Jiahao Cao

Orcid: 0000-0001-7139-376X

Affiliations:
  • Tsinghua University, Institute for Network Sciences and Cyberspace (INSC), Beijing, China


According to our database1, Jiahao Cao authored at least 39 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

GM-BFD: A Generalizable Multi-View Framework for Botnet Flow Detection.
Proceedings of the IEEE INFOCOM 2025, 2025

2024
RoLL+: Real-Time and Accurate Route Leak Locating With AS Triplet Features at Scale.
IEEE/ACM Trans. Netw., December, 2024

Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side.
IEEE Trans. Inf. Forensics Secur., 2024

Enhancing Pre-Trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation.
CoRR, 2024

POSTER: Co4U: Efficient and Robust HTTP Message Compression for Edge Computing Networks.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

Poster: Automatic Network Protocol Fingerprint Discovery with Difference-Guided Fuzzing.
Proceedings of the 32nd IEEE International Conference on Network Protocols, 2024

Paraleon: Automatic and Adaptive Tuning for DCQCN Parameters in RDMA Networks.
Proceedings of the 32nd IEEE International Conference on Network Protocols, 2024

Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate.
IEEE/ACM Trans. Netw., June, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Unsupervised and Adaptive Tor Website Fingerprinting.
Proceedings of the Security and Privacy in Communication Networks, 2023

RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features.
Proceedings of the IEEE International Conference on Communications, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022

The devil is in the detail: Generating system call whitelist for Linux seccomp.
Future Gener. Comput. Syst., 2022

Enhancing malware analysis sandboxes with emulated user behavior.
Comput. Secur., 2022

Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020

SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Fingerprinting SDN Applications via Encrypted Control Traffic.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

SoftGuard: Defend Against the Low-Rate TCP Attack in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

cSFC: Building Credible Service Function Chain on the Cloud.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

2017
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Proceedings of the Security and Privacy in Communication Networks, 2017

TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017


  Loading...