


default search action
Jianfeng Li 0006
Person information
- affiliation: Xi'an Jiaotong University, Faculty of Electronic and Information Engineering, MOE Key Laboratory for Intelligent Networks and Network Security, Xi'an, China
- affiliation (2019 - 2022): Hong Kong Polytechnic University, Department of Computing, Hong Kong
- affiliation (PhD 2018): Xi'an Jiaotong University, Xi'an, China
Other persons with the same name
- Jianfeng Li — disambiguation page
- Jianfeng Li 0001
— Hohai University, College of Computer and Information, Array and Information Processing Laboratory, Nanjing, China (and 1 more)
- Jianfeng Li 0002
— University of Nottingham, Department of Electrical and Electronic Engineering, UK
- Jianfeng Li 0003
— Southwest University, School of Electronic and Information Engineering, Chongqing, China (and 1 more)
- Jianfeng Li 0004 — Beijing University of Posts and Telecommunications, Teleconm Engineering School, China
- Jianfeng Li 0005 — University of Science and Technology of China, China
- Jianfeng Li 0007
— Beijing University of Technology, Faculty of Materials and Manufacturing, Beijing Key Laboratory of Advanced Manufacturing Technology, Beijing, China (and 1 more)
- Jianfeng Li 0008
— Beijing Aeronautical Technology Research Center, Beijing, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Jian Qu
, Xiaobo Ma
, Wenmao Liu
, Hongqing Sang, Jianfeng Li
, Lei Xue
, Xiapu Luo
, Zhenhua Li
, Li Feng, Xiaohong Guan
:
On Smartly Scanning of the Internet of Things. IEEE/ACM Trans. Netw. 32(2): 1019-1034 (2024) - [j11]Xiaobo Ma
, Jian Qu
, Mawei Shi, Bingyu An, Jianfeng Li
, Xiapu Luo
, Junjie Zhang, Zhenhua Li
, Xiaohong Guan
:
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures. IEEE/ACM Trans. Netw. 32(3): 1904-1919 (2024) - [j10]Jianfeng Li
, Zheng Lin
, Jian Qu
, Shuohan Wu, Hao Zhou, Yangyang Liu, Xiaobo Ma
, Ting Wang, Xiapu Luo
, Xiaohong Guan
:
Robust App Fingerprinting Over the Air. IEEE/ACM Trans. Netw. 32(6): 5065-5080 (2024) - [c23]Jianfeng Li, Zheng Lin
, Xiaobo Ma, Jianhao Li, Jian Qu, Xiapu Luo, Xiaohong Guan:
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization. INFOCOM 2024: 1651-1660 - [c22]Shuohan Wu
, Zihao Li
, Hao Zhou
, Xiapu Luo
, Jianfeng Li
, Haoyu Wang
:
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients. ISSTA 2024: 1440-1452 - [i6]Jian Qu, Xiaobo Ma, Jianfeng Li:
TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation. CoRR abs/2403.05822 (2024) - [i5]Xiaobo Ma, Pengyu Pan, Jianfeng Li, Wei Wang, Weizhi Meng, Xiaohong Guan:
ABC-Channel: An Advanced Blockchain-based Covert Channel. CoRR abs/2403.06261 (2024) - 2023
- [c21]Zihao Li
, Jianfeng Li
, Zheyuan He
, Xiapu Luo
, Ting Wang
, Xiaoze Ni
, Wenwu Yang
, Xi Chen
, Ting Chen
:
Demystifying DeFi MEV Activities in Flashbots Bundle. CCS 2023: 165-179 - [c20]Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. ISSTA 2023: 1-13 - [c19]Tao Ni
, Jianfeng Li
, Xiaokuan Zhang
, Chaoshun Zuo
, Wubing Wang
, Weitao Xu
, Xiapu Luo
, Qingchuan Zhao
:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c18]Kunsong Zhao
, Zihao Li
, Jianfeng Li
, He Ye
, Xiapu Luo
, Ting Chen
:
DeepInfer: Deep Type Inference from Smart Contract Bytecode. ESEC/SIGSOFT FSE 2023: 745-757 - [c17]Tao Ni
, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu
, Xiapu Luo, Qingchuan Zhao
:
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. SP 2023: 3399-3415 - [c16]Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan:
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. USENIX Security Symposium 2023: 589-606 - [i4]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CoRR abs/2312.01091 (2023) - [i3]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. IACR Cryptol. ePrint Arch. 2023: 1855 (2023) - 2022
- [j9]Xiaobo Ma
, Jian Qu, Jianfeng Li, John C. S. Lui
, Zhenhua Li
, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. IEEE/ACM Trans. Netw. 30(1): 394-408 (2022) - [c15]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
Landing Reinforcement Learning onto Smart Scanning of The Internet of Things. INFOCOM 2022: 2088-2097 - [c14]Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma:
Packet-Level Open-World App Fingerprinting on Wireless Traffic. NDSS 2022 - [c13]Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma:
FOAP: Fine-Grained Open-World Android App Fingerprinting. USENIX Security Symposium 2022: 1579-1596 - [c12]Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. USENIX Security Symposium 2022: 1921-1938 - 2021
- [j8]Xin Wang, Xiaobo Ma
, Jiahao Peng, Jianfeng Li, Lei Xue
, Wenjun Hu, Li Feng:
On Modeling Link Flooding Attacks and Defenses. IEEE Access 9: 159198-159217 (2021) - [j7]Xiaobo Ma, Jian Qu, Feitong Chen, Wenmao Liu, Jianfeng Li, Jing Tao, Hongshan Jiao, Mawei Shi, Zhi-Li Zhang:
One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers. IEEE Commun. Mag. 59(2): 64-69 (2021) - [c11]Kaifa Zhao, Hao Zhou, Yulin Zhu
, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan
, Xiapu Luo:
Structural Attack against Graph Based Android Malware Detection. CCS 2021: 3218-3235 - [c10]Xiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Daniel Xiapu Luo, Junjie Zhang, Xiaohong Guan:
Context-aware Website Fingerprinting over Encrypted Proxies. INFOCOM 2021: 1-10 - [c9]Jianfeng Li, Kaifa Zhao, Yajuan Tang, Xiapu Luo, Xiaobo Ma:
Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis. VTC Spring 2021: 1-7 - 2020
- [j6]Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:
Taming energy cost of disk encryption software on data-intensive mobile devices. Future Gener. Comput. Syst. 107: 681-691 (2020) - [c8]Xiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li, Xiaohong Guan:
Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting. INFOCOM 2020: 894-903
2010 – 2019
- 2019
- [j5]Xiaobo Ma
, Jianfeng Li, Yajuan Tang, Bo An, Xiaohong Guan:
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective. Inf. Sci. 479: 486-502 (2019) - 2018
- [j4]Xiaobo Ma, Yihui He, Xiapu Luo
, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan:
Camera Placement Based on Vehicle Traffic for Better City Security Surveillance. IEEE Intell. Syst. 33(4): 49-61 (2018) - [c7]Jianfeng Li, Xiaobo Ma, Guodong Li, Xiapu Luo, Junjie Zhang, Wei Li, Xiaohong Guan:
Can We Learn what People are Doing from Raw DNS Queries? INFOCOM 2018: 2240-2248 - [c6]Yankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu
, Wei Li:
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks. NSS 2018: 319-336 - [c5]Jiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue
, Wenjun Hu:
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks. NSS 2018: 436-451 - 2017
- [j3]Jianfeng Li, Xiaobo Ma, Junjie Zhang, Jing Tao, Pinghui Wang, Xiaohong Guan:
Mining repeating pattern in packet arrivals: Metrics, models, and applications. Inf. Sci. 408: 1-22 (2017) - [i2]Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan:
Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance. CoRR abs/1705.08508 (2017) - 2016
- [c4]Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:
Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices. FNC/MobiSPC 2016: 83-90 - [i1]Yang Hu, John C. S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang:
Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices. CoRR abs/1604.07543 (2016) - 2015
- [j2]Xiaobo Ma, Junjie Zhang, Zhenhua Li, Jianfeng Li, Jing Tao, Xiaohong Guan, John C. S. Lui, Don Towsley
:
Accurate DNS query characteristics estimation via active probing. J. Netw. Comput. Appl. 47: 72-84 (2015) - [c3]Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan:
Modeling repeating behaviors in packet arrivals: Detection and measurement. INFOCOM 2015: 2461-2469 - 2014
- [j1]Xiaobo Ma, Junjie Zhang, Jing Tao, Jianfeng Li, Jue Tian, Xiaohong Guan:
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. IEEE Trans. Inf. Forensics Secur. 9(11): 1906-1921 (2014) - 2013
- [c2]Jianfeng Li, Xiaobo Ma, Jing Tao, Xiaohong Guan:
Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting. ICC 2013: 2540-2544 - 2012
- [c1]Xiaobo Ma, Jianfeng Li, Jing Tao, Xiaohong Guan:
Towards active measurement for DNS query behavior of botnets. GLOBECOM 2012: 845-849
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-14 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint