default search action
Qi Li 0002
Person information
- affiliation: Tsinghua University, Institute for Network Sciences and Cyberspace, Beijing, China
- affiliation: Beijing National Research Center for Information Science and Technology, Beijing, China
- affiliation (former): Tsinghua University, Graduate School at Shenzhen, China
- affiliation (former): Tsinghua University, Department of Computer Science, Beijing, China
- affiliation (former): Chinese Academy and Sciences, Institute of Software, Beijing, China
Other persons with the same name
- Qi Li — disambiguation page
- Qi Li 0001 — Western Kentucky University, Department of Mathematics and Computer Science, Bowling Green, KY, USA (and 1 more)
- Qi Li 0003 — China Earthquake Administration, China (and 1 more)
- Qi Li 0004 — SUNY New Paltz, School of Business, NY, USA (and 3 more)
- Qi Li 0005 — Chinese Academy of Sciences, Institute of Automation, CAS Center for Excellence in Brain Science and Intelligence Technology, Beijing, China
- Qi Li 0006 — Tsinghua University, Institute of Data Science, Centre for Computational Mental Healthcare Research, Beijing, China
- Qi Li 0007 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China (and 1 more)
- Qi Li 0008 — Beijing Jiaotong University, Department of Mechanical Engineering, China (and 1 more)
- Qi Li 0009 — Xi'an Jiaotong University, School of Mathematics and Statistics, China
- Qi Li 0010 — National Grid UK, Electricity National Control Centre, Wokingham, UK (and 1 more)
- Qi Li 0011 — Nanjing University of Posts and Telecommunications, School of Computer Science / Jiangsu Key Laboratory of Big Data Security and Intelligent Processing / Jiangsu Innovative Coordination Center of Internet of Things, China (and 1 more)
- Qi Li 0012 — Iowa State University, Ames, IA, USA (and 2 more)
- Qi Li 0013 — Hong Kong University of Science and Technology, Hong Kong
- Qi Li 0014 — Rensselaer Polytechnic Institute, Department of Computer Science, Troy, NY USA (and 1 more)
- Qi Li 0015 — University of Pittsburgh, Department of Mechanical Engineering and Materials Science, PA, USA (and 1 more)
- Qi Li 0016 — University of Notre Dame, IN, USA
- Qi Li 0017 — Southeast University, Key Laboratory of Measurement and Control of Complex Systems of Engineering, Nanjing, China
- Qi Li 0018 — Zhejiang University, State Key Laboratory of Modern Optical Instrumentation, Hangzhou, China
- Qi Li 0019 — Partners HealthCare System, Clinical Informatics Research & Development, Boston, MA, USA
- Qi Li 0020 — University of Southern California, Center for Systems and Software Engineering, Los Angeles, CA, USA
- Qi Li 0021 — Hangzhou Normal University, Institute of Service Engineering, China (and 1 more)
- Qi Li 0022 — Beijing Institute of Technology, School of Software, China
- Qi Li 0023 — Chalmers University of Technology, Department of Microtechnology and Nanoscience, Gothenburg, Sweden
- Qi Li 0024 — China University of Petroleum (East China), College of Information and Control Engineering, Qingdao, China
- Qi Li 0025 — Shaoxing University, Department of Computer Science and Engineering, China (and 1 more)
- Qi Li 0026 — Xi'an Jiaotong University, School of Electrical Engineering, State Key Laboratory of Electrical Insulation and Power Equipment, China
- Qi Li 0027 — Harbin Institute of Technology (Weihai Campus), School of Automotive Engineering, China
- Qi Li 0028 — Changchun University of Science and Technology, School of Computer Science and Technology, China
- Qi Li 0029 — Dalian Maritime University, School of Information Science and Technology, China (and 1 more)
- Qi Li 0030 — Tianjin University, School of Electrical and Information Engineering, China
- Qi Li 0031 — Central South University, School of Information Science and Engineering, Changsha, China
- Qi Li 0032 — Zhongyuan University of Technology, School of Electronic and Information Engineering, Zhengzhou, China
- Qi Li 0033 — University of Guelph, School of Computer Science, Canada
- Qi Li 0034 — University of Science and Technology of China, Department of Computer Science and Technology, Hefei, China
- Qi Li 0035 — Virginia Commonwealth University, Computer Science Department, Richmond, VA, USA
- Qi Li 0036 — Xi'an Jiaotong University, School of Economics and Finance, China
- Qi Li 0037 — Dalian University of Technology, School of Control Science and Engineering, China
- Qi Li 0038 — Fuzhou University, College of Computer and Data Science, China
- Qi Li 0039 — University of Science and Technology of China, School of Computer Science and TechnologyHefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j120]Jianjin Zhao, Qi Li, Jintao Sun, Mianxiong Dong, Kaoru Ota, Meng Shen:
Efficient IoT Device Identification via Network Behavior Analysis Based on Time Series Dictionary. IEEE Internet Things J. 11(3): 5129-5142 (2024) - [j119]Jie Wang, Kun Sun, Lingguang Lei, Yuewu Wang, Jiwu Jing, Shengye Wan, Qi Li:
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms. IEEE Trans. Dependable Secur. Comput. 21(1): 254-269 (2024) - [j118]Meng Shen, Changyue Li, Hao Yu, Qi Li, Liehuang Zhu, Ke Xu:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 1740-1753 (2024) - [j117]Xiaoli Zhang, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng, Chengjun Cai, Helei Cui, Qi Li:
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. IEEE Trans. Inf. Forensics Secur. 19: 2517-2532 (2024) - [j116]Man Zhou, Wenyu Zhou, Jie Huang, Junhui Yang, Minxin Du, Qi Li:
Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving. IEEE Trans. Inf. Forensics Secur. 19: 6795-6809 (2024) - [j115]Renjie Xie, Jiahao Cao, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li:
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. IEEE Trans. Inf. Forensics Secur. 19: 7659-7673 (2024) - [j114]Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du:
Graph Mining for Cybersecurity: A Survey. ACM Trans. Knowl. Discov. Data 18(2): 47:1-47:52 (2024) - [j113]Man Zhou, Yuting Zhou, Shuao Su, Qian Wang, Qi Li, Shengshan Hu, Chunwu Yu, Zhengxiong Li:
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound. IEEE Trans. Mob. Comput. 23(6): 7210-7224 (2024) - [j112]Man Zhou, Qian Wang, Qi Li, Wenyu Zhou, Jingxiao Yang, Chao Shen:
Securing Face Liveness Detection on Mobile Devices Using Unforgeable Lip Motion Patterns. IEEE Trans. Mob. Comput. 23(10): 9772-9788 (2024) - [j111]Jianjin Zhao, Qi Li, Yueping Hong, Meng Shen:
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning. IEEE Trans. Netw. Serv. Manag. 21(2): 2460-2476 (2024) - [j110]Xinhao Deng, Mingwei Xu, Qi Li, Weijie Wu, Yuan Yang, Menghao Zhang, Yu Zhou, Jianping Wu:
Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation. IEEE Trans. Netw. Serv. Manag. 21(4): 4830-4843 (2024) - [j109]Xiaoli Zhang, Wei Geng, Yiqiao Song, Hongbing Cheng, Ke Xu, Qi Li:
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds. IEEE/ACM Trans. Netw. 32(1): 159-174 (2024) - [j108]Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, Xinghua Li:
Interface-Based Side Channel in TEE-Assisted Networked Services. IEEE/ACM Trans. Netw. 32(1): 613-626 (2024) - [j107]Guangmeng Zhou, Qi Li, Yang Liu, Yi Zhao, Qi Tan, Su Yao, Ke Xu:
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning. IEEE/ACM Trans. Netw. 32(3): 1873-1887 (2024) - [j106]Chuanpu Fu, Qi Li, Ke Xu:
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection. IEEE/ACM Trans. Netw. 32(4): 2972-2987 (2024) - [j105]Xiaoliang Wang, Ke Xu, Yangfei Guo, Haiyang Wang, Songtao Fu, Qi Li, Bin Wu, Jianping Wu:
Toward Practical Inter-Domain Source Address Validation. IEEE/ACM Trans. Netw. 32(4): 3126-3141 (2024) - [c186]Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun:
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning. AsiaCCS 2024 - [c185]Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang:
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks. NDSS 2024 - [c184]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. NDSS 2024 - [c183]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. NDSS 2024 - [c182]Yingying Su, Dan Li, Li Chen, Qi Li, Sitong Ling:
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository. NDSS 2024 - [c181]Shu Wang, Kun Sun, Qi Li:
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks. NDSS 2024 - [c180]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [c179]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. NDSS 2024 - [c178]Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li:
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound. NDSS 2024 - [c177]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. NSDI 2024: 419-440 - [c176]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. SP 2024: 2534-2552 - [c175]Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu:
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. SP 2024: 3238-3256 - [c174]Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li:
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. SP 2024: 4459-4477 - [c173]Xiang Li, Dashuai Wu, Haixin Duan, Qi Li:
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses. SP 2024: 4478-4496 - [c172]Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu:
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services. USENIX Security Symposium 2024 - [c171]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. USENIX Security Symposium 2024 - [c170]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Network by Analyzing Training Data. USENIX Security Symposium 2024 - [c169]Yunjie Ge, Pinji Chen, Qian Wang, Lingchen Zhao, Ningping Mou, Peipei Jiang, Cong Wang, Qi Li, Chao Shen:
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. USENIX Security Symposium 2024 - [c168]Yi He, Yunchao Guan, Ruoyu Lun, Shangru Song, Zhihao Guo, Jianwei Zhuge, Jianjun Chen, Qiang Wei, Zehui Wu, Miao Yu, Hetian Shi, Qi Li:
Demystifying the Security Implications in IoT Device Rental Services. USENIX Security Symposium 2024 - [c167]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. USENIX Security Symposium 2024 - [c166]Jialai Wang, Chao Zhang, Longfei Chen, Yi Rong, Yuxiao Wu, Hao Wang, Wende Tan, Qi Li, Zongpeng Li:
Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features. USENIX Security Symposium 2024 - [c165]Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, Zihan Li, Yi He, Kun Sun, Qi Li, Ning Zhang:
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. USENIX Security Symposium 2024 - [c164]Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li:
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check. USENIX Security Symposium 2024 - [c163]Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li:
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. USENIX Security Symposium 2024 - [d1]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts). Zenodo, 2024 - [i54]Tianyu Cui, Yanling Wang, Chuanpu Fu, Yong Xiao, Sijia Li, Xinhao Deng, Yunpeng Liu, Qinglin Zhang, Ziyi Qiu, Peiyang Li, Zhixing Tan, Junwu Xiong, Xinyu Kong, Zujie Wen, Ke Xu, Qi Li:
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems. CoRR abs/2401.05778 (2024) - [i53]Yunjie Ge, Qian Wang, Huayang Huang, Qi Li, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang:
Hijacking Attacks against Neural Networks by Analyzing Training Data. CoRR abs/2401.09740 (2024) - [i52]Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. CoRR abs/2402.12716 (2024) - [i51]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. CoRR abs/2402.16025 (2024) - [i50]Jingwen Fan, Yi He, Bo Tang, Qi Li, Ravi S. Sandhu:
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms. CoRR abs/2402.19011 (2024) - [i49]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. CoRR abs/2403.01268 (2024) - [i48]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. CoRR abs/2403.11090 (2024) - [i47]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. CoRR abs/2403.11166 (2024) - [i46]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i45]Qiushi Li, Yan Zhang, Ju Ren, Qi Li, Yaoxue Zhang:
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks. CoRR abs/2404.04098 (2024) - [i44]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. CoRR abs/2404.04601 (2024) - [i43]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024) - [i42]Xiaoyu Zhang, Weipeng Jiang, Chao Shen, Qi Li, Qian Wang, Chenhao Lin, Xiaohong Guan:
A Survey of Deep Learning Library Testing Methods. CoRR abs/2404.17871 (2024) - [i41]Yi He, Yuan Zhou, Yacong Gu, Purui Su, Qi Li, Yajin Zhou, Yong Jiang:
JNI Global References Are Still Vulnerable: Attacks and Defenses. CoRR abs/2405.00526 (2024) - [i40]Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. CoRR abs/2405.17987 (2024) - [i39]Yanling Wang, Haoyang Li, Hao Zou, Jing Zhang, Xinlei He, Qi Li, Ke Xu:
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models. CoRR abs/2406.05328 (2024) - [i38]Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang:
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems. CoRR abs/2406.19311 (2024) - [i37]Xinhao Deng, Qi Li, Ke Xu:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. CoRR abs/2407.00918 (2024) - [i36]Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li:
Jailbreak Attacks and Defenses Against Large Language Models: A Survey. CoRR abs/2407.04295 (2024) - [i35]Zesen Liu, Tianshuo Cong, Xinlei He, Qi Li:
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks. CoRR abs/2407.04794 (2024) - [i34]Jiating Ma, Yipeng Zhou, Qi Li, Quan Z. Sheng, Laizhong Cui, Jiangchuan Liu:
The Power of Bias: Optimizing Client Selection in Federated Learning with Heterogeneous Differential Privacy. CoRR abs/2408.08642 (2024) - [i33]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. IACR Cryptol. ePrint Arch. 2024: 987 (2024) - 2023
- [j104]Haibin Li, Yi Zhao, Wenbing Yao, Ke Xu, Qi Li:
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction. Sci. China Inf. Sci. 66(5) (2023) - [j103]Yunjie Ge, Qian Wang, Jiayuan Yu, Chao Shen, Qi Li:
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems. IEEE Commun. Mag. 61(12): 176-182 (2023) - [j102]Meng Shen, Ke Ye, Xingtong Liu, Liehuang Zhu, Jiawen Kang, Shui Yu, Qi Li, Ke Xu:
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 791-824 (2023) - [j101]Yueping Hong, Qi Li, Yanqing Yang, Meng Shen:
Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features. Inf. Sci. 644: 119229 (2023) - [j100]Dongheng Zhang, Jia Meng, Jian Zhang, Xinzhe Deng, Shouhong Ding, Man Zhou, Qian Wang, Qi Li, Yan Chen:
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4401-4414 (2023) - [j99]Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds. IEEE Trans. Dependable Secur. Comput. 20(2): 1228-1242 (2023) - [j98]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Trans. Dependable Secur. Comput. 20(2): 1609-1623 (2023) - [j97]Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, Cong Wang:
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals. IEEE Trans. Dependable Secur. Comput. 20(2): 1687-1701 (2023) - [j96]Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, Qi Li:
Securing Liveness Detection for Voice Authentication via Pop Noises. IEEE Trans. Dependable Secur. Comput. 20(2): 1702-1718 (2023) - [j95]Mingxuan Liu, Zihan Zhang, Yiming Zhang, Chao Zhang, Zhou Li, Qi Li, Haixin Duan, Donghong Sun:
Automatic Generation of Adversarial Readable Chinese Texts. IEEE Trans. Dependable Secur. Comput. 20(2): 1756-1770 (2023) - [j94]Chenhao Lin, Jingyi He, Chao Shen, Qi Li, Qian Wang:
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics. IEEE Trans. Dependable Secur. Comput. 20(3): 2314-2327 (2023) - [j93]Xiangyun Tang, Meng Shen, Qi Li, Liehuang Zhu, Tengfei Xue, Qiang Qu:
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations. IEEE Trans. Dependable Secur. Comput. 20(6): 5005-5023 (2023) - [j92]Zheng Zheng, Qian Wang, Cong Wang, Man Zhou, Yi Zhao, Qi Li, Chao Shen:
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns. IEEE Trans. Inf. Forensics Secur. 18: 1295-1308 (2023) - [j91]Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, Ke Xu:
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems. IEEE Trans. Inf. Forensics Secur. 18: 4561-4576 (2023) - [j90]Qingyuan Gong, Yushan Liu, Jiayun Zhang, Yang Chen, Qi Li, Yu Xiao, Xin Wang, Pan Hui:
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning. IEEE Trans. Knowl. Data Eng. 35(10): 10633-10649 (2023) - [j89]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Frequency Domain Feature Based Robust Malicious Traffic Detection. IEEE/ACM Trans. Netw. 31(1): 452-467 (2023) - [j88]Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang:
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. IEEE/ACM Trans. Netw. 31(3): 1416-1431 (2023) - [j87]Songtao Fu, Qi Li, Min Zhu, Xiaoliang Wang, Su Yao, Yangfei Guo, Xinle Du, Ke Xu:
MASK: Practical Source and Path Verification Based on Multi-AS-Key. IEEE/ACM Trans. Netw. 31(4): 1478-1493 (2023) - [c162]Renjie Xie, Yixiao Wang, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. ACM TUR-C 2023: 131-132 - [c161]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. ACM TUR-C 2023: 141-142 - [c160]Qi Li, Mingyu Cheng:
Spear-Phishing Detection Method Based on Few-Shot Learning. APPT 2023: 351-371 - [c159]Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. CCS 2023: 1005-1019 - [c158]Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CCS 2023: 1020-1034 - [c157]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CCS 2023: 1496-1510 - [c156]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CCS 2023: 1496-1510 - [c155]Ning Zhang, Qi Li:
MTD '23: 10th ACM Workshop on Moving Target Defense. CCS 2023: 3653-3654 - [c154]Jialai Wang, Wenjie Qu, Yi Rong, Han Qiu, Qi Li, Zongpeng Li, Chao Zhang:
MPass: Bypassing Learning-based Static Malware Detectors. DAC 2023: 1-6 - [c153]Xiaoli Zhang, Zhicheng Xu, Hongbing Cheng, Tong Che, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Chunping Wang, Qi Li:
Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification. ICDCS 2023: 794-805 - [c152]Jiawang Dan, Ruofan Wu, Yunpeng Liu, Baokun Wang, Changhua Meng, Tengfei Liu, Tianyi Zhang, Ningtao Wang, Xing Fu, Qi Li, Weiqiang Wang:
Self-supervision meets kernel graph neural models: From architecture to augmentations. ICDM (Workshops) 2023: 1076-1083 - [c151]Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. NDSS 2023 - [c150]Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. NDSS 2023 - [c149]Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Robust Multi-tab Website Fingerprinting Attacks in the Wild. SP 2023: 1005-1022 - [c148]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - [c147]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. SP 2023: 3162-3177 - [c146]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264 - [c145]Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu:
Subverting Website Fingerprinting Defenses with Robust Traffic Representation. USENIX Security Symposium 2023: 607-624 - [c144]Renjie Xie, Jiahao Cao, Enhuan Dong, Mingwei Xu, Kun Sun, Qi Li, Licheng Shen, Menghao Zhang:
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. USENIX Security Symposium 2023: 625-642 - [c143]Jialai Wang, Ziyuan Zhang, Meiqi Wang, Han Qiu, Tianwei Zhang, Qi Li, Zongpeng Li, Tao Wei, Chao Zhang:
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. USENIX Security Symposium 2023: 2329-2346 - [c142]