Ruoyu Li

Orcid: 0000-0003-0754-2817

Affiliations:
  • Shenzhen University, China
  • Tsinghua University, Shenzhen, China (PhD)
  • Columbia University, New York, NY, USA (former)


According to our database1, Ruoyu Li authored at least 21 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Making Them a Malicious Database: Exploiting Query Code to Jailbreak Aligned Large Language Models.
CoRR, February, 2025

Intelligent In-Network Attack Detection on Programmable Switches With Soterv2.
IEEE Trans. Dependable Secur. Comput., 2025

Learning-Enhanced High-Throughput Pattern Matching Based on Programmable Data Plane.
Proceedings of the 2025 USENIX Annual Technical Conference, 2025

QueryAttack: Jailbreaking Aligned Large Language Models Using Structured Non-natural Query Language.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

2024
IoTGemini: Modeling IoT Network Behaviors for Synthetic Traffic Generation.
IEEE Trans. Mob. Comput., December, 2024

DeviceRadar: Online IoT Device Fingerprinting in ISPs Using Programmable Switches.
IEEE/ACM Trans. Netw., October, 2024

SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph.
IEEE Trans. Inf. Forensics Secur., 2024

Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask.
CoRR, 2024

Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction.
Proceedings of the IEEE INFOCOM 2024, 2024

Proteus: A Difficulty-Aware Deep Learning Framework for Real-Time Malicious Traffic Detection.
Proceedings of the 32nd IEEE International Conference on Network Protocols, 2024

2023
I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

A comprehensive survey on DDoS defense systems: New trends and challenges.
Comput. Networks, September, 2023

IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches.
Proceedings of the 32nd USENIX Security Symposium, 2023

Interpreting Unsupervised Anomaly Detection in Security via Rule Extraction.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Dryad: Deploying Adaptive Trees on Programmable Switches for Networking Classification.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

2022
ADRIoT: An Edge-Assisted Anomaly Detection Framework Against IoT-Based Network Attacks.
IEEE Internet Things J., 2022

IoTEnsemble: Detection of Botnet Attacks on Internet of Things.
Proceedings of the Computer Security - ESORICS 2022, 2022

2018
SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

HANZO: Collaborative Network Defense for Connected Things.
Proceedings of the 2018 Principles, Systems and Applications of IP Telecommunications, 2018


  Loading...