Jason H. Li

According to our database1, Jason H. Li authored at least 68 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Spectrum Data Poisoning with Adversarial Deep Learning.
CoRR, 2019

Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data.
CoRR, 2019

2018
Optimal Network-Centric Planning for Airborne Relay Communications.
IEEE Systems Journal, 2018

Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls.
CoRR, 2018

Designing Secure and Resilient Embedded Avionics Systems.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Spectrum Data Poisoning with Adversarial Deep Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data.
Proceedings of the 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), 2018

Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Wireless Network Inference and Optimization: Algorithm Design and Implementation.
IEEE Trans. Mob. Comput., 2017

Securing the Backpressure Algorithm for Wireless Networks.
IEEE Trans. Mob. Comput., 2017

A Unified Solution to Cognitive Radio Programming, Test and Evaluation for Tactical Communications.
IEEE Communications Magazine, 2017

Designing agility and resilience into embedded systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Joint network coding and backpressure algorithm for cognitive radio networks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
Optimal orbit selection and design for airborne relay communications.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Systems design of cybersecurity in embedded systems.
Proceedings of the 2016 IEEE High Performance Extreme Computing Conference, 2016

Moving Target Defense: a Journey from Idea to Product.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Design Considerations for Building Cyber Deception Systems.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Adaptive Coding Optimization in Wireless Networks: Design and Implementation Aspects.
IEEE Trans. Wireless Communications, 2015

Deadline-Aware Scheduling With Adaptive Network Coding for Real-Time Traffic.
IEEE/ACM Trans. Netw., 2015

Distributed cognitive radio network architecture, SDR implementation and emulation testbed.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Optimal transmission decisions for airborne relay communications.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Network-Wide Awareness.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Metrics of Security.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Multi-layer optimization with backpressure and genetic algorithms for multi-hop wireless networks.
Wireless Networks, 2014

Tactical big data analytics: challenges, use cases, and solutions.
SIGMETRICS Performance Evaluation Review, 2014

Airborne network evaluation: challenges and high fidelity emulation solution.
IEEE Communications Magazine, 2014

Demonstration of plug-and-play cognitive radio network emulation testbed.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2014

2013
Applying Self-Shielding Dynamics to the Network Architecture.
Proceedings of the Moving Target Defense II, 2013

Mobile network performance evaluation using the radio frequency network channel emulation simulation tool(RFnest™).
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

CREATE-NEST: A Distributed Cognitive Radio Network Platform with Physical Channel Awareness.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Design of Mesh Enhancements to Airborne Links.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Mission-oriented moving target defense based on cryptographically strong network dynamics.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
The Impact of Induced Spectrum Predictability Via Wireless Network Coding.
IEEE Trans. Vehicular Technology, 2012

Distributed stochastic power control in ad hoc networks: a nonconvex optimization case.
EURASIP J. Wireless Comm. and Networking, 2012

Adaptive Network Coding for Scheduling Real-time Traffic with Hard Deadlines
CoRR, 2012

Adaptive network coding for scheduling real-time traffic with hard deadlines.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Low complexity multi-layer optimization for multi-hop wireless networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Automated nanomanipulation for nano device construction.
Proceedings of the IEEE International Conference on Robotics and Automation, 2012

Mixed-initiative distributed simultaneous (MDS) planning.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Scented Node Protocol for MANET Routing.
Proceedings of the Biologically Inspired Networking and Sensing, 2012

2011
An Integrated Multi-layer Approach for Seamless Soft Handoff in Mobile Ad Hoc Networks.
JCM, 2011

Guest Editorial.
JCM, 2011

Distributed Stochastic Power Control in Ad-hoc Networks: A Nonconvex Case
CoRR, 2011

A Self-shielding Dynamic Network Architecture.
Proceedings of the MILCOM 2011, 2011

RFnest™: Radio frequency network emulator simulator tool.
Proceedings of the MILCOM 2011, 2011

Traffic shaping impact of network coding on spectrum predictability and jamming attacks.
Proceedings of the MILCOM 2011, 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

Spectrum shaping via network coding in cognitive radio networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Distributed Power Control for Ad-Hoc Communications via Stochastic Nonconvex Utility Optimization.
Proceedings of IEEE International Conference on Communications, 2011

Information-Geometric Wireless Network Inference.
Proceedings of the Global Communications Conference, 2011

2010
Cross-Layer Damage Assessment for Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Uncertainty and Risk Management in Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Spectrum Shaping via Network Coding in Cognitive Radio Networks
CoRR, 2010

Using Bayesian networks for cyber security analysis.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2008
A scalable key management and clustering scheme for wireless ad hoc and sensor networks.
Future Generation Comp. Syst., 2008

AAAI Fall Symposium Reports.
AI Magazine, 2008

Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Heavy-Tailed Workload Aware Ad Hoc Routing.
Proceedings of IEEE International Conference on Communications, 2008

2007
Sensor coverage in wireless ad hoc sensor networks.
IJSNet, 2007

Intelligent Cyber Security Analysis in Enterprise Networks.
Proceedings of the Regarding the Intelligence in Distributed Intelligent Systems, 2007

Preface.
Proceedings of the Regarding the Intelligence in Distributed Intelligent Systems, 2007

2006
A Mobility-Resistant Efficient Clustering Approach for ad hoc and sensor networks.
Mobile Computing and Communications Review, 2006

Mobility Resistant Clustering in Multi-Hop Wireless Networks.
JNW, 2006

A scalable key management and clustering scheme for ad hoc networks.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

2005
A Distributed Efficient Clustering Approach for Ad Hoc and Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005


  Loading...