NY, USA (and 3 more)
- Jun Li 0019 — Zhejiang Wanli University, Department of Telecommunications, Ningbo, China (and 1 more)
- Jun Li 0020 — National University of Defense Technology, College of Electronic Science, Changsha, China
- Jun Li 0021 — China University of Mining and Technology, College of Geoscience and Surveying Engineering, Beijing, China (and 1 more)
- Jun Li 0022 — Nanjing University, State Key Laboratory for Novel Software Technology, China
- Jun Li 0023 — University of California Riverside, Department of Statistics, CA, USA (and 1 more)
- Jun Li 0024 — University of California, San Diego
- Jun Li 0025 — University of Hertfordshire, UK
- Jun Li 0026 — University of Wisconsin-Madison, Cooperative Institute for Meteorological Satellite Studies, Madison, WI, USA
- Jun Li 0027 — Nanjing University of Science and Technology, School of Computer Science and Engineering, PCA Lab, Nanjing, China (and 2 more)
- Jun Li 0028 — Huawei Technologies Co., Ltd., Qingshuihe, Shenzhen, China
- Jun Li 0030 — Kansas State University, Department of Chemistry, Manhattan, KS, USA (and 1 more)
- Jun Li 0032 — Huawei Technologies Company, Ltd., Wuhan, China (and 1 more)
- Jun Li 0033 — Southeast University, School of Automation, Nanjing, China (and 1 more)
- Jun Li 0034 — Rutgers University, WINLAB, New Brunswick, NJ, USA
- Jun Li 0035 — Dalian University of Technology, Faculty of Electronic Information and Electrical Engineering, China (and 2 more)
- Jun Li 0036 — Guangzhou University, School of Mechanical and Electrical Engineering, China (and 1 more)
- Jun Li 0037 — Zhejiang University, Institute of Information and Communication Engineering, Hangzhou, China
- Jun Li 0038 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Jun Li 0039 — China Electronics Technology Group Corporation, Second Research Institute, Taiyuan, China
- Jun Li 0040 — Nanjing University, Collaborative Innovation Center of Advanced Microstructures, School of Physics, National Laboratory of Solid State Microstructures, China
- Jun Li 0041 — Philips Research North America, Cambridge, MA, USA
- Jun Li 0042 — National University of Defense Technology, School of Computer Science, China (and 1 more)
- Jun Li 0043 — Chinese Academy of Sciences, Haixi Institute, Quanzhou Institute of Equipment Manufacturing, Quanzhou, China (and 1 more)
- Jun Li 0045 — Beihang University, School of Computer Science and Engineering, Beijing, China
- Jun Li 0046 — Jiangsu Yitong High-tech Co., Ltd., China
- Jun Li 0047 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Jun Li 0048 — Anhui University, School of Computer Science and Technology, Hefei, China
- Jun Li 0049 — University of Michigan, Ross School of Business, Ann Arbor, MI, USA (and 1 more)
- Jun Li 0050 — China Industrial Control Systems Cyber Emergency Response Team, Informatization Standard Research Division, Beijing, China (and 1 more)
- Jun Li 0051 — City University of Hong Kong, Department of Infectious Diseases and Public Health, Hong Kong (and 2 more)
- Jun Li 0052 — University of Notre Dame, Department of Applied and Computational Mathematics and Statistics, IN, USA
- Jun Li 0053 — Curtin University, Department of Civil Engineering, Perth, WA, Australia (and 1 more)
- Jun Li 0054 — Lanzhou University of Technology, School of Science, China
- Jun Li 0055 — Tsinghua University, Department of Chemistry, Beijing, China (and 3 more)
- Jun Li 0056 — Wuhan University of Technology, School of Logistics Engineering, China
- Jun Li 0057 — University of Science and Technology of China, Laboratory for Future Networks, Hefei, China
- Jun Li 0058 — University of Science and Technology of China, School of Management, Hefei, China
- Jun Li 0059 — KTH Royal Institute of Technology, Optical Networks Laboratory, Stockholm, Sweden
- Jun Li 0060 — Xinxiang Medical University, Modern Educational Technology Center, China
- Jun Li 0061 — Wenzhou University, School of Mathematical and Electronic Information Engineering, China
- Jun Li 0062 — Southwest University, College of Computer and Information Science, Chongqing, China
- Jun Li 0063 — Guilin University of Electronic Technology, School of Information and Communication, China
- Jun Li 0064 — Shanghai Maritime University, Institute of Logistics Science & Engineering, China
- Jun Li 0065 — Nanjing University of Information Science and Technology, Binjiang College, Wuxi, China (and 3 more)
- Jun Li 0066 — University of Arizona Tucson, Department of Electrical and Computer Engineering, Tucson, AZ, USA
- Jun Li 0067 — Wuhan University of Science and Technology, School of Computer Science and Technology, China (and 1 more)
- Jun Li 0068 — University of Texas, MD Anderson Cancer Center, Houston, TX, USA (and 1 more)
- Jun Li 0069 — Chang'an University, School of Geological Engineering and Geomatics, Xi'an, China
- Jun Li 0070 — Chongqing University of Posts and Telecommunications, School of Computer Science and Technology, China
- Jun Li 0071 — Hunan University, Changsha, China
- Jun Li 0072 — Capital Normal University, Information Engineering College, Beijing, China (and 1 more)
- Jun Li 0073 — Tianjin Normal University, School of Mathematics, China
- Jun Li 0074 — Qilu University of Technology (Shandong Academy of Sciences), School of Electrical Engineering and Automation, Jinan, China (and 1 more)
- Jun Li 0075 — Sun Yat-sen University, School of Intelligent Systems Engineering, Guangzhou, China (and 1 more)
- Jun Li 0076 — Beijing Information Science and Technology University, China (and 1 more)
- Jun Li 0077 — Hubei Minzu University, School of Information Engineering, Enshi, China
- Jun Li 0078 — Ningbo University of Technology, School of Electronic and Information Engineering, China (and 1 more)
- Jun Li 0079 — Wuhan University, School of Electrical Engineering and Automation, China (and 1 more)
- Jun Li 0080 — South China Normal University, School of Physics and Telecommunication Engineering, Guangzhou, China
- Jun Li 0081 — Lakehead University, Thunder Bay, ON, Canada
- Jun Li 0082 — Tsinghua University, State Key Laboratory of Automotive Safety and Energy, Beijing, China (and 2 more)
- Jun Li 0084 — Central South University, School of Computer Science and Engineering, Changsha, China
- Jun Li 0085 — Chinese Academy of Sciences, Institute Information of Engineering, Beijing, China (and 1 more)
- Jun Li 0086 — Xidian University, School of Electro-Mechanical Engineering, Xi'an, China
- Jun Li 0087 — Wuhan University, School of Remote Sensing and Information Engineering, Wuhan, China
- Jun Li 0088 — Harbin Institute of Technology, State Key Laboratory of Robotics and Systems, Harbin, China
- Jun Li 0089 — South China Agricultural University, College of Engineering, Guangzhou, China
- Jun Li 0090 — Nanjing University of Science and Technology, School of Automation, Nanjing, China
- Jun Li 0091 — New York University, Tandon School of Engineering, Department of Electrical and Computer Engineering, New York, NY, USA
- Jun Li 0092 — King Fahd University of Petroleum & Minerals, Center for Integrative Petroleum Research, Saudi Arabia (and 1 more)
- Jun Li 0093 — University of South Australia, UniSA STEM, Mawson Lakes, Australia
- Jun Li 0094 — National University of Defense Technology, College of Computer, Changsha, China (and 1 more)
- Jun Li 0095 — Xidian University, School of Cyber Engineering, Xi'an, China
- Jun Li 0096 — Sun Yat-sen University, School of International Relations, Guangzhou, China (and 1 more)
- Jun Li 0097 — University of Essex, Business School, Essex, UK
- Jun Li 0098 — Fudan University, IICS Lab, Shanghai, China (and 3 more)
- Jun Li 0099 — Second Affiliated Hospital of Zhejiang University Medical School, Department of Surgical Oncology, Hangzhou, China
- Jun Li 0100 — China West Normal University, Institute of Education, Department of Psychology, Nanchong, China
- Jun Li 0101 — University of Virginia, Department of Anesthesiology, Charlottesville, VA, USA
- Jun Li 0102 — Shanghai Tech University, School of Information Science and Technology, Shanghai, China
- Jun Li 0103 — Chinese Academy of Sciences, Institute of Computing Technology, Key Lab of Intelligent Information Processing, Beijing, China
- Jun Li 0104 — Chinese Academy of Sciences, Institute of Microelectronics, System Packaging and Integration Research Center, Beijing, China
- Jun Li 0105 — Sun Yat-sen University, School of Intelligent Systems Engineering, Guangzhou, China (and 1 more)
- Jun Li 0106 — Beihang University, School of Astronautics, Image Processing Center, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Yebo Feng, Jun Li, Devkishen Sisodia, Peter L. Reiher:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. IEEE Trans. Dependable Secur. Comput. 21(4): 2211-2226 (2024) - [j31]Zhangxiang Hu, Jun Li, Christopher Wilson:
Resilient Intermediary-Based Key Exchange Protocol for IoT. ACM Trans. Internet Things 5(1): 7:1-7:31 (2024) - [j30]Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam:
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications. ACM Trans. Internet Things 5(2): 8:1-8:31 (2024) - [i6]Tingxu Han, Shenghan Huang, Ziqi Ding, Weisong Sun, Yebo Feng, Chunrong Fang, Jun Li, Hanwei Qian, Cong Wu, Quanjun Zhang, Yang Liu, Zhenyu Chen:
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder. CoRR abs/2403.03846 (2024) - 2023
- [j29]Jun Li, Devkishen Sisodia, Shad Stafford:
On the Detection of Smart, Self-Propagating Internet Worms. IEEE Trans. Dependable Secur. Comput. 20(4): 3051-3063 (2023) - [c64]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Toward Adaptive DDoS-Filtering Rule Generation. CNS 2023: 1-9 - [i5]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Adaptive Distributed Filtering of DDoS Traffic on the Internet. CoRR abs/2305.13296 (2023) - 2022
- [j28]Lumin Shi, Jun Li, Mingwei Zhang, Peter L. Reiher:
On Capturing DDoS Traffic Footprints on the Internet. IEEE Trans. Dependable Secur. Comput. 19(4): 2755-2770 (2022) - [c63]Zhangxiang Hu, Jun Li, Samuel Mergendahl, Christopher Wilson:
Toward a Resilient Key Exchange Protocol for IoT. CODASPY 2022: 214-225 - [c62]Mingyu Chen, Yu Zhang, Yongshang Li, Zhen Wang, Jun Li, Xiangyang Li:
QCIR: Pattern Matching Based Universal Quantum Circuit Rewriting Framework. ICCAD 2022: 55:1-55:8 - [c61]Yebo Feng, Jun Li, Devkishen Sisodia:
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic. RAID 2022: 482-494 - [i4]Jelena Mirkovic, Yebo Feng, Jun Li:
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures. CoRR abs/2203.00742 (2022) - 2021
- [j27]Yebo Feng, Jun Li, Lei Jiao, Xintao Wu:
Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic. IEEE Trans. Dependable Secur. Comput. 18(5): 2149-2163 (2021) - [j26]Lin Wang, Lei Jiao, Ting He, Jun Li, Henri E. Bal:
Service Placement for Collaborative Edge Applications. IEEE/ACM Trans. Netw. 29(1): 34-47 (2021) - [j25]Jianzhen Luo, Jun Li, Lei Jiao, Jun Cai:
On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains. IEEE Trans. Parallel Distributed Syst. 32(5): 1238-1255 (2021) - 2020
- [j24]Yaoqing Liu, Garegin Grigoryan, Jun Li, Guchuan Sun, Tony Tauber:
VeriTable: Fast equivalence verification of multiple large forwarding tables. Comput. Networks 168 (2020) - [c60]Devkishen Sisodia, Jun Li, Lei Jiao:
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. AsiaCCS 2020: 153-164 - [c59]Yebo Feng, Devkishen Sisodia, Jun Li:
POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. AsiaCCS 2020: 907-909 - [c58]Samuel Mergendahl, Jun Li:
Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things. CNS 2020: 1-9 - [c57]Thomas Cilloni, Xiyu Cai, Charles Fleming, Jun Li:
Understanding and Detecting Majority Attacks. DAPPS 2020: 11-21 - [c56]Jun Li, Alex Grintsvayg, Jeremy Kauffman, Charles Fleming:
LBRY: A Blockchain-Based Decentralized Digital Content Marketplace. DAPPS 2020: 42-51 - [c55]Wencong You, Lei Jiao, Jun Li, Ruiting Zhou:
Scheduling DDoS Cloud Scrubbing in ISP Networks via Randomized Online Auctions. INFOCOM 2020: 1658-1667 - [c54]Yebo Feng, Jun Li, Thanh Nguyen:
Application-Layer DDoS Defense with Reinforcement Learning. IWQoS 2020: 1-10 - [c53]Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li:
Bridging Missing Gaps in Evaluating DDoS Research. CSET @ USENIX Security Symposium 2020
2010 – 2019
- 2019
- [j23]Soheil Jamshidi, Reza Rejaie, Jun Li:
Characterizing the dynamics and evolution of incentivized online reviews on Amazon. Soc. Netw. Anal. Min. 9(1): 22:1-22:15 (2019) - [j22]Lin Wang, Lei Jiao, Jun Li, Julien Gedeon, Max Mühlhäuser:
MOERA: Mobility-Agnostic Online Resource Allocation for Edge Computing. IEEE Trans. Mob. Comput. 18(8): 1843-1856 (2019) - [c52]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. AAAI 2019: 1286-1293 - [c51]Yebo Feng, Jun Li, Lei Jiao, Xintao Wu:
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows. CNS 2019: 169-177 - [c50]Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. IM 2019: 180-188 - 2018
- [j21]Jun Li, Bodong Zhao, Chao Zhang:
Fuzzing: a survey. Cybersecur. 1(1): 6 (2018) - [j20]Congjie Chen, Dan Li, Jun Li, Konglin Zhu:
SVDC: A Highly Scalable Isolation Architecture for Virtualized Layer-2 Data Center Networks. IEEE Trans. Cloud Comput. 6(4): 1178-1190 (2018) - [c49]Soheil Jamshidi, Reza Rejaie, Jun Li:
Trojan Horses in Amazon's Castle: Understanding the Incentivized Online Reviews. ASONAM 2018: 335-342 - [c48]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. ICCCN 2018: 1-9 - [c47]Lin Wang, Lei Jiao, Ting He, Jun Li, Max Mühlhäuser:
Service Entity Placement for Social Virtual Reality Applications in Edge Computing. INFOCOM 2018: 468-476 - [c46]Garegin Grigoryan, Yaoqing Liu, Michael Leczinsky, Jun Li:
VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables. INFOCOM 2018: 621-629 - [c45]Lei Jiao, Antonia M. Tulino, Jaime Llorca, Yue Jin, Alessandra Sala, Jun Li:
Online Control of Cloud and Edge Resources Using Inaccurate Predictions. IWQoS 2018: 1-6 - [c44]Lumin Shi, Mingwei Zhang, Jun Li, Peter L. Reiher:
PathFinder: Capturing DDoS Traffic Footprints on the Internet. Networking 2018: 10-18 - [c43]Lei Jiao, Lingjun Pu, Lin Wang, Xiaojun Lin, Jun Li:
Multiple Granularity Online Control of Cloudlet Networks for Edge Computing. SECON 2018: 406-414 - [c42]Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. SecureComm (1) 2018: 22-42 - [i3]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. CoRR abs/1803.01798 (2018) - [i2]Garegin Grigoryan, Yaoqing Liu, Michael Leczinsky, Jun Li:
VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables. CoRR abs/1804.07374 (2018) - 2017
- [j19]Joshua Stein, Han Hee Song, Mario Baldi, Jun Li:
On the most representative summaries of network user activities. Comput. Networks 113: 205-217 (2017) - [j18]David Koll, Jun Li, Xiaoming Fu:
The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks. Comput. Commun. 108: 36-51 (2017) - [j17]Mingwei Zhang, Jun Li, Scott Brooks:
I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes. IEEE/ACM Trans. Netw. 25(6): 3411-3426 (2017) - [j16]Yang Chen, Shining Wu, Jun Li, Xiaoming Fu:
NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems. IEEE Trans. Serv. Comput. 10(2): 244-257 (2017) - [c41]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
Source-End DDoS Defense in IoT Environments. IoT S&P@CCS 2017: 63-64 - [c40]Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
Spectrum-based Deep Neural Networks for Fraud Detection. CIKM 2017: 2419-2422 - [c39]Lin Wang, Lei Jiao, Jun Li, Max Mühlhäuser:
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds. ICDCS 2017: 1281-1290 - [c38]David Koll, Martin Schwarzmaier, Jun Li, Xiang-Yang Li, Xiaoming Fu:
Thank You For Being A Friend: An Attacker View on Online-Social-Network-Based Sybil Defenses. ICDCS Workshops 2017: 157-162 - [i1]Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
Spectrum-based deep neural networks for fraud detection. CoRR abs/1706.00891 (2017) - 2016
- [j15]Yuanyuan Zhang, Mingwei Xu, Ning Wang, Jun Li, Penghan Chen, Fei Liang:
Compressing IP Forwarding Tables with Small Bounded Update Time. Comput. Networks 106: 77-90 (2016) - [j14]Lei Jiao, Jun Li, Tianyin Xu, Wei Du, Xiaoming Fu:
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds. IEEE/ACM Trans. Netw. 24(1): 99-112 (2016) - [c37]Jun Li, Joshua Stein, Mingwei Zhang, Olaf Maennel:
An expectation-based approach to policy-based security of the Border Gateway Protocol. INFOCOM Workshops 2016: 340-345 - 2015
- [j13]Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang:
Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability. Comput. Commun. 67: 11-22 (2015) - [j12]Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, Jianyu Zhang, Xinhui Han:
SF-DRDoS: The store-and-flood distributed reflective denial of service attack. Comput. Commun. 69: 107-115 (2015) - [j11]Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:
Improving lookup reliability in Kad. Peer-to-Peer Netw. Appl. 8(1): 156-170 (2015) - [c36]Hanqing Zhu, Mingwei Xu, Qing Li, Jun Li, Yuan Yang, Suogang Li:
MDTC: An efficient approach to TCAM-based multidimensional table compression. Networking 2015: 1-9 - 2014
- [j10]Ghulam Memon, Jun Li, Reza Rejaie:
Tsunami: A parasitic, indestructible botnet on Kad. Peer-to-Peer Netw. Appl. 7(4): 444-455 (2014) - [c35]Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, Chen Li:
Splider: A split-based crawler of the BT-DHT network and its applications. CCNC 2014: 327-335 - [c34]Jun Li, Shad Stafford:
Detecting smart, self-propagating Internet worms. CNS 2014: 193-201 - [c33]Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han:
The store-and-flood distributed reflective denial of service attack. ICCCN 2014: 1-8 - [c32]Lei Jiao, Jun Li, Wei Du, Xiaoming Fu:
Multi-objective data placement for multi-cloud socially aware services. INFOCOM 2014: 28-36 - [c31]Joshua Stein, Han Hee Song, Mario Baldi, Jun Li:
Toward the most representative summaries of network user activities. IWQoS 2014: 111-116 - [c30]Ming Zhu, Jun Li, Ying Liu, Dan Li, Jianping Wu:
TED: Inter-domain traffic engineering via deflection. IWQoS 2014: 117-122 - [c29]Ming Zhu, Ying Liu, Jun Li, Jianping Wu:
CCOF: Congestion control on the fly for Inter-Domain routing. LANMAN 2014: 1-2 - [c28]David Koll, Jun Li, Xiaoming Fu:
SOUP: an online social network by the people, for the people. Middleware 2014: 193-204 - [c27]David Koll, Jun Li, Joshua Stein, Xiaoming Fu:
On the state of OSN-based Sybil defenses. Networking 2014: 1-9 - [c26]David Koll, Jun Li, Xiaoming Fu:
SOUP: an online social network by the people, for the people. SIGCOMM 2014: 143-144 - [c25]Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei:
Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM 2014: 591-592 - 2013
- [c24]Jason Gustafson, Jun Li:
Leveraging the crowds to disrupt phishing. CNS 2013: 82-90 - [c23]David Koll, Jun Li, Joshua Stein, Xiaoming Fu:
On the effectiveness of sybil defenses based on online social networks. ICNP 2013: 1-2 - [c22]Lei Jiao, Jun Li, Xiaoming Fu:
Optimizing data center traffic of Online Social Networks. LANMAN 2013: 1-6 - 2012
- [c21]Jun Li, Dongting Yu, Luke Maurer:
A resource management approach to web browser security. ICNC 2012: 697-701 - [c20]Jun Li, Toby Ehrenkranz, Paul Elliott:
Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies. ICNP 2012: 1-10 - [c19]Lei Jiao, Jun Li, Tianyin Xu, Xiaoming Fu:
Cost optimization for Online Social Networks on geo-distributed clouds. ICNP 2012: 1-10 - [c18]Shining Wu, Yang Chen, Xiaoming Fu, Jun Li:
NCShield: Securing decentralized, matrix factorization-based network coordinate systems. IWQoS 2012: 1-9 - [c17]Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu:
Ghost Domain Names: Revoked Yet Still Resolvable. NDSS 2012 - [c16]Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, Mo Zhou:
Revisiting why Kad lookup fails. P2P 2012: 37-42 - 2011
- [j9]Jun Li:
mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients. Peer-to-Peer Netw. Appl. 4(4): 325-345 (2011) - [c15]Jun Li, Scott Brooks:
I-seismograph: Observing and measuring Internet earthquakes. INFOCOM 2011: 2624-2632 - 2010
- [c14]Shad Stafford, Jun Li:
Behavior-Based Worm Detectors Compared. RAID 2010: 38-57 - [c13]Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:
Realizing a Source Authentic Internet. SecureComm 2010: 217-234
2000 – 2009
- 2009
- [j8]Toby Ehrenkranz, Jun Li:
On the state of IP spoofing defense. ACM Trans. Internet Techn. 9(2): 6:1-6:29 (2009) - [c12]Paul Knickerbocker, Dongting Yu, Jun Li:
Humboldt: A distributed phishing disruption system. eCrime 2009: 1-12 - 2008
- [j7]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - 2007
- [j6]Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, Toby Ehrenkranz:
BGP routing dynamics revisited. Comput. Commun. Rev. 37(2): 5-16 (2007) - [j5]Jun Li, Paul Knickerbocker:
Functional similarities between computer worms and biological pathogens. Comput. Secur. 26(4): 338-347 (2007) - [j4]Shad Stafford, Jun Li, Toby Ehrenkranz:
Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts. Simul. 83(2): 199-212 (2007) - [c11]Yibo Wang, Jun Li:
Is your IP address prefix well-served by internet routing? CoNEXT 2007: 69 - [c10]Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li:
Investigating the Impact of Real-World Factors on Internet Worm Propagation. ICISS 2007: 10-24 - [c9]Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang:
On Knowledge-Based Classification of Abnormal BGP Events. ICISS 2007: 267-271 - [c8]Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong:
Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007: 467-472 - 2006
- [c7]Jun Li, Zhen Wu, Eric Purpus:
Toward Understanding the Behavior of BGP During Large-Scale Power Outages. GLOBECOM 2006 - 2005
- [j3]Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal:
An internet routing forensics framework for discovering rules of abnormal BGP events. Comput. Commun. Rev. 35(5): 55-66 (2005) - [c6]Jun Li, Xun Kang:
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. ACSAC 2005: 397-408 - [c5]Virginia Mary Lo, Dayi Zhou, Yuhong Liu, Chris GauthierDickey, Jun Li:
Scalable supernode selection in peer-to-peer overlay networks. HOT-P2P 2005: 18-25 - [c4]Jun Li, Xun Kang:
Proof of Service in a Hybrid P2P Environment. ISPA Workshops 2005: 64-73 - [c3]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher:
Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 - 2004
- [j2]Jun Li, Peter L. Reiher, Gerald J. Popek:
Resilient self-organizing overlay networks for security update delivery. IEEE J. Sel. Areas Commun. 22(1): 189-202 (2004) - 2002
- [b1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144 - [j1]Jun Li, Mark Yarvis, Peter L. Reiher:
Securing distributed adaptation. Comput. Networks 38(3): 347-371 (2002) - [c2]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566
1990 – 1999
- 1999
- [c1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Securing information transmission by redundancy. NSPW 1999: 112-117
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint