default search action
Kang Li 0001
Person information
- affiliation: University of Georgia, Department of Computer Science, Athens, GA, USA
Other persons with the same name
- Kang Li — disambiguation page
- Kang Li 0002 — University of Leeds, School of Electronic and Electrical Engineering, UK (and 1 more)
- Kang Li 0003 — The State University of New York at Buffalo, Department of Computer Science and Engineering, NY, USA
- Kang Li 0004 — Sichuan University, West China Hospital, West China Biomedical Big Data Center, Chengdu, China (and 4 more)
- Kang Li 0005 — Northwest University, College of Information Science and Technology, Xi'an, China
- Kang Li 0007 — Chinese University of Hong Kong, Department of Computer Science and Engineering, Institute of Medical Intelligence and XR, Hong Kong
- Kang Li 0008 — Jiangnan University, School of Artificial Intelligence and Computer Science, Wuxi, China (and 1 more)
- Kang Li 0009 — Beijing University of Technology, Beijing Key Laboratory of Computational Intelligence and Intelligent System, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c43]Xinyang Zhang, Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li:
SimLane: A Risk-Orientated Benchmark for Lane Detection. DSN (Supplements) 2022: 9-12 - [i4]Junjie Shen, Ningfei Wang, Ziwen Wan, Yunpeng Luo, Takami Sato, Zhisheng Hu, Xinyang Zhang, Shengjian Guo, Zhenyu Zhong, Kang Li, Ziming Zhao, Chunming Qiao, Qi Alfred Chen:
SoK: On the Semantic AI Security in Autonomous Driving. CoRR abs/2203.05314 (2022) - 2021
- [j11]Yufei Chen, Chao Shen, Cong Wang, Qixue Xiao, Kang Li, Yu Chen:
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications. IEEE Trans. Dependable Secur. Comput. 18(5): 2017-2028 (2021) - [c42]Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li:
Disclosing the Fragility Problem of Virtual Safety Testing for Autonomous Driving Systems. ISSRE Workshops 2021: 387-392 - [i3]Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li:
Coverage-based Scene Fuzzing for Virtual Autonomous Driving Testing. CoRR abs/2106.00873 (2021)
2010 – 2019
- 2019
- [c41]Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, Kang Li:
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. USENIX Security Symposium 2019: 443-460 - 2018
- [c40]Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin, Kang Li:
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries. ESORICS (1) 2018: 66-83 - [c39]Jian Jiang, Jia Zhang, Hai-Xin Duan, Kang Li, Wu Liu:
Analysis and Measurement of Zone Dependency in the Domain Name System. ICC 2018: 1-7 - [c38]Qixue Xiao, Kang Li, Deyue Zhang, Weilin Xu:
Security Risks in Deep Learning Implementations. IEEE Symposium on Security and Privacy Workshops 2018: 123-128 - 2017
- [c37]Guodong Zhu, Yue Yin, Ruoyan Cai, Kang Li:
Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment. CLOUD 2017: 743-748 - [c36]Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi:
pbSE: Phase-Based Symbolic Execution. DSN 2017: 133-144 - [i2]Qixue Xiao, Kang Li, Deyue Zhang, Weilin Xu:
Security Risks in Deep Learning Implementations. CoRR abs/1711.11008 (2017) - [i1]Qixue Xiao, Kang Li, Deyue Zhang, Yier Jin:
Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications. CoRR abs/1712.07805 (2017) - 2016
- [c35]Jianjun Chen, Xiaofeng Zheng, Hai-Xin Duan, Jinjin Liang, Jian Jiang, Kang Li, Tao Wan, Vern Paxson:
Forwarding-Loop Attacks in Content Delivery Networks. NDSS 2016 - 2015
- [c34]Guodong Zhu, Kang Li, Yibin Liao:
Toward Automatically Deducing Key Device States for the Live Migration of Virtual Machines. CLOUD 2015: 1025-1028 - [c33]Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li:
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. CCS 2015: 133-145 - 2014
- [j10]Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Deepika Sethi, Kang Li, Calton Pu:
Harnessing Context for Vandalism Detection in Wikipedia. EAI Endorsed Trans. Collab. Comput. 1(1): e7 (2014) - [j9]Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for unwanted P2P traffic. J. Inf. Secur. Appl. 19(3): 194-208 (2014) - [c32]Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms:
ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces. CCS 2014: 1244-1255 - [c31]Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Tao Wan, Jianping Wu:
When HTTPS Meets CDN: A Case of Authentication in Delegated Service. IEEE Symposium on Security and Privacy 2014: 67-82 - 2013
- [c30]Lakshmish Ramaswamy, Raga Sowmya Tummalapenta, Kang Li, Calton Pu:
A content-context-centric approach for detecting vandalism in Wikipedia. CollaborateCom 2013: 115-122 - [c29]Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li:
PeerRush: Mining for Unwanted P2P Traffic. DIMVA 2013: 62-82 - [c28]Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis:
Measuring and Detecting Malware Downloads in Live Network Traffic. ESORICS 2013: 556-573 - [c27]Jinjin Liang, Jian Jiang, Hai-Xin Duan, Kang Li, Jianping Wu:
Measuring Query Latency of Top Level DNS Servers. PAM 2013: 145-154 - 2012
- [c26]Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu:
Ghost Domain Names: Revoked Yet Still Resolvable. NDSS 2012 - 2011
- [j8]Danesh Irani, Steve Webb, Calton Pu, Kang Li:
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks. IEEE Internet Comput. 15(3): 13-19 (2011) - [j7]Yong Wei, Suchendra M. Bhandarkar, Kang Li, Lakshmish Ramaswamy:
Video personalization in heterogeneous and resource-constrained environments. Multim. Syst. 17(6): 523-543 (2011) - [j6]Zhenyu Zhong, Kang Li:
Speed Up Statistical Spam Filter by Approximation. IEEE Trans. Computers 60(1): 120-134 (2011) - [e1]Charles Krasic, Kang Li:
Network and Operating System Support for Digital Audio and Video, 21st International Workshop, NOSSDAV 2011, Vancouver, BC, Canada, June 1-3, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0777-2 [contents] - 2010
- [c25]Douglas Brewer, Kang Li, Lakshmish Ramaswamy, Calton Pu:
A Link Obfuscation Service to Detect Webbots. IEEE SCC 2010: 433-440
2000 – 2009
- 2009
- [j5]Yong Wei, Suchendra M. Bhandarkar, Kang Li:
Client-centered multimedia content adaptation. ACM Trans. Multim. Comput. Commun. Appl. 5(3): 22:1-22:26 (2009) - [j4]Kang Li, Zhenyu Zhong, Lakshmish Ramaswamy:
Privacy-Aware Collaborative Spam Filtering. IEEE Trans. Parallel Distributed Syst. 20(5): 725-739 (2009) - [c24]Danesh Irani, Steve Webb, Kang Li, Calton Pu:
Large Online Social Footprints - An Emerging Threat. CSE (3) 2009: 271-276 - 2008
- [c23]Zhenyu Zhong, Lakshmish Ramaswamy, Kang Li:
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System. INFOCOM 2008: 556-564 - 2007
- [j3]Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li:
Model-Based Power Aware Compression Algorithms for MPEG-4 Virtual Human Animation in Mobile Environments. IEEE Trans. Multim. 9(1): 1-8 (2007) - [j2]Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li:
Human Motion Capture Data Compression by Model-Based Indexing: A Power Aware Approach. IEEE Trans. Vis. Comput. Graph. 13(1): 5-14 (2007) - [c22]Yong Wei, Suchendra M. Bhandarkar, Kang Li:
Semantics-Based Video Indexing using a Stochastic Modeling Approach. ICIP (4) 2007: 313-316 - [c21]Yong Wei, Suchendra M. Bhandarkar, Kang Li:
Video personalization in resource-constrained multimedia environments. ACM Multimedia 2007: 902-911 - [c20]Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li:
Ligne-claire video encoding for power constrained mobile environments. ACM Multimedia 2007: 1036-1045 - 2006
- [j1]Haijin Yan, Scott A. Watterson, David K. Lowenthal, Kang Li, Rupa Krishnan, Larry L. Peterson:
Client-Centered, Energy-Efficient Wireless Communication on IEEE 802.11b Networks. IEEE Trans. Mob. Comput. 5(11): 1575-1590 (2006) - [c19]Douglas Brewer, Sujeeth Thirumalai, Karthik Gomadam, Kang Li:
Towards an Ontology Driven Spam Filter. ICDE Workshops 2006: 79 - [c18]Yong Wei, Hongyu Wang, Suchendra M. Bhandarkar, Kang Li:
Parallel Algorithms for Motion Panorama Construction. ICPP Workshops 2006: 82-92 - [c17]Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li:
FGS-MR: MPEG4 fine grained scalable multi-resolution layered video encoding. NOSSDAV 2006: 5 - [c16]Kang Li, Zhenyu Zhong:
Fast statistical spam filter by approximate classifications. SIGMETRICS/Performance 2006: 347-358 - 2005
- [c15]Zhenyu Zhong, Kun Huang, Kang Li:
Throttling Outgoing SPAM for Webmail Services. CEAS 2005 - [c14]Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li:
BAP Sparsing: A Novel Approach to MPEG-4 Body Animation Parameter Compression. Systems Communications 2005: 104-109 - [c13]Haijin Yan, David K. Lowenthal, Kang Li:
ACE: an active, client-directed method for reducing energy during web browsing. NOSSDAV 2005: 27-32 - [c12]Bryan Veal, Kang Li, David K. Lowenthal:
New Methods for Passive Estimation of TCP Round-Trip Times. PAM 2005: 121-134 - [c11]Siddhartha Chattopadhyay, Suchendra M. Bhandarkar, Kang Li:
Efficient compression and delivery of stored motion data for avatar animation in resource constrained devices. VRST 2005: 235-243 - 2004
- [c10]Rui Dai, Kang Li:
Shall We Stop All Unsolicited Email Messages? CEAS 2004 - [c9]Kang Li, Calton Pu, Mustaque Ahamad:
Resisting SPAM Delivery by TCP Damping. CEAS 2004 - [c8]Francis Chang, Kang Li, Wu-chang Feng:
Approximate Caches for Packet Classification. INFOCOM 2004: 2196-2207 - [c7]Haijin Yan, Rupa Krishnan, Scott A. Watterson, David K. Lowenthal, Kang Li, Larry L. Peterson:
Client-centered energy and delay analysis for TCP downloads. IWQoS 2004: 255-264 - [c6]Kang Li, Shanshan Ding, Doug McCreary, Steve Webb:
Analysis of state exposure control to prevent cheating in online games. NOSSDAV 2004: 140-145 - 2003
- [c5]Kang Li, Francis Chang, Damien Berger, Wu-chang Feng:
Architectures for packet classification caching. ICON 2003: 111-117 - 2001
- [c4]Kang Li, Molly H. Shor, Jonathan Walpole, Calton Pu, David C. Steere:
Modeling the effect of short-term rate variations on TCP-friendly congestion control behavior. ACC 2001: 3006-3012 - [c3]Kang Li, Charles Krasic, Jonathan Walpole, Molly H. Shor, Calton Pu:
The Minimal Buffering Requirements of Congestion Controlled Interactive Multimedia Applications. IDMS 2001: 181-192 - [c2]Charles Krasic, Kang Li, Jonathan Walpole:
The Case for Streaming Multimedia with TCP. IDMS 2001: 213-218 - 2000
- [c1]Dylan McNamee, Charles Krasic, Kang Li, Ashvin Goel, Erik Walthinsen, David C. Steere, Jonathan Walpole:
Control challenges in multi-level adaptive video streaming. CDC 2000: 2228-2233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint