COMNET'16
Yuanyuan Zhang, Mingwei Xu, Ning Wang, Jun Li, Penghan Chen, and Fei Liang,
"Compressing IP forwarding tables with small bounded update time,"
Computer Networks,
vol. 106, no. C, pp. 77-90, September 2016.
Link
TCC'16
Congjie Chen, Dan Li, Jun Li, and Konglin Zhu,
"SVDC: A highly scalable isolation architecture for virtualized layer-2 data center networks,"
IEEE Transactions on Cloud Computing (TCC),
vol. 6, no. 4, pp. 1178–1190, June 2016.
DOI:10.1109/TCC.2016.2586047.
Link
COMCOM'15
Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, and Jiahai Yang,
"Nexthop-selectable FIB aggregation: An instant approach for Internet routing scalability,"
Computer Communications (COMCOM),
vol. 67, pp. 11–22, August 2015.
DOI: doi:10.1016/j.comcom.2015.07.003.
Link
COMCOM'15
Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, and Xinhui Han,
"SF-DRDoS: The store-and-flood distributed reflective denial of service attack,"
Computer Communications (COMCOM),
vol. 69, pp. 107–115, September 2015.
DOI: 10.1016/j.comcom.2015.06.008.
Link
PPNA'15
Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, and Jianyu Zhang,
"Improving lookup reliability in Kad,"
Peer-to-Peer Networking and Applications (PPNA), vol. 8, no. 1, pp. 156-170, January 2015.
Link
CCR'07
Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, and Toby Ehrenkranz,
"BGP routing dynamics revisited,"
ACM SIGCOMM Computer Communication Review, vol. 37, no. 2, pp. 7-16, April 2007.
Link
SIMULATION'07
Shad Stafford, Jun Li, and Toby Ehrenkranz,
"Enhancing SWORD to detect 0-day-worm-infected hosts,"
SIMULATION: Transactions of the Society for Modeling and Simulation International, vol. 83, no. 2, pp. 199-212, February 2007.
Link
COMNET'02
Jun Li, Mark D. Yarvis, and Peter L. Reiher.
"Securing distributed adaptation,"
Computer Networks, Special Issue on Programmable Networks,
vol. 38, no. 3, pp. 347-371, February 2002.
Link
CJC'97
Jun Li and Yufang Sun.
"Security design and implementation for micro-kernel based file system server,"
Chinese Journal of Computers, vol. 20, no. 5, pp.396-403, May 1997.
JOS'97
Jun Li and Yufang Sun.
"Security research for micro-kernel based operating system,"
Journal of Software (JOS), vol. 8, no. 2, pp. 99-106, February 1997.
CRAD'96
Jun Li and Yufang Sun.
"Computer security and security model,"
Journal of Computer Research And Development, vol. 33, no. 4, pp.312-320, April 1996.
Peer-Reviewed Conference Publications
CNS'23
Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher,
"Toward adaptive DDoS-filtering rule generation,"
in The 11th IEEE Conference on Communications and Network Security (CNS), Orlando, FL, October 2023.
CODASPY'22
Zhangxiang Hu, Jun Li, Samuel Mergendahl, and Christopher Wilson,
"Toward a resilient key exchange protocol for IoT,"
in 12th ACM Conference on Data and Application Security and Privacy (CODASPY),
Baltimore-Washington DC, April 2022, 12 pages.
DAPPS'20
Jun Li, Jeremy Kauffman, Alex Grintsvayg, and Charles Fleming,
"LBRY: A blockchain-based decentralized digital content marketplace,"
in 2nd IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS),
virtual conference, August 2020.
DAPPS'20
Thomas Cilloni, Xiyu Cai, Charles Fleming, and Jun Li,
"Understanding and detecting majority attacks,"
in 2nd IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS),
virtual conference, August 2020.
CSET'20
Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, and Jun Li,
"Bridging missing gaps in evaluating DDoS research,"
in 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET),
virtual workshop, August 2020.
Link
ACSAC'19 poster
Lumin Shi, Devkishen Sisodia, Mingwei Zhang, Jun Li, Alberto Dainotti, and Peter Reiher,
"The catch-22 attack,"
in Annual Computer Security Applications Conference (ACSAC), San Juan, December 2019, poster paper.
AAAI'19
Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, and Aidong Lu,
"One-class adversarial nets for fraud detection,"
in Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19),
Honolulu, Hawaii, January 2019.
Link
SECURECOMM'18
Devkishen Sisodia, Samuel Mergendahl, Jun Li, and Hasan Cam,
"Securing the smart home via a two-mode security framework,"
in International Conference on Security and Privacy in Communication Networks (SECURECOMM),
Singapore, Singapore, August 2018.
Slides
ICCCN'18
Samuel Mergendahl, Devkishen Sisodia, Jun Li, and Hasan Cam,
"FR-WARD: Fast retransmit as a wary but ample response to distributed denial-of-service attacks from the Internet of things,"
in 27th International Conference on Computer Communications and Networks (ICCCN),
Hangzhou, China, July 2018.
PDFLink
IFIP Networking'18
Lumin Shi, Mingwei Zhang, Jun Li, and Peter Reiher,
"PathFinder: Capturing DDoS traffic footprints on the Internet,"
in IFIP Networking,
Zurich, Switzerland, May 2018.
"PDFSlides
CIKM'17
Shuhan Yuan, Xintao Wu, Jun Li, and Aidong Lu,
"Spectrum-based deep neural betworks for fraud detection,"
in 26th ACM International Conference on Information and Knowledge Management (CIKM),
Singapore, November 2017, pp. 2419--2422, short paper.
IoTS&P'17
Samuel Mergendahl, Devkishen Sisodia, Jun Li, and Hasan Cam,
"Source-end DDoS defense in IoT environments,"
in 1st Workshop on Internet of Things Security and Privacy,
Dallas, TX, November 2017, poster paper.
IFIP Networking'15
Hanqing Zhu, Mingwei Xu, Qing Li, Jun Li, Yuan Yang, and Suogang Li,
"MDTC: An efficient approach to TCAM-based multidimensional table compression,"
in IFIP Networking, Toulouse, France, May 2015, 9 pages.
PDF
NDSS'15 poster
Chen Li, Yu Ding, Tongxin Li, Jun Li, and Xinhui Han,
"SIPD: A practical SDN-based IP spoofing defense method,"
in Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015, 2 pages (poster paper).
PosterLink
SIGCOMM'14 poster
Jun Li, Skyler Berg, Mingwei Zhang, Peter Reiher, and Tao Wei,
"DrawBridge--software-defined DDoS-resistant traffic engineering," in
ACM SIGCOMM, Chicago, USA, August 2014, pp. 591-592 (poster paper).
PDFPosterLink
SIGCOMM'14 poster
David Koll, Jun Li, and Xiaoming Fu,
"SOUP: An online social network by the people, for the people,"
in ACM SIGCOMM, Chicago, USA, August 2014, pp. 143-144 (poster paper).
PDFVideo
ICCCN'14
Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, and Xinhui Han,
"The store-and-flood distributed reflective denial of service attack,"
in International Conference on Computer Communications and Networks (ICCCN),
Shanghai, China, August 4-7, 2014, 8 pages. Best paper award finalist .
SlidesLink
IFIP Networking'14
David Koll, Jun Li, Joshua Stein, and Xiaoming Fu,
"On the state of OSN-based Sybil defenses,"
in IFIP Networking, Trondheim, Norway, June 2014, 9 pages.
PDFSlides
IWQoS'14
Ming Zhu, Jun Li, Ying Liu, Dan Li, and Jianping Wu,
"TED: Inter-domain traffic engineering via deflection,"
in IEEE/ACM International Symposium on Quality of Service (IWQoS),
Hong Kong, China, May 2014, pp. 117-122 (short paper).
CCNC'14
Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, and Chen Li,
"Splider: A split-based crawler of the BT-DHT network and its applications,"
in 11th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, Nevada, January 10-13, 2014, pp. 327-335.
Link
CNS'13
Jason Gustafson and Jun Li,
"Leveraging the crowds to disrupt phishing,"
in First IEEE Conference on Communications and Network Security 2013 (CNS),
Washington, DC, October 2013, pp. 82-90.
Slides
LANMAN'13 Best paper
Lei Jiao, Jun Li, and Xiaoming Fu,
"Optimizing data center traffic of online social networks,"
in The 19th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN),
Brussels, Belgium, April 2013. Best paper award.Link
P2P'12
Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, and Mo Zhou,
"Revisiting why Kad lookup fails,"
in 12th IEEE International Conference on Peer-to-Peer Computing 2012 (P2P),
Tarragona, Spain, September 3-5, 2012, pp. 37-42 (short paper).
HotSocial'12
Jason Gustafson, Jun Li, and Haixin Duan,
"Towards a socially aware home router,"
in First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research (HotSocial),
Beijing, China, August 2012, pp. 77-80 (short paper).
IWQoS'12
Shining Wu, Yang Chen, Xiaoming Fu, and Jun Li,
"NCShield: Securing decentralized, matrix factorization-based network coordinate systems,"
in 20th IEEE/ACM International Workshop on Quality of Service (IWQoS),
Coimbra, Portugal, June 2012, 9 pages.
PDFSlides
NDSS'12
J. Jiang, J. Liang, K. Li, J. Li, H. Duan, and J. Wu,
"Ghost domain names: Revoked yet still resolvable,"
in 19th Network and Distributed System Security Symposium (NDSS),
San Diego, California, February 2012, 13 pages.
Link
ICNC'12
Jun Li, Dongting Yu, and Luke Maurer,
"A resource management approach to web browser security,"
in Proceedings of the International Conference on Computing, Networking and Communications (ICNC),
Maui, Hawaii, January 2012, pp. 697-701.
Slides
Middleware'11 poster
Lei Jiao, Tianyin Xu, Jun Li, and Xiaoming Fu,
"Latency-aware data partitioning for geo-replicated online social networks,"
in Proceedings of ACM/IFIP/USENIX 12th International Middleware Conference (Middleware),
Lisboa, Portugal, December 2011, poster paper.
RAID'10
Shad Stafford and Jun Li,
"Behavior-based worm detectors compared,"
in 13th International Symposium on Recent Advances in Intrusion Detection (RAID),
Ottawa, Canada, September 2010, pp. 38-57.
SecureComm'10
Toby Ehrenkranz, Jun Li, and Patrick McDaniel,
"Realizing a source authentic Internet,"
in 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm),
Singapore, September 2010, pp. 217-234.
ICISS'07
Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, and Yibo Wang,
"On knowledge-based classification of abnormal BGP events,"
in International Conference on Information Systems Security,
December 2007, pp. 267-271 (short paper).
AEPP'05
Jun Li and Xun Kang,
"Proof of service in a hybrid P2P environment,"
in Springer LNCS 3759 of the International Workshop on Applications and Economics of Peer to Peer Systems,
November 2005, pp. 64-73.
HotP2P'05
Virginia Lo, Dayi Zhou, Yuhong Liu, Chris Gauthier-Dickey, and Jun Li,
"Scalable supernode selection in peer-to-peer overlay networks,"
in International Workshop on Hot Topics in Peer-to-Peer Systems (HotP2P),
San Diego, CA, July 2005, pp. 18-25.
IM'05
Zhen Wu, Eric S. Purpus, and Jun Li,
"BGP behavior analysis during the August 2003 blackout,"
in The 9th IFIP/IEEE International Symposium on Integrated Network Management,
Nice, France, May 2005, 4 pages (short paper).
OPENARCH'01
Jun Li, Mark D. Yarvis, and Peter L. Reiher,
"Securing distributed adaptation,"
in the Fourth IEEE Conference on Open Architectures and Network Programming (OPENARCH 2001),
Anchorage, Alaska, April 2001, pp. 71-82.
A best paper and its extended version selected for journal publication.
NSPW'99
Jun Li, Peter L. Reiher, and Gerald J. Popek,
"Securing information transmission by redundancy,"
in ACM New Security Paradigms Workshop,
Ontario, Canada, September 1999, pp. 112-117.
A best paper and selected as a highlight for 22nd National Information Systems Security Conference.