default search action
Zhaoxuan Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Zhaoxuan Li, Ziming Zhao, Rui Zhang, Haoyang Lu, Wenhao Li, Fan Zhang, Siqi Lu, Rui Xue:
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm. Comput. Networks 250: 110563 (2024) - [j16]Ziming Zhao, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang, Rui Zhang:
DDoS family: A novel perspective for massive types of DDoS attacks. Comput. Secur. 138: 103663 (2024) - [j15]Ziming Zhao, Zhaoxuan Li, Tingting Li, Fan Zhang:
TPE-Det: A Tamper-Proof External Detector via Hardware Traces Analysis Against IoT Malware. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(11): 3455-3466 (2024) - [j14]Ziming Zhao, Zhuotao Liu, Huan Chen, Fan Zhang, Zhuoxue Song, Zhaoxuan Li:
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping. IEEE Trans. Dependable Secur. Comput. 21(4): 4271-4289 (2024) - [j13]Siqi Lu, Hanjie Dong, Zhaoxuan Li, Laurance T. Yang:
Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and its Improvement. IEEE Trans. Dependable Secur. Comput. 21(6): 5143-5155 (2024) - [j12]Ziming Zhao, Zhaoxuan Li, Jiongchi Yu, Fan Zhang, Xiaofei Xie, Haitao Xu, Binbin Chen:
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains. IEEE Trans. Mob. Comput. 23(5): 5589-5603 (2024) - [j11]Ziming Zhao, Zhaoxuan Li, Xiaofei Xie, Jiongchi Yu, Fan Zhang, Rui Zhang, Binbin Chen, Xiangyang Luo, Ming Hu, Wenrui Ma:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024) - [c15]Wenhao Li, Duohe Ma, Zhaoxuan Li, Huaifeng Bao, Shuai Wang, Huamin Jin, Xiao-Yu Zhang:
Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector. CCS 2024: 4934-4936 - [c14]Huaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang, Feng Liu:
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network. CCS 2024: 5063-5065 - [c13]Zhaoxuan Li, Ziming Zhao, Wenhao Li, Rui Zhang, Rui Xue, Siqi Lu, Fan Zhang:
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution. CCS 2024: 5072-5074 - [c12]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang, Binbin Chen:
RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches. INFOCOM 2024: 591-600 - [c11]Ziming Zhao, Zhaoxuan Li, Fan Zhang, Tingting Li, Jianwei Yin:
Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network. SIGCOMM (Posters and Demos) 2024: 16-18 - [c10]Ziming Zhao, Zhaoxuan Li, Tingting Li, Jiongchi Yu, Fan Zhang, Rui Zhang:
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer. WWW (Companion Volume) 2024: 529-532 - [c9]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Wenhao Li, Fan Zhang:
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection. WWW 2024: 1608-1619 - 2023
- [j10]Siqi Lu, Zhaoxuan Li, Xuyang Miao, Qingdi Han, Jianhua Zheng:
PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy. IEEE Trans. Comput. Soc. Syst. 10(3): 1039-1056 (2023) - [j9]Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. IEEE Trans. Inf. Forensics Secur. 18: 789-803 (2023) - [j8]Wenhao Li, Xiaoyu Zhang, Huaifeng Bao, Binbin Yang, Zhaoxuan Li, Haichao Shi, Qiang Wang:
Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers. IEEE Trans. Inf. Forensics Secur. 18: 2524-2537 (2023) - [j7]Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao:
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning. IEEE Trans. Software Eng. 49(11): 4886-4916 (2023) - [c8]Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang:
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. CCS 2023: 3636-3638 - [c7]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang:
Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach. RTSS 2023: 431-434 - 2022
- [j6]Wenhao Li, Xiaoyu Zhang, Huaifeng Bao, Qiang Wang, Zhaoxuan Li:
Robust network traffic identification with graph matching. Comput. Networks 218: 109368 (2022) - [j5]Zhaoxuan Li, Siqi Lu, Rui Zhang, Rui Xue, Wenqiu Ma, Rujin Liang, Ziming Zhao, Sheng Gao:
SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts. Empir. Softw. Eng. 27(7): 197 (2022) - [j4]Zhaoxuan Li, Keiji Iramina:
Spatio-Temporal Neural Dynamics of Observing Non-Tool Manipulable Objects and Interactions. Sensors 22(20): 7771 (2022) - [c6]Zhaoxuan Li, Mei Qiang, Yong Li, Wang Peng, Yang Yang, Wenlong Hu:
Prediction and analysis of ship traffic flow based on a space-time graph traffic computing framework. EUC 2022: 28-35 - [c5]Wenhao Li, Xiaoyu Zhang, Huaifeng Bao, Qiang Wang, Haichao Shi, Zhaoxuan Li:
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic. HPCC/DSS/SmartCity/DependSys 2022: 635-644 - 2021
- [c4]Rui Zhang, Zhaoxuan Li, Lijuan Zheng:
Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain. ICAIS (2) 2021: 332-345 - 2020
- [c3]Zhaoxuan Li, Rui Zhang, Pengchao Li:
A Secure and Efficient Smart Contract Execution Scheme. ICWS 2020: 17-32
2010 – 2019
- 2019
- [j3]Ahmad F. Taha, Nikolaos Gatsis, Bing Dong, Ankur Pipri, Zhaoxuan Li:
Buildings-to-Grid Integration Framework. IEEE Trans. Smart Grid 10(2): 1237-1249 (2019) - 2018
- [j2]Lijuan Zheng, Huanhuan Yue, Zhaoxuan Li, Xiao Pan, Mei Wu, Fan Yang:
k-Anonymity Location Privacy Algorithm Based on Clustering. IEEE Access 6: 28328-28338 (2018) - [j1]Lijuan Zheng, Chunlei Song, Ning Cao, Zhaoxuan Li, Wenfeng Zhou, Jianyou Chen, Lili Meng:
A New Mutual Authentication Protocol in Mobile RFID for Smart Campus. IEEE Access 6: 60996-61005 (2018) - [c2]Bing Dong, Ahmad F. Taha, Nikolaos Gatsis, Zhaoxuan Li, Ankur Pipri:
Impact of Occupancy-Based Buildings-to-Grid Integration on Frequency Regulation in Smart Grids. ACC 2018: 5399-5405 - [c1]Lijuan Zheng, Linhao Zhang, Meng Cui, Jianyou Chen, Shaobo Yang, Zhaoxuan Li:
Medical Information Access Control Method Based on Weighted Information Entropy. ICCCS (3) 2018: 113-122 - 2017
- [i1]Ahmad F. Taha, Nikolaos Gatsis, Bing Dong, Ankur Pipri, Zhaoxuan Li:
Buildings-to-Grid Integration Framework. CoRR abs/1706.05626 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint