Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jun Li 0001
@article{DBLP:journals/tiot/HuLW24, author = {Zhangxiang Hu and Jun Li and Christopher Wilson}, title = {Resilient Intermediary-Based Key Exchange Protocol for IoT}, journal = {{ACM} Trans. Internet Things}, volume = {5}, number = {1}, pages = {7:1--7:31}, year = {2024}, url = {https://doi.org/10.1145/3632408}, doi = {10.1145/3632408}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tiot/HuLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSS23, author = {Jun Li and Devkishen Sisodia and Shad Stafford}, title = {On the Detection of Smart, Self-Propagating Internet Worms}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3051--3063}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3194127}, doi = {10.1109/TDSC.2022.3194127}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiSFSZER23, author = {Jun Li and Devkishen Sisodia and Yebo Feng and Lumin Shi and Mingwei Zhang and Christopher Early and Peter L. Reiher}, title = {Toward Adaptive DDoS-Filtering Rule Generation}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288699}, doi = {10.1109/CNS59707.2023.10288699}, timestamp = {Mon, 13 Nov 2023 09:18:17 +0100}, biburl = {https://dblp.org/rec/conf/cns/LiSFSZER23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/Shi00R22, author = {Lumin Shi and Jun Li and Mingwei Zhang and Peter L. Reiher}, title = {On Capturing DDoS Traffic Footprints on the Internet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2755--2770}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3074086}, doi = {10.1109/TDSC.2021.3074086}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/Shi00R22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Hu0MW22, author = {Zhangxiang Hu and Jun Li and Samuel Mergendahl and Christopher Wilson}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Toward a Resilient Key Exchange Protocol for IoT}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {214--225}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511520}, doi = {10.1145/3508398.3511520}, timestamp = {Wed, 20 Apr 2022 12:17:48 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Hu0MW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-00742, author = {Jelena Mirkovic and Yebo Feng and Jun Li}, title = {Measuring Changes in Regional Network Traffic Due to {COVID-19} Stay-at-Home Measures}, journal = {CoRR}, volume = {abs/2203.00742}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.00742}, doi = {10.48550/ARXIV.2203.00742}, eprinttype = {arXiv}, eprint = {2203.00742}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-00742.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/FengLJW21, author = {Yebo Feng and Jun Li and Lei Jiao and Xintao Wu}, title = {Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2149--2163}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3047399}, doi = {10.1109/TDSC.2020.3047399}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/FengLJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangJHLB21, author = {Lin Wang and Lei Jiao and Ting He and Jun Li and Henri E. Bal}, title = {Service Placement for Collaborative Edge Applications}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {29}, number = {1}, pages = {34--47}, year = {2021}, url = {https://doi.org/10.1109/TNET.2020.3025985}, doi = {10.1109/TNET.2020.3025985}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/WangJHLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LuoLJC21, author = {Jianzhen Luo and Jun Li and Lei Jiao and Jun Cai}, title = {On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {32}, number = {5}, pages = {1238--1255}, year = {2021}, url = {https://doi.org/10.1109/TPDS.2020.3043768}, doi = {10.1109/TPDS.2020.3043768}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/LuoLJC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SisodiaLJ20, author = {Devkishen Sisodia and Jun Li and Lei Jiao}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {153--164}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384755}, doi = {10.1145/3320269.3384755}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SisodiaLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FengSL20, author = {Yebo Feng and Devkishen Sisodia and Jun Li}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{POSTER:} Content-Agnostic Identification of Cryptojacking in Network Traffic}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {907--909}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3405440}, doi = {10.1145/3320269.3405440}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FengSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MergendahlL20, author = {Samuel Mergendahl and Jun Li}, title = {Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162278}, doi = {10.1109/CNS48642.2020.9162278}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MergendahlL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/CilloniCF020, author = {Thomas Cilloni and Xiyu Cai and Charles Fleming and Jun Li}, editor = {Jie Xu and Stefan Schulte and Peter Ruppel and Axel K{\"{u}}pper and Divyesh Jadav}, title = {Understanding and Detecting Majority Attacks}, booktitle = {2nd {IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPS} 2020, Oxford, UK, August 3-6, 2020}, pages = {11--21}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DAPPS49028.2020.00002}, doi = {10.1109/DAPPS49028.2020.00002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dappcon/CilloniCF020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dappcon/LiGKF20, author = {Jun Li and Alex Grintsvayg and Jeremy Kauffman and Charles Fleming}, editor = {Jie Xu and Stefan Schulte and Peter Ruppel and Axel K{\"{u}}pper and Divyesh Jadav}, title = {{LBRY:} {A} Blockchain-Based Decentralized Digital Content Marketplace}, booktitle = {2nd {IEEE} International Conference on Decentralized Applications and Infrastructures, {DAPPS} 2020, Oxford, UK, August 3-6, 2020}, pages = {42--51}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DAPPS49028.2020.00005}, doi = {10.1109/DAPPS49028.2020.00005}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dappcon/LiGKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/YouJLZ20, author = {Wencong You and Lei Jiao and Jun Li and Ruiting Zhou}, title = {Scheduling DDoS Cloud Scrubbing in {ISP} Networks via Randomized Online Auctions}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {1658--1667}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOM41043.2020.9155493}, doi = {10.1109/INFOCOM41043.2020.9155493}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/YouJLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/FengLN20, author = {Yebo Feng and Jun Li and Thanh Nguyen}, title = {Application-Layer DDoS Defense with Reinforcement Learning}, booktitle = {28th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2020, Hangzhou, China, June 15-17, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IWQoS49365.2020.9213026}, doi = {10.1109/IWQOS49365.2020.9213026}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/FengLN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShiMSL20, author = {Lumin Shi and Samuel Mergendahl and Devkishen Sisodia and Jun Li}, editor = {Tamara Denning and Tyler Moore}, title = {Bridging Missing Gaps in Evaluating DDoS Research}, booktitle = {13th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2020, August 10, 2020}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/cset20/presentation/shi}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShiMSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/JamshidiRL19, author = {Soheil Jamshidi and Reza Rejaie and Jun Li}, title = {Characterizing the dynamics and evolution of incentivized online reviews on Amazon}, journal = {Soc. Netw. Anal. Min.}, volume = {9}, number = {1}, pages = {22:1--22:15}, year = {2019}, url = {https://doi.org/10.1007/s13278-019-0563-0}, doi = {10.1007/S13278-019-0563-0}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/JamshidiRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/WangJLGM19, author = {Lin Wang and Lei Jiao and Jun Li and Julien Gedeon and Max M{\"{u}}hlh{\"{a}}user}, title = {{MOERA:} Mobility-Agnostic Online Resource Allocation for Edge Computing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {8}, pages = {1843--1856}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2867520}, doi = {10.1109/TMC.2018.2867520}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/WangJLGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhengYW0L19, author = {Panpan Zheng and Shuhan Yuan and Xintao Wu and Jun Li and Aidong Lu}, title = {One-Class Adversarial Nets for Fraud Detection}, booktitle = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI} 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019}, pages = {1286--1293}, publisher = {{AAAI} Press}, year = {2019}, url = {https://doi.org/10.1609/aaai.v33i01.33011286}, doi = {10.1609/AAAI.V33I01.33011286}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZhengYW0L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Feng0JW19, author = {Yebo Feng and Jun Li and Lei Jiao and Xintao Wu}, title = {BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {169--177}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802706}, doi = {10.1109/CNS.2019.8802706}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/Feng0JW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ZhangSSLR19, author = {Mingwei Zhang and Lumin Shi and Devkishen Sisodia and Jun Li and Peter L. Reiher}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {180--188}, publisher = {{IFIP}}, year = {2019}, url = {http://dl.ifip.org/db/conf/im/im2019/189412.pdf}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/ZhangSSLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/LiZZ18, author = {Jun Li and Bodong Zhao and Chao Zhang}, title = {Fuzzing: a survey}, journal = {Cybersecur.}, volume = {1}, number = {1}, pages = {6}, year = {2018}, url = {https://doi.org/10.1186/s42400-018-0002-y}, doi = {10.1186/S42400-018-0002-Y}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/LiZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/Chen0LZ18, author = {Congjie Chen and Dan Li and Jun Li and Konglin Zhu}, title = {{SVDC:} {A} Highly Scalable Isolation Architecture for Virtualized Layer-2 Data Center Networks}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {4}, pages = {1178--1190}, year = {2018}, url = {https://doi.org/10.1109/TCC.2016.2586047}, doi = {10.1109/TCC.2016.2586047}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/Chen0LZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/JamshidiRL18, author = {Soheil Jamshidi and Reza Rejaie and Jun Li}, editor = {Ulrik Brandes and Chandan Reddy and Andrea Tagarelli}, title = {Trojan Horses in Amazon's Castle: Understanding the Incentivized Online Reviews}, booktitle = {{IEEE/ACM} 2018 International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2018, Barcelona, Spain, August 28-31, 2018}, pages = {335--342}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ASONAM.2018.8508267}, doi = {10.1109/ASONAM.2018.8508267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/JamshidiRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/MergendahlSLC18, author = {Samuel Mergendahl and Devkishen Sisodia and Jun Li and Hasan Cam}, title = {{FR-WARD:} Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487342}, doi = {10.1109/ICCCN.2018.8487342}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/MergendahlSLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangJHLM18, author = {Lin Wang and Lei Jiao and Ting He and Jun Li and Max M{\"{u}}hlh{\"{a}}user}, title = {Service Entity Placement for Social Virtual Reality Applications in Edge Computing}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {468--476}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486411}, doi = {10.1109/INFOCOM.2018.8486411}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangJHLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/JiaoTLJSL18, author = {Lei Jiao and Antonia Maria Tulino and Jaime Llorca and Yue Jin and Alessandra Sala and Jun Li}, title = {Online Control of Cloud and Edge Resources Using Inaccurate Predictions}, booktitle = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2018, Banff, AB, Canada, June 4-6, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IWQoS.2018.8624119}, doi = {10.1109/IWQOS.2018.8624119}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/JiaoTLJSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/ShiZ0R18, author = {Lumin Shi and Mingwei Zhang and Jun Li and Peter L. Reiher}, editor = {Claudio Casetti and Fernando A. Kuipers and James P. G. Sterbenz and Burkhard Stiller}, title = {PathFinder: Capturing DDoS Traffic Footprints on the Internet}, booktitle = {17th International {IFIP} {TC6} Networking Conference, Networking 2018, Zurich, Switzerland, May 14-16, 2018}, pages = {10--18}, publisher = {{IFIP}}, year = {2018}, url = {http://dl.ifip.org/db/conf/networking/networking2018/1A2-1570417251.pdf}, doi = {10.23919/IFIPNETWORKING.2018.8696909}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/ShiZ0R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/JiaoPWLL18, author = {Lei Jiao and Lingjun Pu and Lin Wang and Xiaojun Lin and Jun Li}, title = {Multiple Granularity Online Control of Cloudlet Networks for Edge Computing}, booktitle = {15th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2018, Hong Kong, China, June 11-13, 2018}, pages = {406--414}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SAHCN.2018.8397141}, doi = {10.1109/SAHCN.2018.8397141}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/JiaoPWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SisodiaMLC18, author = {Devkishen Sisodia and Samuel Mergendahl and Jun Li and Hasan Cam}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Securing the Smart Home via a Two-Mode Security Framework}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {254}, pages = {22--42}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01701-9\_2}, doi = {10.1007/978-3-030-01701-9\_2}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/SisodiaMLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-01798, author = {Panpan Zheng and Shuhan Yuan and Xintao Wu and Jun Li and Aidong Lu}, title = {One-Class Adversarial Nets for Fraud Detection}, journal = {CoRR}, volume = {abs/1803.01798}, year = {2018}, url = {http://arxiv.org/abs/1803.01798}, eprinttype = {arXiv}, eprint = {1803.01798}, timestamp = {Wed, 24 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-01798.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SteinSBL17, author = {Joshua Stein and Han Hee Song and Mario Baldi and Jun Li}, title = {On the most representative summaries of network user activities}, journal = {Comput. Networks}, volume = {113}, pages = {205--217}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2016.12.014}, doi = {10.1016/J.COMNET.2016.12.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SteinSBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/KollLF17, author = {David Koll and Jun Li and Xiaoming Fu}, title = {The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks}, journal = {Comput. Commun.}, volume = {108}, pages = {36--51}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.04.008}, doi = {10.1016/J.COMCOM.2017.04.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/KollLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ZhangLB17, author = {Mingwei Zhang and Jun Li and Scott Brooks}, title = {I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {6}, pages = {3411--3426}, year = {2017}, url = {https://doi.org/10.1109/TNET.2017.2748902}, doi = {10.1109/TNET.2017.2748902}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/ZhangLB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChenWL017, author = {Yang Chen and Shining Wu and Jun Li and Xiaoming Fu}, title = {NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {2}, pages = {244--257}, year = {2017}, url = {https://doi.org/10.1109/TSC.2015.2437383}, doi = {10.1109/TSC.2015.2437383}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ChenWL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MergendahlSLC17, author = {Samuel Mergendahl and Devkishen Sisodia and Jun Li and Hasan Cam}, editor = {Peng Liu and Yuqing Zhang and Theophilus Benson and Srikanth Sundaresan}, title = {Source-End DDoS Defense in IoT Environments}, booktitle = {Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, IoT S{\&}P@CCS, Dallas, TX, USA, November 03, 2017}, pages = {63--64}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139937.3139954}, doi = {10.1145/3139937.3139954}, timestamp = {Thu, 18 Aug 2022 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MergendahlSLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/YuanWLL17, author = {Shuhan Yuan and Xintao Wu and Jun Li and Aidong Lu}, editor = {Ee{-}Peng Lim and Marianne Winslett and Mark Sanderson and Ada Wai{-}Chee Fu and Jimeng Sun and J. Shane Culpepper and Eric Lo and Joyce C. Ho and Debora Donato and Rakesh Agrawal and Yu Zheng and Carlos Castillo and Aixin Sun and Vincent S. Tseng and Chenliang Li}, title = {Spectrum-based Deep Neural Networks for Fraud Detection}, booktitle = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge Management, {CIKM} 2017, Singapore, November 06 - 10, 2017}, pages = {2419--2422}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132847.3133139}, doi = {10.1145/3132847.3133139}, timestamp = {Tue, 29 Aug 2023 16:24:43 +0200}, biburl = {https://dblp.org/rec/conf/cikm/YuanWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangJLM17, author = {Lin Wang and Lei Jiao and Jun Li and Max M{\"{u}}hlh{\"{a}}user}, editor = {Kisung Lee and Ling Liu}, title = {Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {1281--1290}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.30}, doi = {10.1109/ICDCS.2017.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangJLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/KollSLL017, author = {David Koll and Martin Schwarzmaier and Jun Li and Xiang{-}Yang Li and Xiaoming Fu}, editor = {Aibek Musaev and Jo{\~{a}}o Eduardo Ferreira and Teruo Higashino}, title = {Thank You For Being {A} Friend: An Attacker View on Online-Social-Network-Based Sybil Defenses}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {157--162}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCSW.2017.67}, doi = {10.1109/ICDCSW.2017.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/KollSLL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YuanWLL17, author = {Shuhan Yuan and Xintao Wu and Jun Li and Aidong Lu}, title = {Spectrum-based deep neural networks for fraud detection}, journal = {CoRR}, volume = {abs/1706.00891}, year = {2017}, url = {http://arxiv.org/abs/1706.00891}, eprinttype = {arXiv}, eprint = {1706.00891}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YuanWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangXWLCL16, author = {Yuanyuan Zhang and Mingwei Xu and Ning Wang and Jun Li and Penghan Chen and Fei Liang}, title = {Compressing {IP} Forwarding Tables with Small Bounded Update Time}, journal = {Comput. Networks}, volume = {106}, pages = {77--90}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.06.015}, doi = {10.1016/J.COMNET.2016.06.015}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZhangXWLCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/JiaoLXDF16, author = {Lei Jiao and Jun Li and Tianyin Xu and Wei Du and Xiaoming Fu}, title = {Optimizing Cost for Online Social Networks on Geo-Distributed Clouds}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {1}, pages = {99--112}, year = {2016}, url = {https://doi.org/10.1109/TNET.2014.2359365}, doi = {10.1109/TNET.2014.2359365}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/JiaoLXDF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiSZM16, author = {Jun Li and Joshua Stein and Mingwei Zhang and Olaf Maennel}, title = {An expectation-based approach to policy-based security of the Border Gateway Protocol}, booktitle = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {340--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFCOMW.2016.7562098}, doi = {10.1109/INFCOMW.2016.7562098}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiSZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiXWLJY15, author = {Qing Li and Mingwei Xu and Dan Wang and Jun Li and Yong Jiang and Jiahai Yang}, title = {Nexthop-Selectable {FIB} aggregation: An instant approach for internet routing scalability}, journal = {Comput. Commun.}, volume = {67}, pages = {11--22}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.07.003}, doi = {10.1016/J.COMCOM.2015.07.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LiXWLJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Liu0WBYLZZH15, author = {Bingshuang Liu and Jun Li and Tao Wei and Skyler Berg and Jiayi Ye and Chen Li and Chao Zhang and Jianyu Zhang and Xinhui Han}, title = {SF-DRDoS: The store-and-flood distributed reflective denial of service attack}, journal = {Comput. Commun.}, volume = {69}, pages = {107--115}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.06.008}, doi = {10.1016/J.COMCOM.2015.06.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Liu0WBYLZZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiuWZLZ15, author = {Bingshuang Liu and Tao Wei and Chao Zhang and Jun Li and Jianyu Zhang}, title = {Improving lookup reliability in Kad}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {1}, pages = {156--170}, year = {2015}, url = {https://doi.org/10.1007/s12083-013-0240-4}, doi = {10.1007/S12083-013-0240-4}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiuWZLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/ZhuXLLYL15, author = {Hanqing Zhu and Mingwei Xu and Qing Li and Jun Li and Yuan Yang and Suogang Li}, editor = {Rahim Kacimi and Zoubir Mammeri}, title = {{MDTC:} An efficient approach to TCAM-based multidimensional table compression}, booktitle = {Proceedings of the 14th {IFIP} Networking Conference, Networking 2015, Toulouse, France, 20-22 May, 2015}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IFIPNetworking.2015.7145306}, doi = {10.1109/IFIPNETWORKING.2015.7145306}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/ZhuXLLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/MemonLR14, author = {Ghulam Memon and Jun Li and Reza Rejaie}, title = {Tsunami: {A} parasitic, indestructible botnet on Kad}, journal = {Peer-to-Peer Netw. Appl.}, volume = {7}, number = {4}, pages = {444--455}, year = {2014}, url = {https://doi.org/10.1007/s12083-013-0202-x}, doi = {10.1007/S12083-013-0202-X}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/MemonLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/LiuWWZLZCL14, author = {Bingshuang Liu and Shidong Wu and Tao Wei and Chao Zhang and Jun Li and Jianyu Zhang and Yu Chen and Chen Li}, title = {Splider: {A} split-based crawler of the {BT-DHT} network and its applications}, booktitle = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2014, Las Vegas, NV, USA, January 10-13, 2014}, pages = {327--335}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCNC.2014.6866591}, doi = {10.1109/CCNC.2014.6866591}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/LiuWWZLZCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/0001S14, author = {Jun Li and Shad Stafford}, title = {Detecting smart, self-propagating Internet worms}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {193--201}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997486}, doi = {10.1109/CNS.2014.6997486}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/0001S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/LiuBLWZH14, author = {Bingshuang Liu and Skyler Berg and Jun Li and Tao Wei and Chao Zhang and Xinhui Han}, title = {The store-and-flood distributed reflective denial of service attack}, booktitle = {23rd International Conference on Computer Communication and Networks, {ICCCN} 2014, Shanghai, China, August 4-7, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCCN.2014.6911808}, doi = {10.1109/ICCCN.2014.6911808}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/LiuBLWZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JiaoLDF14, author = {Lei Jiao and Jun Li and Wei Du and Xiaoming Fu}, title = {Multi-objective data placement for multi-cloud socially aware services}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {28--36}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847921}, doi = {10.1109/INFOCOM.2014.6847921}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JiaoLDF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/SteinSBL14, author = {Joshua Stein and Han Hee Song and Mario Baldi and Jun Li}, title = {Toward the most representative summaries of network user activities}, booktitle = {{IEEE} 22nd International Symposium of Quality of Service, IWQoS 2014, Hong Kong, China, May 26-27, 2014}, pages = {111--116}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IWQoS.2014.6914308}, doi = {10.1109/IWQOS.2014.6914308}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/SteinSBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZhuLLLW14, author = {Ming Zhu and Jun Li and Ying Liu and Dan Li and Jianping Wu}, title = {{TED:} Inter-domain traffic engineering via deflection}, booktitle = {{IEEE} 22nd International Symposium of Quality of Service, IWQoS 2014, Hong Kong, China, May 26-27, 2014}, pages = {117--122}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IWQoS.2014.6914309}, doi = {10.1109/IWQOS.2014.6914309}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/ZhuLLLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/KollLF14, author = {David Koll and Jun Li and Xiaoming Fu}, editor = {Laurent R{\'{e}}veill{\`{e}}re and Lucy Cherkasova and Fran{\c{c}}ois Ta{\"{\i}}ani}, title = {{SOUP:} an online social network by the people, for the people}, booktitle = {Proceedings of the 15th International Middleware Conference, Bordeaux, France, December 8-12, 2014}, pages = {193--204}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663165.2663324}, doi = {10.1145/2663165.2663324}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/KollLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/KollLSF14, author = {David Koll and Jun Li and Joshua Stein and Xiaoming Fu}, title = {On the state of OSN-based Sybil defenses}, booktitle = {2014 {IFIP} Networking Conference, Trondheim, Norway, June 2-4, 2014}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IFIPNetworking.2014.6857128}, doi = {10.1109/IFIPNETWORKING.2014.6857128}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/networking/KollLSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/KollLF14, author = {David Koll and Jun Li and Xiaoming Fu}, editor = {Fabi{\'{a}}n E. Bustamante and Y. Charlie Hu and Arvind Krishnamurthy and Sylvia Ratnasamy}, title = {{SOUP:} an online social network by the people, for the people}, booktitle = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014}, pages = {143--144}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2619239.2631432}, doi = {10.1145/2619239.2631432}, timestamp = {Wed, 10 Mar 2021 13:04:38 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/KollLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiBZRW14, author = {Jun Li and Skyler Berg and Mingwei Zhang and Peter L. Reiher and Tao Wei}, editor = {Fabi{\'{a}}n E. Bustamante and Y. Charlie Hu and Arvind Krishnamurthy and Sylvia Ratnasamy}, title = {Drawbridge: software-defined DDoS-resistant traffic engineering}, booktitle = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August 17-22, 2014}, pages = {591--592}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2619239.2631469}, doi = {10.1145/2619239.2631469}, timestamp = {Tue, 18 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/LiBZRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/GustafsonL13, author = {Jason Gustafson and Jun Li}, title = {Leveraging the crowds to disrupt phishing}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {82--90}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682695}, doi = {10.1109/CNS.2013.6682695}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/GustafsonL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/KollLSF13, author = {David Koll and Jun Li and Joshua Stein and Xiaoming Fu}, title = {On the effectiveness of sybil defenses based on online social networks}, booktitle = {2013 21st {IEEE} International Conference on Network Protocols, {ICNP} 2013, G{\"{o}}ttingen, Germany, October 7-10, 2013}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICNP.2013.6733630}, doi = {10.1109/ICNP.2013.6733630}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/KollLSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lanman/JiaoLF13, author = {Lei Jiao and Jun Li and Xiaoming Fu}, title = {Optimizing data center traffic of Online Social Networks}, booktitle = {19th {IEEE} Workshop on Local {\&} Metropolitan Area Networks, {LANMAN} 2013, Brussels, Belgium, April 10-12, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/LANMAN.2013.6528282}, doi = {10.1109/LANMAN.2013.6528282}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lanman/JiaoLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LiYM12, author = {Jun Li and Dongting Yu and Luke Maurer}, title = {A resource management approach to web browser security}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2012, Maui, HI, USA, January 30 - February 2, 2012}, pages = {697--701}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICCNC.2012.6167512}, doi = {10.1109/ICCNC.2012.6167512}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/LiYM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/0001EE12, author = {Jun Li and Toby Ehrenkranz and Paul Elliott}, title = {Buddyguard: {A} buddy system for fast and reliable detection of {IP} prefix anomalies}, booktitle = {20th {IEEE} International Conference on Network Protocols, {ICNP} 2012, Austin, TX, USA, October 30 - Nov. 2, 2012}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICNP.2012.6459962}, doi = {10.1109/ICNP.2012.6459962}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/0001EE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/JiaoLXF12, author = {Lei Jiao and Jun Li and Tianyin Xu and Xiaoming Fu}, title = {Cost optimization for Online Social Networks on geo-distributed clouds}, booktitle = {20th {IEEE} International Conference on Network Protocols, {ICNP} 2012, Austin, TX, USA, October 30 - Nov. 2, 2012}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICNP.2012.6459989}, doi = {10.1109/ICNP.2012.6459989}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/JiaoLXF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/WuCFL12, author = {Shining Wu and Yang Chen and Xiaoming Fu and Jun Li}, title = {NCShield: Securing decentralized, matrix factorization-based network coordinate systems}, booktitle = {20th {IEEE} International Workshop on Quality of Service, IWQoS 2012, Coimbra, Portugal, June 4-5, 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IWQoS.2012.6245983}, doi = {10.1109/IWQOS.2012.6245983}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/WuCFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JiangLLLDW12, author = {Jian Jiang and Jinjin Liang and Kang Li and Jun Li and Hai{-}Xin Duan and Jianping Wu}, title = {Ghost Domain Names: Revoked Yet Still Resolvable}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/ghost-domain-names-revoked-yet-still-resolvable}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/JiangLLLDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/LiuWZLZZ12, author = {Bingshuang Liu and Tao Wei and Jianyu Zhang and Jun Li and Wei Zou and Mo Zhou}, title = {Revisiting why Kad lookup fails}, booktitle = {12th {IEEE} International Conference on Peer-to-Peer Computing, {P2P} 2012, Tarragona, Spain, September 3-5, 2012}, pages = {37--42}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/P2P.2012.6335808}, doi = {10.1109/P2P.2012.6335808}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/p2p/LiuWZLZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/Li11, author = {Jun Li}, title = {mSSL: {A} framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients}, journal = {Peer-to-Peer Netw. Appl.}, volume = {4}, number = {4}, pages = {325--345}, year = {2011}, url = {https://doi.org/10.1007/s12083-010-0087-x}, doi = {10.1007/S12083-010-0087-X}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/Li11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiB11, author = {Jun Li and Scott Brooks}, title = {I-seismograph: Observing and measuring Internet earthquakes}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {2624--2632}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935090}, doi = {10.1109/INFCOM.2011.5935090}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LiB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/StaffordL10, author = {Shad Stafford and Jun Li}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Behavior-Based Worm Detectors Compared}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {38--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_3}, doi = {10.1007/978-3-642-15512-3\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/StaffordL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/EhrenkranzLM10, author = {Toby Ehrenkranz and Jun Li and Patrick D. McDaniel}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Realizing a Source Authentic Internet}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {217--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_13}, doi = {10.1007/978-3-642-16161-2\_13}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/EhrenkranzLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/EhrenkranzL09, author = {Toby Ehrenkranz and Jun Li}, title = {On the state of {IP} spoofing defense}, journal = {{ACM} Trans. Internet Techn.}, volume = {9}, number = {2}, pages = {6:1--6:29}, year = {2009}, url = {https://doi.org/10.1145/1516539.1516541}, doi = {10.1145/1516539.1516541}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/EhrenkranzL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KnickerbockerY009, author = {Paul Knickerbocker and Dongting Yu and Jun Li}, title = {Humboldt: {A} distributed phishing disruption system}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--12}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342620}, doi = {10.1109/ECRIME.2009.5342620}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KnickerbockerY009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiMEWRZ08, author = {Jun Li and Jelena Mirkovic and Toby Ehrenkranz and Mengqiu Wang and Peter L. Reiher and Lixia Zhang}, title = {Learning the valid incoming direction of {IP} packets}, journal = {Comput. Networks}, volume = {52}, number = {2}, pages = {399--417}, year = {2008}, url = {https://doi.org/10.1016/j.comnet.2007.09.024}, doi = {10.1016/J.COMNET.2007.09.024}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiMEWRZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/LiGWPE07, author = {Jun Li and Michael Guidero and Zhen Wu and Eric Purpus and Toby Ehrenkranz}, title = {{BGP} routing dynamics revisited}, journal = {Comput. Commun. Rev.}, volume = {37}, number = {2}, pages = {5--16}, year = {2007}, url = {https://doi.org/10.1145/1232919.1232921}, doi = {10.1145/1232919.1232921}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/LiGWPE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiK07, author = {Jun Li and Paul Knickerbocker}, title = {Functional similarities between computer worms and biological pathogens}, journal = {Comput. Secur.}, volume = {26}, number = {4}, pages = {338--347}, year = {2007}, url = {https://doi.org/10.1016/j.cose.2006.12.002}, doi = {10.1016/J.COSE.2006.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simulation/StaffordLE07, author = {Shad Stafford and Jun Li and Toby Ehrenkranz}, title = {Enhancing {SWORD} to Detect Zero-Day-Worm-Infected Hosts}, journal = {Simul.}, volume = {83}, number = {2}, pages = {199--212}, year = {2007}, url = {https://doi.org/10.1177/0037549707080753}, doi = {10.1177/0037549707080753}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simulation/StaffordLE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/WangL07, author = {Yibo Wang and Jun Li}, editor = {Jim Kurose and Henning Schulzrinne}, title = {Is your {IP} address prefix well-served by internet routing?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Emerging Network Experiment and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007}, pages = {69}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1364654.1364732}, doi = {10.1145/1364654.1364732}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/WangL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/RayWMBHL07, author = {Daniel A. Ray and Charles B. Ward and Bogdan Munteanu and Jonathan Blackwell and Xiaoyan Hong and Jun Li}, editor = {Patrick D. McDaniel and Shyam K. Gupta}, title = {Investigating the Impact of Real-World Factors on Internet Worm Propagation}, booktitle = {Information Systems Security, Third International Conference, {ICISS} 2007, Delhi, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {10--24}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77086-2\_2}, doi = {10.1007/978-3-540-77086-2\_2}, timestamp = {Thu, 05 Jan 2023 17:10:29 +0100}, biburl = {https://dblp.org/rec/conf/iciss/RayWMBHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiDKQW07, author = {Jun Li and Dejing Dou and Shiwoong Kim and Han Qin and Yibo Wang}, editor = {Patrick D. McDaniel and Shyam K. Gupta}, title = {On Knowledge-Based Classification of Abnormal {BGP} Events}, booktitle = {Information Systems Security, Third International Conference, {ICISS} 2007, Delhi, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {267--271}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77086-2\_23}, doi = {10.1007/978-3-540-77086-2\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiDKQW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/DouLQKZ07, author = {Dejing Dou and Jun Li and Han Qin and Shiwoong Kim and Sheng Zhong}, title = {Understanding and Utilizing the Hierarchy of Abnormal {BGP} Events}, booktitle = {Proceedings of the Seventh {SIAM} International Conference on Data Mining, April 26-28, 2007, Minneapolis, Minnesota, {USA}}, pages = {467--472}, publisher = {{SIAM}}, year = {2007}, url = {https://doi.org/10.1137/1.9781611972771.46}, doi = {10.1137/1.9781611972771.46}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdm/DouLQKZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiWP06, author = {Jun Li and Zhen Wu and Eric Purpus}, title = {Toward Understanding the Behavior of {BGP} During Large-Scale Power Outages}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.28}, doi = {10.1109/GLOCOM.2006.28}, timestamp = {Fri, 21 Feb 2020 18:38:36 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiWP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/LiDWKA05, author = {Jun Li and Dejing Dou and Zhen Wu and Shiwoong Kim and Vikash Agarwal}, title = {An internet routing forensics framework for discovering rules of abnormal {BGP} events}, journal = {Comput. Commun. Rev.}, volume = {35}, number = {5}, pages = {55--66}, year = {2005}, url = {https://doi.org/10.1145/1096536.1096542}, doi = {10.1145/1096536.1096542}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/LiDWKA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiK05, author = {Jun Li and Xun Kang}, title = {mSSL: Extending {SSL} to Support Data Sharing Among Collaborative Clients}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {397--408}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.40}, doi = {10.1109/CSAC.2005.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotp2p/LoZLGL05, author = {Virginia Mary Lo and Dayi Zhou and Yuhong Liu and Chris GauthierDickey and Jun Li}, title = {Scalable supernode selection in peer-to-peer overlay networks}, booktitle = {Second International Workshop on Hot Topics in Peer-to-Peer Systems, {HOT-P2P} 2005, San Diego, California, USA, July 21, 2005}, pages = {18--25}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/HOT-P2P.2005.17}, doi = {10.1109/HOT-P2P.2005.17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotp2p/LoZLGL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/LiK05, author = {Jun Li and Xun Kang}, editor = {Guihai Chen and Yi Pan and Minyi Guo and Jian Lu}, title = {Proof of Service in a Hybrid {P2P} Environment}, booktitle = {Parallel and Distributed Processing and Applications - {ISPA} 2005 Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3759}, pages = {64--73}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11576259\_8}, doi = {10.1007/11576259\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispa/LiK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pads/LiEKR05, author = {Jun Li and Toby Ehrenkranz and Geoffrey H. Kuenning and Peter L. Reiher}, title = {Simulation and Analysis on the Resiliency and Efficiency of Malnets}, booktitle = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055, Monterey, CA, USA, June 1-3, 2005}, pages = {262--269}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PADS.2005.29}, doi = {10.1109/PADS.2005.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pads/LiEKR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LiRP04, author = {Jun Li and Peter L. Reiher and Gerald J. Popek}, title = {Resilient self-organizing overlay networks for security update delivery}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {1}, pages = {189--202}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2003.818808}, doi = {10.1109/JSAC.2003.818808}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LiRP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LiRP02, author = {Jun Li and Peter L. Reiher and Gerald J. Popek}, title = {Disseminating Security Updates at Internet Scale}, series = {Advances in Information Security}, volume = {8}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-1021-5}, doi = {10.1007/978-1-4615-1021-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LiRP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiYR02, author = {Jun Li and Mark Yarvis and Peter L. Reiher}, title = {Securing distributed adaptation}, journal = {Comput. Networks}, volume = {38}, number = {3}, pages = {347--371}, year = {2002}, url = {https://doi.org/10.1016/S1389-1286(01)00291-2}, doi = {10.1016/S1389-1286(01)00291-2}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiYR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LiMWRZ02, author = {Jun Li and Jelena Mirkovic and Mengqiu Wang and Peter L. Reiher and Lixia Zhang}, title = {{SAVE:} Source Address Validity Enforcement Protocol}, booktitle = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference of the {IEEE} Computer and Communications Societies, New York, USA, June 23-27, 2002}, pages = {1557--1566}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/INFCOM.2002.1019407}, doi = {10.1109/INFCOM.2002.1019407}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LiMWRZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/LiRP99, author = {Jun Li and Peter L. Reiher and Gerald J. Popek}, editor = {Darrell M. Kienzle and Mary Ellen Zurko and Steven J. Greenwald and Cristina Serbau}, title = {Securing information transmission by redundancy}, booktitle = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999}, pages = {112--117}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/335169.335205}, doi = {10.1145/335169.335205}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/LiRP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.