Selected Publications

Peer-Reviewed Books

  1. Book'02 Jun Li, Peter Reiher, Gerald Popek. Disseminating Security Updates at Internet Scale, Kluwer Academic Publishers, Boston, November 2002, 174 pages, ISBN 1-4020-7305-4.

Peer-Reviewed Journal Articles

  1. TIoT'23 Zhangxiang Hu, Jun Li, and Christopher Wilson, "Resilient intermediary-based key exchange protocol for IoT," ACM Transactions on Internet of Things (TIoT), vol. 5, no. 1, pp. 1–31, February 2024, doi: 10.1145/3632408.
  2. TDSC'23 Yebo Feng, Jun Li, Devkishen Sisodia, and Peter Reiher, "On explainable and adaptable detection of distributed denial-of-service traffic," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 21, no. 4, pp. 2211–2226, 2023, doi: 10.1109/TDSC.2023.3301293.
  3. TIoT'23 Devkishen Sisodia, Jun Li, Samuel Mergendahl, and Hasan Cam, "A two-mode, adaptive security framework for smart home security applications," ACM Transactions on Internet of Things (TIoT), vol. 5, no. 2, pp. 1–31, 2023, doi: 10.1145/3617504.
  4. TDSC'22 Jun Li, Devkishen Sisodia, and Shad Stafford, "On the detection of smart, self-propagating Internet worms," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 20, no. 4, pp. 3051–3063, July-August 2022. Link
  5. TDSC'22 Lumin Shi, Jun Li, Mingwei Zhang, and Peter Reiher, "On capturing DDoS traffic footprints on the Internet," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 19, no. 4, pp. 2755–2770, 2022. Link
  6. TDSC'21 Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu, "Towards learning-based, content-agnostic detection of social bot traffic," IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, no. 5, pp. 2149–2163, September/October 2021. Link
  7. ToN'21 Lin Wang, Lei Jiao, Ting He, Jun Li, and Henri Bal, "Service placement for collaborative edge applications," IEEE/ACM Transactions on Networking (ToN), vol. 29, no. 1, pp. 34–47, February 2021. Link
  8. TPDS'21 Jianzhen Luo, Jun Li, Lei Jiao, and Jun Cai, "On the effective parallelization and near-optimal deployment of service function chains," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 32, no. 5, pp. 1238–1255, 2021. Link
  9. COMNET'20 Yaoqing Liu, Garegin Grigoryan, Jun Li, Guchuan Sun, and Tony Tauber, "VeriTable: Fast equivalence verification of multiple large forwarding tables," Computer Networks, vol. 168, pp. 106981, February 2020. Link
  10. SNAM'19 Soheil Jamshidi, Reza Rejaie, and Jun Li, "Characterizing the dynamics and evolution of incentivized online reviews on Amazon," Social Network Analysis and Mining, vol. 9, no. 22, December 2019. Link
  11. TMC'19 Lin Wang, Lei Jiao, Jun Li, Julien Gedeon, and Max Mühlhäuser, "MOERA: Mobility-agnostic online resource allocation for edge computing," IEEE Transactions on Mobile Computing (TMC), 18(8):1843-1856, 2019. DOI: 10.1109/TMC.2018.2867520. Link
  12. ToN'17 Mingwei Zhang, Jun Li, and Scott Brooks, "I-seismograph: Observing, measuring, and analyzing Internet earthquakes," IEEE/ACM Transactions on Networking (ToN), vol. 25, no. 6, pp. 3411-3426, December 2017, DOI: 10.1109/TNET.2017.2748902. Link
  13. COMCOM'17 David Koll, Jun Li, and Xiaoming Fu, "The good left undone: Advances and challenges in decentralizing online social networks," Computer Communications (COMCOM), vol. 108, pp. 36-51, August 2017. Link
  14. TSC'17 Yang Chen, Shining Wu, Jun Li, and Xiaoming Fu, "NCShield: Protecting decentralized, matrix factorization-based network coordinate systems," IEEE Transactions on Services Computing (TSC), vol. 10, no. 2, pp. 244-257, March-April 2017. DOI: 10.1109/TSC.2015.2437383. Link
  15. COMNET'17 Joshua Stein, Han Hee Song, Mario Baldi, and Jun Li, "On the most representative summaries of network user activities," Computer Networks, vol. 113, no. C, pp. 205-217, February 2017. Link
  16. COMNET'16 Yuanyuan Zhang, Mingwei Xu, Ning Wang, Jun Li, Penghan Chen, and Fei Liang, "Compressing IP forwarding tables with small bounded update time," Computer Networks, vol. 106, no. C, pp. 77-90, September 2016. Link
  17. TCC'16 Congjie Chen, Dan Li, Jun Li, and Konglin Zhu, "SVDC: A highly scalable isolation architecture for virtualized layer-2 data center networks," IEEE Transactions on Cloud Computing (TCC), vol. 6, no. 4, pp. 1178–1190, June 2016. DOI:10.1109/TCC.2016.2586047. Link
  18. ToN'16 Lei Jiao, Jun Li, Tianyin Xu, Wei Du, and Xiaoming Fu, "Optimizing cost for online social networks on geo-distributed clouds," IEEE/ACM Transactions on Networking (ToN), vol. 24, no. 1, pp. 99–112, February 2016. DOI: 10.1109/TNET.2014.2359365. Link
  19. COMCOM'15 Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, and Jiahai Yang, "Nexthop-selectable FIB aggregation: An instant approach for Internet routing scalability," Computer Communications (COMCOM), vol. 67, pp. 11–22, August 2015. DOI: doi:10.1016/j.comcom.2015.07.003. Link
  20. COMCOM'15 Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, and Xinhui Han, "SF-DRDoS: The store-and-flood distributed reflective denial of service attack," Computer Communications (COMCOM), vol. 69, pp. 107–115, September 2015. DOI: 10.1016/j.comcom.2015.06.008. Link
  21. PPNA'15 Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, and Jianyu Zhang, "Improving lookup reliability in Kad," Peer-to-Peer Networking and Applications (PPNA), vol. 8, no. 1, pp. 156-170, January 2015. Link
  22. PPNA'14 Ghulam Memon, Jun Li, and Reza Rejaie, "Tsunami: A parasitic, indestructible botnet on Kad," Peer-to-Peer Networking and Applications (PPNA), vol. 7, no. 4, pp. 444-455, December 2014. Link
  23. PPNA'11 Jun Li, "mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients," Peer-to-Peer Networking and Applications (PPNA), vol. 4, no. 4, pp. 325-345, December 2011. Link
  24. ToIT'09 Toby Ehrenkranz and Jun Li, "On the state of IP spoofing defense," ACM Transactions on Internet Technology (TOIT), vol. 9, no. 2, May 2009. Link
  25. COMNET'08 Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter Reiher, and Lixia Zhang, "Learning the valid incoming direction of IP packets," Computer Networks, vol. 52, no. 2, pp. 399-417, February 2008. Link
  26. COMSEC'07 Jun Li and Paul Knickerbocker, "Functional similarities between computer worms and biological pathogens," Computers & Security, vol. 26, no. 4, pp. 338-347, June 2007. Link
  27. CCR'07 Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, and Toby Ehrenkranz, "BGP routing dynamics revisited," ACM SIGCOMM Computer Communication Review, vol. 37, no. 2, pp. 7-16, April 2007. Link
  28. SIMULATION'07 Shad Stafford, Jun Li, and Toby Ehrenkranz, "Enhancing SWORD to detect 0-day-worm-infected hosts," SIMULATION: Transactions of the Society for Modeling and Simulation International, vol. 83, no. 2, pp. 199-212, February 2007. Link
  29. CCR'05 Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, and Vikash Agarwal, "An Internet routing forensics framework for discovering rules of abnormal BGP events," ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 55-66, October 2005. Link
  30. JSAC'04 Jun Li, Peter Reiher, and Gerald Popek. "Resilient self-organizing overlay networks for security update delivery," IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks (JSAC), vol. 22, no. 1, pp. 189-202, January 2004. Link
  31. COMNET'02 Jun Li, Mark D. Yarvis, and Peter L. Reiher. "Securing distributed adaptation," Computer Networks, Special Issue on Programmable Networks, vol. 38, no. 3, pp. 347-371, February 2002. Link
  32. CCR'97 Adam Rosenstein, Jun Li, and Siyuan Tong. "MASH: The multicasting archie server hierarchy," ACM SIGCOMM Computer Communication Review, vol. 27, no. 3, pp. 5-13, July 1997. Link
  33. CJC'97 Jun Li and Yufang Sun. "Security design and implementation for micro-kernel based file system server," Chinese Journal of Computers, vol. 20, no. 5, pp.396-403, May 1997.
  34. JOS'97 Jun Li and Yufang Sun. "Security research for micro-kernel based operating system," Journal of Software (JOS), vol. 8, no. 2, pp. 99-106, February 1997.
  35. CRAD'96 Jun Li and Yufang Sun. "Computer security and security model," Journal of Computer Research And Development, vol. 33, no. 4, pp.312-320, April 1996.

Peer-Reviewed Conference Publications

  1. CNS'23 Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher, "Toward adaptive DDoS-filtering rule generation," in The 11th IEEE Conference on Communications and Network Security (CNS), Orlando, FL, October 2023.
  2. SecureComm'23 Lumin Shi, Jun Li, Devkishen Sisodia, Mingwei Zhang, Alberto Dainotti, and Peter Reiher, "DDoS mitigation dilemma exposed: A two-wave attack with collateral damage of millions," in 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Hong Kong, October 2023.
  3. SecureComm'23 Mingwei Zhang, Jun Li, Jiabin Wu, and Peter Reiher, "A game theoretical analysis of distributed denial-of-service defense incentive," in 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Hong Kong, October 2023.
  4. RAID'22 Yebo Feng, Devkishen Sisodia, and Jun Li, "CJ-Sniffer: Measurement and content-agnostic detection of cryptojacking traffic," in 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Cyprus, October 2022.
  5. CODASPY'22 Zhangxiang Hu, Jun Li, Samuel Mergendahl, and Christopher Wilson, "Toward a resilient key exchange protocol for IoT," in 12th ACM Conference on Data and Application Security and Privacy (CODASPY), Baltimore-Washington DC, April 2022, 12 pages.
  6. ASIACCS'20 Devkishen Sisodia, Jun Li, and Lei Jiao, "In-network filtering of distributed denial-of-service traffic with near-optimal rule selection," in 15th ACM ASIA Con- ference on Computer and Communications Security (ASIACCS), virtual conference, October 2020. Slides
  7. ASIACCS'20 poster Yebo Feng, Devkishen Sisodia, and Jun Li, "Poster: Content-agnostic identification of cryptojacking in network traffic," in 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS), virtual conference, October 2020. Slides
  8. MLHat'20 Yebo Feng and Jun Li, "Toward explainable and adaptable detection and classification of distributed denial-of-service attacks," in First International Workshop on Deployable Machine Learning for Security Defense (MLHat), virtual space, August 2020. Co-located with The 25TH ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Slides
  9. DAPPS'20 Jun Li, Jeremy Kauffman, Alex Grintsvayg, and Charles Fleming, "LBRY: A blockchain-based decentralized digital content marketplace," in 2nd IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS), virtual conference, August 2020.
  10. DAPPS'20 Thomas Cilloni, Xiyu Cai, Charles Fleming, and Jun Li, "Understanding and detecting majority attacks," in 2nd IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS), virtual conference, August 2020.
  11. CSET'20 Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, and Jun Li, "Bridging missing gaps in evaluating DDoS research," in 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET), virtual workshop, August 2020. Link
  12. IWQoS'20 Yebo Feng, Jun Li, and Thanh Nguyen, "Application-layer DDoS defense with reinforcement learning," in IEEE/ACM International Symposium on Quality of Service (IWQoS), virtual conference, June 2020. Slides
  13. CNS'20 Samuel Mergendahl and Jun Li, "Rapid: Robust and adaptive detection of distributed denial-of-service traffic from the Internet of things," in 8th IEEE Conference on Communications and Network Security (CNS), virtual conference, June 2020. Slides Video
  14. INFOCOM'20 Wencong You, Lei Jiao, Jun Li, and Ruiting Zhou, "Scheduling DDoS cloud scrubbing in ISP networks via randomized online auctions," in IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada (virtual), July 2020, pp. 1658–1667.
  15. PAM'20 poster Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, and Jun Li, "Playing in the sand-box: A step towards sound DDoS research through high-fidelity evaluation," in Passive and Active Measurement Conference (PAM), Eugene, OR, virtual conference, March 2020, Poster.
  16. PAM'20 poster Yebo Feng and Jun Li, "Towards explicable and adaptive DDoS traffic classification," in Passive and Active Measurement Conference (PAM), Eugene, OR, virtual conference, March 2020, Poster.
  17. ACSAC'19 poster Lumin Shi, Devkishen Sisodia, Mingwei Zhang, Jun Li, Alberto Dainotti, and Peter Reiher, "The catch-22 attack," in Annual Computer Security Applications Conference (ACSAC), San Juan, December 2019, poster paper.
  18. CNS'19 BestPaper Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu, "BotFlowMon: Learning-based, content-agnostic identification of social bot traffic flows," in Seventh IEEE Conference on Communications and Network Security (CNS), Washington, D.C., June 2019. Best Paper Award. Slides
  19. IM'19 Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, and Peter Reiher, "On multi-point, in-network filtering of distributed denial-of-service traffic," in IFIP/IEEE International Symposium on Integrated Network Management (IM), Washington, D.C., April 2019. Slides
  20. AAAI'19 Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, and Aidong Lu, "One-class adversarial nets for fraud detection," in Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19), Honolulu, Hawaii, January 2019. Link
  21. ASONAM'18 Soheil Jamshidi, Reza Rejaie, and Jun Li, "Trojan horses in Amazon's castle: Understanding the incentivized online reviews," in IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), Barcelona, Spain, August 2018. Slides
  22. SECURECOMM'18 Devkishen Sisodia, Samuel Mergendahl, Jun Li, and Hasan Cam, "Securing the smart home via a two-mode security framework," in International Conference on Security and Privacy in Communication Networks (SECURECOMM), Singapore, Singapore, August 2018. Slides
  23. ICCCN'18 Samuel Mergendahl, Devkishen Sisodia, Jun Li, and Hasan Cam, "FR-WARD: Fast retransmit as a wary but ample response to distributed denial-of-service attacks from the Internet of things," in 27th International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, July 2018. PDF Link
  24. IFIP Networking'18 Lumin Shi, Mingwei Zhang, Jun Li, and Peter Reiher, "PathFinder: Capturing DDoS traffic footprints on the Internet," in IFIP Networking, Zurich, Switzerland, May 2018. "PDF Slides
  25. IWQoS'18 Lei Jiao, Antonia Tulino, Jaime Llorca, Yue Jin, Alessandra Sala, and Jun Li, "Online control of cloud and edge resources using inaccurate predictions," in IEEE/ACM International Symposium on Quality of Service (IWQoS)", Banff, Alberta, Canada, June 2018, pp. 111-116 (short paper). Link
  26. SECON'18 Lei Jiao, Lingjun Pu, Lin Wang, Xiaojun Lin, and Jun Li, "Multiple granularity online control of cloudlet networks for edge computing," in 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Hong Kong, June 2018. Link
  27. INFOCOM'18 Lin Wang, Lei Jiao, Ting He, Jun Li, and Max Mühlhäuser, "Service entity placement for social virtual reality applications in edge computing," in IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018, pp. 468-476.
  28. INFOCOM'18 Garegin Grigoryan, Yaoqing Liu, Michael Leczinsky, and Jun Li, "VeriTable: Fast equivalence verification of multiple large forwarding tables," in IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018, pp. 621-629.
  29. CIKM'17 Shuhan Yuan, Xintao Wu, Jun Li, and Aidong Lu, "Spectrum-based deep neural betworks for fraud detection," in 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 2017, pp. 2419--2422, short paper.
  30. IoTS&P'17 Samuel Mergendahl, Devkishen Sisodia, Jun Li, and Hasan Cam, "Source-end DDoS defense in IoT environments," in 1st Workshop on Internet of Things Security and Privacy, Dallas, TX, November 2017, poster paper.
  31. HotPOST'17 BestPaper David Koll, Martin Schwarzmaier, Jun Li, Xiang-Yang Li, and Xiaoming Fu, "Thank you for being a friend: An attacker view on online-social-network-based sybil defenses," in The 9th International Workshop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking (HotPOST), Atlanta, GA, June 2017.
  32. ICDCS'17 Lin Wang, Lei Jiao, Jun Li, and Max Mühlhäuser, "Online resource allocation for arbitrary user mobility in distributed edge clouds," in 37th IEEE International Conference on Distributed Computing (ICDCS 2017), Atlanta, GA, June 2017, Applications-Experiences Track. Link
  33. GI'16 Jun Li, Josh Stein, Mingwei Zhang, and Olaf Maennel, "An expectation-based approach to policy-based security of the Border Gateway Protocol," in IEEE Global Internet Symposium, San Francisco, CA, April 2016, pp. 217-222. Slides
  34. IFIP Networking'15 Hanqing Zhu, Mingwei Xu, Qing Li, Jun Li, Yuan Yang, and Suogang Li, "MDTC: An efficient approach to TCAM-based multidimensional table compression," in IFIP Networking, Toulouse, France, May 2015, 9 pages. PDF
  35. NDSS'15 poster Chen Li, Yu Ding, Tongxin Li, Jun Li, and Xinhui Han, "SIPD: A practical SDN-based IP spoofing defense method," in Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015, 2 pages (poster paper). Poster Link
  36. Middleware'14 David Koll, Jun Li, and Xiaoming Fu, "SOUP: An online social network by the people, for the people," in Annual ACM/IFIP/USENIX Middleware Conference, Bordeaux, France, December 8-12, 2014, 12 pages.
  37. CNS'14 Jun Li and Shad Stafford, "Detecting smart, self-propagating Internet worms," in Second IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 2014, pp. 193-201. Slides
  38. SIGCOMM'14 poster Jun Li, Skyler Berg, Mingwei Zhang, Peter Reiher, and Tao Wei, "DrawBridge--software-defined DDoS-resistant traffic engineering," in ACM SIGCOMM, Chicago, USA, August 2014, pp. 591-592 (poster paper). PDF Poster Link
  39. SIGCOMM'14 poster David Koll, Jun Li, and Xiaoming Fu, "SOUP: An online social network by the people, for the people," in ACM SIGCOMM, Chicago, USA, August 2014, pp. 143-144 (poster paper). PDF Video
  40. ICCCN'14 Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, and Xinhui Han, "The store-and-flood distributed reflective denial of service attack," in International Conference on Computer Communications and Networks (ICCCN), Shanghai, China, August 4-7, 2014, 8 pages. Best paper award finalist . Slides Link
  41. IFIP Networking'14 David Koll, Jun Li, Joshua Stein, and Xiaoming Fu, "On the state of OSN-based Sybil defenses," in IFIP Networking, Trondheim, Norway, June 2014, 9 pages. PDF Slides
  42. IWQoS'14 Joshua Stein, Han Hee Song, Mario Baldi, and Jun Li, "Toward the most representative summaries of network user activities," in IEEE/ACM International Symposium on Quality of Service (IWQoS), Hong Kong, China, May 2014, pp. 111-116 (short paper).
  43. IWQoS'14 Ming Zhu, Jun Li, Ying Liu, Dan Li, and Jianping Wu, "TED: Inter-domain traffic engineering via deflection," in IEEE/ACM International Symposium on Quality of Service (IWQoS), Hong Kong, China, May 2014, pp. 117-122 (short paper).
  44. INFOCOM'14 Lei Jiao, Jun Li, Wei Du, and Xiaoming Fu, "Multi-objective data placement for multi-cloud socially aware services," in The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, April 2014, pp. 28-36. Link
  45. CCNC'14 Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, and Chen Li, "Splider: A split-based crawler of the BT-DHT network and its applications," in 11th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, Nevada, January 10-13, 2014, pp. 327-335. Link
  46. ICNP'13 poster David Koll, Jun Li, Joshua Stein, and Xiaoming Fu, "On the effectiveness of Sybil defenses based on online social networks," in 21st IEEE International Conference on Network Protocols (ICNP), Goettingen, Germany, October 2013, 2 pages (poster paper). Poster
  47. CNS'13 Jason Gustafson and Jun Li, "Leveraging the crowds to disrupt phishing," in First IEEE Conference on Communications and Network Security 2013 (CNS), Washington, DC, October 2013, pp. 82-90. Slides
  48. LANMAN'13 Best paper Lei Jiao, Jun Li, and Xiaoming Fu, "Optimizing data center traffic of online social networks," in The 19th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN), Brussels, Belgium, April 2013. Best paper award. Link
  49. ICNP'12 Jun Li, Toby Ehrenkranz, and Paul Elliott, "Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies," in 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, October 2012, 10 pages. Slides
  50. ICNP'12 Lei Jiao, Jun Li, Tianyin Xu, and Xiaoming Fu, "Cost optimization for online social networks on geo-distributed clouds," in 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, October 2012, 10 pages.
  51. P2P'12 Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, and Mo Zhou, "Revisiting why Kad lookup fails," in 12th IEEE International Conference on Peer-to-Peer Computing 2012 (P2P), Tarragona, Spain, September 3-5, 2012, pp. 37-42 (short paper).
  52. HotSocial'12 Jason Gustafson, Jun Li, and Haixin Duan, "Towards a socially aware home router," in First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research (HotSocial), Beijing, China, August 2012, pp. 77-80 (short paper).
  53. IWQoS'12 Shining Wu, Yang Chen, Xiaoming Fu, and Jun Li, "NCShield: Securing decentralized, matrix factorization-based network coordinate systems," in 20th IEEE/ACM International Workshop on Quality of Service (IWQoS), Coimbra, Portugal, June 2012, 9 pages. PDF Slides
  54. NDSS'12 J. Jiang, J. Liang, K. Li, J. Li, H. Duan, and J. Wu, "Ghost domain names: Revoked yet still resolvable," in 19th Network and Distributed System Security Symposium (NDSS), San Diego, California, February 2012, 13 pages. Link
  55. ICNC'12 Jun Li, Dongting Yu, and Luke Maurer, "A resource management approach to web browser security," in Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Maui, Hawaii, January 2012, pp. 697-701. Slides
  56. Middleware'11 poster Lei Jiao, Tianyin Xu, Jun Li, and Xiaoming Fu, "Latency-aware data partitioning for geo-replicated online social networks," in Proceedings of ACM/IFIP/USENIX 12th International Middleware Conference (Middleware), Lisboa, Portugal, December 2011, poster paper.
  57. INFOCOM'11 Jun Li and Scott Brooks, "I-seismograph: Observing and measuring Internet earthquakes," in The 30th IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China, April 2011, pp. 2624-2632.
  58. RAID'10 Shad Stafford and Jun Li, "Behavior-based worm detectors compared," in 13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Canada, September 2010, pp. 38-57.
  59. SecureComm'10 Toby Ehrenkranz, Jun Li, and Patrick McDaniel, "Realizing a source authentic Internet," in 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), Singapore, September 2010, pp. 217-234.
  60. eCrime'09 Paul Knickerbocker, Dongting Yu, and Jun Li, "Humboldt: A distributed phishing disruption system," in The Anti-Phishing Working Group eCrime Researchers Summit, October 2009, 11 pages.
  61. ICISS'07 Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, and Jun Li, "Investigating the impact of real-world factors on Internet worm propagation," in International Conference on Information Systems Security, December 2007, pp. 10-24.
  62. ICISS'07 Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, and Yibo Wang, "On knowledge-based classification of abnormal BGP events," in International Conference on Information Systems Security, December 2007, pp. 267-271 (short paper).
  63. SIAM'07 Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, and Sheng Zhong, "Understanding and utilizing the hierarchy of abnormal BGP events," in SIAM International Conference on Data Mining, Minneapolis, Minnesota, April 2007, pp. 457-462 (short paper).
  64. GLOBECOM'06 Jun Li, Zhen Wu, and Eric Purpus, "Toward understanding the behavior of BGP during large-scale power outages," in IEEE GLOBECOM, San Francisco, CA, November 2006, 5 pages.
  65. SPECTS'06 Shad Stafford, Jun Li, and Toby Ehrenkranz, "On the performance of SWORD in detecting zero-day-worm-infected hosts," in Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Calgary, Canada, July 2006, vol. 38, pp. 559-566.
  66. SPECTS'06 Matthew Roughan, Jun Li, Randy Bush, Zhuoqing Mao, and Timothy Griffin, "Is BGP update storm a sign of trouble: Observing the Internet control and data planes during Internet worms," in Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Calgary, Canada, July 2006, vol. 38, pp. 535-542.
  67. PAM'06 Jun Li, Randy Bush, Zhuoqing Mao, Timothy Griffin, Matthew Roughan, Daniel Stutzbach, and Eric Purpus, "Watching data streams toward a multi-homed sink under routing changes introduced by a BGP beacon," in Passive and Active Measurement Conference (PAM), Adelaide, Australia, March 2006.
  68. ACSAC'05 Jun Li and Xun Kang, "mSSL: Extending SSL to support data sharing among collaborative clients," in Annual Computer Security Applications Conference, Tucson, Arizona, December 2005, pp. 357-368.
  69. AEPP'05 Jun Li and Xun Kang, "Proof of service in a hybrid P2P environment," in Springer LNCS 3759 of the International Workshop on Applications and Economics of Peer to Peer Systems, November 2005, pp. 64-73.
  70. HotP2P'05 Virginia Lo, Dayi Zhou, Yuhong Liu, Chris Gauthier-Dickey, and Jun Li, "Scalable supernode selection in peer-to-peer overlay networks," in International Workshop on Hot Topics in Peer-to-Peer Systems (HotP2P), San Diego, CA, July 2005, pp. 18-25.
  71. MMSM'05 Jun Li, Toby Ehrenkranz, Geoff Kuenning, and Peter Reiher, "Simulation and analysis on the resiliency and efficiency of malnets," in Symposium on Measurement, Modeling, and Simulation of Malware, Monterey, CA, June 2005, pp. 262-269.
  72. IM'05 Zhen Wu, Eric S. Purpus, and Jun Li, "BGP behavior analysis during the August 2003 blackout," in The 9th IFIP/IEEE International Symposium on Integrated Network Management, Nice, France, May 2005, 4 pages (short paper).
  73. SIGCOMM'04 poster Xun Kang, Dayi Zhou, Dan Rao, Jun Li, and Virginia Lo, "Sequoia--A robust communication architecture for collaborative security monitoring systems," in ACM SIGCOMM poster session, Portland, OR, August 2004, 1 page.
  74. WISA'04 Jun Li and Xun Kang, "mSSL: Securely sharing data from a server among clients," in Workshop on Information Security Applications (WISA), August 2004, pp. 567-570 (short paper).
  75. INFOCOM'02 Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, and Lixia Zhang, "SAVE: Source address validity enforcement protocol," in IEEE INFOCOM, New York, June 2002, pp. 1557-66.
  76. TestCom'02 Jun Li, Peter L. Reiher, Gerald J. Popek, Mark D. Yarvis, and Geoff Kuenning, "Position statement: An approach to measuring large-scale distributed systems," in IFIP 14th International Conference on Testing of Communicating Systems (TestCom 2002), Berlin, Germany, March 2002, pp. 9-18.
  77. OPENARCH'01 Jun Li, Mark D. Yarvis, and Peter L. Reiher, "Securing distributed adaptation," in the Fourth IEEE Conference on Open Architectures and Network Programming (OPENARCH 2001), Anchorage, Alaska, April 2001, pp. 71-82. A best paper and its extended version selected for journal publication.
  78. NSPW'99 Jun Li, Peter L. Reiher, and Gerald J. Popek, "Securing information transmission by redundancy," in ACM New Security Paradigms Workshop, Ontario, Canada, September 1999, pp. 112-117. A best paper and selected as a highlight for 22nd National Information Systems Security Conference.

Invited Publications

  1. IAnewsletter'06 Jun Li, "Data integrity and proof of service in Bittorrent-like P2P environments," IAnewsletter, Information Assurance Technology Analysis Center, vol. 9, no. 4, pp. 16-19, Winter 2006.

Patents

  1. USPatent'11 Jun Li, "Security protocols for hybrid peer-to-peer file sharing networks," September 27, 2011, number US 8,028,159 B2. Link
  2. USPatent'11 Jun Li, "Security protocols for hybrid peer-to-peer file sharing networks," September 13, 2011, number US 8,019,988 B2. Link