Kang Li

Orcid: 0000-0002-9789-3233

Affiliations:
  • University of Georgia, Department of Computer Science, Athens, GA, USA


According to our database1, Kang Li authored at least 56 papers between 2000 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
SoK: On the Semantic AI Security in Autonomous Driving.
CoRR, 2022

SimLane: A Risk-Orientated Benchmark for Lane Detection.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Coverage-based Scene Fuzzing for Virtual Autonomous Driving Testing.
CoRR, 2021

Disclosing the Fragility Problem of Virtual Safety Testing for Autonomous Driving Systems.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2019
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Security Risks in Deep Learning Implementations.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Analysis and Measurement of Zone Dependency in the Domain Name System.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

MobileFindr: Function Similarity Identification for Reversing Mobile Binaries.
Proceedings of the Computer Security, 2018

2017
Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications.
CoRR, 2017

pbSE: Phase-Based Symbolic Execution.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Detecting Virtualization Specific Vulnerabilities in Cloud Computing Environment.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Forwarding-Loop Attacks in Content Delivery Networks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Toward Automatically Deducing Key Device States for the Live Migration of Virtual Machines.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
PeerRush: Mining for unwanted P2P traffic.
J. Inf. Secur. Appl., 2014

Harnessing Context for Vandalism Detection in Wikipedia.
EAI Endorsed Trans. Collab. Comput., 2014

When HTTPS Meets CDN: A Case of Authentication in Delegated Service.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Measuring Query Latency of Top Level DNS Servers.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Measuring and Detecting Malware Downloads in Live Network Traffic.
Proceedings of the Computer Security - ESORICS 2013, 2013

A content-context-centric approach for detecting vandalism in Wikipedia.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Ghost Domain Names: Revoked Yet Still Resolvable.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Speed Up Statistical Spam Filter by Approximation.
IEEE Trans. Computers, 2011

Video personalization in heterogeneous and resource-constrained environments.
Multim. Syst., 2011

Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks.
IEEE Internet Comput., 2011

2010
A Link Obfuscation Service to Detect Webbots.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Privacy-Aware Collaborative Spam Filtering.
IEEE Trans. Parallel Distributed Syst., 2009

Client-centered multimedia content adaptation.
ACM Trans. Multim. Comput. Commun. Appl., 2009

Large Online Social Footprints - An Emerging Threat.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Human Motion Capture Data Compression by Model-Based Indexing: A Power Aware Approach.
IEEE Trans. Vis. Comput. Graph., 2007

Model-Based Power Aware Compression Algorithms for MPEG-4 Virtual Human Animation in Mobile Environments.
IEEE Trans. Multim., 2007

Video personalization in resource-constrained multimedia environments.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Ligne-claire video encoding for power constrained mobile environments.
Proceedings of the 15th International Conference on Multimedia 2007, 2007

Semantics-Based Video Indexing using a Stochastic Modeling Approach.
Proceedings of the International Conference on Image Processing, 2007

2006
Client-Centered, Energy-Efficient Wireless Communication on IEEE 802.11b Networks.
IEEE Trans. Mob. Comput., 2006

Fast statistical spam filter by approximate classifications.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

FGS-MR: MPEG4 fine grained scalable multi-resolution layered video encoding.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2006

Parallel Algorithms for Motion Panorama Construction.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Towards an Ontology Driven Spam Filter.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

2005
Efficient compression and delivery of stored motion data for avatar animation in resource constrained devices.
Proceedings of the ACM Symposium on Virtual Reality Software and Technology, 2005

New Methods for Passive Estimation of TCP Round-Trip Times.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

ACE: an active, client-directed method for reducing energy during web browsing.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2005

BAP Sparsing: A Novel Approach to MPEG-4 Body Animation Parameter Compression.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

Throttling Outgoing SPAM for Webmail Services.
Proceedings of the CEAS 2005, 2005

2004
Analysis of state exposure control to prevent cheating in online games.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2004

Client-centered energy and delay analysis for TCP downloads.
Proceedings of the Quality of Service, 2004

Approximate Caches for Packet Classification.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Resisting SPAM Delivery by TCP Damping.
Proceedings of the CEAS 2004, 2004

Shall We Stop All Unsolicited Email Messages?
Proceedings of the CEAS 2004, 2004

2003
Architectures for packet classification caching.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2001
The Minimal Buffering Requirements of Congestion Controlled Interactive Multimedia Applications.
Proceedings of the Interactive Distributed Multimedia Systems, 2001

The Case for Streaming Multimedia with TCP.
Proceedings of the Interactive Distributed Multimedia Systems, 2001

Modeling the effect of short-term rate variations on TCP-friendly congestion control behavior.
Proceedings of the American Control Conference, 2001

2000
Control challenges in multi-level adaptive video streaming.
Proceedings of the 39th IEEE Conference on Decision and Control, 2000


  Loading...