What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ke Xu
Google Scholar
ORCID:
0000-0003-2587-8517
40
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Enhancing Federated Learning Robustness Using Locally Benignity-Assessable Bayesian Dropout.
Jingjing Xue
Sheng Sun
Min Liu
Qi Li
Ke Xu
2025
journals/tifs
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning.
Meng Shen
Jinhe Wu
Ke Ye
Ke Xu
Gang Xiong
Liehuang Zhu
2025
conf/sp
TrafficFormer: An Efficient Pre-trained Model for Traffic Data.
Guangmeng Zhou
Xiongwen Guo
Zhuotao Liu
Tong Li
Qi Li
Ke Xu
2025
conf/ndss
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
Ziqiang Wang
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Mengyuan Li
Ganqiu Du
Ke Xu
Jianping Wu
2025
conf/ndss
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks.
Xuewei Feng
Yuxiang Yang
Qi Li
Xingxiang Zhan
Kun Sun
Ziqiang Wang
Ao Wang
Ganqiu Du
Ke Xu
2025
conf/uss
CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis.
Jinzhu Yan
Zhuotao Liu
Yuyang Xie
Shiyu Liang
Lin Liu
Ke Xu
2024
conf/ccs
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
Xinhao Deng
Qi Li
Ke Xu
2024
conf/ccs
CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
Zhenhua Zou
Zhuotao Liu
Jinyong Shan
Qi Li
Ke Xu
Mingwei Xu
2024
conf/ccs
Towards Fine-Grained Webpage Fingerprinting at Scale.
Xiyuan Zhao
Xinhao Deng
Qi Li
Yunpeng Liu
Zhuotao Liu
Kun Sun
Ke Xu
2024
conf/ccs
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns.
Chuanpu Fu
Qi Li
Meng Shen
Ke Xu
2024
conf/ccs
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
Xijia Che
Yi He
Xuewei Feng
Kun Sun
Ke Xu
Qi Li
2024
conf/uss
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
Yihao Chen
Qilei Yin
Qi Li
Zhuotao Liu
Ke Xu
Yi Xu
Mingwei Xu
Ziqian Liu
Jianping Wu
2024
conf/uss
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
Meng Shen
Changyue Li
Qi Li
Hao Lu
Liehuang Zhu
Ke Xu
2024
conf/uss
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
Qi Tan
Qi Li
Yi Zhao
Zhuotao Liu
Xiaobing Guo
Ke Xu
2024
conf/sp
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization.
Meng Shen
Kexin Ji
Jinhe Wu
Qi Li
Xiangdong Kong
Ke Xu
Liehuang Zhu
2024
conf/ndss
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Yuqi Qing
Qilei Yin
Xinhao Deng
Yihao Chen
Zhuotao Liu
Kun Sun
Ke Xu
Jia Zhang
Qi Li
2024
conf/ndss
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
Yue Xiao
Yi He
Xiaoli Zhang
Qian Wang
Renjie Xie
Kun Sun
Ke Xu
Qi Li
2024
conf/ndss
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
Xuanqi Liu
Zhuotao Liu
Qi Li
Ke Xu
Mingwei Xu
2024
conf/ndss
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
Yuxiang Yang
Xuewei Feng
Qi Li
Kun Sun
Ziqiang Wang
Ke Xu
2023
journals/tifs
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
Jiahui Chen
Yi Zhao
Qi Li
Xuewei Feng
Ke Xu
2023
conf/ccs
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Peiyang Li
Ye Wang
Qi Li
Zhuotao Liu
Ke Xu
Ju Ren
Zhiying Liu
Ruilin Lin
2023
conf/ccs
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Qi Li
Zhuotao Liu
Qi Li
Ke Xu
2023
conf/ccs
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Chuanpu Fu
Qi Li
Ke Xu
Jianping Wu
2023
conf/uss
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Meng Shen
Kexin Ji
Zhenbo Gao
Qi Li
Liehuang Zhu
Ke Xu
2023
conf/uss
Cross Container Attacks: The Bewildered eBPF on Clouds.
Yi He
Roland Guo
Yunlong Xing
Xijia Che
Kun Sun
Zhuotao Liu
Ke Xu
Qi Li
2023
conf/uss
An Efficient Design of Intelligent Network Data Plane.
Guangmeng Zhou
Zhuotao Liu
Chuanpu Fu
Qi Li
Ke Xu
2023
conf/sp
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Xinhao Deng
Qilei Yin
Zhuotao Liu
Xiyuan Zhao
Qi Li
Mingwei Xu
Ke Xu
Jianping Wu
2023
conf/sp
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Ke Xu
2023
conf/ndss
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Chuanpu Fu
Qi Li
Ke Xu
2022
conf/uss
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Yi He
Zhenhua Zou
Kun Sun
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Zhi Wang
Qi Li
2022
conf/uss
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Xuewei Feng
Qi Li
Kun Sun
Zhiyun Qian
Gang Zhao
Xiaohui Kuang
Chuanpu Fu
Ke Xu
2022
conf/esorics
Verifying the Quality of Outsourced Training on Clouds.
Peiyang Li
Ye Wang
Zhuotao Liu
Ke Xu
Qian Wang
Chao Shen
Qi Li
2022
conf/ndss
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Xuewei Feng
Qi Li
Kun Sun
Ke Xu
Baojun Liu
Xiaofeng Zheng
Qiushi Yang
Haixin Duan
Zhiyun Qian
2021
journals/tifs
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
Meng Shen
Jinpeng Zhang
Liehuang Zhu
Ke Xu
Xiaojiang Du
2021
journals/tifs
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
Meng Shen
Hao Yu
Liehuang Zhu
Ke Xu
Qi Li
Jiankun Hu
2021
conf/ccs
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
Chuanpu Fu
Qi Li
Meng Shen
Ke Xu
2021
conf/acsac
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Qiyang Song
Jiahao Cao
Kun Sun
Qi Li
Ke Xu
2020
conf/ccs
Off-Path TCP Exploits of the Mixed IPID Assignment.
Xuewei Feng
Chuanpu Fu
Qi Li
Kun Sun
Ke Xu
2012
journals/tifs
Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
Qi Li
Mingwei Xu
Jianping Wu
Xinwen Zhang
Patrick P. C. Lee
Ke Xu
2011
conf/ccs
Enhancing the trust of internet routing with lightweight route attestation.
Qi Li
Mingwei Xu
Jianping Wu
Xinwen Zhang
Patrick P. C. Lee
Ke Xu
Coauthors
Ao Wang
(1)
Baojun Liu
(1)
Changyue Li
(1)
Chao Shen
(2)
Chuanpu Fu
(7)
Gang Xiong
(1)
Gang Zhao
(1)
Ganqiu Du
(2)
Guangmeng Zhou
(2)
Haixin Duan
(1)
Hao Lu
(1)
Hao Yu
(1)
Jia Zhang
(1)
Jiahao Cao
(1)
Jiahui Chen
(1)
Jiankun Hu
(1)
Jianping Wu
(6)
Jingjing Xue
(1)
Jinhe Wu
(2)
Jinpeng Zhang
(1)
Jinyong Shan
(1)
Jinzhu Yan
(1)
Ju Ren
(1)
Ke Xu
(40)
Ke Ye
(1)
Kexin Ji
(2)
Kun Sun
(14)
Liehuang Zhu
(6)
Lin Liu
(1)
Meng Shen
(8)
Mengyuan Li
(1)
Min Liu
(1)
Mingwei Xu
(6)
Patrick P. C. Lee
(2)
Peiyang Li
(2)
Qi Li
(1)
Qi Li
(37)
Qi Tan
(1)
Qian Wang
(3)
Qilei Yin
(3)
Qiushi Yang
(1)
Qiyang Song
(1)
Renjie Xie
(1)
Roland Guo
(1)
Ruilin Lin
(1)
Sheng Sun
(1)
Shiyu Liang
(1)
Tong Li
(1)
Xiangdong Kong
(1)
Xiaobing Guo
(1)
Xiaofeng Zheng
(1)
Xiaohui Kuang
(1)
Xiaojiang Du
(1)
Xiaoli Zhang
(1)
Xijia Che
(2)
Xingxiang Zhan
(1)
Xinhao Deng
(4)
Xinwen Zhang
(2)
Xiongwen Guo
(1)
Xiyuan Zhao
(2)
Xuanqi Liu
(1)
Xuewei Feng
(9)
Ye Wang
(2)
Yi He
(4)
Yi Xu
(1)
Yi Zhao
(2)
Yihao Chen
(2)
Yue Xiao
(1)
Yunlong Xing
(1)
Yunpeng Liu
(1)
Yuqi Qing
(1)
Yuxiang Yang
(4)
Yuyang Xie
(1)
Zhenbo Gao
(1)
Zhenhua Zou
(2)
Zhi Wang
(1)
Zhiying Liu
(1)
Zhiyun Qian
(2)
Zhuotao Liu
(15)
Ziqian Liu
(1)
Ziqiang Wang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to