Follow
Jiahao Cao
Jiahao Cao
Verified email at mails.tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
1762018
The {CrossPath} Attack: Disrupting the {SDN} Control Channel via Shared Links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
28th USENIX Security Symposium (USENIX Security 19), 19-36, 2019
682019
Disrupting SDN via the data plane: A low-rate flow table overflow attack
J Cao, M Xu, Q Li, K Sun, Y Yang, J Zheng
Security and Privacy in Communication Networks: 13th International …, 2018
552018
SoftGuard: Defend against the low-rate TCP attack in SDN
R Xie, M Xu, J Cao, Q Li
ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019
272019
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition
S Wang, J Cao, X He, K Sun, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
252020
SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption
Q Song, Z Liu, J Cao, K Sun, Q Li, C Wang
IEEE Transactions on Information Forensics and Security 16, 1795-1809, 2020
192020
Fingerprinting {SDN} applications via encrypted control traffic
J Cao, Z Yang, K Sun, Q Li, M Xu, P Han
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
172019
Enhancing malware analysis sandboxes with emulated user behavior
S Liu, P Feng, S Wang, K Sun, J Cao
Computers & Security 115, 102613, 2022
142022
When match fields do not need to match: Buffered packets hijacking in SDN
J Cao, R Xie, K Sun, Q Li, G Gu, M Xu
Proc. of the Network and Distributed System Security Symposium (NDSS'20), 2020
142020
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage
P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang
IEEE Access 8, 68449-68459, 2020
132020
Try before you buy: Privacy-preserving data evaluation on cloud-based machine learning data marketplace
Q Song, J Cao, K Sun, Q Li, K Xu
Annual Computer Security Applications Conference, 260-272, 2021
112021
{SIEVE}: Secure {In-Vehicle} Automatic Speech Recognition Systems
S Wang, J Cao, K Sun, Q Li
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
102020
Disrupting the SDN control channel via shared links: Attacks and countermeasures
R Xie, J Cao, Q Li, K Sun, G Gu, M Xu, Y Yang
IEEE/ACM Transactions on Networking 30 (5), 2158-2172, 2022
82022
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
J Cao, K Sun, Q Li, M Xu, Z Yang, KJ Kwak, J Li
Security and Privacy in Communication Networks: 15th EAI International …, 2019
42019
The Attack: Overflowing SDN Flow Tables at a Low Rate
J Cao, M Xu, Q Li, K Sun, Y Yang
IEEE/ACM Transactions on Networking, 2022
32022
cSFC: Building credible service function chain on the cloud
S Yao, M Xu, Q Li, J Cao, Q Song
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
32019
Rosetta: Enabling Robust {TLS} Encrypted Traffic Classification in Diverse Network Environments with {TCP-Aware} Traffic Augmentation
R Xie, J Cao, E Dong, M Xu, K Sun, Q Li, L Shen, M Zhang
32nd USENIX Security Symposium (USENIX Security 23), 625-642, 2023
22023
From One-Hot Encoding to Privacy-Preserving Synthetic Electronic Health Records Embedding
X Xiang, S Duan, H Pan, P Han, J Cao, C Liu
Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020
22020
SEC: Secure, efficient, and compatible source address validation with packet tags
X Yang, J Cao, M Xu
2020 IEEE 39th International Performance Computing and Communications …, 2020
22020
TSA: A two-phase scheme against amplification DDoS attack in SDN
Z Liu, M Xu, J Cao, Q Li
Mobile Ad-hoc and Sensor Networks: 13th International Conference, MSN 2017 …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20