Ruoyu Li
Orcid: 0000-0003-0754-2817Affiliations:
- Shenzhen University, China
- Tsinghua University, Shenzhen, China (PhD)
- Columbia University, New York, NY, USA (former)
According to our database1,
Ruoyu Li
authored at least 21 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2025
Making Them a Malicious Database: Exploiting Query Code to Jailbreak Aligned Large Language Models.
CoRR, February, 2025
IEEE Trans. Dependable Secur. Comput., 2025
Proceedings of the 2025 USENIX Annual Technical Conference, 2025
QueryAttack: Jailbreaking Aligned Large Language Models Using Structured Non-natural Query Language.
Proceedings of the Findings of the Association for Computational Linguistics, 2025
2024
IEEE Trans. Mob. Comput., December, 2024
IEEE/ACM Trans. Netw., October, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask.
CoRR, 2024
Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proteus: A Difficulty-Aware Deep Learning Framework for Real-Time Malicious Traffic Detection.
Proceedings of the 32nd IEEE International Conference on Network Protocols, 2024
2023
I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023
Comput. Networks, September, 2023
IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023
HorusEye: A Realtime IoT Malicious Traffic Detection Framework using Programmable Switches.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Dryad: Deploying Adaptive Trees on Programmable Switches for Networking Classification.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023
2022
ADRIoT: An Edge-Assisted Anomaly Detection Framework Against IoT-Based Network Attacks.
IEEE Internet Things J., 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the 2018 Principles, Systems and Applications of IP Telecommunications, 2018