Follow
Hongda Li
Title
Cited by
Cited by
Year
Performance considerations of network functions virtualization using containers
J Anderson, H Hu, U Agarwal, C Lowery, H Li, A Apon
2016 International Conference on Computing, Networking and Communications …, 2016
842016
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls
J Deng, H Hu, H Li, Z Pan, KC Wang, GJ Ahn, J Bi, Y Park
2015 IEEE Conference on Network Function Virtualization and Software Defined …, 2015
662015
vNIDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems
H Li, H Hu, G Gu, GJ Ahn, F Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
542018
Enabling dynamic network access control with anomaly-based IDS and SDN
H Li, F Wei, H Hu
Proceedings of the ACM international workshop on security in software …, 2019
502019
Cybersecurity attacks in vehicle-to-infrastructure applications and their prevention
M Islam, M Chowdhury, H Li, H Hu
Transportation research record 2672 (19), 66-78, 2018
472018
DeepPower: Non-intrusive and deep learning-based detection of IoT malware using power side channels
F Ding, H Li, F Luo, H Hu, L Cheng, H Xiao, R Ge
Proceedings of the 15th ACM Asia conference on computer and communications …, 2020
362020
On the Safety and Efficiency of Virtual Firewall Elasticity Control
H Li, J Deng, H Hu, KC Wang, GJ Ahn, Z Zhao, W Han
24th Network and Distributed System Security Symposium (NDSS 2017), 2017
25*2017
Towards a reliable firewall for software-defined networks
H Hu, W Han, S Kyung, J Wang, GJ Ahn, Z Zhao, H Li
Computers & Security 87, 101597, 2019
202019
Vision-based navigation of autonomous vehicles in roadway environments with unexpected hazards
M Islam, M Chowdhury, H Li, H Hu
Transportation research record 2673 (12), 494-507, 2019
172019
Enhancing security education through designing SDN security labs in CloudLab
Y Park, H Hu, X Yuan, H Li
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
142018
Towards effective virtualization of intrusion detection systems
N Zhang, H Li, H Hu, Y Park
Proceedings of the ACM International Workshop on Security in Software …, 2017
132017
{xNIDS}: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
F Wei, H Li, Z Zhao, H Hu
32nd USENIX Security Symposium (USENIX Security 23), 4337-4354, 2023
92023
Towards efficient traffic monitoring for science dmz with side-channel based traffic winnowing
H Li, F Zhang, L Yu, J Oakley, H Hu, RR Brooks
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
82018
SysFlow: Toward a Programmable Zero Trust Framework for System Security
S Hong, L Xu, J Huang, H Li, H Hu, G Gu
IEEE Transactions on Information Forensics and Security 18, 2794-2809, 2023
52023
S-Blocks: Lightweight and trusted virtual security function with SGX
J Wang, S Hao, H Hu, B Zhao, H Li, W Zhang, J Xu, P Liu, J Ma
IEEE Transactions on Cloud Computing 10 (2), 1082-1099, 2020
52020
When nfv meets ann: Rethinking elastic scaling for ann-based nfs
M Zhang, J Bai, G Li, Z Meng, H Li, H Hu, M Xu
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-6, 2019
52019
Understanding and detecting remote infection on linux-based iot devices
H Li, Q Huang, F Ding, H Hu, L Cheng, G Gu, Z Zhao
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
32022
Teaching SDN Security Using Hands-on Labs in CloudLab
X Yuan, Z Liu, Y Park, H Hu, H Li
Journal of The Colloquium for Information Systems Security Education 7 (1), 6-6, 2020
12020
Journal of The Colloquium for Information SystemsSecurity Educatio
X Yuan, Z Liu, Y Park, H Hu, H Li
Journal of the Colloquium for Information System Security Education 7 (1), 2020
2020
Vision-based Navigation of Autonomous Vehicle In Roadway Environments With Unexpected Hazards
M Chowdhury, M Islam, H Li, H Hu
Center for Connected Multimodal Mobility, Clemson University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20