Biblio

Export 24 results:
Filters: Author is Qi Li  [Clear All Filters]
2024
Yan J, Xu H, Liu Z, Li Q, Xu K, Xu M, Wu J.  2024.  Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). :419--440.
Tan Q, Li Q, Zhao Y, Liu Z, Guo X, Xu K.  2024.  Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. 33rd USENIX Security Symposium (USENIX Security 24). :325--342.
He Y, Guan Y, Lun R, Song S, Guo Z, Zhuge J, Chen J, Wei Q, Wu Z, Yu M et al..  2024.  Demystifying the Security Implications in IoT Device Rental Services. 33rd USENIX Security Symposium (USENIX Security 24). :6579--6596.
Ge Y, Wang Q, Huang H, Li Q, Wang C, Shen C, Zhao L, Jiang P, Fang Z, Zhang S.  2024.  Hijacking Attacks against Neural Network by Analyzing Training Data. 33rd USENIX Security Symposium (USENIX Security 24). :6867--6884.
Wang J, Zhang C, Chen L, Rong Y, Wu Y, Wang H, Tan W, Li Q, Li Z.  2024.  Improving ML-based Binary Function Similarity Detection by Assessing and Deprioritizing Control Flow Graph Features. 33rd USENIX Security Symposium (USENIX Security 24). :4265--4282.
Chen Y, Yin Q, Li Q, Liu Z, Xu K, Xu Y, Xu M, Liu Z, Wu J.  2024.  Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. 33rd USENIX Security Symposium (USENIX Security 24). :5143--5160.
Ge Y, Chen P, Wang Q, Zhao L, Mou N, Jiang P, Wang C, Li Q, Shen C.  2024.  More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor. 33rd USENIX Security Symposium (USENIX Security 24). :2973--2990.
Zhang Q, Bai X, Li X, Duan H, Li Q, Li Z.  2024.  ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. 33rd USENIX Security Symposium (USENIX Security 24). :4729--4746.
Shen M, Li C, Li Q, Lu H, Zhu L, Xu K.  2024.  Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services. 33rd USENIX Security Symposium (USENIX Security 24). :2991--3008.
Xing Y, Wang S, Sun S, He X, Sun K, Li Q.  2024.  What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check 33rd USENIX Security Symposium (USENIX Security 24). :1367--1382.
Wu Y, Wang J, Wang Y, Zhai S, Li Z, He Y, Sun K, Li Q, Zhang N.  2024.  Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities. 33rd USENIX Security Symposium (USENIX Security 24). :5627--5644.
2023
Wang J, Zhang Z, Wang M, Qiu H, Zhang T, Li Q, Li Z, Wei T, Zhang C.  2023.  Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks. 32nd USENIX Security Symposium (USENIX Security 23). :2329--2346.
He Y, Guo R, Xing Y, Che X, Sun K, Liu Z, Xu K, Li Q.  2023.  Cross Container Attacks: The Bewildered eBPF on Clouds. 32nd USENIX Security Symposium (USENIX Security 23). :5971--5988.
Zhou G, Liu Z, Fu C, Li Q, Xu K.  2023.  An Efficient Design of Intelligent Network Data Plane. 32nd USENIX Security Symposium (USENIX Security 23). :6203--6220.
Wu X, Ma S, Shen C, Lin C, Wang Q, Li Q, Rao Y.  2023.  KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. 32nd USENIX Security Symposium (USENIX Security 23). :247--264.
Li X, Lu C, Liu B, Zhang Q, Li Z, Duan H, Li Q.  2023.  The Maginot Line: Attacking the Boundary of DNS Caching Protection. 32nd USENIX Security Symposium (USENIX Security 23). :3153--3170.
Xie R, Cao J, Dong E, Xu M, Sun K, Li Q, Shen L, Zhang M.  2023.  Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. 32nd USENIX Security Symposium (USENIX Security 23). :625--642.
Shen M, Ji K, Gao Z, Li Q, Zhu L, Xu K.  2023.  Subverting Website Fingerprinting Defenses with Robust Traffic Representation. 32nd USENIX Security Symposium (USENIX Security 23). :607--624.
2022
Feng X, Li Q, Sun K, Qian Z, Zhao G, Kuang X, Fu C, Xu K.  2022.  Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. 31st USENIX Security Symposium (USENIX Security 22). :2619--2636.
He Y, Zou Z, Sun K, Liu Z, Xu K, Wang Q, Shen C, Wang Z, Li Q.  2022.  RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. 31st USENIX Security Symposium (USENIX Security 22). :2225--2242.
2020
Wang S, Cao J, Sun K, Li Q.  2020.  SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). :365--379.
2019
Cao J, Li Q, Xie R, Sun K, Gu G, Xu M, Yang Y.  2019.  The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. 28th USENIX Security Symposium (USENIX Security 19). :19--36.
Cao J, Yang Z, Sun K, Li Q, Xu M, Han P.  2019.  Fingerprinting SDN Applications via Encrypted Control Traffic. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :501--515.