Obserwuj
Jiahao Cao
Jiahao Cao
Zweryfikowany adres z mails.tsinghua.edu.cn - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
1932018
The {CrossPath} attack: Disrupting the {SDN} control channel via shared links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
28th USENIX Security Symposium (USENIX Security 19), 19-36, 2019
782019
Disrupting SDN via the data plane: A low-rate flow table overflow attack
J Cao, M Xu, Q Li, K Sun, Y Yang, J Zheng
Security and Privacy in Communication Networks: 13th International …, 2018
602018
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition
S Wang, J Cao, X He, K Sun, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
352020
SoftGuard: Defend against the low-rate TCP attack in SDN
R Xie, M Xu, J Cao, Q Li
ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019
312019
SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption
Q Song, Z Liu, J Cao, K Sun, Q Li, C Wang
IEEE Transactions on Information Forensics and Security 16, 1795-1809, 2020
302020
Enhancing malware analysis sandboxes with emulated user behavior
S Liu, P Feng, S Wang, K Sun, J Cao
Computers & Security 115, 102613, 2022
232022
When match fields do not need to match: Buffered packets hijacking in SDN
J Cao, R Xie, K Sun, Q Li, G Gu, M Xu
Proc. of the Network and Distributed System Security Symposium (NDSS'20), 2020
192020
Fingerprinting {SDN} applications via encrypted control traffic
J Cao, Z Yang, K Sun, Q Li, M Xu, P Han
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
192019
{SIEVE}: Secure {In-Vehicle} Automatic Speech Recognition Systems
S Wang, J Cao, K Sun, Q Li
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
172020
Disrupting the SDN control channel via shared links: Attacks and countermeasures
R Xie, J Cao, Q Li, K Sun, G Gu, M Xu, Y Yang
IEEE/ACM Transactions on Networking 30 (5), 2158-2172, 2022
152022
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage
P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang
IEEE Access 8, 68449-68459, 2020
152020
Try before you buy: Privacy-preserving data evaluation on cloud-based machine learning data marketplace
Q Song, J Cao, K Sun, Q Li, K Xu
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
132021
Rosetta: Enabling robust tls encrypted traffic classification in diverse network environments with tcp-aware traffic augmentation
R Xie, Y Wang, J Cao, E Dong, M Xu, K Sun, Q Li, L Shen, M Zhang
Proceedings of the ACM Turing Award Celebration Conference-China 2023, 131-132, 2023
92023
The attack: Overflowing sdn flow tables at a low rate
J Cao, M Xu, Q Li, K Sun, Y Yang
IEEE/ACM Transactions on Networking, 2022
82022
The devil is in the detail: Generating system call whitelist for Linux seccomp
Y Xing, J Cao, K Sun, F Yan, S Wan
Future Generation Computer Systems 135, 105-113, 2022
52022
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
J Cao, K Sun, Q Li, M Xu, Z Yang, KJ Kwak, J Li
Security and Privacy in Communication Networks: 15th EAI International …, 2019
42019
From One-Hot Encoding to Privacy-Preserving Synthetic Electronic Health Records Embedding
X Xiang, S Duan, H Pan, P Han, J Cao, C Liu
Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020
32020
SEC: Secure, efficient, and compatible source address validation with packet tags
X Yang, J Cao, M Xu
2020 IEEE 39th International Performance Computing and Communications …, 2020
32020
cSFC: Building credible service function chain on the cloud
S Yao, M Xu, Q Li, J Cao, Q Song
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
32019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20