Jiahao Cao

Orcid: 0000-0001-7139-376X

According to our database1, Jiahao Cao authored at least 33 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate.
IEEE/ACM Trans. Netw., June, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features.
Proceedings of the IEEE International Conference on Communications, 2023

Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures.
IEEE/ACM Trans. Netw., 2022

Good Learning, Bad Performance: A Novel Attack Against RL-Based Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2022

The devil is in the detail: Generating system call whitelist for Linux seccomp.
Future Gener. Comput. Syst., 2022

Enhancing malware analysis sandboxes with emulated user behavior.
Comput. Secur., 2022

Aspect Feature Distillation and Enhancement Network for Aspect-based Sentiment Analysis.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Aspect Is Not You Need: No-aspect Differential Sentiment Framework for Aspect-based Sentiment Analysis.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Prompt as a Knowledge Probe for Chinese Spelling Check.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption.
IEEE Trans. Inf. Forensics Secur., 2021

Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Integrating Coarse Granularity Part-level Features with Supervised Global-level Features for Person Re-identification.
CoRR, 2020

CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020

SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.
Proceedings of the 28th USENIX Security Symposium, 2019

Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts.
Proceedings of the Security and Privacy in Communication Networks, 2019

Fingerprinting SDN Applications via Encrypted Control Traffic.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

SoftGuard: Defend Against the Low-Rate TCP Attack in SDN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

cSFC: Building Credible Service Function Chain on the Cloud.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

2017
Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack.
Proceedings of the Security and Privacy in Communication Networks, 2017

TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017


  Loading...