


default search action
Ruoyu Li 0003
Person information
- unicode name: 李若愚
- affiliation: Shenzhen University, China
- affiliation (PhD): Tsinghua University, Shenzhen, China
- affiliation (former): Columbia University, New York, NY, USA
Other persons with the same name
- Ruoyu Li — disambiguation page
- Ruoyu Li 0001 — University of Illinois, Department of Mechanical and Industrial Engineering, Chicago, IL, USA
- Ruoyu Li 0002 — University of Texas at Arlington, TX, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Guorui Xie
, Qing Li
, Chupeng Cui, Ruoyu Li
, Lianbo Ma
, Zhuyun Qi, Yong Jiang
:
Intelligent In-Network Attack Detection on Programmable Switches With Soterv2. IEEE Trans. Dependable Secur. Comput. 22(1): 440-456 (2025) - [i4]Qingsong Zou, Jingyu Xiao, Qing Li, Zhi Yan, Yuhang Wang, Li Xu, Wenxuan Wang, Kuofeng Gao, Ruoyu Li, Yong Jiang:
Making Them a Malicious Database: Exploiting Query Code to Jailbreak Aligned Large Language Models. CoRR abs/2502.09723 (2025) - 2024
- [j7]Ruoyu Li
, Qing Li
, Yucheng Huang, Qingsong Zou
, Dan Zhao
, Zhengxin Zhang
, Yong Jiang
, Fa Zhu
, Athanasios V. Vasilakos
:
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph. IEEE Trans. Inf. Forensics Secur. 19: 7005-7018 (2024) - [j6]Ruoyu Li
, Qing Li
, Qingsong Zou
, Dan Zhao
, Xiangyi Zeng, Yucheng Huang, Yong Jiang
, Feng Lyu
, Gaston Ormazabal, Aman Singh
, Henning Schulzrinne
:
IoTGemini: Modeling IoT Network Behaviors for Synthetic Traffic Generation. IEEE Trans. Mob. Comput. 23(12): 13240-13257 (2024) - [j5]Ruoyu Li
, Qing Li
, Tao Lin, Qingsong Zou
, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie
, Yong Jiang
:
DeviceRadar: Online IoT Device Fingerprinting in ISPs Using Programmable Switches. IEEE/ACM Trans. Netw. 32(5): 3854-3869 (2024) - [c9]Chupeng Cui, Qing Li, Guorui Xie, Ruoyu Li, Dan Zhao, Zhenhui Yuan, Yong Jiang:
Proteus: A Difficulty-Aware Deep Learning Framework for Real-Time Malicious Traffic Detection. ICNP 2024: 1-12 - [c8]Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, Xi Xiao, Yong Jiang:
Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction. INFOCOM 2024: 561-570 - [c7]Jingyu Xiao
, Zhiyao Xu
, Qingsong Zou
, Qing Li
, Dan Zhao
, Dong Fang
, Ruoyu Li
, Wenxin Tang
, Kang Li
, Xudong Zuo
, Penghui Hu
, Yong Jiang
, Zixuan Weng
, Michael R. Lyu
:
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask. KDD 2024: 3551-3562 - [i3]Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, Xi Xiao, Yong Jiang:
Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction. CoRR abs/2403.19248 (2024) - [i2]Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang:
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches. CoRR abs/2404.12738 (2024) - [i1]Jingyu Xiao, Zhiyao Xu, Qingsong Zou, Qing Li, Dan Zhao, Dong Fang, Ruoyu Li, Wenxin Tang, Kang Li, Xudong Zuo, Penghui Hu, Yong Jiang, Zixuan Weng, Michael R. Lyv:
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask. CoRR abs/2406.10928 (2024) - 2023
- [j4]Qing Li
, He Huang, Ruoyu Li
, Jianhui Lv, Zhenhui Yuan, Lianbo Ma, Yi Han
, Yong Jiang:
A comprehensive survey on DDoS defense systems: New trends and challenges. Comput. Networks 233: 109895 (2023) - [j3]Qingsong Zou
, Qing Li
, Ruoyu Li
, Yucheng Huang
, Gareth Tyson
, Jingyu Xiao
, Yong Jiang
:
IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 43:1-43:26 (2023) - [j2]Jingyu Xiao
, Qingsong Zou
, Qing Li, Dan Zhao
, Kang Li
, Zixuan Weng
, Ruoyu Li
, Yong Jiang
:
I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 136:1-136:28 (2023) - [c6]Guorui Xie, Qing Li, Jiaye Lin, Gianni Antichi, Dan Zhao, Zhenhui Yuan, Ruoyu Li, Yong Jiang:
Dryad: Deploying Adaptive Trees on Programmable Switches for Networking Classification. ICNP 2023: 1-11 - [c5]Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, Yong Jiang, Yong Yang:
Interpreting Unsupervised Anomaly Detection in Security via Rule Extraction. NeurIPS 2023 - [c4]Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, Mingwei Xu:
HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches. USENIX Security Symposium 2023: 571-588 - 2022
- [j1]Ruoyu Li
, Qing Li
, Jianer Zhou, Yong Jiang
:
ADRIoT: An Edge-Assisted Anomaly Detection Framework Against IoT-Based Network Attacks. IEEE Internet Things J. 9(13): 10576-10587 (2022) - [c3]Ruoyu Li
, Qing Li
, Yucheng Huang, Wenbin Zhang, Peican Zhu
, Yong Jiang:
IoTEnsemble: Detection of Botnet Attacks on Internet of Things. ESORICS (2) 2022: 569-588
2010 – 2019
- 2018
- [c2]Aman Singh, Shashank Murali, Lalka Rieger, Ruoyu Li
, Stefan Hommes
, Radu State, Gaston Ormazabal, Henning Schulzrinne:
HANZO: Collaborative Network Defense for Connected Things. IPTComm 2018: 1-8 - [c1]Bo Wu, Qi Li, Ke Xu, Ruoyu Li
, Zhuotao Liu:
SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection. MASS 2018: 308-316
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-18 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint