Shuailou Li

According to our database1, Shuailou Li authored at least 13 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
FineGCP: Fine-grained dependency graph community partitioning for attack investigation.
Comput. Secur., 2025

Edge computing for IoT: Novel insights from a comparative analysis of access control models.
Comput. Networks, 2025

Dual Decoder for Fast Inference in Natural Language Generation.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

2024
Comprehensive Analysis of Access Control Models in Edge Computing: Challenges, Solutions, and Future Directions.
CoRR, 2024

DyCom: A Dynamic Community Partitioning Technique for System Audit Logs.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy.
Proceedings of the IEEE International Performance, 2024

Interpretable Risk-aware Access Control for Spark: Blocking Attack Purpose Behind Actions.
Proceedings of the 42nd IEEE International Conference on Computer Design, 2024

2023
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
Ponder: Enabling Balloon-Borne Based Solar Unmanned Aerial Vehicle's Take Off Diagnosis under Little Data.
Entropy, 2022

2021
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021


  Loading...