USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 14 results:
Filters: Author is Qi Li [Clear All Filters]
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :419--440.
.
2024. Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. 32nd USENIX Security Symposium (USENIX Security 23). :2329--2346.
.
2023. Cross Container Attacks: The Bewildered eBPF on Clouds. 32nd USENIX Security Symposium (USENIX Security 23). :5971--5988.
.
2023. An Efficient Design of Intelligent Network Data Plane. 32nd USENIX Security Symposium (USENIX Security 23). :6203--6220.
.
2023. KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. 32nd USENIX Security Symposium (USENIX Security 23). :247--264.
.
2023. The Maginot Line: Attacking the Boundary of DNS Caching Protection. 32nd USENIX Security Symposium (USENIX Security 23). :3153--3170.
.
2023. Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. 32nd USENIX Security Symposium (USENIX Security 23). :625--642.
.
2023. Subverting Website Fingerprinting Defenses with Robust Traffic Representation. 32nd USENIX Security Symposium (USENIX Security 23). :607--624.
.
2023. Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2619--2636.
.
2022. RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. 31st USENIX Security Symposium (USENIX Security 22). :2225--2242.
.
2022. SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :365--379.
.
2020. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 28th USENIX Security Symposium (USENIX Security 19). :19--36.
.
2019. Fingerprinting SDN Applications via Encrypted Control Traffic. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :501--515.
.
2019. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. 11th USENIX Security Symposium (USENIX Security 02).
.
2002.