Jun Li

Orcid: 0000-0002-5308-5672

Affiliations:
  • University of Oregon, Eugene, OR, USA
  • University of California at Los Angeles, CA, USA (PhD 2002)


According to our database1, Jun Li authored at least 90 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Resilient Intermediary-Based Key Exchange Protocol for IoT.
ACM Trans. Internet Things, February, 2024

2023
On the Detection of Smart, Self-Propagating Internet Worms.
IEEE Trans. Dependable Secur. Comput., 2023

Toward Adaptive DDoS-Filtering Rule Generation.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
On Capturing DDoS Traffic Footprints on the Internet.
IEEE Trans. Dependable Secur. Comput., 2022

Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures.
CoRR, 2022

Toward a Resilient Key Exchange Protocol for IoT.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
On the Effective Parallelization and Near-Optimal Deployment of Service Function Chains.
IEEE Trans. Parallel Distributed Syst., 2021

Service Placement for Collaborative Edge Applications.
IEEE/ACM Trans. Netw., 2021

Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Bridging Missing Gaps in Evaluating DDoS Research.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

Application-Layer DDoS Defense with Reinforcement Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Scheduling DDoS Cloud Scrubbing in ISP Networks via Randomized Online Auctions.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

LBRY: A Blockchain-Based Decentralized Digital Content Marketplace.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020

Understanding and Detecting Majority Attacks.
Proceedings of the 2nd IEEE International Conference on Decentralized Applications and Infrastructures, 2020

Rapid: Robust and Adaptive Detection of Distributed Denial-of-Service Traffic from the Internet of Things.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
MOERA: Mobility-Agnostic Online Resource Allocation for Edge Computing.
IEEE Trans. Mob. Comput., 2019

Characterizing the dynamics and evolution of incentivized online reviews on Amazon.
Soc. Netw. Anal. Min., 2019

On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

One-Class Adversarial Nets for Fraud Detection.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
SVDC: A Highly Scalable Isolation Architecture for Virtualized Layer-2 Data Center Networks.
IEEE Trans. Cloud Comput., 2018

Fuzzing: a survey.
Cybersecur., 2018

Securing the Smart Home via a Two-Mode Security Framework.
Proceedings of the Security and Privacy in Communication Networks, 2018

Multiple Granularity Online Control of Cloudlet Networks for Edge Computing.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

PathFinder: Capturing DDoS Traffic Footprints on the Internet.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

Online Control of Cloud and Edge Resources Using Inaccurate Predictions.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Service Entity Placement for Social Virtual Reality Applications in Edge Computing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Trojan Horses in Amazon's Castle: Understanding the Incentivized Online Reviews.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
NCShield: Protecting Decentralized, Matrix Factorization-Based Network Coordinate Systems.
IEEE Trans. Serv. Comput., 2017

I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes.
IEEE/ACM Trans. Netw., 2017

The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks.
Comput. Commun., 2017

On the most representative summaries of network user activities.
Comput. Networks, 2017

Thank You For Being A Friend: An Attacker View on Online-Social-Network-Based Sybil Defenses.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Spectrum-based Deep Neural Networks for Fraud Detection.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Source-End DDoS Defense in IoT Environments.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

2016
Optimizing Cost for Online Social Networks on Geo-Distributed Clouds.
IEEE/ACM Trans. Netw., 2016

Compressing IP Forwarding Tables with Small Bounded Update Time.
Comput. Networks, 2016

An expectation-based approach to policy-based security of the Border Gateway Protocol.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Improving lookup reliability in Kad.
Peer-to-Peer Netw. Appl., 2015

SF-DRDoS: The store-and-flood distributed reflective denial of service attack.
Comput. Commun., 2015

Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability.
Comput. Commun., 2015

MDTC: An efficient approach to TCAM-based multidimensional table compression.
Proceedings of the 14th IFIP Networking Conference, 2015

2014
Tsunami: A parasitic, indestructible botnet on Kad.
Peer-to-Peer Netw. Appl., 2014

Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

SOUP: an online social network by the people, for the people.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

On the state of OSN-based Sybil defenses.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

TED: Inter-domain traffic engineering via deflection.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Toward the most representative summaries of network user activities.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Multi-objective data placement for multi-cloud socially aware services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

The store-and-flood distributed reflective denial of service attack.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Detecting smart, self-propagating Internet worms.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Splider: A split-based crawler of the BT-DHT network and its applications.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Optimizing data center traffic of Online Social Networks.
Proceedings of the 19th IEEE Workshop on Local & Metropolitan Area Networks, 2013

On the effectiveness of sybil defenses based on online social networks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Leveraging the crowds to disrupt phishing.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

Ghost Domain Names: Revoked Yet Still Resolvable.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

NCShield: Securing decentralized, matrix factorization-based network coordinate systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Cost optimization for Online Social Networks on geo-distributed clouds.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

A resource management approach to web browser security.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients.
Peer-to-Peer Netw. Appl., 2011

I-seismograph: Observing and measuring Internet earthquakes.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Realizing a Source Authentic Internet.
Proceedings of the Security and Privacy in Communication Networks, 2010

Behavior-Based Worm Detectors Compared.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
On the state of IP spoofing defense.
ACM Trans. Internet Techn., 2009

Humboldt: A distributed phishing disruption system.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Learning the valid incoming direction of IP packets.
Comput. Networks, 2008

2007
Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts.
Simul., 2007

Functional similarities between computer worms and biological pathogens.
Comput. Secur., 2007

BGP routing dynamics revisited.
Comput. Commun. Rev., 2007

Understanding and Utilizing the Hierarchy of Abnormal BGP Events.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

Investigating the Impact of Real-World Factors on Internet Worm Propagation.
Proceedings of the Information Systems Security, Third International Conference, 2007

On Knowledge-Based Classification of Abnormal BGP Events.
Proceedings of the Information Systems Security, Third International Conference, 2007

Is your IP address prefix well-served by internet routing?
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

2006
Toward Understanding the Behavior of BGP During Large-Scale Power Outages.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
An internet routing forensics framework for discovering rules of abnormal BGP events.
Comput. Commun. Rev., 2005

Simulation and Analysis on the Resiliency and Efficiency of Malnets.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

Proof of Service in a Hybrid P2P Environment.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Scalable supernode selection in peer-to-peer overlay networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005

mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Resilient self-organizing overlay networks for security update delivery.
IEEE J. Sel. Areas Commun., 2004

2002
Securing distributed adaptation.
Comput. Networks, 2002

SAVE: Source Address Validity Enforcement Protocol.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Disseminating Security Updates at Internet Scale
Advances in Information Security 8, Springer, 2002

1999
Securing information transmission by redundancy.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999


  Loading...