Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018 | 150 | 2018 |
The crosspath attack: Disrupting the SDN control channel via shared links J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang USENIX Security Symposium 2019, 2019 | 57 | 2019 |
Disrupting SDN via the data plane: a low-rate flow table overflow attack J Cao, M Xu, Q Li, K Sun, Y Yang, J Zheng Security and Privacy in Communication Networks: 13th International …, 2018 | 45 | 2018 |
SoftGuard: Defend against the low-rate TCP attack in SDN R Xie, M Xu, J Cao, Q Li ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019 | 22 | 2019 |
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition S Wang, J Cao, X He, K Sun, Q Li Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 18 | 2020 |
Fingerprinting SDN Applications via Encrypted Control Traffic. J Cao, Z Yang, K Sun, Q Li, M Xu, P Han RAID, 501-515, 2019 | 13 | 2019 |
SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption Q Song, Z Liu, J Cao, K Sun, Q Li, C Wang IEEE Transactions on Information Forensics and Security 16, 1795-1809, 2020 | 12 | 2020 |
When match fields do not need to match: Buffered packets hijacking in SDN J Cao, R Xie, K Sun, Q Li, G Gu, M Xu Proc. of the Network and Distributed System Security Symposium (NDSS'20), 2020 | 10 | 2020 |
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang IEEE Access 8, 68449-68459, 2020 | 9 | 2020 |
Enhancing malware analysis sandboxes with emulated user behavior S Liu, P Feng, S Wang, K Sun, J Cao Computers & Security 115, 102613, 2022 | 7 | 2022 |
SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. S Wang, J Cao, K Sun, Q Li RAID, 365-379, 2020 | 6 | 2020 |
Try before you buy: Privacy-preserving data evaluation on cloud-based machine learning data marketplace Q Song, J Cao, K Sun, Q Li, K Xu Annual Computer Security Applications Conference, 260-272, 2021 | 4 | 2021 |
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts J Cao, K Sun, Q Li, M Xu, Z Yang, KJ Kwak, J Li Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 3 | 2019 |
Disrupting the SDN control channel via shared links: Attacks and countermeasures R Xie, J Cao, Q Li, K Sun, G Gu, M Xu, Y Yang IEEE/ACM Transactions on Networking 30 (5), 2158-2172, 2022 | 2 | 2022 |
From One-Hot Encoding to Privacy-Preserving Synthetic Electronic Health Records Embedding X Xiang, S Duan, H Pan, P Han, J Cao, C Liu Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020 | 2 | 2020 |
Sec: Secure, efficient, and compatible source address validation with packet tags X Yang, J Cao, M Xu 2020 IEEE 39th International Performance Computing and Communications …, 2020 | 2 | 2020 |
cSFC: Building credible service function chain on the cloud S Yao, M Xu, Q Li, J Cao, Q Song 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 2 | 2019 |
TSA: A two-phase scheme against amplification DDoS attack in SDN Z Liu, M Xu, J Cao, Q Li Mobile Ad-hoc and Sensor Networks: 13th International Conference, MSN 2017 …, 2018 | 2 | 2018 |
The Attack: Overflowing SDN Flow Tables at a Low Rate J Cao, M Xu, Q Li, K Sun, Y Yang IEEE/ACM Transactions on Networking, 2022 | 1 | 2022 |
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images Y Xing, J Cao, X Wang, S Torabi, K Sun, F Yan, Q Li 2022 IEEE Conference on Communications and Network Security (CNS), 236-244, 2022 | | 2022 |