USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 24 results:
Filters: Author is Qi Li [Clear All Filters]
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :419--440.
.
2024. Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. 33rd USENIX Security Symposium (USENIX Security 24). :325--342.
.
2024. Demystifying the Security Implications in IoT Device Rental Services. 33rd USENIX Security Symposium (USENIX Security 24). :6579--6596.
.
2024. Hijacking Attacks against Neural Network by Analyzing Training Data. 33rd USENIX Security Symposium (USENIX Security 24). :6867--6884.
.
2024. Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features. 33rd USENIX Security Symposium (USENIX Security 24). :4265--4282.
.
2024. Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. 33rd USENIX Security Symposium (USENIX Security 24). :5143--5160.
.
2024. More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. 33rd USENIX Security Symposium (USENIX Security 24). :2973--2990.
.
2024. ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. 33rd USENIX Security Symposium (USENIX Security 24). :4729--4746.
.
2024. Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services. 33rd USENIX Security Symposium (USENIX Security 24). :2991--3008.
.
2024. What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check 33rd USENIX Security Symposium (USENIX Security 24). :1367--1382.
.
2024. Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. 33rd USENIX Security Symposium (USENIX Security 24). :5627--5644.
.
2024. Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. 32nd USENIX Security Symposium (USENIX Security 23). :2329--2346.
.
2023. Cross Container Attacks: The Bewildered eBPF on Clouds. 32nd USENIX Security Symposium (USENIX Security 23). :5971--5988.
.
2023. An Efficient Design of Intelligent Network Data Plane. 32nd USENIX Security Symposium (USENIX Security 23). :6203--6220.
.
2023. KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. 32nd USENIX Security Symposium (USENIX Security 23). :247--264.
.
2023. The Maginot Line: Attacking the Boundary of DNS Caching Protection. 32nd USENIX Security Symposium (USENIX Security 23). :3153--3170.
.
2023. Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. 32nd USENIX Security Symposium (USENIX Security 23). :625--642.
.
2023. Subverting Website Fingerprinting Defenses with Robust Traffic Representation. 32nd USENIX Security Symposium (USENIX Security 23). :607--624.
.
2023. Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2619--2636.
.
2022. RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. 31st USENIX Security Symposium (USENIX Security 22). :2225--2242.
.
2022. SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :365--379.
.
2020. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 28th USENIX Security Symposium (USENIX Security 19). :19--36.
.
2019. Fingerprinting SDN Applications via Encrypted Control Traffic. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :501--515.
.
2019. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. 11th USENIX Security Symposium (USENIX Security 02).
.
2002.