Bo Li

Orcid: 0000-0002-6297-712X

Affiliations:
  • Beihang University, Beijing Advanced Innovation Center for Big Data and Brain Computing and State Key Laboratory of Software Development Environment, Beijing, China
  • Beihang University, School of Computer Science and Engineering, Beijing, China (PhD 2011)


According to our database1, Bo Li authored at least 102 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A2-CLM: Few-Shot Malware Detection Based on Adversarial Heterogeneous Graph Augmentation.
IEEE Trans. Inf. Forensics Secur., 2024

Empowering smart city situational awareness via big mobile data.
Frontiers Inf. Technol. Electron. Eng., 2024

2023
TI-MVD: A temporal interaction-enhanced model for malware variants detection.
Knowl. Based Syst., October, 2023

eHotSnap: An Efficient and Hot Distributed Snapshots System for Virtual Machine Cluster.
IEEE Trans. Parallel Distributed Syst., August, 2023

A Deep Learning Approach to Increase the Value of Satellite Data for PM2.5 Monitoring in China.
Remote. Sens., August, 2023

A novel hierarchical attention-based triplet network with unsupervised domain adaptation for network intrusion detection.
Appl. Intell., May, 2023

Towards Code Watermarking with Dual-Channel Transformations.
CoRR, 2023

2022
Cyber threat prediction using dynamic heterogeneous graph learning.
Knowl. Based Syst., 2022

EarIO: A Low-power Acoustic Sensing Earable for Continuously Tracking Detailed Facial Movements.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection.
Comput. Secur., 2022

DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification.
Comput. Secur., 2022

MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Fingerprinting IIoT Devices Through Machine Learning Techniques.
J. Signal Process. Syst., 2021

A Global Data Model for Electric Power Data Centers.
J. Signal Process. Syst., 2021

Hierarchical Taxonomy-Aware and Attentional Graph Capsule RCNNs for Large-Scale Multi-Label Text Classification.
IEEE Trans. Knowl. Data Eng., 2021

Porn2Vec: A robust framework for detecting pornographic websites based on contrastive learning.
Knowl. Based Syst., 2021

Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning.
Comput. Secur., 2021

Anomaly Detection System of Controller Area Network (CAN) Bus Based on Time Series Prediction.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

MG-DVD: A Real-time Framework for Malware Variant Detection Based on Dynamic Heterogeneous Graph Learning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
Towards a distributed local-search approach for partitioning large-scale social networks.
Inf. Sci., 2020

Multi-attributed heterogeneous graph convolutional network for bot detection.
Inf. Sci., 2020

TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data.
Comput. Secur., 2020

Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional Network.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
Data Model Analysis and Integration Technology Based on Electric Power.
J. Signal Process. Syst., 2019

Research on Microkernel-based Power Dedicated Secure Operating System.
J. Signal Process. Syst., 2019

SPFC: An Effective Optimization for Vertex-Centric Graph Processing Systems.
IEEE Trans. Sustain. Comput., 2019

A Nonparametric Approach to Uncovering Connected Anomalies by Tree Shaped Priors.
IEEE Trans. Knowl. Data Eng., 2019

Modeling and clustering attacker activities in IoT through machine learning techniques.
Inf. Sci., 2019

Incorporating URL embedding into ensemble clustering to detect web anomalies.
Future Gener. Comput. Syst., 2019

Hierarchical Taxonomy-Aware and Attentional Graph Capsule RCNNs for Large-Scale Multi-Label Text Classification.
CoRR, 2019

Automated Classification of Attacker Privileges Based on Deep Neural Network.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Anomaly Detection for Power Grid Based on Time Series Model.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

Uncovering Specific-Shape Graph Anomalies in Attributed Graphs.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
FluteDB: An efficient and scalable in-memory time series database for sensor-cloud.
J. Parallel Distributed Comput., 2018

Vanguard: A Cache-Level Sensitive File Integrity Monitoring System in Virtual Machine Environment.
IEEE Access, 2018

Anomaly Detection for Power Grid Based on Network Flow.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
Multi-Task Learning for Intrusion Detection on web logs.
J. Syst. Archit., 2017

Towards an efficient snapshot approach for virtual machines in clouds.
Inf. Sci., 2017

Towards a multi-layers anomaly detection framework for analyzing network traffic.
Concurr. Comput. Pract. Exp., 2017

Data Quality Evaluation: Methodology and Key Factors.
Proceedings of the Smart Computing and Communication, 2017

NEM: A NEW In-VM Monitoring with High Efficiency and Strong Isolation.
Proceedings of the Smart Computing and Communication, 2017

SecTube: SGX-Based Trusted Transmission System.
Proceedings of the Smart Computing and Communication, 2017

DiPot: A Distributed Industrial Honeypot System.
Proceedings of the Smart Computing and Communication, 2017

WebAD ^2 2 : A Cascading Model Based on Machine Learning for Web Attacks Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

A deep learning enabled subspace spectral ensemble clustering approach for web anomaly detection.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Query-Driven Discovery of Anomalous Subgraphs in Attributed Graphs.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A Proposal of NV Center in Nanodiamond Based Magnetometer toward Human Neuron AP Detection.
Proceedings of the 5th International Conference on Enterprise Systems, 2017

IoT Eye An Efficient System for Dynamic IoT Devices Auto-discovery on Organization Level.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

A Human-Machine Collaborative Detection Model for Identifying Web Attacks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Information Theoretic Subspace Clustering.
IEEE Trans. Neural Networks Learn. Syst., 2016

Toward a flexible and fine-grained access control framework for infrastructure as a service clouds.
Secur. Commun. Networks, 2016

TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments.
Int. J. Grid High Perform. Comput., 2016

SOA Reference Architecture: Standards and Analysis.
Proceedings of the Smart Computing and Communication, 2016

Aggregating Heterogeneous Services in the Smart City: The Practice in China.
Proceedings of the Smart Computing and Communication, 2016

Optimizing Virtual Machine Live Migration without Shared Storage in Hybrid Clouds.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Controlling a Car Through OBD Injection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

A Remote Backup Approach for Virtual Machine Images.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

CloudAuditor: A Cloud Auditing Framework Based on Nested Virtualization.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances.
Concurr. Comput. Pract. Exp., 2015

iMIG: Toward an Adaptive Live Migration Method for KVM Virtual Machines.
Comput. J., 2015

PARS: A Page-Aware Replication System for Efficiently Storing Virtual Machine Snapshots.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

Prediction and Clustering of User Relationship in Social Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Novel Anomaly Detection Approach for Mitigating Web-Based Attacks Against Clouds.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

ShutterRoller: Preserving Social Network Privacy towards High-Speed Domain Gateway.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A fixed point model for rate control and routing in cloud data center networks.
Secur. Commun. Networks, 2014

Shutter: Preventing Information Leakage Based on Domain Gateway for Social Networks.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

NSLPA: A Node Similarity Based Label Propagation Algorithm for Real-Time Community Detection.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Mercurial: A Traffic-Saving Roll Back System for Virtual Machine Cluster.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

VMCSnap: Taking Snapshots of Virtual Machine Cluster with Memory Deduplication.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

HotRestore: A Fast Restore System for Virtual Machine Cluster.
Proceedings of the 28th Large Installation System Administration Conference, 2014

dIRIEr: Distributed Influence Maximization in social network.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Web Service Recommendation via Exploiting Temporal QoS Information.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

SyncSnap: Synchronized Live Memory Snapshots of Virtual Machine Networks.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree.
Telecommun. Syst., 2013

VMScatter: migrate virtual machines to many hosts.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

A Memory Deduplication Approach Based on Group in Virtualized Environments.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

A Network-Based Approach for Collaborative Filtering Recommendation.
Proceedings of the Behavior and Social Computing, 2013

HotSnap: A Hot Distributed Snapshot System For Virtual Machine Cluster.
Proceedings of the Lucky LISA: Proceedings of the 27th Large Installation System Administration Conference, 2013

LoRe: Supporting Non-deterministic Events Logging and Replay for KVM Virtual Machines.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

vMON: An Efficient Out-of-VM Process Monitor for Virtual Machines.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

MEFTTD: A Parallel Awareness Scheduler.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
CyberGuarder: A virtualization security assurance architecture for green cloud computing.
Future Gener. Comput. Syst., 2012

Reliability-aware automatic composition approach for web services.
Sci. China Inf. Sci., 2012

Models and algorithms for elastic-demand network equilibrium problems in communication networks with multicast sessions.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Overbooking-Based Resource Allocation in Virtualized Data Center.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

iROW: An Efficient Live Snapshot System for Virtual Machine Disk.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Remote USB Architecture for Virtual Machine Oriented Device Sharing and Transparent Mgration.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Software Aging in Virtualized Environments: Detection and Prediction.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
VMDetector: A VMM-based Platform to Detect Hidden Process by Multi-view Comparison.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2010
CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration.
Proceedings of the 11th ACIS International Conference on Software Engineering, 2010

A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems.
Proceedings of the Advances in Computer Science and Information Technology, 2010

An adaptive strategy for scheduling data-intensive applications in Grid environments.
Proceedings of the 17th International Conference on Telecommunications, 2010

A Prefetching Framework for the Streaming Loading of Virtual Software.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

A VMM-Based System Call Interposition Framework for Program Monitoring.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

A Virtualization-Based SaaS Enabling Architecture for Cloud Computing.
Proceedings of the Sixth International Conference on Autonomic and Autonomous Systems, 2010

HiTrust: A Hybrid Tree Based Trust Negotiation Service.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
GridFTP GUI: An Easy and Efficient Way to Transfer Data in Grid.
Proceedings of the Networks for Grid Applications, 2009

EnaCloud: An Energy-Saving Application Live Placement Approach for Cloud Computing Environments.
Proceedings of the IEEE International Conference on Cloud Computing, 2009

2004
Research and Implementation of Single Sign-On Mechanism for ASP Pattern.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...