Sign in
Qi Li
ORCID
Publication Activity (10 Years)
Years Active: 2005-2024
Publications (10 Years): 214
Top Topics
Acoustic Signals
Deep Learning
Malicious Traffic
Lightweight
Top Venues
CoRR
IEEE Trans. Dependable Secur. Comput.
IEEE/ACM Trans. Netw.
IEEE Trans. Inf. Forensics Secur.
</>
Publications
</>
Jie Wang
,
Kun Sun
,
Lingguang Lei
,
Yuewu Wang
,
Jiwu Jing
,
Shengye Wan
,
Qi Li
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms.
IEEE Trans. Dependable Secur. Comput.
21 (1) (2024)
Xiaohan Zhang
,
Jinwen Wang
,
Yueqiang Cheng
,
Qi Li
,
Kun Sun
,
Yao Zheng
,
Ning Zhang
,
Xinghua Li
Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw.
32 (1) (2024)
Xiaoli Zhang
,
Wenxiang Sun
,
Zhicheng Xu
,
Hongbing Cheng
,
Chengjun Cai
,
Helei Cui
,
Qi Li
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Zheng Zheng
,
Qian Wang
,
Cong Wang
,
Man Zhou
,
Yi Zhao
,
Qi Li
,
Chao Shen
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Meng Shen
,
Ke Ye
,
Xingtong Liu
,
Liehuang Zhu
,
Jiawen Kang
,
Shui Yu
,
Qi Li
,
Ke Xu
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials
25 (1) (2023)
Mingxuan Liu
,
Zihan Zhang
,
Yiming Zhang
,
Chao Zhang
,
Zhou Li
,
Qi Li
,
Haixin Duan
,
Donghong Sun
Automatic Generation of Adversarial Readable Chinese Texts.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Dan Liu
,
Qian Wang
,
Man Zhou
,
Peipei Jiang
,
Qi Li
,
Chao Shen
,
Cong Wang
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Jialai Wang
,
Wenjie Qu
,
Yi Rong
,
Han Qiu
,
Qi Li
,
Zongpeng Li
,
Chao Zhang
MPass: Bypassing Learning-based Static Malware Detectors.
DAC
(2023)
Haibin Li
,
Yi Zhao
,
Wenbing Yao
,
Ke Xu
,
Qi Li
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction.
Sci. China Inf. Sci.
66 (5) (2023)
Qi Li
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
CoRR
(2023)
Yunjie Ge
,
Qian Wang
,
Jiayuan Yu
,
Chao Shen
,
Qi Li
Data Poisoning and Backdoor Attacks on Audio Intelligence Systems.
IEEE Commun. Mag.
61 (12) (2023)
Xinghui Wu
,
Shiqing Ma
,
Chao Shen
,
Chenhao Lin
,
Qian Wang
,
Qi Li
,
Yuan Rao
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
USENIX Security Symposium
(2023)
Guangmeng Zhou
,
Zhuotao Liu
,
Chuanpu Fu
,
Qi Li
,
Ke Xu
An Efficient Design of Intelligent Network Data Plane.
USENIX Security Symposium
(2023)
Yunpeng Liu
,
Kexin Li
,
Zhuotao Liu
,
Bihan Wen
,
Ke Xu
,
Weiqiang Wang
,
Wenbiao Zhao
,
Qi Li
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification.
WWW
(2023)
Jiahui Chen
,
Yi Zhao
,
Qi Li
,
Xuewei Feng
,
Ke Xu
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Yi He
,
Yacong Gu
,
Purui Su
,
Kun Sun
,
Yajin Zhou
,
Zhi Wang
,
Qi Li
A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Chenhao Lin
,
Jingyi He
,
Chao Shen
,
Qi Li
,
Qian Wang
CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics.
IEEE Trans. Dependable Secur. Comput.
20 (3) (2023)
Renjie Xie
,
Jiahao Cao
,
Enhuan Dong
,
Mingwei Xu
,
Kun Sun
,
Qi Li
,
Licheng Shen
,
Menghao Zhang
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
USENIX Security Symposium
(2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Ke Xu
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
SP
(2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Ke Xu
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
ACM TUR-C
(2023)
Shu Wang
,
Xinda Wang
,
Kun Sun
,
Sushil Jajodia
,
Haining Wang
,
Qi Li
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
SP
(2023)
Xiaoliang Wang
,
Zhuotao Liu
,
Qi Li
,
Yangfei Guo
,
Sitong Ling
,
Jiangou Zhan
,
Yi Xu
,
Ke Xu
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments.
CoRR
(2023)
Xinhao Deng
,
Qilei Yin
,
Zhuotao Liu
,
Xiyuan Zhao
,
Qi Li
,
Mingwei Xu
,
Ke Xu
,
Jianping Wu
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
SP
(2023)
Jiahao Cao
,
Mingwei Xu
,
Qi Li
,
Kun Sun
,
Yuan Yang
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate.
IEEE/ACM Trans. Netw.
31 (3) (2023)
Xiang Li
,
Baojun Liu
,
Xuesong Bai
,
Mingming Zhang
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
NDSS
(2023)
Xiang Li
,
Chaoyi Lu
,
Baojun Liu
,
Qifan Zhang
,
Zhou Li
,
Haixin Duan
,
Qi Li
The Maginot Line: Attacking the Boundary of DNS Caching Protection.
USENIX Security Symposium
(2023)
Meng Shen
,
Kexin Ji
,
Zhenbo Gao
,
Qi Li
,
Liehuang Zhu
,
Ke Xu
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
USENIX Security Symposium
(2023)
Qingyuan Gong
,
Yushan Liu
,
Jiayun Zhang
,
Yang Chen
,
Qi Li
,
Yu Xiao
,
Xin Wang
,
Pan Hui
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning.
IEEE Trans. Knowl. Data Eng.
35 (10) (2023)
Xiangyun Tang
,
Meng Shen
,
Qi Li
,
Liehuang Zhu
,
Tengfei Xue
,
Qiang Qu
PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Chuanpu Fu
,
Qi Li
,
Meng Shen
,
Ke Xu
Frequency Domain Feature Based Robust Malicious Traffic Detection.
IEEE/ACM Trans. Netw.
31 (1) (2023)
Dongheng Zhang
,
Jia Meng
,
Jian Zhang
,
Xinzhe Deng
,
Shouhong Ding
,
Man Zhou
,
Qian Wang
,
Qi Li
,
Yan Chen
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices.
IEEE Trans. Circuits Syst. Video Technol.
33 (8) (2023)
Zhengyu Zhao
,
Hanwei Zhang
,
Renjue Li
,
Ronan Sicre
,
Laurent Amsaleg
,
Michael Backes
,
Qi Li
,
Chao Shen
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR
(2023)
Chuanpu Fu
,
Qi Li
,
Ke Xu
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
NDSS
(2023)
Jialai Wang
,
Ziyuan Zhang
,
Meiqi Wang
,
Han Qiu
,
Tianwei Zhang
,
Qi Li
,
Zongpeng Li
,
Tao Wei
,
Chao Zhang
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
USENIX Security Symposium
(2023)
Songtao Fu
,
Qi Li
,
Min Zhu
,
Xiaoliang Wang
,
Su Yao
,
Yangfei Guo
,
Xinle Du
,
Ke Xu
MASK: Practical Source and Path Verification Based on Multi-AS-Key.
IEEE/ACM Trans. Netw.
31 (4) (2023)
Yuqi Qing
,
Qilei Yin
,
Xinhao Deng
,
Yihao Chen
,
Zhuotao Liu
,
Kun Sun
,
Ke Xu
,
Jia Zhang
,
Qi Li
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR
(2023)
Yi He
,
Roland Guo
,
Yunlong Xing
,
Xijia Che
,
Kun Sun
,
Zhuotao Liu
,
Ke Xu
,
Qi Li
Cross Container Attacks: The Bewildered eBPF on Clouds.
USENIX Security Symposium
(2023)
Peipei Jiang
,
Qian Wang
,
Xiu Lin
,
Man Zhou
,
Wenbing Ding
,
Cong Wang
,
Chao Shen
,
Qi Li
Securing Liveness Detection for Voice Authentication via Pop Noises.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Man Zhou
,
Qian Wang
,
Xiu Lin
,
Yi Zhao
,
Peipei Jiang
,
Qi Li
,
Chao Shen
,
Cong Wang
PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Bingyu Li
,
Jingqiang Lin
,
Fengjun Li
,
Qiongxiao Wang
,
Wei Wang
,
Qi Li
,
Guangshen Cheng
,
Jiwu Jing
,
Congli Wang
The Invisible Side of Certificate Transparency: Exploring the Reliability of Monitors in the Wild.
IEEE/ACM Trans. Netw.
30 (2) (2022)
Qi Li
,
Xinhao Deng
,
Zhuotao Liu
,
Yuan Yang
,
Xiaoyue Zou
,
Qian Wang
,
Mingwei Xu
,
Jianping Wu
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Lingchen Zhao
,
Jianlin Jiang
,
Bo Feng
,
Qian Wang
,
Chao Shen
,
Qi Li
SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Qilei Yin
,
Zhuotao Liu
,
Qi Li
,
Tao Wang
,
Qian Wang
,
Chao Shen
,
Yixiao Xu
An Automated Multi-Tab Website Fingerprinting Attack.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Renjie Xie
,
Jiahao Cao
,
Qi Li
,
Kun Sun
,
Guofei Gu
,
Mingwei Xu
,
Yuan Yang
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw.
30 (5) (2022)
Chenhao Lin
,
Jingyi Deng
,
Pengbin Hu
,
Chao Shen
,
Qian Wang
,
Qi Li
Towards Benchmarking and Evaluating Deepfake Detection.
CoRR
(2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Zhiyun Qian
,
Gang Zhao
,
Xiaohui Kuang
,
Chuanpu Fu
,
Ke Xu
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
USENIX Security Symposium
(2022)
Zijie Yang
,
Jiahao Cao
,
Zhuotao Liu
,
Xiaoli Zhang
,
Kun Sun
,
Qi Li
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur.
17 (2022)
Xu He
,
Jiahao Cao
,
Shu Wang
,
Kun Sun
,
Lisong Xu
,
Qi Li
Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
INFOCOM
(2022)
Yi Zhao
,
Ke Xu
,
Qi Li
,
Haiyang Wang
,
Dan Wang
,
Min Zhu
Intelligent networking in adversarial environment: challenges and opportunities.
Sci. China Inf. Sci.
65 (7) (2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Chuanpu Fu
,
Ke Xu
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw.
30 (1) (2022)
Rémi Badonnel
,
Carol J. Fung
,
Sandra Scott-Hayward
,
Qi Li
,
Fulvio Valenza
,
Cristian Hesselman
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag.
19 (3) (2022)
Peiyang Li
,
Ye Wang
,
Zhuotao Liu
,
Ke Xu
,
Qian Wang
,
Chao Shen
,
Qi Li
Verifying the Quality of Outsourced Training on Clouds.
ESORICS (2)
(2022)
Haoda Li
,
Qiyang Song
,
Guoliang Li
,
Qi Li
,
Rengui Wang
GPSC: A Grid-Based Privacy-Reserving Framework for Online Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng.
34 (11) (2022)
Hai Huang
,
Zhikun Zhang
,
Yun Shen
,
Michael Backes
,
Qi Li
,
Yang Zhang
On the Privacy Risks of Cell-Based NAS Architectures.
CCS
(2022)
Yunlong Xing
,
Jiahao Cao
,
Xinda Wang
,
Sadegh Torabi
,
Kun Sun
,
Fei Yan
,
Qi Li
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
CNS
(2022)
Ruoyi Zhang
,
Jing Deng
,
Qi Li
,
Xinlei Xie
,
Qingyuan Gong
,
Chao Zhu
FlyLISL: Traffic Balance Awared Routing for Large-scale Mixed-Reality Telepresence over Reconfigurable Mega-Constellation.
ICDCS Workshops
(2022)
Songtao Fu
,
Qi Li
,
Xiaoliang Wang
,
Su Yao
,
Xuewei Feng
,
Ziqiang Wang
,
Xinle Du
,
Kao Wan
,
Ke Xu
D3: Lightweight Secure Fault Localization in Edge Cloud.
ICDCS
(2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Ke Xu
,
Baojun Liu
,
Xiaofeng Zheng
,
Qiushi Yang
,
Haixin Duan
,
Zhiyun Qian
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
NDSS
(2022)
Songsong Liu
,
Pengbin Feng
,
Jiahao Cao
,
Xu He
,
Tommy Chin
,
Kun Sun
,
Qi Li
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
DIMVA
(2022)
Yike Zhan
,
Baolin Zheng
,
Qian Wang
,
Ningping Mou
,
Binqing Guo
,
Qi Li
,
Chao Shen
,
Cong Wang
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems.
ICME
(2022)
Yi He
,
Yuan Zhou
,
Yajin Zhou
,
Qi Li
,
Kun Sun
,
Yacong Gu
,
Yong Jiang
JNI Global References Are Still Vulnerable: Attacks and Defenses.
IEEE Trans. Dependable Secur. Comput.
19 (1) (2022)
Pengfei Wu
,
Qi Li
,
Jianting Ning
,
Xinyi Huang
,
Wei Wu
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Jie Sun
,
Lingchen Zhao
,
Zhuotao Liu
,
Qi Li
,
Xinhao Deng
,
Qian Wang
,
Yong Jiang
Practical differentially private online advertising.
Comput. Secur.
112 (2022)
Guoqiang Zhang
,
Jiahao Cao
,
Mingwei Xu
,
Qi Li
Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection.
HPCC/DSS/SmartCity/DependSys
(2022)
Jiahui Chen
,
Yi Zhao
,
Qi Li
,
Ke Xu
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR
(2022)
Hai Huang
,
Zhikun Zhang
,
Yun Shen
,
Michael Backes
,
Qi Li
,
Yang Zhang
On the Privacy Risks of Cell-Based NAS Architectures.
CoRR
(2022)
Zhuotao Liu
,
Yangxi Xiang
,
Jian Shi
,
Peng Gao
,
Haoyu Wang
,
Xusheng Xiao
,
Bihan Wen
,
Qi Li
,
Yih-Chun Hu
Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput.
19 (5) (2022)
Yi He
,
Zhenhua Zou
,
Kun Sun
,
Zhuotao Liu
,
Ke Xu
,
Qian Wang
,
Chao Shen
,
Zhi Wang
,
Qi Li
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
USENIX Security Symposium
(2022)
Qiyang Song
,
Jiahao Cao
,
Kun Sun
,
Qi Li
,
Ke Xu
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
ACSAC
(2021)
Jiaming Mu
,
Binghui Wang
,
Qi Li
,
Kun Sun
,
Mingwei Xu
,
Zhuotao Liu
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
CoRR
(2021)
Meng Shen
,
Hao Yu
,
Liehuang Zhu
,
Ke Xu
,
Qi Li
,
Jiankun Hu
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Peipei Jiang
,
Qian Wang
,
Muqi Huang
,
Cong Wang
,
Qi Li
,
Chao Shen
,
Kui Ren
Building In-the-Cloud Network Functions: Security and Privacy Challenges.
Proc. IEEE
109 (12) (2021)
Chuanpu Fu
,
Qi Li
,
Meng Shen
,
Ke Xu
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
CCS
(2021)
Xiao Liang
,
Zheng Yang
,
Binghui Wang
,
Shaofeng Hu
,
Zijie Yang
,
Dong Yuan
,
Neil Zhenqiang Gong
,
Qi Li
,
Fang He
Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach.
KDD
(2021)
Zeyu Zhang
,
Xiaoli Zhang
,
Qi Li
,
Kun Sun
,
Yinqian Zhang
,
Songsong Liu
,
Yukun Liu
,
Xiaoning Li
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
AsiaCCS
(2021)
Baolin Zheng
,
Peipei Jiang
,
Qian Wang
,
Qi Li
,
Chao Shen
,
Cong Wang
,
Yunjie Ge
,
Qingyang Teng
,
Shenyi Zhang
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
CCS
(2021)
Dian Chen
,
Hongxin Hu
,
Qian Wang
,
Yinli Li
,
Cong Wang
,
Chao Shen
,
Qi Li
CARTL: Cooperative Adversarially-Robust Transfer Learning.
CoRR
(2021)
Man Zhou
,
Qian Wang
,
Jingxiao Yang
,
Qi Li
,
Peipei Jiang
,
Yanjiao Chen
,
Zhibo Wang
Stealing Your Android Patterns via Acoustic Signals.
IEEE Trans. Mob. Comput.
20 (4) (2021)
Songtao Fu
,
Ke Xu
,
Qi Li
,
Xiaoliang Wang
,
Su Yao
,
Yangfei Guo
,
Xinle Du
MASK: Practical Source and Path Verification based on Multi-AS-Key.
IWQoS
(2021)
Nan Geng
,
Mingwei Xu
,
Yuan Yang
,
Chenyi Liu
,
Jiahai Yang
,
Qi Li
,
Shize Zhang
Distributed and Adaptive Traffic Engineering with Deep Reinforcement Learning.
IWQoS
(2021)
Qian Wang
,
Baolin Zheng
,
Qi Li
,
Chao Shen
,
Zhongjie Ba
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Hai Huang
,
Jiaming Mu
,
Neil Zhenqiang Gong
,
Qi Li
,
Bin Liu
,
Mingwei Xu
Data Poisoning Attacks to Deep Learning Based Recommender Systems.
CoRR
(2021)
Guangmeng Zhou
,
Ke Xu
,
Qi Li
,
Yang Liu
,
Yi Zhao
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning.
CoRR
(2021)
Shangqi Lai
,
Xingliang Yuan
,
Joseph K. Liu
,
Xun Yi
,
Qi Li
,
Dongxi Liu
,
Surya Nepal
OblivSketch: Oblivious Network Measurement as a Cloud Service.
NDSS
(2021)
Rémi Badonnel
,
Carol Fung
,
Sandra Scott-Hayward
,
Qi Li
,
Jie Zhang
,
Cristian Hesselman
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services.
IEEE Trans. Netw. Serv. Manag.
18 (2) (2021)
Zhuotao Liu
,
Hao Zhao
,
Sainan Li
,
Qi Li
,
Tao Wei
,
Yu Wang
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
AsiaCCS
(2021)
Yunjie Ge
,
Qian Wang
,
Baolin Zheng
,
Xinlu Zhuang
,
Qi Li
,
Chao Shen
,
Cong Wang
Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation.
ACM Multimedia
(2021)
Lingchen Zhao
,
Qian Wang
,
Cong Wang
,
Qi Li
,
Chao Shen
,
Bo Feng
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
IEEE Trans. Parallel Distributed Syst.
32 (10) (2021)
Meng Shen
,
Huan Wang
,
Bin Zhang
,
Liehuang Zhu
,
Ke Xu
,
Qi Li
,
Xiaojiang Du
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J.
8 (4) (2021)
Guanyu Li
,
Menghao Zhang
,
Shicheng Wang
,
Chang Liu
,
Mingwei Xu
,
Ang Chen
,
Hongxin Hu
,
Guofei Gu
,
Qi Li
,
Jianping Wu
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw.
29 (4) (2021)
Jie Sun
,
Qi Li
,
Yong Jiang
Privacy-Preserving Convex Factorization Machine.
IJCNN
(2021)
Peng Zhang
,
Fangzheng Zhang
,
Shimin Xu
,
Zuoru Yang
,
Hao Li
,
Qi Li
,
Huanzhao Wang
,
Chao Shen
,
Chengchen Hu
Network-Wide Forwarding Anomaly Detection and Localization in Software Defined Networks.
IEEE/ACM Trans. Netw.
29 (1) (2021)
Man Zhou
,
Qian Wang
,
Qi Li
,
Peipei Jiang
,
Jingxiao Yang
,
Chao Shen
,
Cong Wang
,
Shouhong Ding
Securing Face Liveness Detection Using Unforgeable Lip Motion Patterns.
CoRR
(2021)
Chalee Vorakulpipat
,
Ryan K. L. Ko
,
Qi Li
,
Ahmed Meddahi
Security and Privacy in Smart Cities.
Secur. Commun. Networks
2021 (2021)
Xiaoli Zhang
,
Qi Li
,
Zeyu Zhang
,
Jianping Wu
,
Jiahai Yang
vSFC: Generic and Agile Verification of Service Function Chains in the Cloud.
IEEE/ACM Trans. Netw.
29 (1) (2021)
Hai Huang
,
Jiaming Mu
,
Neil Zhenqiang Gong
,
Qi Li
,
Bin Liu
,
Mingwei Xu
Data Poisoning Attacks to Deep Learning Based Recommender Systems.
NDSS
(2021)
Fengting Li
,
Xuankai Liu
,
Xiaoli Zhang
,
Qi Li
,
Kun Sun
,
Kang Li
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.
INFOCOM
(2021)
Baolin Zheng
,
Peipei Jiang
,
Qian Wang
,
Qi Li
,
Chao Shen
,
Cong Wang
,
Yunjie Ge
,
Qingyang Teng
,
Shenyi Zhang
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
CoRR
(2021)
Jiaming Mu
,
Binghui Wang
,
Qi Li
,
Kun Sun
,
Mingwei Xu
,
Zhuotao Liu
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
CCS
(2021)
Zijie Yang
,
Binghui Wang
,
Haoran Li
,
Dong Yuan
,
Zhuotao Liu
,
Neil Zhenqiang Gong
,
Chang Liu
,
Qi Li
,
Xiao Liang
,
Shaofeng Hu
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
ACSAC
(2021)