Login / Signup
Qi Li
ORCID
Publication Activity (10 Years)
Years Active: 2005-2024
Publications (10 Years): 247
Top Topics
Deep Learning
Acoustic Signals
Malware Detection
Neural Network
Top Venues
CoRR
USENIX Security Symposium
IEEE Trans. Dependable Secur. Comput.
IEEE/ACM Trans. Netw.
</>
Publications
</>
Yunjie Ge
,
Qian Wang
,
Huayang Huang
,
Qi Li
,
Cong Wang
,
Chao Shen
,
Lingchen Zhao
,
Peipei Jiang
,
Zheng Fang
,
Shenyi Zhang
Hijacking Attacks against Neural Network by Analyzing Training Data.
USENIX Security Symposium
(2024)
Yi He
,
Yunchao Guan
,
Ruoyu Lun
,
Shangru Song
,
Zhihao Guo
,
Jianwei Zhuge
,
Jianjun Chen
,
Qiang Wei
,
Zehui Wu
,
Miao Yu
,
Hetian Shi
,
Qi Li
Demystifying the Security Implications in IoT Device Rental Services.
USENIX Security Symposium
(2024)
Meng Shen
,
Changyue Li
,
Hao Yu
,
Qi Li
,
Liehuang Zhu
,
Ke Xu
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Jinzhu Yan
,
Haotian Xu
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
,
Mingwei Xu
,
Jianping Wu
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
NSDI
(2024)
Xuanqi Liu
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
,
Mingwei Xu
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
CoRR
(2024)
Jinzhu Yan
,
Haotian Xu
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
,
Mingwei Xu
,
Jianping Wu
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
CoRR
(2024)
Ziqiang Wang
,
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Mengyuan Li
,
Ke Xu
,
Jianping Wu
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
CoRR
(2024)
Renjie Xie
,
Jiahao Cao
,
Yuxi Zhu
,
Yixiang Zhang
,
Yi He
,
Hanyi Peng
,
Yixiao Wang
,
Mingwei Xu
,
Kun Sun
,
Enhuan Dong
,
Qi Li
,
Menghao Zhang
,
Jiang Li
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Jie Wang
,
Kun Sun
,
Lingguang Lei
,
Yuewu Wang
,
Jiwu Jing
,
Shengye Wan
,
Qi Li
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Man Zhou
,
Yuting Zhou
,
Shuao Su
,
Qian Wang
,
Qi Li
,
Shengshan Hu
,
Chunwu Yu
,
Zhengxiong Li
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound.
IEEE Trans. Mob. Comput.
23 (6) (2024)
Qi Tan
,
Qi Li
,
Yi Zhao
,
Zhuotao Liu
,
Xiaobing Guo
,
Ke Xu
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
USENIX Security Symposium
(2024)
Yunlong Xing
,
Shu Wang
,
Shiyu Sun
,
Xu He
,
Kun Sun
,
Qi Li
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check.
USENIX Security Symposium
(2024)
Yuxiang Yang
,
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Ziqiang Wang
,
Ke Xu
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
CoRR
(2024)
Xu He
,
Shu Wang
,
Pengbin Feng
,
Xinda Wang
,
Shiyu Sun
,
Qi Li
,
Kun Sun
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
AsiaCCS
(2024)
Yihao Chen
,
Qilei Yin
,
Qi Li
,
Zhuotao Liu
,
Ke Xu
,
Yi Xu
,
Mingwei Xu
,
Ziqian Liu
,
Jianping Wu
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
CoRR
(2024)
Zhenhua Zou
,
Zhuotao Liu
,
Jinyong Shan
,
Qi Li
,
Ke Xu
,
Mingwei Xu
CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
IACR Cryptol. ePrint Arch.
2024 (2024)
Meng Shen
,
Changyue Li
,
Qi Li
,
Hao Lu
,
Liehuang Zhu
,
Ke Xu
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
USENIX Security Symposium
(2024)
Jianjin Zhao
,
Qi Li
,
Yueping Hong
,
Meng Shen
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning.
IEEE Trans. Netw. Serv. Manag.
21 (2) (2024)
Qifan Zhang
,
Xuesong Bai
,
Xiang Li
,
Haixin Duan
,
Qi Li
,
Zhou Li
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
USENIX Security Symposium
(2024)
Jialai Wang
,
Chao Zhang
,
Longfei Chen
,
Yi Rong
,
Yuxiao Wu
,
Hao Wang
,
Wende Tan
,
Qi Li
,
Zongpeng Li
Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features.
USENIX Security Symposium
(2024)
Xinhao Deng
,
Qi Li
,
Ke Xu
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
CoRR
(2024)
Sibo Yi
,
Yule Liu
,
Zhen Sun
,
Tianshuo Cong
,
Xinlei He
,
Jiaxing Song
,
Ke Xu
,
Qi Li
Jailbreak Attacks and Defenses Against Large Language Models: A Survey.
CoRR
(2024)
Zesen Liu
,
Tianshuo Cong
,
Xinlei He
,
Qi Li
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks.
CoRR
(2024)
Qi Tan
,
Qi Li
,
Yi Zhao
,
Zhuotao Liu
,
Xiaobing Guo
,
Ke Xu
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
CoRR
(2024)
Man Zhou
,
Wenyu Zhou
,
Jie Huang
,
Junhui Yang
,
Minxin Du
,
Qi Li
Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Yi He
,
Yuan Zhou
,
Yacong Gu
,
Purui Su
,
Qi Li
,
Yajin Zhou
,
Yong Jiang
JNI Global References Are Still Vulnerable: Attacks and Defenses.
CoRR
(2024)
Qiushi Li
,
Yan Zhang
,
Ju Ren
,
Qi Li
,
Yaoxue Zhang
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks.
CoRR
(2024)
Xiaohan Zhang
,
Jinwen Wang
,
Yueqiang Cheng
,
Qi Li
,
Kun Sun
,
Yao Zheng
,
Ning Zhang
,
Xinghua Li
Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw.
32 (1) (2024)
Yue Xiao
,
Yi He
,
Xiaoli Zhang
,
Qian Wang
,
Renjie Xie
,
Kun Sun
,
Ke Xu
,
Qi Li
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
CoRR
(2024)
Guangmeng Zhou
,
Qi Li
,
Yang Liu
,
Yi Zhao
,
Qi Tan
,
Su Yao
,
Ke Xu
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning.
IEEE/ACM Trans. Netw.
32 (3) (2024)
Yihao Chen
,
Qilei Yin
,
Qi Li
,
Zhuotao Liu
,
Ke Xu
,
Yi Xu
,
Mingwei Xu
,
Ziqian Liu
,
Jianping Wu
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
USENIX Security Symposium
(2024)
Yunjie Ge
,
Pinji Chen
,
Qian Wang
,
Lingchen Zhao
,
Ningping Mou
,
Peipei Jiang
,
Cong Wang
,
Qi Li
,
Chao Shen
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
USENIX Security Symposium
(2024)
Xiaoyu Zhang
,
Weipeng Jiang
,
Chao Shen
,
Qi Li
,
Qian Wang
,
Chenhao Lin
,
Xiaohong Guan
A Survey of Deep Learning Library Testing Methods.
CoRR
(2024)
Xijia Che
,
Yi He
,
Xuewei Feng
,
Kun Sun
,
Ke Xu
,
Qi Li
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
CoRR
(2024)
Yuhao Wu
,
Jinwen Wang
,
Yujie Wang
,
Shixuan Zhai
,
Zihan Li
,
Yi He
,
Kun Sun
,
Qi Li
,
Ning Zhang
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
USENIX Security Symposium
(2024)
Xiaoli Zhang
,
Wenxiang Sun
,
Zhicheng Xu
,
Hongbing Cheng
,
Chengjun Cai
,
Helei Cui
,
Qi Li
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Zheng Zheng
,
Qian Wang
,
Cong Wang
,
Man Zhou
,
Yi Zhao
,
Qi Li
,
Chao Shen
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Meng Shen
,
Ke Ye
,
Xingtong Liu
,
Liehuang Zhu
,
Jiawen Kang
,
Shui Yu
,
Qi Li
,
Ke Xu
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials
25 (1) (2023)
Mingxuan Liu
,
Zihan Zhang
,
Yiming Zhang
,
Chao Zhang
,
Zhou Li
,
Qi Li
,
Haixin Duan
,
Donghong Sun
Automatic Generation of Adversarial Readable Chinese Texts.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Dan Liu
,
Qian Wang
,
Man Zhou
,
Peipei Jiang
,
Qi Li
,
Chao Shen
,
Cong Wang
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Jialai Wang
,
Wenjie Qu
,
Yi Rong
,
Han Qiu
,
Qi Li
,
Zongpeng Li
,
Chao Zhang
MPass: Bypassing Learning-based Static Malware Detectors.
DAC
(2023)
Haibin Li
,
Yi Zhao
,
Wenbing Yao
,
Ke Xu
,
Qi Li
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction.
Sci. China Inf. Sci.
66 (5) (2023)
Qi Li
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
CoRR
(2023)
Yunjie Ge
,
Qian Wang
,
Jiayuan Yu
,
Chao Shen
,
Qi Li
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems.
IEEE Commun. Mag.
61 (12) (2023)
Xinghui Wu
,
Shiqing Ma
,
Chao Shen
,
Chenhao Lin
,
Qian Wang
,
Qi Li
,
Yuan Rao
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
USENIX Security Symposium
(2023)
Guangmeng Zhou
,
Zhuotao Liu
,
Chuanpu Fu
,
Qi Li
,
Ke Xu
An Efficient Design of Intelligent Network Data Plane.
USENIX Security Symposium
(2023)
Yunpeng Liu
,
Kexin Li
,
Zhuotao Liu
,
Bihan Wen
,
Ke Xu
,
Weiqiang Wang
,
Wenbiao Zhao
,
Qi Li
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification.
WWW
(2023)
Jiahui Chen
,
Yi Zhao
,
Qi Li
,
Xuewei Feng
,
Ke Xu
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Yi He
,
Yacong Gu
,
Purui Su
,
Kun Sun
,
Yajin Zhou
,
Zhi Wang
,
Qi Li
A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Chenhao Lin
,
Jingyi He
,
Chao Shen
,
Qi Li
,
Qian Wang
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput.
20 (3) (2023)
Renjie Xie
,
Jiahao Cao
,
Enhuan Dong
,
Mingwei Xu
,
Kun Sun
,
Qi Li
,
Licheng Shen
,
Menghao Zhang
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
USENIX Security Symposium
(2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Ke Xu
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
SP
(2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Ke Xu
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
ACM TUR-C
(2023)
Shu Wang
,
Xinda Wang
,
Kun Sun
,
Sushil Jajodia
,
Haining Wang
,
Qi Li
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
SP
(2023)
Xiaoliang Wang
,
Zhuotao Liu
,
Qi Li
,
Yangfei Guo
,
Sitong Ling
,
Jiangou Zhan
,
Yi Xu
,
Ke Xu
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments.
CoRR
(2023)
Xinhao Deng
,
Qilei Yin
,
Zhuotao Liu
,
Xiyuan Zhao
,
Qi Li
,
Mingwei Xu
,
Ke Xu
,
Jianping Wu
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
SP
(2023)
Jiahao Cao
,
Mingwei Xu
,
Qi Li
,
Kun Sun
,
Yuan Yang
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate.
IEEE/ACM Trans. Netw.
31 (3) (2023)
Xiang Li
,
Baojun Liu
,
Xuesong Bai
,
Mingming Zhang
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
NDSS
(2023)
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
The Maginot Line: Attacking the Boundary of DNS Caching Protection.
USENIX Security Symposium
(2023)
Meng Shen
,
Kexin Ji
,
Zhenbo Gao
,
Qi Li
,
Liehuang Zhu
,
Ke Xu
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
USENIX Security Symposium
(2023)
Qingyuan Gong
,
Yushan Liu
,
Jiayun Zhang
,
Yang Chen
,
Qi Li
,
Yu Xiao
,
Xin Wang
,
Pan Hui
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning.
IEEE Trans. Knowl. Data Eng.
35 (10) (2023)
Xiangyun Tang
,
Meng Shen
,
Qi Li
,
Liehuang Zhu
,
Tengfei Xue
,
Qiang Qu
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Chuanpu Fu
,
Qi Li
,
Meng Shen
,
Ke Xu
Frequency Domain Feature Based Robust Malicious Traffic Detection.
IEEE/ACM Trans. Netw.
31 (1) (2023)
Dongheng Zhang
,
Jia Meng
,
Jian Zhang
,
Xinzhe Deng
,
Shouhong Ding
,
Man Zhou
,
Qian Wang
,
Qi Li
,
Yan Chen
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices.
IEEE Trans. Circuits Syst. Video Technol.
33 (8) (2023)
Zhengyu Zhao
,
Hanwei Zhang
,
Renjue Li
,
Ronan Sicre
,
Laurent Amsaleg
,
Michael Backes
,
Qi Li
,
Chao Shen
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR
(2023)
Chuanpu Fu
,
Qi Li
,
Ke Xu
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
NDSS
(2023)
Jialai Wang
,
Ziyuan Zhang
,
Meiqi Wang
,
Han Qiu
,
Tianwei Zhang
,
Qi Li
,
Zongpeng Li
,
Tao Wei
,
Chao Zhang
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
USENIX Security Symposium
(2023)
Songtao Fu
,
Qi Li
,
Min Zhu
,
Xiaoliang Wang
,
Su Yao
,
Yangfei Guo
,
Xinle Du
,
Ke Xu
MASK: Practical Source and Path Verification Based on Multi-AS-Key.
IEEE/ACM Trans. Netw.
31 (4) (2023)
Yuqi Qing
,
Qilei Yin
,
Xinhao Deng
,
Yihao Chen
,
Zhuotao Liu
,
Kun Sun
,
Ke Xu
,
Jia Zhang
,
Qi Li
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR
(2023)
Yi He
,
Roland Guo
,
Yunlong Xing
,
Xijia Che
,
Kun Sun
,
Zhuotao Liu
,
Ke Xu
,
Qi Li
Cross Container Attacks: The Bewildered eBPF on Clouds.
USENIX Security Symposium
(2023)
Peipei Jiang
,
Qian Wang
,
Xiu Lin
,
Man Zhou
,
Wenbing Ding
,
Cong Wang
,
Chao Shen
,
Qi Li
Securing Liveness Detection for Voice Authentication via Pop Noises.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Man Zhou
,
Qian Wang
,
Xiu Lin
,
Yi Zhao
,
Peipei Jiang
,
Qi Li
,
Chao Shen
,
Cong Wang
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Bingyu Li
,
Jingqiang Lin
,
Fengjun Li
,
Qiongxiao Wang
,
Wei Wang
,
Qi Li
,
Guangshen Cheng
,
Jiwu Jing
,
Congli Wang
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw.
30 (2) (2022)
Qi Li
,
Xinhao Deng
,
Zhuotao Liu
,
Yuan Yang
,
Xiaoyue Zou
,
Qian Wang
,
Mingwei Xu
,
Jianping Wu
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Lingchen Zhao
,
Jianlin Jiang
,
Bo Feng
,
Qian Wang
,
Chao Shen
,
Qi Li
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Qilei Yin
,
Zhuotao Liu
,
Qi Li
,
Tao Wang
,
Qian Wang
,
Chao Shen
,
Yixiao Xu
An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Renjie Xie
,
Jiahao Cao
,
Qi Li
,
Kun Sun
,
Guofei Gu
,
Mingwei Xu
,
Yuan Yang
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw.
30 (5) (2022)
Chenhao Lin
,
Jingyi Deng
,
Pengbin Hu
,
Chao Shen
,
Qian Wang
,
Qi Li
Towards Benchmarking and Evaluating Deepfake Detection.
CoRR
(2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Zhiyun Qian
,
Gang Zhao
,
Xiaohui Kuang
,
Chuanpu Fu
,
Ke Xu
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
USENIX Security Symposium
(2022)
Zijie Yang
,
Jiahao Cao
,
Zhuotao Liu
,
Xiaoli Zhang
,
Kun Sun
,
Qi Li
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Xu He
,
Jiahao Cao
,
Shu Wang
,
Kun Sun
,
Lisong Xu
,
Qi Li
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
INFOCOM
(2022)
Yi Zhao
,
Ke Xu
,
Qi Li
,
Haiyang Wang
,
Dan Wang
,
Min Zhu
Intelligent networking in adversarial environment: challenges and opportunities.
Sci. China Inf. Sci.
65 (7) (2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Chuanpu Fu
,
Ke Xu
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw.
30 (1) (2022)
Rémi Badonnel
,
Carol J. Fung
,
Sandra Scott-Hayward
,
Qi Li
,
Fulvio Valenza
,
Cristian Hesselman
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag.
19 (3) (2022)
Peiyang Li
,
Ye Wang
,
Zhuotao Liu
,
Ke Xu
,
Qian Wang
,
Chao Shen
,
Qi Li
Verifying the Quality of Outsourced Training on Clouds.
ESORICS (2)
(2022)
Haoda Li
,
Qiyang Song
,
Guoliang Li
,
Qi Li
,
Rengui Wang
GPSC: A Grid-Based Privacy-Reserving Framework for Online Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng.
34 (11) (2022)
Hai Huang
,
Zhikun Zhang
,
Yun Shen
,
Michael Backes
,
Qi Li
,
Yang Zhang
On the Privacy Risks of Cell-Based NAS Architectures.
CCS
(2022)
Yunlong Xing
,
Jiahao Cao
,
Xinda Wang
,
Sadegh Torabi
,
Kun Sun
,
Fei Yan
,
Qi Li
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
CNS
(2022)
Ruoyi Zhang
,
Jing Deng
,
Qi Li
,
Xinlei Xie
,
Qingyuan Gong
,
Chao Zhu
FlyLISL: Traffic Balance Awared Routing for Large-scale Mixed-Reality Telepresence over Reconfigurable Mega-Constellation.
ICDCS Workshops
(2022)
Songtao Fu
,
Qi Li
,
Xiaoliang Wang
,
Su Yao
,
Xuewei Feng
,
Ziqiang Wang
,
Xinle Du
,
Kao Wan
,
Ke Xu
D3: Lightweight Secure Fault Localization in Edge Cloud.
ICDCS
(2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Ke Xu
,
Baojun Liu
,
Xiaofeng Zheng
,
Qiushi Yang
,
Haixin Duan
,
Zhiyun Qian
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
NDSS
(2022)
Songsong Liu
,
Pengbin Feng
,
Jiahao Cao
,
Xu He
,
Tommy Chin
,
Kun Sun
,
Qi Li
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
DIMVA
(2022)
Yike Zhan
,
Baolin Zheng
,
Qian Wang
,
Ningping Mou
,
Binqing Guo
,
Qi Li
,
Chao Shen
,
Cong Wang
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
ICME
(2022)
Yi He
,
Yuan Zhou
,
Yajin Zhou
,
Qi Li
,
Kun Sun
,
Yacong Gu
,
Yong Jiang
JNI Global References Are Still Vulnerable: Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput.
19 (1) (2022)
Pengfei Wu
,
Qi Li
,
Jianting Ning
,
Xinyi Huang
,
Wei Wu
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Jie Sun
,
Lingchen Zhao
,
Zhuotao Liu
,
Qi Li
,
Xinhao Deng
,
Qian Wang
,
Yong Jiang
Practical differentially private online advertising.
Comput. Secur.
112 (2022)
Guoqiang Zhang
,
Jiahao Cao
,
Mingwei Xu
,
Qi Li
Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection.
HPCC/DSS/SmartCity/DependSys
(2022)
Jiahui Chen
,
Yi Zhao
,
Qi Li
,
Ke Xu
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR
(2022)
Hai Huang
,
Zhikun Zhang
,
Yun Shen
,
Michael Backes
,
Qi Li
,
Yang Zhang
On the Privacy Risks of Cell-Based NAS Architectures.
CoRR
(2022)
Zhuotao Liu
,
Yangxi Xiang
,
Jian Shi
,
Peng Gao
,
Haoyu Wang
,
Xusheng Xiao
,
Bihan Wen
,
Qi Li
,
Yih-Chun Hu
Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)