default search action
Jun Li 0001
- > Home > Persons > Jun Li 0001
Publications
- 2024
- [j32]Yebo Feng, Jun Li, Devkishen Sisodia, Peter L. Reiher:
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic. IEEE Trans. Dependable Secur. Comput. 21(4): 2211-2226 (2024) - [j31]Zhangxiang Hu, Jun Li, Christopher Wilson:
Resilient Intermediary-Based Key Exchange Protocol for IoT. ACM Trans. Internet Things 5(1): 7:1-7:31 (2024) - [j30]Devkishen Sisodia, Jun Li, Samuel Mergendahl, Hasan Cam:
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications. ACM Trans. Internet Things 5(2): 8:1-8:31 (2024) - [i6]Tingxu Han, Shenghan Huang, Ziqi Ding, Weisong Sun, Yebo Feng, Chunrong Fang, Jun Li, Hanwei Qian, Cong Wu, Quanjun Zhang, Yang Liu, Zhenyu Chen:
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder. CoRR abs/2403.03846 (2024) - 2023
- [j29]Jun Li, Devkishen Sisodia, Shad Stafford:
On the Detection of Smart, Self-Propagating Internet Worms. IEEE Trans. Dependable Secur. Comput. 20(4): 3051-3063 (2023) - [c64]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Toward Adaptive DDoS-Filtering Rule Generation. CNS 2023: 1-9 - [i5]Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, Peter L. Reiher:
Adaptive Distributed Filtering of DDoS Traffic on the Internet. CoRR abs/2305.13296 (2023) - 2022
- [j28]Lumin Shi, Jun Li, Mingwei Zhang, Peter L. Reiher:
On Capturing DDoS Traffic Footprints on the Internet. IEEE Trans. Dependable Secur. Comput. 19(4): 2755-2770 (2022) - [c63]Zhangxiang Hu, Jun Li, Samuel Mergendahl, Christopher Wilson:
Toward a Resilient Key Exchange Protocol for IoT. CODASPY 2022: 214-225 - [c62]Mingyu Chen, Yu Zhang, Yongshang Li, Zhen Wang, Jun Li, Xiangyang Li:
QCIR: Pattern Matching Based Universal Quantum Circuit Rewriting Framework. ICCAD 2022: 55:1-55:8 - [c61]Yebo Feng, Jun Li, Devkishen Sisodia:
CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic. RAID 2022: 482-494 - [i4]Jelena Mirkovic, Yebo Feng, Jun Li:
Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures. CoRR abs/2203.00742 (2022) - 2021
- [j27]Yebo Feng, Jun Li, Lei Jiao, Xintao Wu:
Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic. IEEE Trans. Dependable Secur. Comput. 18(5): 2149-2163 (2021) - [j26]Lin Wang, Lei Jiao, Ting He, Jun Li, Henri E. Bal:
Service Placement for Collaborative Edge Applications. IEEE/ACM Trans. Netw. 29(1): 34-47 (2021) - [j25]Jianzhen Luo, Jun Li, Lei Jiao, Jun Cai:
On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains. IEEE Trans. Parallel Distributed Syst. 32(5): 1238-1255 (2021) - 2020
- [j24]Yaoqing Liu, Garegin Grigoryan, Jun Li, Guchuan Sun, Tony Tauber:
VeriTable: Fast equivalence verification of multiple large forwarding tables. Comput. Networks 168 (2020) - [c60]Devkishen Sisodia, Jun Li, Lei Jiao:
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. AsiaCCS 2020: 153-164 - [c59]Yebo Feng, Devkishen Sisodia, Jun Li:
POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. AsiaCCS 2020: 907-909 - [c58]Samuel Mergendahl, Jun Li:
Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things. CNS 2020: 1-9 - [c57]Thomas Cilloni, Xiyu Cai, Charles Fleming, Jun Li:
Understanding and Detecting Majority Attacks. DAPPS 2020: 11-21 - [c56]Jun Li, Alex Grintsvayg, Jeremy Kauffman, Charles Fleming:
LBRY: A Blockchain-Based Decentralized Digital Content Marketplace. DAPPS 2020: 42-51 - [c55]Wencong You, Lei Jiao, Jun Li, Ruiting Zhou:
Scheduling DDoS Cloud Scrubbing in ISP Networks via Randomized Online Auctions. INFOCOM 2020: 1658-1667 - [c54]Yebo Feng, Jun Li, Thanh Nguyen:
Application-Layer DDoS Defense with Reinforcement Learning. IWQoS 2020: 1-10 - [c53]Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li:
Bridging Missing Gaps in Evaluating DDoS Research. CSET @ USENIX Security Symposium 2020 - 2019
- [j23]Soheil Jamshidi, Reza Rejaie, Jun Li:
Characterizing the dynamics and evolution of incentivized online reviews on Amazon. Soc. Netw. Anal. Min. 9(1): 22:1-22:15 (2019) - [j22]Lin Wang, Lei Jiao, Jun Li, Julien Gedeon, Max Mühlhäuser:
MOERA: Mobility-Agnostic Online Resource Allocation for Edge Computing. IEEE Trans. Mob. Comput. 18(8): 1843-1856 (2019) - [c52]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. AAAI 2019: 1286-1293 - [c51]Yebo Feng, Jun Li, Lei Jiao, Xintao Wu:
BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows. CNS 2019: 169-177 - [c50]Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, Peter L. Reiher:
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic. IM 2019: 180-188 - 2018
- [j21]Jun Li, Bodong Zhao, Chao Zhang:
Fuzzing: a survey. Cybersecur. 1(1): 6 (2018) - [j20]Congjie Chen, Dan Li, Jun Li, Konglin Zhu:
SVDC: A Highly Scalable Isolation Architecture for Virtualized Layer-2 Data Center Networks. IEEE Trans. Cloud Comput. 6(4): 1178-1190 (2018) - [c49]Soheil Jamshidi, Reza Rejaie, Jun Li:
Trojan Horses in Amazon's Castle: Understanding the Incentivized Online Reviews. ASONAM 2018: 335-342 - [c48]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. ICCCN 2018: 1-9 - [c47]Lin Wang, Lei Jiao, Ting He, Jun Li, Max Mühlhäuser:
Service Entity Placement for Social Virtual Reality Applications in Edge Computing. INFOCOM 2018: 468-476 - [c46]Garegin Grigoryan, Yaoqing Liu, Michael Leczinsky, Jun Li:
VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables. INFOCOM 2018: 621-629 - [c45]Lei Jiao, Antonia M. Tulino, Jaime Llorca, Yue Jin, Alessandra Sala, Jun Li:
Online Control of Cloud and Edge Resources Using Inaccurate Predictions. IWQoS 2018: 1-6 - [c44]Lumin Shi, Mingwei Zhang, Jun Li, Peter L. Reiher:
PathFinder: Capturing DDoS Traffic Footprints on the Internet. Networking 2018: 10-18 - [c43]Lei Jiao, Lingjun Pu, Lin Wang, Xiaojun Lin, Jun Li:
Multiple Granularity Online Control of Cloudlet Networks for Edge Computing. SECON 2018: 406-414 - [c42]Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. SecureComm (1) 2018: 22-42 - [i3]Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
One-Class Adversarial Nets for Fraud Detection. CoRR abs/1803.01798 (2018) - [i2]Garegin Grigoryan, Yaoqing Liu, Michael Leczinsky, Jun Li:
VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables. CoRR abs/1804.07374 (2018) - 2017
- [j19]Joshua Stein, Han Hee Song, Mario Baldi, Jun Li:
On the most representative summaries of network user activities. Comput. Networks 113: 205-217 (2017) - [j18]David Koll, Jun Li, Xiaoming Fu:
The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks. Comput. Commun. 108: 36-51 (2017) - [j17]Mingwei Zhang, Jun Li, Scott Brooks:
I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes. IEEE/ACM Trans. Netw. 25(6): 3411-3426 (2017) - [j16]Yang Chen, Shining Wu, Jun Li, Xiaoming Fu:
NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems. IEEE Trans. Serv. Comput. 10(2): 244-257 (2017) - [c41]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
Source-End DDoS Defense in IoT Environments. IoT S&P@CCS 2017: 63-64 - [c40]Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
Spectrum-based Deep Neural Networks for Fraud Detection. CIKM 2017: 2419-2422 - [c39]Lin Wang, Lei Jiao, Jun Li, Max Mühlhäuser:
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds. ICDCS 2017: 1281-1290 - [c38]David Koll, Martin Schwarzmaier, Jun Li, Xiang-Yang Li, Xiaoming Fu:
Thank You For Being A Friend: An Attacker View on Online-Social-Network-Based Sybil Defenses. ICDCS Workshops 2017: 157-162 - [i1]Shuhan Yuan, Xintao Wu, Jun Li, Aidong Lu:
Spectrum-based deep neural networks for fraud detection. CoRR abs/1706.00891 (2017) - 2016
- [j15]Yuanyuan Zhang, Mingwei Xu, Ning Wang, Jun Li, Penghan Chen, Fei Liang:
Compressing IP Forwarding Tables with Small Bounded Update Time. Comput. Networks 106: 77-90 (2016) - [j14]Lei Jiao, Jun Li, Tianyin Xu, Wei Du, Xiaoming Fu:
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds. IEEE/ACM Trans. Netw. 24(1): 99-112 (2016) - [c37]Jun Li, Joshua Stein, Mingwei Zhang, Olaf Maennel:
An expectation-based approach to policy-based security of the Border Gateway Protocol. INFOCOM Workshops 2016: 340-345 - 2015
- [j13]Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang:
Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability. Comput. Commun. 67: 11-22 (2015) - [j12]Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, Jianyu Zhang, Xinhui Han:
SF-DRDoS: The store-and-flood distributed reflective denial of service attack. Comput. Commun. 69: 107-115 (2015) - [j11]Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:
Improving lookup reliability in Kad. Peer-to-Peer Netw. Appl. 8(1): 156-170 (2015) - [c36]Hanqing Zhu, Mingwei Xu, Qing Li, Jun Li, Yuan Yang, Suogang Li:
MDTC: An efficient approach to TCAM-based multidimensional table compression. Networking 2015: 1-9 - 2014
- [j10]Ghulam Memon, Jun Li, Reza Rejaie:
Tsunami: A parasitic, indestructible botnet on Kad. Peer-to-Peer Netw. Appl. 7(4): 444-455 (2014) - [c35]Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, Chen Li:
Splider: A split-based crawler of the BT-DHT network and its applications. CCNC 2014: 327-335 - [c34]Jun Li, Shad Stafford:
Detecting smart, self-propagating Internet worms. CNS 2014: 193-201 - [c33]Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han:
The store-and-flood distributed reflective denial of service attack. ICCCN 2014: 1-8 - [c32]Lei Jiao, Jun Li, Wei Du, Xiaoming Fu:
Multi-objective data placement for multi-cloud socially aware services. INFOCOM 2014: 28-36 - [c31]Joshua Stein, Han Hee Song, Mario Baldi, Jun Li:
Toward the most representative summaries of network user activities. IWQoS 2014: 111-116 - [c30]Ming Zhu, Jun Li, Ying Liu, Dan Li, Jianping Wu:
TED: Inter-domain traffic engineering via deflection. IWQoS 2014: 117-122 - [c29]Ming Zhu, Ying Liu, Jun Li, Jianping Wu:
CCOF: Congestion control on the fly for Inter-Domain routing. LANMAN 2014: 1-2 - [c28]David Koll, Jun Li, Xiaoming Fu:
SOUP: an online social network by the people, for the people. Middleware 2014: 193-204 - [c27]David Koll, Jun Li, Joshua Stein, Xiaoming Fu:
On the state of OSN-based Sybil defenses. Networking 2014: 1-9 - [c26]David Koll, Jun Li, Xiaoming Fu:
SOUP: an online social network by the people, for the people. SIGCOMM 2014: 143-144 - [c25]Jun Li, Skyler Berg, Mingwei Zhang, Peter L. Reiher, Tao Wei:
Drawbridge: software-defined DDoS-resistant traffic engineering. SIGCOMM 2014: 591-592 - 2013
- [c23]David Koll, Jun Li, Joshua Stein, Xiaoming Fu:
On the effectiveness of sybil defenses based on online social networks. ICNP 2013: 1-2 - [c22]Lei Jiao, Jun Li, Xiaoming Fu:
Optimizing data center traffic of Online Social Networks. LANMAN 2013: 1-6 - 2012
- [c20]Jun Li, Toby Ehrenkranz, Paul Elliott:
Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies. ICNP 2012: 1-10 - [c19]Lei Jiao, Jun Li, Tianyin Xu, Xiaoming Fu:
Cost optimization for Online Social Networks on geo-distributed clouds. ICNP 2012: 1-10 - [c18]Shining Wu, Yang Chen, Xiaoming Fu, Jun Li:
NCShield: Securing decentralized, matrix factorization-based network coordinate systems. IWQoS 2012: 1-9 - [c17]Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu:
Ghost Domain Names: Revoked Yet Still Resolvable. NDSS 2012 - [c16]Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, Mo Zhou:
Revisiting why Kad lookup fails. P2P 2012: 37-42 - 2011
- [c15]Jun Li, Scott Brooks:
I-seismograph: Observing and measuring Internet earthquakes. INFOCOM 2011: 2624-2632 - 2010
- [c14]Shad Stafford, Jun Li:
Behavior-Based Worm Detectors Compared. RAID 2010: 38-57 - [c13]Toby Ehrenkranz, Jun Li, Patrick D. McDaniel:
Realizing a Source Authentic Internet. SecureComm 2010: 217-234 - 2009
- [j8]Toby Ehrenkranz, Jun Li:
On the state of IP spoofing defense. ACM Trans. Internet Techn. 9(2): 6:1-6:29 (2009) - 2008
- [j7]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
Learning the valid incoming direction of IP packets. Comput. Networks 52(2): 399-417 (2008) - 2007
- [j6]Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, Toby Ehrenkranz:
BGP routing dynamics revisited. Comput. Commun. Rev. 37(2): 5-16 (2007) - [j4]Shad Stafford, Jun Li, Toby Ehrenkranz:
Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts. Simul. 83(2): 199-212 (2007) - [c11]Yibo Wang, Jun Li:
Is your IP address prefix well-served by internet routing? CoNEXT 2007: 69 - [c9]Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang:
On Knowledge-Based Classification of Abnormal BGP Events. ICISS 2007: 267-271 - [c8]Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong:
Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007: 467-472 - 2006
- [c7]Jun Li, Zhen Wu, Eric Purpus:
Toward Understanding the Behavior of BGP During Large-Scale Power Outages. GLOBECOM 2006 - 2005
- [j3]Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal:
An internet routing forensics framework for discovering rules of abnormal BGP events. Comput. Commun. Rev. 35(5): 55-66 (2005) - [c5]Virginia Mary Lo, Dayi Zhou, Yuhong Liu, Chris GauthierDickey, Jun Li:
Scalable supernode selection in peer-to-peer overlay networks. HOT-P2P 2005: 18-25 - [c3]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher:
Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269 - 2004
- [j2]Jun Li, Peter L. Reiher, Gerald J. Popek:
Resilient self-organizing overlay networks for security update delivery. IEEE J. Sel. Areas Commun. 22(1): 189-202 (2004) - 2002
- [b1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144 - [j1]Jun Li, Mark Yarvis, Peter L. Reiher:
Securing distributed adaptation. Comput. Networks 38(3): 347-371 (2002) - [c2]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang:
SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002: 1557-1566 - 1999
- [c1]Jun Li, Peter L. Reiher, Gerald J. Popek:
Securing information transmission by redundancy. NSPW 1999: 112-117
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint