BibTeX records: Jun Li 0001

download as .bib file

@article{DBLP:journals/tiot/HuLW24,
  author       = {Zhangxiang Hu and
                  Jun Li and
                  Christopher Wilson},
  title        = {Resilient Intermediary-Based Key Exchange Protocol for IoT},
  journal      = {{ACM} Trans. Internet Things},
  volume       = {5},
  number       = {1},
  pages        = {7:1--7:31},
  year         = {2024},
  url          = {https://doi.org/10.1145/3632408},
  doi          = {10.1145/3632408},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tiot/HuLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSS23,
  author       = {Jun Li and
                  Devkishen Sisodia and
                  Shad Stafford},
  title        = {On the Detection of Smart, Self-Propagating Internet Worms},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3051--3063},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3194127},
  doi          = {10.1109/TDSC.2022.3194127},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiSFSZER23,
  author       = {Jun Li and
                  Devkishen Sisodia and
                  Yebo Feng and
                  Lumin Shi and
                  Mingwei Zhang and
                  Christopher Early and
                  Peter L. Reiher},
  title        = {Toward Adaptive DDoS-Filtering Rule Generation},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288699},
  doi          = {10.1109/CNS59707.2023.10288699},
  timestamp    = {Mon, 13 Nov 2023 09:18:17 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/LiSFSZER23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Shi00R22,
  author       = {Lumin Shi and
                  Jun Li and
                  Mingwei Zhang and
                  Peter L. Reiher},
  title        = {On Capturing DDoS Traffic Footprints on the Internet},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2755--2770},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3074086},
  doi          = {10.1109/TDSC.2021.3074086},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/Shi00R22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Hu0MW22,
  author       = {Zhangxiang Hu and
                  Jun Li and
                  Samuel Mergendahl and
                  Christopher Wilson},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Toward a Resilient Key Exchange Protocol for IoT},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {214--225},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511520},
  doi          = {10.1145/3508398.3511520},
  timestamp    = {Wed, 20 Apr 2022 12:17:48 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Hu0MW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-00742,
  author       = {Jelena Mirkovic and
                  Yebo Feng and
                  Jun Li},
  title        = {Measuring Changes in Regional Network Traffic Due to {COVID-19} Stay-at-Home
                  Measures},
  journal      = {CoRR},
  volume       = {abs/2203.00742},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.00742},
  doi          = {10.48550/ARXIV.2203.00742},
  eprinttype    = {arXiv},
  eprint       = {2203.00742},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-00742.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/FengLJW21,
  author       = {Yebo Feng and
                  Jun Li and
                  Lei Jiao and
                  Xintao Wu},
  title        = {Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2149--2163},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3047399},
  doi          = {10.1109/TDSC.2020.3047399},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/FengLJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WangJHLB21,
  author       = {Lin Wang and
                  Lei Jiao and
                  Ting He and
                  Jun Li and
                  Henri E. Bal},
  title        = {Service Placement for Collaborative Edge Applications},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {29},
  number       = {1},
  pages        = {34--47},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNET.2020.3025985},
  doi          = {10.1109/TNET.2020.3025985},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/WangJHLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LuoLJC21,
  author       = {Jianzhen Luo and
                  Jun Li and
                  Lei Jiao and
                  Jun Cai},
  title        = {On the Effective Parallelization and Near-Optimal Deployment of Service
                  Function Chains},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {32},
  number       = {5},
  pages        = {1238--1255},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPDS.2020.3043768},
  doi          = {10.1109/TPDS.2020.3043768},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/LuoLJC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SisodiaLJ20,
  author       = {Devkishen Sisodia and
                  Jun Li and
                  Lei Jiao},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {In-Network Filtering of Distributed Denial-of-Service Traffic with
                  Near-Optimal Rule Selection},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {153--164},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384755},
  doi          = {10.1145/3320269.3384755},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SisodiaLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FengSL20,
  author       = {Yebo Feng and
                  Devkishen Sisodia and
                  Jun Li},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{POSTER:} Content-Agnostic Identification of Cryptojacking in Network
                  Traffic},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {907--909},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3405440},
  doi          = {10.1145/3320269.3405440},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FengSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MergendahlL20,
  author       = {Samuel Mergendahl and
                  Jun Li},
  title        = {Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service
                  Traffic from the Internet of Things},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162278},
  doi          = {10.1109/CNS48642.2020.9162278},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MergendahlL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/CilloniCF020,
  author       = {Thomas Cilloni and
                  Xiyu Cai and
                  Charles Fleming and
                  Jun Li},
  editor       = {Jie Xu and
                  Stefan Schulte and
                  Peter Ruppel and
                  Axel K{\"{u}}pper and
                  Divyesh Jadav},
  title        = {Understanding and Detecting Majority Attacks},
  booktitle    = {2nd {IEEE} International Conference on Decentralized Applications
                  and Infrastructures, {DAPPS} 2020, Oxford, UK, August 3-6, 2020},
  pages        = {11--21},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DAPPS49028.2020.00002},
  doi          = {10.1109/DAPPS49028.2020.00002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dappcon/CilloniCF020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dappcon/LiGKF20,
  author       = {Jun Li and
                  Alex Grintsvayg and
                  Jeremy Kauffman and
                  Charles Fleming},
  editor       = {Jie Xu and
                  Stefan Schulte and
                  Peter Ruppel and
                  Axel K{\"{u}}pper and
                  Divyesh Jadav},
  title        = {{LBRY:} {A} Blockchain-Based Decentralized Digital Content Marketplace},
  booktitle    = {2nd {IEEE} International Conference on Decentralized Applications
                  and Infrastructures, {DAPPS} 2020, Oxford, UK, August 3-6, 2020},
  pages        = {42--51},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DAPPS49028.2020.00005},
  doi          = {10.1109/DAPPS49028.2020.00005},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dappcon/LiGKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YouJLZ20,
  author       = {Wencong You and
                  Lei Jiao and
                  Jun Li and
                  Ruiting Zhou},
  title        = {Scheduling DDoS Cloud Scrubbing in {ISP} Networks via Randomized Online
                  Auctions},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020,
                  Toronto, ON, Canada, July 6-9, 2020},
  pages        = {1658--1667},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOM41043.2020.9155493},
  doi          = {10.1109/INFOCOM41043.2020.9155493},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/YouJLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/FengLN20,
  author       = {Yebo Feng and
                  Jun Li and
                  Thanh Nguyen},
  title        = {Application-Layer DDoS Defense with Reinforcement Learning},
  booktitle    = {28th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2020, Hangzhou, China, June 15-17, 2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IWQoS49365.2020.9213026},
  doi          = {10.1109/IWQOS49365.2020.9213026},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/FengLN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShiMSL20,
  author       = {Lumin Shi and
                  Samuel Mergendahl and
                  Devkishen Sisodia and
                  Jun Li},
  editor       = {Tamara Denning and
                  Tyler Moore},
  title        = {Bridging Missing Gaps in Evaluating DDoS Research},
  booktitle    = {13th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2020, August 10, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/cset20/presentation/shi},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShiMSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/JamshidiRL19,
  author       = {Soheil Jamshidi and
                  Reza Rejaie and
                  Jun Li},
  title        = {Characterizing the dynamics and evolution of incentivized online reviews
                  on Amazon},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {9},
  number       = {1},
  pages        = {22:1--22:15},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13278-019-0563-0},
  doi          = {10.1007/S13278-019-0563-0},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/JamshidiRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/WangJLGM19,
  author       = {Lin Wang and
                  Lei Jiao and
                  Jun Li and
                  Julien Gedeon and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {{MOERA:} Mobility-Agnostic Online Resource Allocation for Edge Computing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {8},
  pages        = {1843--1856},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2867520},
  doi          = {10.1109/TMC.2018.2867520},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/WangJLGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/ZhengYW0L19,
  author       = {Panpan Zheng and
                  Shuhan Yuan and
                  Xintao Wu and
                  Jun Li and
                  Aidong Lu},
  title        = {One-Class Adversarial Nets for Fraud Detection},
  booktitle    = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2019, The Thirty-First Innovative Applications of Artificial Intelligence
                  Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational
                  Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii,
                  USA, January 27 - February 1, 2019},
  pages        = {1286--1293},
  publisher    = {{AAAI} Press},
  year         = {2019},
  url          = {https://doi.org/10.1609/aaai.v33i01.33011286},
  doi          = {10.1609/AAAI.V33I01.33011286},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/ZhengYW0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Feng0JW19,
  author       = {Yebo Feng and
                  Jun Li and
                  Lei Jiao and
                  Xintao Wu},
  title        = {BotFlowMon: Learning-based, Content-Agnostic Identification of Social
                  Bot Traffic Flows},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {169--177},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802706},
  doi          = {10.1109/CNS.2019.8802706},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Feng0JW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ZhangSSLR19,
  author       = {Mingwei Zhang and
                  Lumin Shi and
                  Devkishen Sisodia and
                  Jun Li and
                  Peter L. Reiher},
  editor       = {Joe Betser and
                  Carol J. Fung and
                  Alex Clemm and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Shingo Ata},
  title        = {On Multi-Point, In-Network Filtering of Distributed Denial-of-Service
                  Traffic},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2019, Washington, DC, USA, April 09-11, 2019},
  pages        = {180--188},
  publisher    = {{IFIP}},
  year         = {2019},
  url          = {http://dl.ifip.org/db/conf/im/im2019/189412.pdf},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/ZhangSSLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/LiZZ18,
  author       = {Jun Li and
                  Bodong Zhao and
                  Chao Zhang},
  title        = {Fuzzing: a survey},
  journal      = {Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {6},
  year         = {2018},
  url          = {https://doi.org/10.1186/s42400-018-0002-y},
  doi          = {10.1186/S42400-018-0002-Y},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/LiZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/Chen0LZ18,
  author       = {Congjie Chen and
                  Dan Li and
                  Jun Li and
                  Konglin Zhu},
  title        = {{SVDC:} {A} Highly Scalable Isolation Architecture for Virtualized
                  Layer-2 Data Center Networks},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {4},
  pages        = {1178--1190},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2016.2586047},
  doi          = {10.1109/TCC.2016.2586047},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/Chen0LZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/JamshidiRL18,
  author       = {Soheil Jamshidi and
                  Reza Rejaie and
                  Jun Li},
  editor       = {Ulrik Brandes and
                  Chandan Reddy and
                  Andrea Tagarelli},
  title        = {Trojan Horses in Amazon's Castle: Understanding the Incentivized Online
                  Reviews},
  booktitle    = {{IEEE/ACM} 2018 International Conference on Advances in Social Networks
                  Analysis and Mining, {ASONAM} 2018, Barcelona, Spain, August 28-31,
                  2018},
  pages        = {335--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ASONAM.2018.8508267},
  doi          = {10.1109/ASONAM.2018.8508267},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/JamshidiRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/MergendahlSLC18,
  author       = {Samuel Mergendahl and
                  Devkishen Sisodia and
                  Jun Li and
                  Hasan Cam},
  title        = {{FR-WARD:} Fast Retransmit as a Wary but Ample Response to Distributed
                  Denial-of-Service Attacks from the Internet of Things},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487342},
  doi          = {10.1109/ICCCN.2018.8487342},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/MergendahlSLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangJHLM18,
  author       = {Lin Wang and
                  Lei Jiao and
                  Ting He and
                  Jun Li and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {Service Entity Placement for Social Virtual Reality Applications in
                  Edge Computing},
  booktitle    = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018,
                  Honolulu, HI, USA, April 16-19, 2018},
  pages        = {468--476},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/INFOCOM.2018.8486411},
  doi          = {10.1109/INFOCOM.2018.8486411},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangJHLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/JiaoTLJSL18,
  author       = {Lei Jiao and
                  Antonia Maria Tulino and
                  Jaime Llorca and
                  Yue Jin and
                  Alessandra Sala and
                  Jun Li},
  title        = {Online Control of Cloud and Edge Resources Using Inaccurate Predictions},
  booktitle    = {26th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2018, Banff, AB, Canada, June 4-6, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IWQoS.2018.8624119},
  doi          = {10.1109/IWQOS.2018.8624119},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/JiaoTLJSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/ShiZ0R18,
  author       = {Lumin Shi and
                  Mingwei Zhang and
                  Jun Li and
                  Peter L. Reiher},
  editor       = {Claudio Casetti and
                  Fernando A. Kuipers and
                  James P. G. Sterbenz and
                  Burkhard Stiller},
  title        = {PathFinder: Capturing DDoS Traffic Footprints on the Internet},
  booktitle    = {17th International {IFIP} {TC6} Networking Conference, Networking
                  2018, Zurich, Switzerland, May 14-16, 2018},
  pages        = {10--18},
  publisher    = {{IFIP}},
  year         = {2018},
  url          = {http://dl.ifip.org/db/conf/networking/networking2018/1A2-1570417251.pdf},
  doi          = {10.23919/IFIPNETWORKING.2018.8696909},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/ShiZ0R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/JiaoPWLL18,
  author       = {Lei Jiao and
                  Lingjun Pu and
                  Lin Wang and
                  Xiaojun Lin and
                  Jun Li},
  title        = {Multiple Granularity Online Control of Cloudlet Networks for Edge
                  Computing},
  booktitle    = {15th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2018, Hong Kong, China, June 11-13, 2018},
  pages        = {406--414},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SAHCN.2018.8397141},
  doi          = {10.1109/SAHCN.2018.8397141},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/JiaoPWLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SisodiaMLC18,
  author       = {Devkishen Sisodia and
                  Samuel Mergendahl and
                  Jun Li and
                  Hasan Cam},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Securing the Smart Home via a Two-Mode Security Framework},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {254},
  pages        = {22--42},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01701-9\_2},
  doi          = {10.1007/978-3-030-01701-9\_2},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/SisodiaMLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-01798,
  author       = {Panpan Zheng and
                  Shuhan Yuan and
                  Xintao Wu and
                  Jun Li and
                  Aidong Lu},
  title        = {One-Class Adversarial Nets for Fraud Detection},
  journal      = {CoRR},
  volume       = {abs/1803.01798},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.01798},
  eprinttype    = {arXiv},
  eprint       = {1803.01798},
  timestamp    = {Wed, 24 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-01798.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SteinSBL17,
  author       = {Joshua Stein and
                  Han Hee Song and
                  Mario Baldi and
                  Jun Li},
  title        = {On the most representative summaries of network user activities},
  journal      = {Comput. Networks},
  volume       = {113},
  pages        = {205--217},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2016.12.014},
  doi          = {10.1016/J.COMNET.2016.12.014},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SteinSBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/KollLF17,
  author       = {David Koll and
                  Jun Li and
                  Xiaoming Fu},
  title        = {The Good Left Undone: Advances and Challenges in Decentralizing Online
                  Social Networks},
  journal      = {Comput. Commun.},
  volume       = {108},
  pages        = {36--51},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comcom.2017.04.008},
  doi          = {10.1016/J.COMCOM.2017.04.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/KollLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ZhangLB17,
  author       = {Mingwei Zhang and
                  Jun Li and
                  Scott Brooks},
  title        = {I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {25},
  number       = {6},
  pages        = {3411--3426},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNET.2017.2748902},
  doi          = {10.1109/TNET.2017.2748902},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/ZhangLB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ChenWL017,
  author       = {Yang Chen and
                  Shining Wu and
                  Jun Li and
                  Xiaoming Fu},
  title        = {NCShield: Protecting Decentralized, Matrix Factorization-Based Network
                  Coordinate Systems},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {244--257},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2015.2437383},
  doi          = {10.1109/TSC.2015.2437383},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ChenWL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MergendahlSLC17,
  author       = {Samuel Mergendahl and
                  Devkishen Sisodia and
                  Jun Li and
                  Hasan Cam},
  editor       = {Peng Liu and
                  Yuqing Zhang and
                  Theophilus Benson and
                  Srikanth Sundaresan},
  title        = {Source-End DDoS Defense in IoT Environments},
  booktitle    = {Proceedings of the 2017 Workshop on Internet of Things Security and
                  Privacy, IoT S{\&}P@CCS, Dallas, TX, USA, November 03, 2017},
  pages        = {63--64},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139937.3139954},
  doi          = {10.1145/3139937.3139954},
  timestamp    = {Thu, 18 Aug 2022 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MergendahlSLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/YuanWLL17,
  author       = {Shuhan Yuan and
                  Xintao Wu and
                  Jun Li and
                  Aidong Lu},
  editor       = {Ee{-}Peng Lim and
                  Marianne Winslett and
                  Mark Sanderson and
                  Ada Wai{-}Chee Fu and
                  Jimeng Sun and
                  J. Shane Culpepper and
                  Eric Lo and
                  Joyce C. Ho and
                  Debora Donato and
                  Rakesh Agrawal and
                  Yu Zheng and
                  Carlos Castillo and
                  Aixin Sun and
                  Vincent S. Tseng and
                  Chenliang Li},
  title        = {Spectrum-based Deep Neural Networks for Fraud Detection},
  booktitle    = {Proceedings of the 2017 {ACM} on Conference on Information and Knowledge
                  Management, {CIKM} 2017, Singapore, November 06 - 10, 2017},
  pages        = {2419--2422},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132847.3133139},
  doi          = {10.1145/3132847.3133139},
  timestamp    = {Tue, 29 Aug 2023 16:24:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/YuanWLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangJLM17,
  author       = {Lin Wang and
                  Lei Jiao and
                  Jun Li and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Online Resource Allocation for Arbitrary User Mobility in Distributed
                  Edge Clouds},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {1281--1290},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.30},
  doi          = {10.1109/ICDCS.2017.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangJLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/KollSLL017,
  author       = {David Koll and
                  Martin Schwarzmaier and
                  Jun Li and
                  Xiang{-}Yang Li and
                  Xiaoming Fu},
  editor       = {Aibek Musaev and
                  Jo{\~{a}}o Eduardo Ferreira and
                  Teruo Higashino},
  title        = {Thank You For Being {A} Friend: An Attacker View on Online-Social-Network-Based
                  Sybil Defenses},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems
                  Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {157--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCSW.2017.67},
  doi          = {10.1109/ICDCSW.2017.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/KollSLL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YuanWLL17,
  author       = {Shuhan Yuan and
                  Xintao Wu and
                  Jun Li and
                  Aidong Lu},
  title        = {Spectrum-based deep neural networks for fraud detection},
  journal      = {CoRR},
  volume       = {abs/1706.00891},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.00891},
  eprinttype    = {arXiv},
  eprint       = {1706.00891},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YuanWLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangXWLCL16,
  author       = {Yuanyuan Zhang and
                  Mingwei Xu and
                  Ning Wang and
                  Jun Li and
                  Penghan Chen and
                  Fei Liang},
  title        = {Compressing {IP} Forwarding Tables with Small Bounded Update Time},
  journal      = {Comput. Networks},
  volume       = {106},
  pages        = {77--90},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.06.015},
  doi          = {10.1016/J.COMNET.2016.06.015},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangXWLCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/JiaoLXDF16,
  author       = {Lei Jiao and
                  Jun Li and
                  Tianyin Xu and
                  Wei Du and
                  Xiaoming Fu},
  title        = {Optimizing Cost for Online Social Networks on Geo-Distributed Clouds},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {1},
  pages        = {99--112},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2014.2359365},
  doi          = {10.1109/TNET.2014.2359365},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/JiaoLXDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiSZM16,
  author       = {Jun Li and
                  Joshua Stein and
                  Mingwei Zhang and
                  Olaf Maennel},
  title        = {An expectation-based approach to policy-based security of the Border
                  Gateway Protocol},
  booktitle    = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {340--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFCOMW.2016.7562098},
  doi          = {10.1109/INFCOMW.2016.7562098},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiSZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiXWLJY15,
  author       = {Qing Li and
                  Mingwei Xu and
                  Dan Wang and
                  Jun Li and
                  Yong Jiang and
                  Jiahai Yang},
  title        = {Nexthop-Selectable {FIB} aggregation: An instant approach for internet
                  routing scalability},
  journal      = {Comput. Commun.},
  volume       = {67},
  pages        = {11--22},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.07.003},
  doi          = {10.1016/J.COMCOM.2015.07.003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiXWLJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Liu0WBYLZZH15,
  author       = {Bingshuang Liu and
                  Jun Li and
                  Tao Wei and
                  Skyler Berg and
                  Jiayi Ye and
                  Chen Li and
                  Chao Zhang and
                  Jianyu Zhang and
                  Xinhui Han},
  title        = {SF-DRDoS: The store-and-flood distributed reflective denial of service
                  attack},
  journal      = {Comput. Commun.},
  volume       = {69},
  pages        = {107--115},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.06.008},
  doi          = {10.1016/J.COMCOM.2015.06.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Liu0WBYLZZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LiuWZLZ15,
  author       = {Bingshuang Liu and
                  Tao Wei and
                  Chao Zhang and
                  Jun Li and
                  Jianyu Zhang},
  title        = {Improving lookup reliability in Kad},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {156--170},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-013-0240-4},
  doi          = {10.1007/S12083-013-0240-4},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LiuWZLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/ZhuXLLYL15,
  author       = {Hanqing Zhu and
                  Mingwei Xu and
                  Qing Li and
                  Jun Li and
                  Yuan Yang and
                  Suogang Li},
  editor       = {Rahim Kacimi and
                  Zoubir Mammeri},
  title        = {{MDTC:} An efficient approach to TCAM-based multidimensional table
                  compression},
  booktitle    = {Proceedings of the 14th {IFIP} Networking Conference, Networking 2015,
                  Toulouse, France, 20-22 May, 2015},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/IFIPNetworking.2015.7145306},
  doi          = {10.1109/IFIPNETWORKING.2015.7145306},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/ZhuXLLYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/MemonLR14,
  author       = {Ghulam Memon and
                  Jun Li and
                  Reza Rejaie},
  title        = {Tsunami: {A} parasitic, indestructible botnet on Kad},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {7},
  number       = {4},
  pages        = {444--455},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12083-013-0202-x},
  doi          = {10.1007/S12083-013-0202-X},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/MemonLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/LiuWWZLZCL14,
  author       = {Bingshuang Liu and
                  Shidong Wu and
                  Tao Wei and
                  Chao Zhang and
                  Jun Li and
                  Jianyu Zhang and
                  Yu Chen and
                  Chen Li},
  title        = {Splider: {A} split-based crawler of the {BT-DHT} network and its applications},
  booktitle    = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2014, Las Vegas, NV, USA, January 10-13, 2014},
  pages        = {327--335},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CCNC.2014.6866591},
  doi          = {10.1109/CCNC.2014.6866591},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/LiuWWZLZCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/0001S14,
  author       = {Jun Li and
                  Shad Stafford},
  title        = {Detecting smart, self-propagating Internet worms},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {193--201},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997486},
  doi          = {10.1109/CNS.2014.6997486},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/0001S14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/LiuBLWZH14,
  author       = {Bingshuang Liu and
                  Skyler Berg and
                  Jun Li and
                  Tao Wei and
                  Chao Zhang and
                  Xinhui Han},
  title        = {The store-and-flood distributed reflective denial of service attack},
  booktitle    = {23rd International Conference on Computer Communication and Networks,
                  {ICCCN} 2014, Shanghai, China, August 4-7, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCCN.2014.6911808},
  doi          = {10.1109/ICCCN.2014.6911808},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/LiuBLWZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JiaoLDF14,
  author       = {Lei Jiao and
                  Jun Li and
                  Wei Du and
                  Xiaoming Fu},
  title        = {Multi-objective data placement for multi-cloud socially aware services},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {28--36},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847921},
  doi          = {10.1109/INFOCOM.2014.6847921},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JiaoLDF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/SteinSBL14,
  author       = {Joshua Stein and
                  Han Hee Song and
                  Mario Baldi and
                  Jun Li},
  title        = {Toward the most representative summaries of network user activities},
  booktitle    = {{IEEE} 22nd International Symposium of Quality of Service, IWQoS 2014,
                  Hong Kong, China, May 26-27, 2014},
  pages        = {111--116},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IWQoS.2014.6914308},
  doi          = {10.1109/IWQOS.2014.6914308},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/SteinSBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhuLLLW14,
  author       = {Ming Zhu and
                  Jun Li and
                  Ying Liu and
                  Dan Li and
                  Jianping Wu},
  title        = {{TED:} Inter-domain traffic engineering via deflection},
  booktitle    = {{IEEE} 22nd International Symposium of Quality of Service, IWQoS 2014,
                  Hong Kong, China, May 26-27, 2014},
  pages        = {117--122},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IWQoS.2014.6914309},
  doi          = {10.1109/IWQOS.2014.6914309},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZhuLLLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/KollLF14,
  author       = {David Koll and
                  Jun Li and
                  Xiaoming Fu},
  editor       = {Laurent R{\'{e}}veill{\`{e}}re and
                  Lucy Cherkasova and
                  Fran{\c{c}}ois Ta{\"{\i}}ani},
  title        = {{SOUP:} an online social network by the people, for the people},
  booktitle    = {Proceedings of the 15th International Middleware Conference, Bordeaux,
                  France, December 8-12, 2014},
  pages        = {193--204},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663165.2663324},
  doi          = {10.1145/2663165.2663324},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/KollLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KollLSF14,
  author       = {David Koll and
                  Jun Li and
                  Joshua Stein and
                  Xiaoming Fu},
  title        = {On the state of OSN-based Sybil defenses},
  booktitle    = {2014 {IFIP} Networking Conference, Trondheim, Norway, June 2-4, 2014},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IFIPNetworking.2014.6857128},
  doi          = {10.1109/IFIPNETWORKING.2014.6857128},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/KollLSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/KollLF14,
  author       = {David Koll and
                  Jun Li and
                  Xiaoming Fu},
  editor       = {Fabi{\'{a}}n E. Bustamante and
                  Y. Charlie Hu and
                  Arvind Krishnamurthy and
                  Sylvia Ratnasamy},
  title        = {{SOUP:} an online social network by the people, for the people},
  booktitle    = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
                  17-22, 2014},
  pages        = {143--144},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619239.2631432},
  doi          = {10.1145/2619239.2631432},
  timestamp    = {Wed, 10 Mar 2021 13:04:38 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/KollLF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiBZRW14,
  author       = {Jun Li and
                  Skyler Berg and
                  Mingwei Zhang and
                  Peter L. Reiher and
                  Tao Wei},
  editor       = {Fabi{\'{a}}n E. Bustamante and
                  Y. Charlie Hu and
                  Arvind Krishnamurthy and
                  Sylvia Ratnasamy},
  title        = {Drawbridge: software-defined DDoS-resistant traffic engineering},
  booktitle    = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
                  17-22, 2014},
  pages        = {591--592},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619239.2631469},
  doi          = {10.1145/2619239.2631469},
  timestamp    = {Tue, 18 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiBZRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/GustafsonL13,
  author       = {Jason Gustafson and
                  Jun Li},
  title        = {Leveraging the crowds to disrupt phishing},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {82--90},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682695},
  doi          = {10.1109/CNS.2013.6682695},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/GustafsonL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/KollLSF13,
  author       = {David Koll and
                  Jun Li and
                  Joshua Stein and
                  Xiaoming Fu},
  title        = {On the effectiveness of sybil defenses based on online social networks},
  booktitle    = {2013 21st {IEEE} International Conference on Network Protocols, {ICNP}
                  2013, G{\"{o}}ttingen, Germany, October 7-10, 2013},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICNP.2013.6733630},
  doi          = {10.1109/ICNP.2013.6733630},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/KollLSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lanman/JiaoLF13,
  author       = {Lei Jiao and
                  Jun Li and
                  Xiaoming Fu},
  title        = {Optimizing data center traffic of Online Social Networks},
  booktitle    = {19th {IEEE} Workshop on Local {\&} Metropolitan Area Networks,
                  {LANMAN} 2013, Brussels, Belgium, April 10-12, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/LANMAN.2013.6528282},
  doi          = {10.1109/LANMAN.2013.6528282},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lanman/JiaoLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/LiYM12,
  author       = {Jun Li and
                  Dongting Yu and
                  Luke Maurer},
  title        = {A resource management approach to web browser security},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2012, Maui, HI, USA, January 30 - February 2, 2012},
  pages        = {697--701},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCNC.2012.6167512},
  doi          = {10.1109/ICCNC.2012.6167512},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/LiYM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/0001EE12,
  author       = {Jun Li and
                  Toby Ehrenkranz and
                  Paul Elliott},
  title        = {Buddyguard: {A} buddy system for fast and reliable detection of {IP}
                  prefix anomalies},
  booktitle    = {20th {IEEE} International Conference on Network Protocols, {ICNP}
                  2012, Austin, TX, USA, October 30 - Nov. 2, 2012},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNP.2012.6459962},
  doi          = {10.1109/ICNP.2012.6459962},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/0001EE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/JiaoLXF12,
  author       = {Lei Jiao and
                  Jun Li and
                  Tianyin Xu and
                  Xiaoming Fu},
  title        = {Cost optimization for Online Social Networks on geo-distributed clouds},
  booktitle    = {20th {IEEE} International Conference on Network Protocols, {ICNP}
                  2012, Austin, TX, USA, October 30 - Nov. 2, 2012},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNP.2012.6459989},
  doi          = {10.1109/ICNP.2012.6459989},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/JiaoLXF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/WuCFL12,
  author       = {Shining Wu and
                  Yang Chen and
                  Xiaoming Fu and
                  Jun Li},
  title        = {NCShield: Securing decentralized, matrix factorization-based network
                  coordinate systems},
  booktitle    = {20th {IEEE} International Workshop on Quality of Service, IWQoS 2012,
                  Coimbra, Portugal, June 4-5, 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWQoS.2012.6245983},
  doi          = {10.1109/IWQOS.2012.6245983},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/WuCFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JiangLLLDW12,
  author       = {Jian Jiang and
                  Jinjin Liang and
                  Kang Li and
                  Jun Li and
                  Hai{-}Xin Duan and
                  Jianping Wu},
  title        = {Ghost Domain Names: Revoked Yet Still Resolvable},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/ghost-domain-names-revoked-yet-still-resolvable},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/JiangLLLDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/LiuWZLZZ12,
  author       = {Bingshuang Liu and
                  Tao Wei and
                  Jianyu Zhang and
                  Jun Li and
                  Wei Zou and
                  Mo Zhou},
  title        = {Revisiting why Kad lookup fails},
  booktitle    = {12th {IEEE} International Conference on Peer-to-Peer Computing, {P2P}
                  2012, Tarragona, Spain, September 3-5, 2012},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/P2P.2012.6335808},
  doi          = {10.1109/P2P.2012.6335808},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/LiuWZLZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/Li11,
  author       = {Jun Li},
  title        = {mSSL: {A} framework for trusted and incentivized peer-to-peer data
                  sharing between distrusted and selfish clients},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {4},
  number       = {4},
  pages        = {325--345},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12083-010-0087-x},
  doi          = {10.1007/S12083-010-0087-X},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/Li11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiB11,
  author       = {Jun Li and
                  Scott Brooks},
  title        = {I-seismograph: Observing and measuring Internet earthquakes},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {2624--2632},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935090},
  doi          = {10.1109/INFCOM.2011.5935090},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/StaffordL10,
  author       = {Shad Stafford and
                  Jun Li},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Behavior-Based Worm Detectors Compared},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_3},
  doi          = {10.1007/978-3-642-15512-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/StaffordL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/EhrenkranzLM10,
  author       = {Toby Ehrenkranz and
                  Jun Li and
                  Patrick D. McDaniel},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Realizing a Source Authentic Internet},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_13},
  doi          = {10.1007/978-3-642-16161-2\_13},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/EhrenkranzLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/EhrenkranzL09,
  author       = {Toby Ehrenkranz and
                  Jun Li},
  title        = {On the state of {IP} spoofing defense},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {9},
  number       = {2},
  pages        = {6:1--6:29},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516539.1516541},
  doi          = {10.1145/1516539.1516541},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/EhrenkranzL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/KnickerbockerY009,
  author       = {Paul Knickerbocker and
                  Dongting Yu and
                  Jun Li},
  title        = {Humboldt: {A} distributed phishing disruption system},
  booktitle    = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October
                  20-21, 2009},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECRIME.2009.5342620},
  doi          = {10.1109/ECRIME.2009.5342620},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/KnickerbockerY009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiMEWRZ08,
  author       = {Jun Li and
                  Jelena Mirkovic and
                  Toby Ehrenkranz and
                  Mengqiu Wang and
                  Peter L. Reiher and
                  Lixia Zhang},
  title        = {Learning the valid incoming direction of {IP} packets},
  journal      = {Comput. Networks},
  volume       = {52},
  number       = {2},
  pages        = {399--417},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comnet.2007.09.024},
  doi          = {10.1016/J.COMNET.2007.09.024},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LiMEWRZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/LiGWPE07,
  author       = {Jun Li and
                  Michael Guidero and
                  Zhen Wu and
                  Eric Purpus and
                  Toby Ehrenkranz},
  title        = {{BGP} routing dynamics revisited},
  journal      = {Comput. Commun. Rev.},
  volume       = {37},
  number       = {2},
  pages        = {5--16},
  year         = {2007},
  url          = {https://doi.org/10.1145/1232919.1232921},
  doi          = {10.1145/1232919.1232921},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/LiGWPE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiK07,
  author       = {Jun Li and
                  Paul Knickerbocker},
  title        = {Functional similarities between computer worms and biological pathogens},
  journal      = {Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {338--347},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.cose.2006.12.002},
  doi          = {10.1016/J.COSE.2006.12.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/StaffordLE07,
  author       = {Shad Stafford and
                  Jun Li and
                  Toby Ehrenkranz},
  title        = {Enhancing {SWORD} to Detect Zero-Day-Worm-Infected Hosts},
  journal      = {Simul.},
  volume       = {83},
  number       = {2},
  pages        = {199--212},
  year         = {2007},
  url          = {https://doi.org/10.1177/0037549707080753},
  doi          = {10.1177/0037549707080753},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/StaffordLE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/WangL07,
  author       = {Yibo Wang and
                  Jun Li},
  editor       = {Jim Kurose and
                  Henning Schulzrinne},
  title        = {Is your {IP} address prefix well-served by internet routing?},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Emerging Network Experiment
                  and Technology, CoNEXT 2007, New York, NY, USA, December 10-13, 2007},
  pages        = {69},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1364654.1364732},
  doi          = {10.1145/1364654.1364732},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/WangL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RayWMBHL07,
  author       = {Daniel A. Ray and
                  Charles B. Ward and
                  Bogdan Munteanu and
                  Jonathan Blackwell and
                  Xiaoyan Hong and
                  Jun Li},
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {Investigating the Impact of Real-World Factors on Internet Worm Propagation},
  booktitle    = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {10--24},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77086-2\_2},
  doi          = {10.1007/978-3-540-77086-2\_2},
  timestamp    = {Thu, 05 Jan 2023 17:10:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/RayWMBHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiDKQW07,
  author       = {Jun Li and
                  Dejing Dou and
                  Shiwoong Kim and
                  Han Qin and
                  Yibo Wang},
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {On Knowledge-Based Classification of Abnormal {BGP} Events},
  booktitle    = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {267--271},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77086-2\_23},
  doi          = {10.1007/978-3-540-77086-2\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LiDKQW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/DouLQKZ07,
  author       = {Dejing Dou and
                  Jun Li and
                  Han Qin and
                  Shiwoong Kim and
                  Sheng Zhong},
  title        = {Understanding and Utilizing the Hierarchy of Abnormal {BGP} Events},
  booktitle    = {Proceedings of the Seventh {SIAM} International Conference on Data
                  Mining, April 26-28, 2007, Minneapolis, Minnesota, {USA}},
  pages        = {467--472},
  publisher    = {{SIAM}},
  year         = {2007},
  url          = {https://doi.org/10.1137/1.9781611972771.46},
  doi          = {10.1137/1.9781611972771.46},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdm/DouLQKZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiWP06,
  author       = {Jun Li and
                  Zhen Wu and
                  Eric Purpus},
  title        = {Toward Understanding the Behavior of {BGP} During Large-Scale Power
                  Outages},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.28},
  doi          = {10.1109/GLOCOM.2006.28},
  timestamp    = {Fri, 21 Feb 2020 18:38:36 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiWP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/LiDWKA05,
  author       = {Jun Li and
                  Dejing Dou and
                  Zhen Wu and
                  Shiwoong Kim and
                  Vikash Agarwal},
  title        = {An internet routing forensics framework for discovering rules of abnormal
                  {BGP} events},
  journal      = {Comput. Commun. Rev.},
  volume       = {35},
  number       = {5},
  pages        = {55--66},
  year         = {2005},
  url          = {https://doi.org/10.1145/1096536.1096542},
  doi          = {10.1145/1096536.1096542},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/LiDWKA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiK05,
  author       = {Jun Li and
                  Xun Kang},
  title        = {mSSL: Extending {SSL} to Support Data Sharing Among Collaborative
                  Clients},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {397--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.40},
  doi          = {10.1109/CSAC.2005.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotp2p/LoZLGL05,
  author       = {Virginia Mary Lo and
                  Dayi Zhou and
                  Yuhong Liu and
                  Chris GauthierDickey and
                  Jun Li},
  title        = {Scalable supernode selection in peer-to-peer overlay networks},
  booktitle    = {Second International Workshop on Hot Topics in Peer-to-Peer Systems,
                  {HOT-P2P} 2005, San Diego, California, USA, July 21, 2005},
  pages        = {18--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/HOT-P2P.2005.17},
  doi          = {10.1109/HOT-P2P.2005.17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotp2p/LoZLGL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LiK05,
  author       = {Jun Li and
                  Xun Kang},
  editor       = {Guihai Chen and
                  Yi Pan and
                  Minyi Guo and
                  Jian Lu},
  title        = {Proof of Service in a Hybrid {P2P} Environment},
  booktitle    = {Parallel and Distributed Processing and Applications - {ISPA} 2005
                  Workshops, {ISPA} 2005 International Workshops AEPP, ASTD, BIOS, GCIC,
                  IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3759},
  pages        = {64--73},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11576259\_8},
  doi          = {10.1007/11576259\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/LiK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/LiEKR05,
  author       = {Jun Li and
                  Toby Ehrenkranz and
                  Geoffrey H. Kuenning and
                  Peter L. Reiher},
  title        = {Simulation and Analysis on the Resiliency and Efficiency of Malnets},
  booktitle    = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055,
                  Monterey, CA, USA, June 1-3, 2005},
  pages        = {262--269},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PADS.2005.29},
  doi          = {10.1109/PADS.2005.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pads/LiEKR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LiRP04,
  author       = {Jun Li and
                  Peter L. Reiher and
                  Gerald J. Popek},
  title        = {Resilient self-organizing overlay networks for security update delivery},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {22},
  number       = {1},
  pages        = {189--202},
  year         = {2004},
  url          = {https://doi.org/10.1109/JSAC.2003.818808},
  doi          = {10.1109/JSAC.2003.818808},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LiRP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LiRP02,
  author       = {Jun Li and
                  Peter L. Reiher and
                  Gerald J. Popek},
  title        = {Disseminating Security Updates at Internet Scale},
  series       = {Advances in Information Security},
  volume       = {8},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-1021-5},
  doi          = {10.1007/978-1-4615-1021-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LiRP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiYR02,
  author       = {Jun Li and
                  Mark Yarvis and
                  Peter L. Reiher},
  title        = {Securing distributed adaptation},
  journal      = {Comput. Networks},
  volume       = {38},
  number       = {3},
  pages        = {347--371},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1389-1286(01)00291-2},
  doi          = {10.1016/S1389-1286(01)00291-2},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LiYR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiMWRZ02,
  author       = {Jun Li and
                  Jelena Mirkovic and
                  Mengqiu Wang and
                  Peter L. Reiher and
                  Lixia Zhang},
  title        = {{SAVE:} Source Address Validity Enforcement Protocol},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, New York, USA,
                  June 23-27, 2002},
  pages        = {1557--1566},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/INFCOM.2002.1019407},
  doi          = {10.1109/INFCOM.2002.1019407},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LiMWRZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/LiRP99,
  author       = {Jun Li and
                  Peter L. Reiher and
                  Gerald J. Popek},
  editor       = {Darrell M. Kienzle and
                  Mary Ellen Zurko and
                  Steven J. Greenwald and
                  Cristina Serbau},
  title        = {Securing information transmission by redundancy},
  booktitle    = {Proceedings of the 1999 Workshop on New Security Paradigms, Caledon
                  Hills, ON, Canada, September 22-24, 1999},
  pages        = {112--117},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/335169.335205},
  doi          = {10.1145/335169.335205},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/LiRP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics