Frank Li

Orcid: 0000-0003-2242-048X

Affiliations:
  • Georgia Institute of Technology, GA, USA


According to our database1, Frank Li authored at least 37 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

A First Look At NAT64 Deployment In-The-Wild.
CoRR, 2023

A Large-Scale Measurement of Website Login Policies.
Proceedings of the 32nd USENIX Security Symposium, 2023

Investigating the Password Policy Practices of Website Administrators.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Evaluating the Security Posture of Real-World FIDO2 Deployments.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Measuring Website Password Creation Policies At Scale.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
IEEE Trans. Dependable Secur. Comput., 2022

A View into YouTube View Fraud.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Building an Open, Robust, and Stable Voting-Based Domain Top List.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Deep Entity Classification: Abusive Account Detection for Online Social Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Who you gonna call?: an empirical evaluation of website security.txt deployment.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Knock and talk: investigating local network communications on websites.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards A User-Level Understanding of IPv6 Behavior.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Remedying Security Concerns at an Internet Scale.
PhD thesis, 2019

Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
A Large-Scale Empirical Study of Security Patches.
login Usenix Mag., 2018

Toward Continual Measurement of Global Network-Level Censorship.
IEEE Secur. Priv., 2018

Web-based Attacks to Discover and Control Local IoT Devices.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Global-Scale Measurement of DNS Manipulation.
login Usenix Mag., 2017

Global Measurement of DNS Manipulation.
Proceedings of the 26th USENIX Security Symposium, 2017

Augur: Internet-Wide Detection of Connectivity Disruptions.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Target generation for internet-wide IPv6 scanning.
Proceedings of the 2017 Internet Measurement Conference, 2017

MiniCrypt: Reconciling Encryption and Compression for Big Data Stores.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the 25th International Conference on World Wide Web, 2016

You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

2014
The Matter of Heartbleed.
Proceedings of the 2014 Internet Measurement Conference, 2014

Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
An Ideal-Security Protocol for Order-Preserving Encoding.
IACR Cryptol. ePrint Arch., 2013

Data-Confined HTML5 Applications.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
SybilControl: Practical Sybil Defense with Computational Puzzles
CoRR, 2012

2011
Privacy and accountability for location-based aggregate statistics.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...