Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018 | 176 | 2018 |
The {CrossPath} Attack: Disrupting the {SDN} Control Channel via Shared Links J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang 28th USENIX Security Symposium (USENIX Security 19), 19-36, 2019 | 68 | 2019 |
Disrupting SDN via the data plane: A low-rate flow table overflow attack J Cao, M Xu, Q Li, K Sun, Y Yang, J Zheng Security and Privacy in Communication Networks: 13th International …, 2018 | 55 | 2018 |
SoftGuard: Defend against the low-rate TCP attack in SDN R Xie, M Xu, J Cao, Q Li ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019 | 27 | 2019 |
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition S Wang, J Cao, X He, K Sun, Q Li Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 25 | 2020 |
SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption Q Song, Z Liu, J Cao, K Sun, Q Li, C Wang IEEE Transactions on Information Forensics and Security 16, 1795-1809, 2020 | 19 | 2020 |
Fingerprinting {SDN} applications via encrypted control traffic J Cao, Z Yang, K Sun, Q Li, M Xu, P Han 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 17 | 2019 |
Enhancing malware analysis sandboxes with emulated user behavior S Liu, P Feng, S Wang, K Sun, J Cao Computers & Security 115, 102613, 2022 | 14 | 2022 |
When match fields do not need to match: Buffered packets hijacking in SDN J Cao, R Xie, K Sun, Q Li, G Gu, M Xu Proc. of the Network and Distributed System Security Symposium (NDSS'20), 2020 | 14 | 2020 |
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang IEEE Access 8, 68449-68459, 2020 | 13 | 2020 |
Try before you buy: Privacy-preserving data evaluation on cloud-based machine learning data marketplace Q Song, J Cao, K Sun, Q Li, K Xu Annual Computer Security Applications Conference, 260-272, 2021 | 11 | 2021 |
{SIEVE}: Secure {In-Vehicle} Automatic Speech Recognition Systems S Wang, J Cao, K Sun, Q Li 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 10 | 2020 |
Disrupting the SDN control channel via shared links: Attacks and countermeasures R Xie, J Cao, Q Li, K Sun, G Gu, M Xu, Y Yang IEEE/ACM Transactions on Networking 30 (5), 2158-2172, 2022 | 8 | 2022 |
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts J Cao, K Sun, Q Li, M Xu, Z Yang, KJ Kwak, J Li Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 4 | 2019 |
The Attack: Overflowing SDN Flow Tables at a Low Rate J Cao, M Xu, Q Li, K Sun, Y Yang IEEE/ACM Transactions on Networking, 2022 | 3 | 2022 |
cSFC: Building credible service function chain on the cloud S Yao, M Xu, Q Li, J Cao, Q Song 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 3 | 2019 |
Rosetta: Enabling Robust {TLS} Encrypted Traffic Classification in Diverse Network Environments with {TCP-Aware} Traffic Augmentation R Xie, J Cao, E Dong, M Xu, K Sun, Q Li, L Shen, M Zhang 32nd USENIX Security Symposium (USENIX Security 23), 625-642, 2023 | 2 | 2023 |
From One-Hot Encoding to Privacy-Preserving Synthetic Electronic Health Records Embedding X Xiang, S Duan, H Pan, P Han, J Cao, C Liu Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020 | 2 | 2020 |
SEC: Secure, efficient, and compatible source address validation with packet tags X Yang, J Cao, M Xu 2020 IEEE 39th International Performance Computing and Communications …, 2020 | 2 | 2020 |
TSA: A two-phase scheme against amplification DDoS attack in SDN Z Liu, M Xu, J Cao, Q Li Mobile Ad-hoc and Sensor Networks: 13th International Conference, MSN 2017 …, 2018 | 2 | 2018 |