Baojun Liu

Orcid: 0000-0002-9032-8063

According to our database1, Baojun Liu authored at least 47 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Variations of single event transient induced by line edge roughness (LER) and temperature in FinFET.
Microelectron. J., February, 2024

Research on human behaviour recognition method of sports images based on machine learning.
Int. J. Bio Inspired Comput., 2024

2023
Detecting and Measuring Security Risks of Hosting-Based Dangling Domains.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

The Maginot Line: Attacking the Boundary of DNS Caching Protection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Model and analysis of single event transient sensitivity based on uncertainty quantification.
Microprocess. Microsystems, April, 2022

Building an Open, Robust, and Stable Voting-Based Domain Top List.
Proceedings of the 31st USENIX Security Symposium, 2022

A Large-scale and Longitudinal Measurement Study of DKIM Deployment.
Proceedings of the 31st USENIX Security Symposium, 2022

Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Effect of temperature and single event transient on crosstalk in coupled single-walled carbon nanotube (SWCNT) bundle interconnects.
Int. J. Circuit Theory Appl., 2021

DNSWeight: Quantifying Country-Wise Importance of Domain Name System.
IEEE Access, 2021

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Fast IPv6 Network Periphery Discovery and Security Implications.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Detecting and Characterizing SMS Spearphishing Attacks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Research on encoding and decoding algorithms of non-binary LDPC code and FPGA implementation.
J. Comput. Methods Sci. Eng., 2020

An Analytic Model for Predicting Single Event (SE) Crosstalk of Nanometer CMOS Circuits.
J. Electron. Test., 2020

Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices.
Proceedings of the 29th USENIX Security Symposium, 2020

CDN Judo: Breaking the CDN DoS Protection with Itself.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Total Ionizing Dose Hardening of 45 nm FD-SOI MOSFETs Using Body-Tie Biasing.
IEEE Access, 2019

Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.
Proceedings of the Security and Privacy in Communication Networks, 2019

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?
Proceedings of the Internet Measurement Conference, 2019

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Measuring Privacy Threats in China-Wide Mobile Networks.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Reliability for nanomagnetic logic (NML) readout circuit under single event effect.
Microelectron. J., 2015

2014
On-chip readout circuit for nanomagnetic logic.
IET Circuits Devices Syst., 2014

2012
Reliability Evaluation for Single Event Transients on Digital Circuits.
IEEE Trans. Reliab., 2012

Reliability evaluation for single event crosstalk via probabilistic transfer matrix.
Microelectron. Reliab., 2012

The impact of Miller and coupling effects on single event transient in logical circuits.
Microelectron. J., 2012


  Loading...