Follow
Jiahao Cao
Jiahao Cao
Verified email at mails.tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
1502018
The crosspath attack: Disrupting the SDN control channel via shared links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
USENIX Security Symposium 2019, 2019
572019
Disrupting SDN via the data plane: a low-rate flow table overflow attack
J Cao, M Xu, Q Li, K Sun, Y Yang, J Zheng
Security and Privacy in Communication Networks: 13th International …, 2018
452018
SoftGuard: Defend against the low-rate TCP attack in SDN
R Xie, M Xu, J Cao, Q Li
ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019
222019
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition
S Wang, J Cao, X He, K Sun, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
182020
Fingerprinting SDN Applications via Encrypted Control Traffic.
J Cao, Z Yang, K Sun, Q Li, M Xu, P Han
RAID, 501-515, 2019
132019
SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption
Q Song, Z Liu, J Cao, K Sun, Q Li, C Wang
IEEE Transactions on Information Forensics and Security 16, 1795-1809, 2020
122020
When match fields do not need to match: Buffered packets hijacking in SDN
J Cao, R Xie, K Sun, Q Li, G Gu, M Xu
Proc. of the Network and Distributed System Security Symposium (NDSS'20), 2020
102020
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage
P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang
IEEE Access 8, 68449-68459, 2020
92020
Enhancing malware analysis sandboxes with emulated user behavior
S Liu, P Feng, S Wang, K Sun, J Cao
Computers & Security 115, 102613, 2022
72022
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems.
S Wang, J Cao, K Sun, Q Li
RAID, 365-379, 2020
62020
Try before you buy: Privacy-preserving data evaluation on cloud-based machine learning data marketplace
Q Song, J Cao, K Sun, Q Li, K Xu
Annual Computer Security Applications Conference, 260-272, 2021
42021
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
J Cao, K Sun, Q Li, M Xu, Z Yang, KJ Kwak, J Li
Security and Privacy in Communication Networks: 15th EAI International …, 2019
32019
Disrupting the SDN control channel via shared links: Attacks and countermeasures
R Xie, J Cao, Q Li, K Sun, G Gu, M Xu, Y Yang
IEEE/ACM Transactions on Networking 30 (5), 2158-2172, 2022
22022
From One-Hot Encoding to Privacy-Preserving Synthetic Electronic Health Records Embedding
X Xiang, S Duan, H Pan, P Han, J Cao, C Liu
Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020
22020
Sec: Secure, efficient, and compatible source address validation with packet tags
X Yang, J Cao, M Xu
2020 IEEE 39th International Performance Computing and Communications …, 2020
22020
cSFC: Building credible service function chain on the cloud
S Yao, M Xu, Q Li, J Cao, Q Song
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
22019
TSA: A two-phase scheme against amplification DDoS attack in SDN
Z Liu, M Xu, J Cao, Q Li
Mobile Ad-hoc and Sensor Networks: 13th International Conference, MSN 2017 …, 2018
22018
The Attack: Overflowing SDN Flow Tables at a Low Rate
J Cao, M Xu, Q Li, K Sun, Y Yang
IEEE/ACM Transactions on Networking, 2022
12022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images
Y Xing, J Cao, X Wang, S Torabi, K Sun, F Yan, Q Li
2022 IEEE Conference on Communications and Network Security (CNS), 236-244, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20