2019
|
Shen Wang; Zhengzhang Chen; Phillip S Yu; Lu-An Tang; Zhichun Li; Junghwan Rhee; Haifeng Chen Deep Program Reidentification: A Graph Neural Network Solution Inproceedings SIAM International Conference on Data Mining (SDM), 2019. BibTeX @inproceedings{SDM09,
title = {Deep Program Reidentification: A Graph Neural Network Solution},
author = {Shen Wang and Zhengzhang Chen and Phillip S Yu and Lu-An Tang and Zhichun Li and Junghwan Rhee and Haifeng Chen},
year = {2019},
date = {2019-05-01},
booktitle = {SIAM International Conference on Data Mining (SDM)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Yuseok Jeon; Junghwan Rhee; Chung Hwan Kim; Zhichun Li; Mathis Payer; Byungyoung Lee; Zhenyu Wu; Kangkook Jee PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications Inproceedings ACM Conference on Data and Application Security and Privacy (CODASPY), 2019. BibTeX @inproceedings{CODASPY09,
title = {PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications},
author = {Yuseok Jeon and Junghwan Rhee and Chung Hwan Kim and Zhichun Li and Mathis Payer and Byungyoung Lee and Zhenyu Wu and Kangkook Jee},
year = {2019},
date = {2019-03-01},
booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Suphannee Sivakorn; Kangkook Jee; Yixin Sun; Lauri Kort-Parn; Zhichun Li; Cristian Lumezanu; Lu-An Tang; Ding Li Countering Malicious Processes with Process-DNS Association Inproceedings NDSS, 2019. Links | BibTeX @inproceedings{NDSS19-PDNS,
title = {Countering Malicious Processes with Process-DNS Association},
author = {Suphannee Sivakorn and Kangkook Jee and Yixin Sun and Lauri Kort-Parn and Zhichun Li and Cristian Lumezanu and Lu-An Tang and Ding Li},
url = {https://www.zhichunli.org/publication/NDSS19-PDNS.pdf},
year = {2019},
date = {2019-00-01},
booktitle = {NDSS},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Wajih Ul Hassan; Shengjian Guo; Ding Li; Zhichun Li; Zhengzhang Chen; Kangkook Jee; Zhichun Li; Adam Bates NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage Inproceedings NDSS, 2019. Links | BibTeX @inproceedings{NDSS19-NoDoze,
title = {NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage},
author = {Wajih Ul Hassan and Shengjian Guo and Ding Li and Zhichun Li and Zhengzhang Chen and Kangkook Jee and Zhichun Li and Adam Bates},
url = {https://www.zhichunli.org/publication/NDSS19-NoDoze.pdf},
year = {2019},
date = {2019-00-01},
booktitle = {NDSS},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2018
|
Cheng Cao; Zhengzhang Chen; James Caverlee; Lu-An Tang; Chen Luo; Zhichun Li Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks Inproceedings ACM International Conference on Information and Knowledge Management (CIKM), 2018. Links | BibTeX @inproceedings{CIKM2018-CommunityDetection,
title = {Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks},
author = {Cheng Cao and Zhengzhang Chen and James Caverlee and Lu-An Tang and Chen Luo and Zhichun Li},
url = {https://www.zhichunli.org/publication/CIKM18-CD.pdf},
year = {2018},
date = {2018-10-01},
booktitle = {ACM International Conference on Information and Knowledge Management (CIKM)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Ying Lin; Zhengzhang Chen; Cheng Cao; Lu-An Tang; Kai Zhang; Wei Cheng; Zhichun; Li Collaborative Alert Ranking for Anomaly Detection Inproceedings ACM International Conference on Information and Knowledge Management (CIKM), 2018. Links | BibTeX @inproceedings{CIKM2018-AlertRanking,
title = {Collaborative Alert Ranking for Anomaly Detection},
author = {Ying Lin and Zhengzhang Chen and Cheng Cao and Lu-An Tang and Kai Zhang and Wei Cheng and Zhichun and Li},
url = {https://www.zhichunli.org/publication/CIKM18-AlertR.pdf},
year = {2018},
date = {2018-10-01},
booktitle = {ACM International Conference on Information and Knowledge Management (CIKM)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Yutao Tang; Ding Li; Zhichun Li; Mu Zhang; Kangkook Jee; Xusheng Xiao; Zhenyu Wu; Junghwan Rhee; Fengyuan Xu; Qun Li NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis Inproceedings ACM CCS, 2018. Links | BibTeX @inproceedings{CCS2018,
title = {NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis},
author = {Yutao Tang and Ding Li and Zhichun Li and Mu Zhang and Kangkook Jee and Xusheng Xiao and Zhenyu Wu and Junghwan Rhee and Fengyuan Xu and Qun Li},
url = {https://www.zhichunli.org/publication/CCS18-NodeMerge.pdf},
year = {2018},
date = {2018-10-01},
booktitle = {ACM CCS},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Peng Gao; Xusheng Xiao; Ding Li; Zhichun Li; Kangkook Jee; Zhenyu Wu; Chung Hwan Kim; Sanjeev R Kulkarni; Prateek Mittal SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection Inproceedings USENIX Security, 2018. Links | BibTeX @inproceedings{Security18,
title = {SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection},
author = {Peng Gao and Xusheng Xiao and Ding Li and Zhichun Li and Kangkook Jee and Zhenyu Wu and Chung Hwan Kim and Sanjeev R Kulkarni and Prateek Mittal},
url = {https://www.zhichunli.org/publication/sec18-final146.pdf},
year = {2018},
date = {2018-08-01},
booktitle = {USENIX Security},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Chen Luo; Zhengzhang Chen; Lu-An tang; Anshumali Shrivastava; Zhichun Li; Haifeng Chen; Jieping Ye TINET: Learning Invariant Networks via Knowledge Transfer Inproceedings KDD, 2018. Links | BibTeX @inproceedings{KDD18,
title = {TINET: Learning Invariant Networks via Knowledge Transfer},
author = {Chen Luo and Zhengzhang Chen and Lu-An tang and Anshumali Shrivastava and Zhichun Li and Haifeng Chen and Jieping Ye},
url = {https://www.zhichunli.org/publication/kdd2018-tinet-final.pdf},
year = {2018},
date = {2018-08-01},
booktitle = {KDD},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Peng Gao; Xusheng Xiao; Zhichun Li; Kangkook Jee; Fengyuan Xu; Sanjeev R Kulkarni; Prateek Mittal AIQL: Enabling Efficient Attack Investigation from System Monitoring Data Inproceedings USENIX Annual Technical Conference (ATC), 2018. Links | BibTeX @inproceedings{ATC18,
title = {AIQL: Enabling Efficient Attack Investigation from System Monitoring Data},
author = {Peng Gao and Xusheng Xiao and Zhichun Li and Kangkook Jee and Fengyuan Xu and Sanjeev R Kulkarni and Prateek Mittal},
url = {https://www.zhichunli.org/publication/aiql-atc18.pdf},
year = {2018},
date = {2018-07-01},
booktitle = {USENIX Annual Technical Conference (ATC)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Yushan Liu; Mu Zhang; Ding Li; Kangkook Jee; Zhichun Li; Zhenyu Wu; Junghwan Rhee; Prateek Mittal Towards a Timely Causality Analysis for Enterprise Security Inproceedings NDSS, 2018. Links | BibTeX @inproceedings{NDSS18,
title = {Towards a Timely Causality Analysis for Enterprise Security},
author = {Yushan Liu and Mu Zhang and Ding Li and Kangkook Jee and Zhichun Li and Zhenyu Wu and Junghwan Rhee and Prateek Mittal},
url = {https://www.zhichunli.org/publication/priotracker-ndss18.pdf},
year = {2018},
date = {2018-02-01},
booktitle = {NDSS},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2017
|
Boxiang Dong; Zhenzhang Chen; Hui (Wendy) Wang; Lu-An Tang; Kai Zhang; Yin Lin; Zhichun Li; Haifeng Chen Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems Inproceedings ACM CIKM, 2017. Links | BibTeX @inproceedings{CIKM17,
title = {Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems},
author = {Boxiang Dong and Zhenzhang Chen and Hui (Wendy) Wang and Lu-An Tang and Kai Zhang and Yin Lin and Zhichun Li and Haifeng Chen},
url = {https://www.zhichunli.org/publication/CIKM2017_final.pdf},
year = {2017},
date = {2017-01-01},
booktitle = {ACM CIKM},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2016
|
Bo Zong; Xusheng Xiao; Zhichun Li; Zhenyu Wu; Zhiyun Qian; Xifeng Yan; Ambuj K Singh; Guofei Jiang Behavior Query Discovery in System-Generated Temporal Graphs Inproceedings VLDB, 2016. Links | BibTeX @inproceedings{TGMiner,
title = {Behavior Query Discovery in System-Generated Temporal Graphs},
author = {Bo Zong and Xusheng Xiao and Zhichun Li and Zhenyu Wu and Zhiyun Qian and Xifeng Yan and Ambuj K Singh and Guofei Jiang},
url = {https://www.vldb.org/pvldb/vol9/p240-zong.pdf},
year = {2016},
date = {2016-01-01},
booktitle = {VLDB},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Zhang Xu; Zhenyu Wu; Zhichun Li; Kangkook Jee; Junghwan Rhee; Xusheng Xiao; Fengyuan Xu; Haining Wang; Guofei Jiang High Fidelity Data Reduction for Big Data Security Dependency Analyses Inproceedings ACM CCS, 2016. Links | BibTeX @inproceedings{DataReduction06,
title = {High Fidelity Data Reduction for Big Data Security Dependency Analyses},
author = {Zhang Xu and Zhenyu Wu and Zhichun Li and Kangkook Jee and Junghwan Rhee and Xusheng Xiao and Fengyuan Xu and Haining Wang and Guofei Jiang},
url = {https://www.zhichunli.org/publication/Reduction-CCS-2016.pdf},
year = {2016},
date = {2016-01-01},
booktitle = {ACM CCS},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2015
|
Jianjun Huang; Zhichun Li; Xusheng Xiao; Zhenyu Wu; Kangjie Lu; Xiangyu Zhang; Guofei Jiang SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps Inproceedings USENIX Security, 2015. Links | BibTeX @inproceedings{SUPOR,
title = {SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps},
author = {Jianjun Huang and Zhichun Li and Xusheng Xiao and Zhenyu Wu and Kangjie Lu and Xiangyu Zhang and Guofei Jiang},
url = {https://www.zhichunli.org/publication/SUPOR-USENIX2015.pdf},
year = {2015},
date = {2015-08-01},
booktitle = {USENIX Security},
note = {Top 10 finalists for CSAW Best Paper Award},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Kangjie Lu; Zhichun Li; Vasileios Kemerlis; Zhenyu Wu; Long Lu; Cong Zheng; Zhiyun Qian; Wenke Lee; Guofei Jiang Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting Inproceedings the Annual Network & Distributed System Security Symposium (NDSS), 2015. Links | BibTeX @inproceedings{AAPL,
title = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting},
author = {Kangjie Lu and Zhichun Li and Vasileios Kemerlis and Zhenyu Wu and Long Lu and Cong Zheng and Zhiyun Qian and Wenke Lee and Guofei Jiang},
url = {https://www.zhichunli.org/publication/aapl-ndss15.pdf},
year = {2015},
date = {2015-02-01},
booktitle = {the Annual Network & Distributed System Security Symposium (NDSS)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2013
|
Yinzhi Cao; Vaibhav Rastogi; Zhichun Li; Yan Chen; Alex Moshchuk Redefining Web Browser Principals with a Configurable Origin Policy Inproceedings IEEE/IFIP International Conference on Dependable Systems and Network (DSN), 2013. Links | BibTeX @inproceedings{COP,
title = {Redefining Web Browser Principals with a Configurable Origin Policy},
author = {Yinzhi Cao and Vaibhav Rastogi and Zhichun Li and Yan Chen and Alex Moshchuk},
url = {https://www.zhichunli.org/publication/COP-DSN2013.pdf},
year = {2013},
date = {2013-06-01},
booktitle = {IEEE/IFIP International Conference on Dependable Systems and Network (DSN)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2012
|
Long Lu; Zhichun Li; Zhenyu Wu; Wenke Lee; Guofei Jiang CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities Inproceedings ACM CCS, 2012. Links | BibTeX @inproceedings{CHEX,
title = {CHEX: Statically Vetting Android Apps for Component Hijacking Vulnerabilities},
author = {Long Lu and Zhichun Li and Zhenyu Wu and Wenke Lee and Guofei Jiang},
url = {https://www.zhichunli.org/publication/CHEX-CCS12.pdf},
year = {2012},
date = {2012-10-01},
booktitle = {ACM CCS},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Yinzhi Cao; Zhichun Li; Vaibhav Rastogi; Xitao Wen; Yan Chen Virtual Browser: a Virtualized Browser to Sandbox Third-party JavaScripts with Enhanced Security Inproceedings ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2012. Links | BibTeX @inproceedings{VirtualBrowser,
title = {Virtual Browser: a Virtualized Browser to Sandbox Third-party JavaScripts with Enhanced Security},
author = {Yinzhi Cao and Zhichun Li and Vaibhav Rastogi and Xitao Wen and Yan Chen},
url = {https://www.zhichunli.org/publication/VirtualBrowser.pdf},
year = {2012},
date = {2012-05-01},
booktitle = {ACM Symposium on Information, Computer and Communications Security (ASIACCS)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2011
|
Zhichun Li; Anup Goyal; Yan Chen; Aleksandar Kuzmanovic Measurement and Diagnosis of Address Misconfigured P2P Traffic Journal Article IEEE Network Magazine, 25 (3), 2011. Links | BibTeX @article{P2Pmis-journal,
title = {Measurement and Diagnosis of Address Misconfigured P2P Traffic},
author = {Zhichun Li and Anup Goyal and Yan Chen and Aleksandar Kuzmanovic},
url = {https://www.zhichunli.org/publication/Li-P2PScope-IEEENetwork.pdf},
year = {2011},
date = {2011-05-01},
journal = {IEEE Network Magazine},
volume = {25},
number = {3},
keywords = {},
pubstate = {},
tppubtype = {article}
}
|
Yan Chen Zhichun Li Anup Goyal; Vern Paxson Towards Situational Awareness of Large-scale Botnet Probing Events Journal Article IEEE Transactions on Information Forensics and Security, 6 (1), 2011. Links | BibTeX @article{NetSA-journal,
title = {Towards Situational Awareness of Large-scale Botnet Probing Events},
author = {Yan Chen Zhichun Li Anup Goyal and Vern Paxson},
url = {https://www.zhichunli.org/publication/Li-NetSA-TIFS.pdf},
year = {2011},
date = {2011-03-01},
journal = {IEEE Transactions on Information Forensics and Security},
volume = {6},
number = {1},
keywords = {},
pubstate = {},
tppubtype = {article}
}
|
Zhichun Li; Yi Tang; Yinzhi Cao; Vaibhav Rastogi; Yan Chen; Bin Liu WebShield: Enabling Various Web Defense Techniques without Client Side Modifications Inproceedings the Annual Network & Distributed System Security Symposium (NDSS), 2011. Links | BibTeX @inproceedings{WebShield,
title = {WebShield: Enabling Various Web Defense Techniques without Client Side Modifications},
author = {Zhichun Li and Yi Tang and Yinzhi Cao and Vaibhav Rastogi and Yan Chen and Bin Liu},
url = {https://www.zhichunli.org/publication/Li-WebShield-NDSS11.pdf},
year = {2011},
date = {2011-02-01},
booktitle = {the Annual Network & Distributed System Security Symposium (NDSS)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2010
|
Hongyu Gao; Jun Hu; Christo Wilson; Zhichun Li; Yan Chen; Ben Y Zhao Detecting and Characterizing Social Spam Campaigns Inproceedings ACM SIGCOMM IMC, 2010. Links | BibTeX @inproceedings{social-spam,
title = {Detecting and Characterizing Social Spam Campaigns},
author = {Hongyu Gao and Jun Hu and Christo Wilson and Zhichun Li and Yan Chen and Ben Y Zhao},
url = {https://www.zhichunli.org/publication/Li-SocialSpam-IMC10.pdf},
year = {2010},
date = {2010-11-01},
booktitle = {ACM SIGCOMM IMC},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Zhichun Li; Gao Xia; Hongyu Gao; Yi Tang; Yan Chen; Bin Liu; Junchen Jiang; Yuezhou Lv NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense Inproceedings ACM SIGCOMM, 2010. Links | BibTeX @inproceedings{NetShield,
title = {NetShield: Matching with a Large Vulnerability Signature Ruleset for High Performance Network Defense},
author = {Zhichun Li and Gao Xia and Hongyu Gao and Yi Tang and Yan Chen and Bin Liu and Junchen Jiang and Yuezhou Lv},
url = {https://www.zhichunli.org/publication/NetShield-SIGCOMM.pdf},
year = {2010},
date = {2010-09-01},
booktitle = {ACM SIGCOMM},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Zhichun Li; Yan Gao; Yan Chen HiFIND: A High-Speed Flow-Level Intrusion Detection Approach with DoS Resiliency Journal Article Journal of Computer Networks, 54 (8), 2010. Links | BibTeX @article{HiFind-Journal,
title = {HiFIND: A High-Speed Flow-Level Intrusion Detection Approach with DoS Resiliency},
author = {Zhichun Li and Yan Gao and Yan Chen},
url = {https://www.zhichunli.org/publication/HiFind-journal.pdf},
year = {2010},
date = {2010-06-01},
journal = {Journal of Computer Networks},
volume = {54},
number = {8},
keywords = {},
pubstate = {},
tppubtype = {article}
}
|
Zhichun Li; Ming Zhang; Zhaosheng Zhu; Yan Chen; Albert Greenberg; Yi-Min Wang WebProphet: Automating Performance Prediction for Web Services Inproceedings USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010. Links | BibTeX @inproceedings{WebProphet,
title = {WebProphet: Automating Performance Prediction for Web Services},
author = {Zhichun Li and Ming Zhang and Zhaosheng Zhu and Yan Chen and Albert Greenberg and Yi-Min Wang},
url = {https://www.zhichunli.org/publication/Li-nsdi10.pdf},
year = {2010},
date = {2010-04-01},
booktitle = {USENIX Symposium on Networked Systems Design and Implementation (NSDI)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Zhichun Li; Anup Goyal; Yan Chen; Aleksandar Kuzmanovic Measurement and Diagnosis of Address Misconfigured P2P Traffic Inproceedings IEEE INFOCOM, 2010. Links | BibTeX @inproceedings{P2Pmis-conf,
title = {Measurement and Diagnosis of Address Misconfigured P2P Traffic},
author = {Zhichun Li and Anup Goyal and Yan Chen and Aleksandar Kuzmanovic},
url = {https://www.zhichunli.org/publication/Li-P2PScope-INFOCOM2010.pdf},
year = {2010},
date = {2010-03-01},
booktitle = {IEEE INFOCOM},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Lanjia Wang; Zhichun Li; Yan Chen; Judy Fu; Xing Li Thwarting Zero-Day Polymorphic Worms with Network-Level Length-Based Signature Generation Journal Article ACM/IEEE Transaction on Networking (TON), 18 (1), 2010. Links | BibTeX @article{LESG-journal,
title = {Thwarting Zero-Day Polymorphic Worms with Network-Level Length-Based Signature Generation},
author = {Lanjia Wang and Zhichun Li and Yan Chen and Judy Fu and Xing Li},
url = {https://www.zhichunli.org/publication/LESG-TON10.pdf},
year = {2010},
date = {2010-03-01},
journal = {ACM/IEEE Transaction on Networking (TON)},
volume = {18},
number = {1},
keywords = {},
pubstate = {},
tppubtype = {article}
}
|
2009
|
Yan Chen Zhichun Li Anup Goyal; Vern Paxson Automating Analysis of Large-Scale Botnet Probing Events Inproceedings ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2009. Links | BibTeX @inproceedings{NetSA-conf,
title = {Automating Analysis of Large-Scale Botnet Probing Events},
author = {Yan Chen Zhichun Li Anup Goyal and Vern Paxson},
url = {https://www.zhichunli.org/publication/Li-NetSA-AsiaCCS09.pdf},
year = {2009},
date = {2009-03-01},
booktitle = {ACM Symposium on Information, Computer and Communications Security (ASIACCS)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2007
|
Zhichun Li; Lanjia Wang; Yan Chen; Zhi (Judy) Fu Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Inproceedings IEEE ICNP, 2007. Links | BibTeX @inproceedings{LESG-conf,
title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms},
author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi (Judy) Fu},
url = {https://www.zhichunli.org/publication/Li-LESG-ICNP07.pdf
https://www.zhichunli.org/publication/Li-LESG-ICNP07.ppt},
year = {2007},
date = {2007-10-01},
booktitle = {IEEE ICNP},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Robert Schweller; Zhichun Li; Yan Chen; Yan Gao; Ashish Gupta; Elliot Parsons; Yin Zhang; Peter Dinda; Ming-Yang Kao; Gokhan Memik Reversible sketches: Enabling monitoring and analysis over high-speed data streams Journal Article IEEE/ACM Transactions on Networking, 15 (5), 2007. Links | BibTeX @article{RevSketch-journal,
title = {Reversible sketches: Enabling monitoring and analysis over high-speed data streams},
author = {Robert Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Elliot Parsons and Yin Zhang and Peter Dinda and Ming-Yang Kao and Gokhan Memik},
url = {https://www.zhichunli.org/publication/revSketch-ton07.pdf},
year = {2007},
date = {2007-10-01},
journal = {IEEE/ACM Transactions on Networking},
volume = {15},
number = {5},
keywords = {},
pubstate = {},
tppubtype = {article}
}
|
2006
|
Zhichun Li; Yan Chen; Aaron Beach Towards Scalable and Robust Distributed Intrusion Alert Fusion with Good Load Balancing Inproceedings ACM SIGCOMM Workshop on Large-Scale Attack Defense, 2006. Links | BibTeX @inproceedings{LSAD06,
title = {Towards Scalable and Robust Distributed Intrusion Alert Fusion with Good Load Balancing},
author = {Zhichun Li and Yan Chen and Aaron Beach},
url = {https://www.zhichunli.org/publication/Li-LSAD06.pdf
https://www.zhichunli.org/publication/LSAD06.ppt},
year = {2006},
date = {2006-09-01},
booktitle = {ACM SIGCOMM Workshop on Large-Scale Attack Defense},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Yan Gao; Zhichun Li; Yan Chen A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Inproceedings The International Conference on Distributed Computing Systems (ICDCS), 2006. Links | BibTeX @inproceedings{HiFind-conf,
title = {A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks},
author = {Yan Gao and Zhichun Li and Yan Chen},
url = {https://www.zhichunli.org/publication/icdcs06.pdf},
year = {2006},
date = {2006-07-01},
booktitle = {The International Conference on Distributed Computing Systems (ICDCS)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Zhichun Li; Manan Sanghi; Brian Chavez; Yan Chen; Ming-Yang Kao Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience Inproceedings IEEE Symposium on Security and Privacy, 2006. Links | BibTeX @inproceedings{Hamsa06-conf,
title = {Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience},
author = {Zhichun Li and Manan Sanghi and Brian Chavez and Yan Chen and Ming-Yang Kao},
url = {https://www.zhichunli.org/publication/Li-Hamsa-ssp06.pdf
https://www.zhichunli.org/publication/hamsa-ssp06.ppt},
year = {2006},
date = {2006-05-01},
booktitle = {IEEE Symposium on Security and Privacy},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Robert Schweller; Zhichun Li; Yan Chen; Yan Gao; Ashish Gupta; Elliot Parsons; Yin Zhang; Peter Dinda; Ming-Yang Kao; Gokhan Memik Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Inproceedings IEEE INFOCOM, 2006. Links | BibTeX @inproceedings{RevSketch-conf,
title = {Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications},
author = {Robert Schweller and Zhichun Li and Yan Chen and Yan Gao and Ashish Gupta and Elliot Parsons and Yin Zhang and Peter Dinda and Ming-Yang Kao and Gokhan Memik},
url = {https://www.zhichunli.org/publication/revSketch-infocom06.pdf
https://www.zhichunli.org/publication/infocom06.ppt},
year = {2006},
date = {2006-04-01},
booktitle = {IEEE INFOCOM},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Pin Ren; Yan Gao; Zhichun Li; Yan Chen; Ben Watson IDGraphs: Intrusion Detection and Analysis Using Stream Compositing Journal Article IEEE Computer Graphics & Applications, 26 (2), pp. 28-39, 2006. Links | BibTeX @article{IDGraphs-journal,
title = {IDGraphs: Intrusion Detection and Analysis Using Stream Compositing},
author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Ben Watson},
url = {https://www.zhichunli.org/publication/CGA_submitted.pdf},
year = {2006},
date = {2006-00-01},
journal = {IEEE Computer Graphics & Applications},
volume = {26},
number = {2},
pages = {28-39},
keywords = {},
pubstate = {},
tppubtype = {article}
}
|
2005
|
Pin Ren; Yan Gao; Zhichun Li; Yan Chen; Ben Watson IDGraphs: Intrusion Detection and Analysis Using Histographs Inproceedings the IEEE Workshop on Visualization for Computer Security (VizSEC), in conjunction with Visualization 2005 and InfoVis 2005 conferences, 2005. Links | BibTeX @inproceedings{IDGraphs-conf,
title = {IDGraphs: Intrusion Detection and Analysis Using Histographs},
author = {Pin Ren and Yan Gao and Zhichun Li and Yan Chen and Ben Watson},
url = {https://www.zhichunli.org/publication/vizsec05.pdf},
year = {2005},
date = {2005-10-01},
booktitle = {the IEEE Workshop on Visualization for Computer Security (VizSEC), in conjunction with Visualization 2005 and InfoVis 2005 conferences},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
2003
|
Zhichun Li; Hui Zhang; Yue You; Tao He Linuxflow: A High Speed Backbone Measurement Facility Inproceedings Passive and Active Measurement Workshop (PAM), 2003. Links | BibTeX @inproceedings{Linuxflow,
title = {Linuxflow: A High Speed Backbone Measurement Facility},
author = {Zhichun Li and Hui Zhang and Yue You and Tao He},
url = {https://www.zhichunli.org/publication/Linuxflow-A%20High%20Speed%20Backbone%20Measurement%20Facility.pdf
https://www.zhichunli.org/publication/Linuxflow_slides.pdf},
year = {2003},
date = {2003-03-01},
booktitle = {Passive and Active Measurement Workshop (PAM)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Zhichun Li; Hui Zhang; Yue You; Zimu Li "Design and Implementation of A High Speed Backbone Measurement System"(in Chinese) Inproceedings Journal of Computer Engineering (Chinese), pp. 53-56, 2003. Links | BibTeX @inproceedings{Zhichun-CH-2003,
title = {"Design and Implementation of A High Speed Backbone Measurement System"(in Chinese)},
author = {Zhichun Li and Hui Zhang and Yue You and Zimu Li},
url = {https://www.zhichunli.org/publication/Design%20and%20Implementation%20of%20A%20High%20Speed%20Backbone%20Measurement%20System(in%20Chinese).pdf},
year = {2003},
date = {2003-01-01},
booktitle = {Journal of Computer Engineering (Chinese)},
volume = {29},
pages = {53-56},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|
Tao He; Hui Zhang; Xing Li; Zhichun Li A Methodology for Analyzing Backbone Network Traffic at Stream-Level Inproceedings IEEE International Conference on Communication Technology (ICCT), 2003. Links | BibTeX @inproceedings{TaoHe2003,
title = {A Methodology for Analyzing Backbone Network Traffic at Stream-Level},
author = {Tao He and Hui Zhang and Xing Li and Zhichun Li},
url = {https://www.zhichunli.org/publication/A%20Methodology%20for%20Analyzing%20Backbone%20Network%20Traffic%20at%20Stream-Level.pdf},
year = {2003},
date = {2003-01-01},
booktitle = {IEEE International Conference on Communication Technology (ICCT)},
keywords = {},
pubstate = {},
tppubtype = {inproceedings}
}
|