What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Qi Li
Google Scholar
107
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Graph Learning on Instruction Stream-Augmented CFG for Malware Variant Detection.
Jiaxin Mi
Qi Li
Zewei Han
Weilue Liao
Junsong Fu
2025
journals/tifs
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout.
Jingjing Xue
Sheng Sun
Min Liu
Qi Li
Ke Xu
2025
journals/tifs
ReTrial: Robust Encrypted Malicious Traffic Detection via Discriminative Relation Incorporation and Misleading Relation Correction.
Jianjin Zhao
Qi Li
Zewei Han
Junsong Fu
Guoshun Nan
Meng Shen
Bharat K. Bhargava
2025
conf/sp
TrafficFormer: An Efficient Pre-trained Model for Traffic Data.
Guangmeng Zhou
Xiongwen Guo
Zhuotao Liu
Tong Li
Qi Li
Ke Xu
2025
conf/ndss
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
Ziqiang Wang
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Mengyuan Li
Ganqiu Du
Ke Xu
Jianping Wu
2025
conf/ndss
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
Xuewei Feng
Yuxiang Yang
Qi Li
Xingxiang Zhan
Kun Sun
Ziqiang Wang
Ao Wang
Ganqiu Du
Ke Xu
2025
journals/tifs
VPGFuzz: Vulnerable Path-Guided Greybox Fuzzing.
Zhechao Lin
Jiahao Cao
Xinda Wang
Renjie Xie
Yuxi Zhu
Xiao Li
Qi Li
Yangyang Wang
Mingwei Xu
2025
conf/asiaccs
OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access.
Viet Vo
Shangqi Lai
Xingliang Yuan
Surya Nepal
Qi Li
2025
conf/uss
DISPATCH: Unraveling Security Patches from Entangled Code Changes.
Shiyu Sun
Yunlong Xing
Xinda Wang
Shu Wang
Qi Li
Kun Sun
2025
conf/uss
The Silent Danger in HTTP: Identifying HTTP Desync Vulnerabilities with Gray-box Testing.
Keran Mu
Jianjun Chen
Jianwei Zhuge
Qi Li
Haixin Duan
Nick Feamster
2024
journals/tifs
Stealthy and Effective Physical Adversarial Attacks in Autonomous Driving.
Man Zhou
Wenyu Zhou
Jie Huang
Junhui Yang
Minxin Du
Qi Li
2024
journals/tifs
Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side.
Renjie Xie
Jiahao Cao
Yuxi Zhu
Yixiang Zhang
Yi He
Hanyi Peng
Yixiao Wang
Mingwei Xu
Kun Sun
Enhuan Dong
Qi Li
Menghao Zhang
Jiang Li
2024
journals/tifs
EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention.
Xiaoli Zhang
Wenxiang Sun
Zhicheng Xu
Hongbing Cheng
Chengjun Cai
Helei Cui
Qi Li
2024
conf/ccs
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems.
Zheng Fang
Tao Wang
Lingchen Zhao
Shenyi Zhang
Bowen Li
Yunjie Ge
Qi Li
Chao Shen
Qian Wang
2024
conf/ccs
AACD '24: 11th ACM Workshop on Adaptive and Autonomous Cyber Defense.
Neil Gong
Qi Li
Xiaoli Zhang
2024
conf/ccs
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Xinhao Deng
Qi Li
Ke Xu
2024
conf/ccs
RISiren: Wireless Sensing System Attacks via Metasurface.
Chenghan Jiang
Jinjiang Yang
Xinyi Li
Qi Li
Xinyu Zhang
Ju Ren
2024
conf/ccs
CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
Zhenhua Zou
Zhuotao Liu
Jinyong Shan
Qi Li
Ke Xu
Mingwei Xu
2024
conf/ccs
Towards Fine-Grained Webpage Fingerprinting at Scale.
Xiyuan Zhao
Xinhao Deng
Qi Li
Yunpeng Liu
Zhuotao Liu
Kun Sun
Ke Xu
2024
conf/ccs
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns.
Chuanpu Fu
Qi Li
Meng Shen
Ke Xu
2024
conf/ccs
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
Xijia Che
Yi He
Xuewei Feng
Kun Sun
Ke Xu
Qi Li
2024
conf/uss
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
Yihao Chen
Qilei Yin
Qi Li
Zhuotao Liu
Ke Xu
Yi Xu
Mingwei Xu
Ziqian Liu
Jianping Wu
2024
conf/uss
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Meng Shen
Changyue Li
Qi Li
Hao Lu
Liehuang Zhu
Ke Xu
2024
conf/uss
Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features.
Jialai Wang
Chao Zhang
Longfei Chen
Yi Rong
Yuxiao Wu
Hao Wang
Wende Tan
Qi Li
Zongpeng Li
2024
conf/uss
What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check.
Yunlong Xing
Shu Wang
Shiyu Sun
Xu He
Kun Sun
Qi Li
2024
conf/uss
Hijacking Attacks against Neural Network by Analyzing Training Data.
Yunjie Ge
Qian Wang
Huayang Huang
Qi Li
Cong Wang
Chao Shen
Lingchen Zhao
Peipei Jiang
Zheng Fang
Shenyi Zhang
2024
conf/uss
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities.
Yuhao Wu
Jinwen Wang
Yujie Wang
Shixuan Zhai
Zihan Li
Yi He
Kun Sun
Qi Li
Ning Zhang
2024
conf/uss
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Qi Tan
Qi Li
Yi Zhao
Zhuotao Liu
Xiaobing Guo
Ke Xu
2024
conf/uss
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing.
Qifan Zhang
Xuesong Bai
Xiang Li
Haixin Duan
Qi Li
Zhou Li
2024
conf/uss
Demystifying the Security Implications in IoT Device Rental Services.
Yi He
Yunchao Guan
Ruoyu Lun
Shangru Song
Zhihao Guo
Jianwei Zhuge
Jianjun Chen
Qiang Wei
Zehui Wu
Miao Yu
Hetian Shi
Qi Li
2024
conf/uss
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor.
Yunjie Ge
Pinji Chen
Qian Wang
Lingchen Zhao
Ningping Mou
Peipei Jiang
Cong Wang
Qi Li
Chao Shen
2024
conf/sp
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Xiang Li
Wei Xu
Baojun Liu
Mingming Zhang
Zhou Li
Jia Zhang
Deliang Chang
Xiaofeng Zheng
Chuhan Wang
Jianjun Chen
Haixin Duan
Qi Li
2024
conf/sp
DNSBomb: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses.
Xiang Li
Dashuai Wu
Haixin Duan
Qi Li
2024
conf/sp
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
Meng Shen
Kexin Ji
Jinhe Wu
Qi Li
Xiangdong Kong
Ke Xu
Liehuang Zhu
2024
conf/sp
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification.
Bang Wu
Xingliang Yuan
Shuo Wang
Qi Li
Minhui Xue
Shirui Pan
2024
conf/asiaccs
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
Xu He
Shu Wang
Pengbin Feng
Xinda Wang
Shiyu Sun
Qi Li
Kun Sun
2024
conf/ndss
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Yuqi Qing
Qilei Yin
Xinhao Deng
Yihao Chen
Zhuotao Liu
Kun Sun
Ke Xu
Jia Zhang
Qi Li
2024
conf/ndss
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository.
Yingying Su
Dan Li
Li Chen
Qi Li
Sitong Ling
2024
conf/ndss
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound.
Man Zhou
Shuao Su
Qian Wang
Qi Li
Yuting Zhou
Xiaojing Ma
Zhengxiong Li
2024
conf/ndss
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Yue Xiao
Yi He
Xiaoli Zhang
Qian Wang
Renjie Xie
Kun Sun
Ke Xu
Qi Li
2024
conf/ndss
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Xuanqi Liu
Zhuotao Liu
Qi Li
Ke Xu
Mingwei Xu
2024
conf/ndss
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks.
Qiushi Li
Yan Zhang
Ju Ren
Qi Li
Yaoxue Zhang
2024
conf/ndss
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks.
Shu Wang
Kun Sun
Qi Li
2024
conf/ndss
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
Yuxiang Yang
Xuewei Feng
Qi Li
Kun Sun
Ziqiang Wang
Ke Xu
2023
journals/tifs
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns.
Zheng Zheng
Qian Wang
Cong Wang
Man Zhou
Yi Zhao
Qi Li
Chao Shen
2023
journals/tifs
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
Jiahui Chen
Yi Zhao
Qi Li
Xuewei Feng
Ke Xu
2023
conf/ccs
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Peiyang Li
Ye Wang
Qi Li
Zhuotao Liu
Ke Xu
Ju Ren
Zhiying Liu
Ruilin Lin
2023
conf/ccs
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Qi Li
Zhuotao Liu
Qi Li
Ke Xu
2023
conf/ccs
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Chuanpu Fu
Qi Li
Ke Xu
Jianping Wu
2023
conf/ccs
MTD '23: 10th ACM Workshop on Moving Target Defense.
Ning Zhang
Qi Li
2023
conf/uss
The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Xiang Li
Chaoyi Lu
Baojun Liu
Qifan Zhang
Zhou Li
Haixin Duan
Qi Li
2023
conf/uss
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems.
Xinghui Wu
Shiqing Ma
Chao Shen
Chenhao Lin
Qian Wang
Qi Li
Yuan Rao
2023
conf/uss
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Meng Shen
Kexin Ji
Zhenbo Gao
Qi Li
Liehuang Zhu
Ke Xu
2023
conf/uss
Cross Container Attacks: The Bewildered eBPF on Clouds.
Yi He
Roland Guo
Yunlong Xing
Xijia Che
Kun Sun
Zhuotao Liu
Ke Xu
Qi Li
2023
conf/uss
An Efficient Design of Intelligent Network Data Plane.
Guangmeng Zhou
Zhuotao Liu
Chuanpu Fu
Qi Li
Ke Xu
2023
conf/uss
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Renjie Xie
Jiahao Cao
Enhuan Dong
Mingwei Xu
Kun Sun
Qi Li
Licheng Shen
Menghao Zhang
2023
conf/uss
Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.
Jialai Wang
Ziyuan Zhang
Meiqi Wang
Han Qiu
Tianwei Zhang
Qi Li
Zongpeng Li
Tao Wei
Chao Zhang
2023
conf/sp
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Xinhao Deng
Qilei Yin
Zhuotao Liu
Xiyuan Zhao
Qi Li
Mingwei Xu
Ke Xu
Jianping Wu
2023
conf/sp
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Ke Xu
2023
conf/sp
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Shu Wang
Xinda Wang
Kun Sun
Sushil Jajodia
Haining Wang
Qi Li
2023
conf/ndss
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
Xiang Li
Baojun Liu
Xuesong Bai
Mingming Zhang
Qifan Zhang
Zhou Li
Haixin Duan
Qi Li
2023
conf/ndss
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Chuanpu Fu
Qi Li
Ke Xu
2022
journals/compsec
Practical differentially private online advertising.
Jie Sun
Lingchen Zhao
Zhuotao Liu
Qi Li
Xinhao Deng
Qian Wang
Yong Jiang
2022
journals/tifs
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
Qi Li
Xinhao Deng
Zhuotao Liu
Yuan Yang
Xiaoyue Zou
Qian Wang
Mingwei Xu
Jianping Wu
2022
journals/tifs
Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
Zijie Yang
Jiahao Cao
Zhuotao Liu
Xiaoli Zhang
Kun Sun
Qi Li
2022
conf/ccs
On the Privacy Risks of Cell-Based NAS Architectures.
Hai Huang
Zhikun Zhang
Yun Shen
Michael Backes
Qi Li
Yang Zhang
2022
conf/uss
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Yi He
Zhenhua Zou
Kun Sun
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Zhi Wang
Qi Li
2022
conf/uss
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Xuewei Feng
Qi Li
Kun Sun
Zhiyun Qian
Gang Zhao
Xiaohui Kuang
Chuanpu Fu
Ke Xu
2022
conf/esorics
Verifying the Quality of Outsourced Training on Clouds.
Peiyang Li
Ye Wang
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Qi Li
2022
conf/cns
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Yunlong Xing
Jiahao Cao
Xinda Wang
Sadegh Torabi
Kun Sun
Fei Yan
Qi Li
2022
conf/ndss
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Xuewei Feng
Qi Li
Kun Sun
Ke Xu
Baojun Liu
Xiaofeng Zheng
Qiushi Yang
Haixin Duan
Zhiyun Qian
2021
journals/tifs
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
Qian Wang
Baolin Zheng
Qi Li
Chao Shen
Zhongjie Ba
2021
journals/tifs
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
Meng Shen
Hao Yu
Liehuang Zhu
Ke Xu
Qi Li
Jiankun Hu
2021
journals/tifs
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
Qiyang Song
Zhuotao Liu
Jiahao Cao
Kun Sun
Qi Li
Cong Wang
2021
conf/ccs
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
Chuanpu Fu
Qi Li
Meng Shen
Ke Xu
2021
conf/ccs
A Hard Label Black-box Adversarial Attack Against Graph Neural Networks.
Jiaming Mu
Binghui Wang
Qi Li
Kun Sun
Mingwei Xu
Zhuotao Liu
2021
conf/ccs
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information.
Baolin Zheng
Peipei Jiang
Qian Wang
Qi Li
Chao Shen
Cong Wang
Yunjie Ge
Qingyang Teng
Shenyi Zhang
2021
conf/asiaccs
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Zhuotao Liu
Hao Zhao
Sainan Li
Qi Li
Tao Wei
Yu Wang
2021
conf/asiaccs
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Zeyu Zhang
Xiaoli Zhang
Qi Li
Kun Sun
Yinqian Zhang
Songsong Liu
Yukun Liu
Xiaoning Li
2021
conf/ndss
OblivSketch: Oblivious Network Measurement as a Cloud Service.
Shangqi Lai
Xingliang Yuan
Joseph K. Liu
Xun Yi
Qi Li
Dongxi Liu
Surya Nepal
2021
conf/ndss
Data Poisoning Attacks to Deep Learning Based Recommender Systems.
Hai Huang
Jiaming Mu
Neil Zhenqiang Gong
Qi Li
Bin Liu
Mingwei Xu
2021
conf/dsn
Fast IPv6 Network Periphery Discovery and Security Implications.
Xiang Li
Baojun Liu
Xiaofeng Zheng
Haixin Duan
Qi Li
Youjun Huang
2021
conf/acsac
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Qiyang Song
Jiahao Cao
Kun Sun
Qi Li
Ke Xu
2021
conf/acsac
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Zijie Yang
Binghui Wang
Haoran Li
Dong Yuan
Zhuotao Liu
Neil Zhenqiang Gong
Chang Liu
Qi Li
Xiao Liang
Shaofeng Hu
2020
journals/tifs
PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing.
Dong Yuan
Qi Li
Guoliang Li
Qian Wang
Kui Ren
2020
conf/ccs
Off-Path TCP Exploits of the Mixed IPID Assignment.
Xuewei Feng
Chuanpu Fu
Qi Li
Kun Sun
Ke Xu
2020
conf/ccs
When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Shu Wang
Jiahao Cao
Xu He
Kun Sun
Qi Li
2020
conf/cns
Towards a Believable Decoy System: Replaying Network Activities from Real System.
Jianhua Sun
Kun Sun
Qi Li
2020
conf/ndss
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Jiahao Cao
Renjie Xie
Kun Sun
Qi Li
Guofei Gu
Mingwei Xu
2020
conf/ndss
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
Menghao Zhang
Guanyu Li
Shicheng Wang
Chang Liu
Ang Chen
Hongxin Hu
Guofei Gu
Qi Li
Mingwei Xu
Jianping Wu
2019
conf/ccs
Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Bingyu Li
Jingqiang Lin
Fengjun Li
Qiongxiao Wang
Qi Li
Jiwu Jing
Congli Wang
2019
conf/ccs
Detecting Fake Accounts in Online Social Networks at the Time of Registrations.
Dong Yuan
Yuanli Miao
Neil Zhenqiang Gong
Zheng Yang
Qi Li
Dawn Song
Qian Wang
Xiao Liang
2019
conf/uss
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Jiahao Cao
Qi Li
Renjie Xie
Kun Sun
Guofei Gu
Mingwei Xu
Yuan Yang
2019
conf/dsn
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors.
Shengye Wan
Jianhua Sun
Kun Sun
Ning Zhang
Qi Li
2018
journals/tifs
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis.
Jing Zheng
Qi Li
Guofei Gu
Jiahao Cao
David K. Y. Yau
Jianping Wu
2018
conf/ccs
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Man Zhou
Qian Wang
Jingxiao Yang
Qi Li
Feng Xiao
Zhibo Wang
Xiaofeng Chen
2018
conf/acsac
A Multi-tab Website Fingerprinting Attack.
Yixiao Xu
Tao Wang
Qi Li
Qingyuan Gong
Yang Chen
Yong Jiang
2017
conf/ccs
Vulnerable Implicit Service: A Revisit.
Lingguang Lei
Yi He
Kun Sun
Jiwu Jing
Yuewu Wang
Qi Li
Jian Weng
2017
conf/fc
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates.
Qian Wang
Kui Ren
Minxin Du
Qi Li
Aziz Mohaisen
2017
conf/cns
CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms.
Jianhua Sun
Kun Sun
Qi Li
2017
conf/cns
Data verification in information-centric networking with efficient revocable certificateless signature.
Qingji Zheng
Qi Li
Aytac Azgin
Jian Weng
2017
conf/dsn
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android.
Yacong Gu
Kun Sun
Purui Su
Qi Li
Yemian Lu
Lingyun Ying
Dengguo Feng
2015
journals/tifs
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
Qi Li
Xinwen Zhang
Qingji Zheng
Ravi S. Sandhu
Xiaoming Fu
2012
journals/tifs
Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
Qi Li
Mingwei Xu
Jianping Wu
Xinwen Zhang
Patrick P. C. Lee
Ke Xu
2011
conf/ccs
Enhancing the trust of internet routing with lightweight route attestation.
Qi Li
Mingwei Xu
Jianping Wu
Xinwen Zhang
Patrick P. C. Lee
Ke Xu
2009
journals/compsec
Towards secure dynamic collaborations with group-based RBAC model.
Qi Li
Xinwen Zhang
Mingwei Xu
Jianping Wu
2008
conf/ccs
Usage control platformization via trustworthy SELinux.
Masoom Alam
Jean-Pierre Seifert
Qi Li
Xinwen Zhang
Coauthors
Ang Chen
(1)
Ao Wang
(1)
Aytac Azgin
(1)
Aziz Mohaisen
(1)
Bang Wu
(1)
Baojun Liu
(5)
Baolin Zheng
(2)
Bharat K. Bhargava
(1)
Bin Liu
(1)
Binghui Wang
(2)
Bingyu Li
(1)
Bowen Li
(1)
Chang Liu
(2)
Changyue Li
(1)
Chao Shen
(9)
Chao Zhang
(2)
Chaoyi Lu
(1)
Chenghan Jiang
(1)
Chengjun Cai
(1)
Chenhao Lin
(1)
Chuanpu Fu
(7)
Chuhan Wang
(1)
Cong Wang
(5)
Congli Wang
(1)
Dan Li
(1)
Dashuai Wu
(1)
David K. Y. Yau
(1)
Dawn Song
(1)
Deliang Chang
(1)
Dengguo Feng
(1)
Dong Yuan
(3)
Dongxi Liu
(1)
Enhuan Dong
(2)
Fei Yan
(1)
Feng Xiao
(1)
Fengjun Li
(1)
Gang Zhao
(1)
Ganqiu Du
(2)
Guangmeng Zhou
(2)
Guanyu Li
(1)
Guofei Gu
(4)
Guoliang Li
(1)
Guoshun Nan
(1)
Hai Huang
(2)
Haining Wang
(1)
Haixin Duan
(8)
Han Qiu
(1)
Hanyi Peng
(1)
Hao Lu
(1)
Hao Wang
(1)
Hao Yu
(1)
Hao Zhao
(1)
Haoran Li
(1)
Helei Cui
(1)
Hetian Shi
(1)
Hongbing Cheng
(1)
Hongxin Hu
(1)
Huayang Huang
(1)
Jean-Pierre Seifert
(1)
Jia Zhang
(2)
Jiahao Cao
(11)
Jiahui Chen
(1)
Jialai Wang
(2)
Jiaming Mu
(2)
Jian Weng
(2)
Jiang Li
(1)
Jianhua Sun
(3)
Jianjin Zhao
(1)
Jianjun Chen
(3)
Jiankun Hu
(1)
Jianping Wu
(10)
Jianwei Zhuge
(2)
Jiaxin Mi
(1)
Jie Huang
(1)
Jie Sun
(1)
Jing Zheng
(1)
Jingjing Xue
(1)
Jingqiang Lin
(1)
Jingxiao Yang
(1)
Jinhe Wu
(1)
Jinjiang Yang
(1)
Jinwen Wang
(1)
Jinyong Shan
(1)
Jiwu Jing
(2)
Joseph K. Liu
(1)
Ju Ren
(3)
Junhui Yang
(1)
Junsong Fu
(2)
Ke Xu
(37)
Keran Mu
(1)
Kexin Ji
(2)
Kui Ren
(2)
Kun Sun
(35)
Li Chen
(1)
Licheng Shen
(1)
Liehuang Zhu
(4)
Lingchen Zhao
(4)
Lingguang Lei
(1)
Lingyun Ying
(1)
Longfei Chen
(1)
Man Zhou
(4)
Masoom Alam
(1)
Meiqi Wang
(1)
Meng Shen
(7)
Menghao Zhang
(3)
Mengyuan Li
(1)
Miao Yu
(1)
Michael Backes
(1)
Min Liu
(1)
Mingming Zhang
(2)
Mingwei Xu
(16)
Minhui Xue
(1)
Minxin Du
(2)
Neil Gong
(1)
Neil Zhenqiang Gong
(3)
Nick Feamster
(1)
Ning Zhang
(3)
Ningping Mou
(1)
Patrick P. C. Lee
(2)
Peipei Jiang
(3)
Peiyang Li
(2)
Pengbin Feng
(1)
Pinji Chen
(1)
Purui Su
(1)
Qi Li
(1)
Qi Li
(107)
Qi Tan
(1)
Qian Wang
(17)
Qiang Wei
(1)
Qifan Zhang
(3)
Qilei Yin
(3)
Qingji Zheng
(2)
Qingyang Teng
(1)
Qingyuan Gong
(1)
Qiongxiao Wang
(1)
Qiushi Li
(1)
Qiushi Yang
(1)
Qiyang Song
(2)
Ravi S. Sandhu
(1)
Renjie Xie
(6)
Roland Guo
(1)
Ruilin Lin
(1)
Ruoyu Lun
(1)
Sadegh Torabi
(1)
Sainan Li
(1)
Shangqi Lai
(2)
Shangru Song
(1)
Shaofeng Hu
(1)
Sheng Sun
(1)
Shengye Wan
(1)
Shenyi Zhang
(3)
Shicheng Wang
(1)
Shiqing Ma
(1)
Shirui Pan
(1)
Shixuan Zhai
(1)
Shiyu Sun
(3)
Shu Wang
(6)
Shuao Su
(1)
Shuo Wang
(1)
Sitong Ling
(1)
Songsong Liu
(1)
Surya Nepal
(2)
Sushil Jajodia
(1)
Tao Wang
(1)
Tao Wang
(1)
Tao Wei
(2)
Tianwei Zhang
(1)
Tong Li
(1)
Viet Vo
(1)
Wei Xu
(1)
Weilue Liao
(1)
Wende Tan
(1)
Wenxiang Sun
(1)
Wenyu Zhou
(1)
Xiang Li
(6)
Xiangdong Kong
(1)
Xiao Li
(1)
Xiao Liang
(2)
Xiaobing Guo
(1)
Xiaofeng Chen
(1)
Xiaofeng Zheng
(3)
Xiaohui Kuang
(1)
Xiaojing Ma
(1)
Xiaoli Zhang
(5)
Xiaoming Fu
(1)
Xiaoning Li
(1)
Xiaoyue Zou
(1)
Xijia Che
(2)
Xinda Wang
(5)
Xinghui Wu
(1)
Xingliang Yuan
(3)
Xingxiang Zhan
(1)
Xinhao Deng
(6)
Xinwen Zhang
(5)
Xinyi Li
(1)
Xinyu Zhang
(1)
Xiongwen Guo
(1)
Xiyuan Zhao
(2)
Xu He
(3)
Xuanqi Liu
(1)
Xuesong Bai
(2)
Xuewei Feng
(9)
Xun Yi
(1)
Yacong Gu
(1)
Yan Zhang
(1)
Yang Chen
(1)
Yang Zhang
(1)
Yangyang Wang
(1)
Yaoxue Zhang
(1)
Ye Wang
(2)
Yemian Lu
(1)
Yi He
(8)
Yi Rong
(1)
Yi Xu
(1)
Yi Zhao
(3)
Yihao Chen
(2)
Yingying Su
(1)
Yinqian Zhang
(1)
Yixiang Zhang
(1)
Yixiao Wang
(1)
Yixiao Xu
(1)
Yong Jiang
(2)
Youjun Huang
(1)
Yu Wang
(1)
Yuan Rao
(1)
Yuan Yang
(2)
Yuanli Miao
(1)
Yue Xiao
(1)
Yuewu Wang
(1)
Yuhao Wu
(1)
Yujie Wang
(1)
Yukun Liu
(1)
Yun Shen
(1)
Yunchao Guan
(1)
Yunjie Ge
(4)
Yunlong Xing
(4)
Yunpeng Liu
(1)
Yuqi Qing
(1)
Yuting Zhou
(1)
Yuxi Zhu
(2)
Yuxiang Yang
(4)
Yuxiao Wu
(1)
Zehui Wu
(1)
Zewei Han
(2)
Zeyu Zhang
(1)
Zhechao Lin
(1)
Zhenbo Gao
(1)
Zheng Fang
(2)
Zheng Yang
(1)
Zheng Zheng
(1)
Zhengxiong Li
(1)
Zhenhua Zou
(2)
Zhi Wang
(1)
Zhibo Wang
(1)
Zhicheng Xu
(1)
Zhihao Guo
(1)
Zhikun Zhang
(1)
Zhiying Liu
(1)
Zhiyun Qian
(2)
Zhongjie Ba
(1)
Zhou Li
(4)
Zhuotao Liu
(21)
Zihan Li
(1)
Zijie Yang
(2)
Ziqian Liu
(1)
Ziqiang Wang
(3)
Ziyuan Zhang
(1)
Zongpeng Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to