Selected Publications

Peer-Reviewed Books

  1. Book'02 Jun Li, Peter Reiher, Gerald Popek. Disseminating Security Updates at Internet Scale, Kluwer Academic Publishers, Boston, November 2002, 174 pages, ISBN 1-4020-7305-4.

Peer-Reviewed Journal Articles

  1. TDSC'21 Lumin Shi, Jun Li, Mingwei Zhang, and Peter Reiher, "On capturing DDoS traffic footprints on the Internet," IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted on 04/06/2021. PDF Link
  2. TDSC'21 Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu, "Towards learning-based, content-agnostic detection of social bot traffic," IEEE Transactions on Dependable and Secure Computing (TDSC), Accepted on 12/18/2020. DOI: 10.1109/TDSC.2020.3047399. PDF Link
  3. ToN'21 Lin Wang, Lei Jiao, Ting He, Jun Li, and Henri Bal, "Service placement for collaborative edge applications," IEEE/ACM Transactions on Networking (ToN), vol. 29, no. 1, pp. 34–47, February 2021. PDF Link
  4. TPDS'21 Jianzhen Luo, Jun Li, Lei Jiao, and Jun Cai, "On the effective parallelization and near-optimal deployment of service function chains," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 32, no. 5, pp. 1238–1255, 2021. PDF Link
  5. COMNET'20 Yaoqing Liu, Garegin Grigoryan, Jun Li, Guchuan Sun, and Tony Tauber, "VeriTable: Fast equivalence verification of multiple large forwarding tables," Computer Networks, vol. 168, pp. 106981, February 2020. Link
  6. SNAM'19 Soheil Jamshidi, Reza Rejaie, and Jun Li, "Characterizing the dynamics and evolution of incentivized online reviews on Amazon," Social Network Analysis and Mining, vol. 9, no. 22, December 2019. PDF Link
  7. TMC'19 Lin Wang, Lei Jiao, Jun Li, Julien Gedeon, and Max Mühlhäuser, "MOERA: Mobility-agnostic online resource allocation for edge computing," IEEE Transactions on Mobile Computing (TMC), 18(8):1843-1856, 2019. DOI: 10.1109/TMC.2018.2867520. PDF Link
  8. ToN'17 Mingwei Zhang, Jun Li, and Scott Brooks, "I-seismograph: Observing, measuring, and analyzing Internet earthquakes," IEEE/ACM Transactions on Networking (ToN), vol. 25, no. 6, pp. 3411-3426, December 2017, DOI: 10.1109/TNET.2017.2748902. PDF Link
  9. COMCOM'17 David Koll, Jun Li, and Xiaoming Fu, "The good left undone: Advances and challenges in decentralizing online social networks," Computer Communications (COMCOM), vol. 108, pp. 36-51, August 2017. PDF Link
  10. TSC'17 Yang Chen, Shining Wu, Jun Li, and Xiaoming Fu, "NCShield: Protecting decentralized, matrix factorization-based network coordinate systems," IEEE Transactions on Services Computing (TSC), vol. 10, no. 2, pp. 244-257, March-April 2017. DOI: 10.1109/TSC.2015.2437383. PDF Link
  11. COMNET'17 Joshua Stein, Han Hee Song, Mario Baldi, and Jun Li, "On the most representative summaries of network user activities," Computer Networks, vol. 113, no. C, pp. 205-217, February 2017. PDF Link
  12. COMNET'16 Yuanyuan Zhang, Mingwei Xu, Ning Wang, Jun Li, Penghan Chen, and Fei Liang, "Compressing IP forwarding tables with small bounded update time," Computer Networks, vol. 106, no. C, pp. 77-90, September 2016. PDF Link
  13. TCC'16 Congjie Chen, Dan Li, Jun Li, and Konglin Zhu, "SVDC: A highly scalable isolation architecture for virtualized layer-2 data center networks," IEEE Transactions on Cloud Computing (TCC), vol. 6, no. 4, pp. 1178–1190, June 2016. DOI:10.1109/TCC.2016.2586047. PDF Link
  14. ToN'16 Lei Jiao, Jun Li, Tianyin Xu, Wei Du, and Xiaoming Fu, "Optimizing cost for online social networks on geo-distributed clouds," IEEE/ACM Transactions on Networking (ToN), vol. 24, no. 1, pp. 99–112, February 2016. DOI: 10.1109/TNET.2014.2359365. PDF Link
  15. COMCOM'15 Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, and Jiahai Yang, "Nexthop-selectable FIB aggregation: An instant approach for Internet routing scalability," Computer Communications (COMCOM), vol. 67, pp. 11–22, August 2015. DOI: doi:10.1016/j.comcom.2015.07.003. PDF Link
  16. COMCOM'15 Bingshuang Liu, Jun Li, Tao Wei, Skyler Berg, Jiayi Ye, Chen Li, Chao Zhang, and Xinhui Han, "SF-DRDoS: The store-and-flood distributed reflective denial of service attack," Computer Communications (COMCOM), vol. 69, pp. 107–115, September 2015. DOI: 10.1016/j.comcom.2015.06.008. PDF Link
  17. PPNA'15 Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, and Jianyu Zhang, "Improving lookup reliability in Kad," Peer-to-Peer Networking and Applications (PPNA), vol. 8, no. 1, pp. 156-170, January 2015. PDF Link
  18. PPNA'14 Ghulam Memon, Jun Li, and Reza Rejaie, "Tsunami: A parasitic, indestructible botnet on Kad," Peer-to-Peer Networking and Applications (PPNA), vol. 7, no. 4, pp. 444-455, December 2014. PDF Link
  19. PPNA'11 Jun Li, "mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients," Peer-to-Peer Networking and Applications (PPNA), vol. 4, no. 4, pp. 325-345, December 2011. PDF Link
  20. ToIT'09 Toby Ehrenkranz and Jun Li, "On the state of IP spoofing defense," ACM Transactions on Internet Technology (TOIT), vol. 9, no. 2, May 2009. PDF Link
  21. COMNET'08 Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter Reiher, and Lixia Zhang, "Learning the valid incoming direction of IP packets," Computer Networks, vol. 52, no. 2, pp. 399-417, February 2008. PDF Link
  22. COMSEC'07 Jun Li and Paul Knickerbocker, "Functional similarities between computer worms and biological pathogens," Computers & Security, vol. 26, no. 4, pp. 338-347, June 2007. PDF Link
  23. CCR'07 Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, and Toby Ehrenkranz, "BGP routing dynamics revisited," ACM SIGCOMM Computer Communication Review, vol. 37, no. 2, pp. 7-16, April 2007. PDF Link
  24. SIMULATION'07 Shad Stafford, Jun Li, and Toby Ehrenkranz, "Enhancing SWORD to detect 0-day-worm-infected hosts," SIMULATION: Transactions of the Society for Modeling and Simulation International, vol. 83, no. 2, pp. 199-212, February 2007. PDF Link
  25. CCR'05 Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, and Vikash Agarwal, "An Internet routing forensics framework for discovering rules of abnormal BGP events," ACM SIGCOMM Computer Communication Review, vol. 35, no. 5, pp. 55-66, October 2005. PDF Link
  26. JSAC'04 Jun Li, Peter Reiher, and Gerald Popek. "Resilient self-organizing overlay networks for security update delivery," IEEE Journal on Selected Areas in Communications, Special Issue on Service Overlay Networks (JSAC), vol. 22, no. 1, pp. 189-202, January 2004. PDF Link
  27. COMNET'02 Jun Li, Mark D. Yarvis, and Peter L. Reiher. ""Securing distributed adaptation," Computer Networks, Special Issue on Programmable Networks, vol. 38, no. 3, pp. 347-371, February 2002. PDF Link
  28. CCR'97 Adam Rosenstein, Jun Li, and Siyuan Tong. "MASH: The multicasting archie server hierarchy," ACM SIGCOMM Computer Communication Review, vol. 27, no. 3, pp. 5-13, July 1997. PDF Link
  29. CJC'97 Jun Li and Yufang Sun. "Security design and implementation for micro-kernel based file system server," Chinese Journal of Computers, vol. 20, no. 5, pp.396-403, May 1997. PDF
  30. JOS'97 Jun Li and Yufang Sun. "Security research for micro-kernel based operating system," Journal of Software (JOS), vol. 8, no. 2, pp. 99-106, February 1997. PDF
  31. CRAD'96 Jun Li and Yufang Sun. "Computer security and security model," Journal of Computer Research And Development, vol. 33, no. 4, pp.312-320, April 1996. PDF

Peer-Reviewed Conference Publications

  1. ASIACCS'20 Devkishen Sisodia, Jun Li, and Lei Jiao, "In-network filtering of distributed denial-of- service traffic with near-optimal rule selection," in 15th ACM ASIA Con- ference on Computer and Communications Security (ASIACCS), virtual conference, October 2020. PDF Slides
  2. ASIACCS'20 poster Yebo Feng, Devkishen Sisodia, and Jun Li, "Poster: Content-agnostic identification of cryptojacking in network traffic," in 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS), virtual conference, October 2020. PDF Slides
  3. MLHat'20 Yebo Feng and Jun Li, "Toward explainable and adaptable detection and classification of distributed denial-of-service attacks," in First International Workshop on Deployable Machine Learning for Security Defense (MLHat), virtual space, August 2020. Co-located with The 25TH ACM SIGKDD Conference on Knowledge Discovery and Data Mining. PDF Slides
  4. DAPPS'20 Jun Li, Jeremy Kauffman, Alex Grintsvayg, and Charles Fleming, "LBRY: A blockchain-based decentralized digital content marketplace," in 2nd IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS), virtual conference, August 2020.
  5. DAPPS'20 Thomas Cilloni, Xiyu Cai, Charles Fleming, and Jun Li, "Understanding and detecting majority attacks," in 2nd IEEE International Conference on Decentralized Applications and Infrastructures(DAPPS), virtual conference, August 2020.
  6. CSET'20 Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, and Jun Li, "Bridging missing gaps in evaluating DDoS research," in 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET), virtual workshop, August 2020.
  7. IWQoS'20 Yebo Feng, Jun Li, and Thanh Nguyen, "Application-layer DDoS defense with reinforcement learning," in IEEE/ACM International Symposium on Quality of Service (IWQoS), virtual conference, June 2020. PDF Slides
  8. CNS'20 Samuel Mergendahl and Jun Li, "Rapid: Robust and adaptive detection of distributed denial-of-service traffic from the Internet of things," in 8th IEEE Conference on Communications and Network Security (CNS), virtual conference, June 2020. PDF Slides Video
  9. PAM'20 poster Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, and Jun Li, "Playing in the sand-box: A step towards sound DDoS research through high-fidelity evaluation," in Passive and Active Measurement Conference (PAM), Eugene, OR, virtual conference, March 2020, Poster. PDF
  10. PAM'20 poster Yebo Feng and Jun Li, "Towards explicable and adaptive DDoS traffic classification," in Passive and Active Measurement Conference (PAM), Eugene, OR, virtual conference, March 2020, Poster. PDF
  11. ACSAC'19 poster Lumin Shi, Devkishen Sisodia, Mingwei Zhang, Jun Li, Alberto Dainotti, and Peter Reiher, "The catch-22 attack," in Annual Computer Security Applications Conference (ACSAC), San Juan, December 2019, poster paper. PDF
  12. CNS'19 BestPaper Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu, "BotFlowMon: Learning-based, content- agnostic identification of social bot traffic flows," in Seventh IEEE Conference on Communications and Network Security (CNS), Washington, D.C., June 2019. Best Paper Award. PDF Slides
  13. IM'19 Mingwei Zhang, Lumin Shi, Devkishen Sisodia, Jun Li, and Peter Reiher, "On multi-point, in-network filtering of distributed denial-of-service traffic," in IFIP/IEEE International Symposium on Integrated Network Management (IM), Washington, D.C., April 2019. PDF Slides
  14. AAAI'19 Panpan Zheng, Shuhan Yuan, Xintao Wu, Jun Li, and Aidong Lu, "One-class adversarial nets for fraud detection," in Thirty-Third AAAI Conference on Artificial Intelligence (AAAI-19), Honolulu, Hawaii, January 2019. PDF Link
  15. ASONAM'18 Soheil Jamshidi, Reza Rejaie, and Jun Li, "Trojan horses in Amazon's castle: Understanding the incentivized online reviews," in IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), Barcelona, Spain, August 2018. PDF Slides
  16. SECURECOMM'18 Devkishen Sisodia, Samuel Mergendahl, Jun Li, and Hasan Cam, "Securing the smart home via a two-mode security framework," in International Conference on Security and Privacy in Communication Networks (SECURECOMM), Singapore, Singapore, August 2018. PDF Slides
  17. ICCCN'18 Samuel Mergendahl, Devkishen Sisodia, Jun Li, and Hasan Cam, "FR-WARD: Fast retransmit as a wary but ample response to distributed denial-of-service attacks from the Internet of things," in 27th International Conference on Computer Communications and Networks (ICCCN), Hangzhou, China, July 2018. PDF Link
  18. IFIP Networking'18 Lumin Shi, Mingwei Zhang, Jun Li, and Peter Reiher, "PathFinder: Capturing DDoS traffic footprints on the Internet," in IFIP Networking, Zurich, Switzerland, May 2018. PDF Slides
  19. IWQoS'18 Lei Jiao, Antonia Tulino, Jaime Llorca, Yue Jin, Alessandra Sala, and Jun Li, "Online control of cloud and edge resources using inaccurate predictions," in IEEE/ACM International Symposium on Quality of Service (IWQoS)", Banff, Alberta, Canada, June 2018, pp. 111-116 (short paper). PDF Link
  20. SECON'18 Lei Jiao, Lingjun Pu, Lin Wang, Xiaojun Lin, and Jun Li, "Multiple granularity online control of cloudlet networks for edge computing," in 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Hong Kong, June 2018. PDF Link
  21. INFOCOM'18 Lin Wang, Lei Jiao, Ting He, Jun Li, and Max Mühlhäuser, "Service entity placement for social virtual reality applications in edge computing," in IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018, pp. 468-476. PDF
  22. INFOCOM'18 Garegin Grigoryan, Yaoqing Liu, Michael Leczinsky, and Jun Li, "VeriTable: Fast equivalence verification of multiple large forwarding tables," in IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, April 2018, pp. 621-629. PDF
  23. CIKM'17 Shuhan Yuan, Xintao Wu, Jun Li, and Aidong Lu, "Spectrum-based deep neural betworks for fraud detection," in 26th ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 2017, pp. 2419--2422, short paper. PDF
  24. HotPOST'17 BestPaper David Koll, Martin Schwarzmaier, Jun Li, Xiang-Yang Li, and Xiaoming Fu, "Thank you for being a friend: An attacker view on online-social-network-based sybil defenses," in The 9th International Workshop on Hot Topics in Planet-Scale Mobile Computing and Online Social Networking (HotPOST), Atlanta, GA, June 2017. PDF
  25. ICDCS'17 Lin Wang, Lei Jiao, Jun Li, and Max Mühlhäuser, "Online resource allocation for arbitrary user mobility in distributed edge clouds," in 37th IEEE International Conference on Distributed Computing (ICDCS 2017), Atlanta, GA, June 2017, Applications-Experiences Track. PDF Link
  26. GI'16 Jun Li, Josh Stein, Mingwei Zhang, and Olaf Maennel, "An expectation-based approach to policy-based security of the Border Gateway Protocol," in IEEE Global Internet Symposium, San Francisco, CA, April 2016, pp. 217-222. PDF Slides
  27. IFIP Networking'15 Hanqing Zhu, Mingwei Xu, Qing Li, Jun Li, Yuan Yang, and Suogang Li, "MDTC: An efficient approach to TCAM-based multidimensional table compression," in IFIP Networking, Toulouse, France, May 2015, 9 pages. PDF
  28. NDSS'15 poster Chen Li, Yu Ding, Tongxin Li, Jun Li, and Xinhui Han, "SIPD: A practical SDN-based IP spoofing defense method," in Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2015, 2 pages (poster paper). Poster Link
  29. Middleware'14 David Koll, Jun Li, and Xiaoming Fu, "SOUP: An online social network by the people, for the people," in Annual ACM/IFIP/USENIX Middleware Conference, Bordeaux, France, December 8-12, 2014, 12 pages. PDF
  30. CNS'14 Jun Li and Shad Stafford, "Detecting smart, self-propagating Internet worms," in Second IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 2014, pp. 193-201. PDF Slides
  31. SIGCOMM'14 poster Jun Li, Skyler Berg, Mingwei Zhang, Peter Reiher, and Tao Wei, "DrawBridge--software-defined DDoS-resistant traffic engineering," in ACM SIGCOMM, Chicago, USA, August 2014, pp. 591-592 (poster paper). PDF Poster Link
  32. SIGCOMM'14 poster David Koll, Jun Li, and Xiaoming Fu, "SOUP: An online social network by the people, for the people," in ACM SIGCOMM, Chicago, USA, August 2014, pp. 143-144 (poster paper). PDF Video
  33. ICCCN'14 Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, and Xinhui Han, "The store-and-flood distributed reflective denial of service attack," in International Conference on Computer Communications and Networks (ICCCN), Shanghai, China, August 4-7, 2014, 8 pages. Best paper award finalist . PDF Slides Link
  34. IFIP Networking'14 David Koll, Jun Li, Joshua Stein, and Xiaoming Fu, "On the state of OSN-based Sybil defenses," in IFIP Networking, Trondheim, Norway, June 2014, 9 pages. PDF Slides
  35. IWQoS'14 Joshua Stein, Han Hee Song, Mario Baldi, and Jun Li, "Toward the most representative summaries of network user activities," in IEEE/ACM International Symposium on Quality of Service (IWQoS), Hong Kong, China, May 2014, pp. 111-116 (short paper). PDF
  36. IWQoS'14 Ming Zhu, Jun Li, Ying Liu, Dan Li, and Jianping Wu, "TED: Inter-domain traffic engineering via deflection," in IEEE/ACM International Symposium on Quality of Service (IWQoS), Hong Kong, China, May 2014, pp. 117-122 (short paper). PDF
  37. INFOCOM'14 Lei Jiao, Jun Li, Wei Du, and Xiaoming Fu, "Multi-objective data placement for multi-cloud socially aware services," in The 33rd Annual IEEE International Conference on Computer Communications (INFOCOM), Toronto, Canada, April 2014, pp. 28-36. PDF Link
  38. CCNC'14 Bingshuang Liu, Shidong Wu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang, Yu Chen, and Chen Li, "Splider: A split-based crawler of the BT-DHT network and its applications," in 11th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, Nevada, January 10-13, 2014, pp. 327-335. PDF Link
  39. ICNP'13 poster David Koll, Jun Li, Joshua Stein, and Xiaoming Fu, "On the effectiveness of Sybil defenses based on online social networks," in 21st IEEE International Conference on Network Protocols (ICNP), Goettingen, Germany, October 2013, 2 pages (poster paper). PDF Poster
  40. CNS'13 Jason Gustafson and Jun Li, "Leveraging the crowds to disrupt phishing," in First IEEE Conference on Communications and Network Security 2013 (CNS), Washington, DC, October 2013, pp. 82-90. PDF Slides
  41. LANMAN'13 Best paper Lei Jiao, Jun Li, and Xiaoming Fu, "Optimizing data center traffic of online social networks," in The 19th IEEE International Workshop on Local and Metropolitan Area Networks (LANMAN), Brussels, Belgium, April 2013. Best paper award. PDF Link
  42. ICNP'12 Jun Li, Toby Ehrenkranz, and Paul Elliott, "Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies," in 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, October 2012, 10 pages. PDF Slides
  43. ICNP'12 Lei Jiao, Jun Li, Tianyin Xu, and Xiaoming Fu, "Cost optimization for online social networks on geo-distributed clouds," in 20th IEEE International Conference on Network Protocols (ICNP), Austin, TX, October 2012, 10 pages. PDF
  44. P2P'12 Bingshuang Liu, Tao Wei, Jianyu Zhang, Jun Li, Wei Zou, and Mo Zhou, "Revisiting why Kad lookup fails," in 12th IEEE International Conference on Peer-to-Peer Computing 2012 (P2P), Tarragona, Spain, September 3-5, 2012, pp. 37-42 (short paper). PDF
  45. HotSocial'12 Jason Gustafson, Jun Li, and Haixin Duan, "Towards a socially aware home router," in First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research (HotSocial), Beijing, China, August 2012, pp. 77-80 (short paper). PDF
  46. IWQoS'12 Shining Wu, Yang Chen, Xiaoming Fu, and Jun Li, "NCShield: Securing decentralized, matrix factorization-based network coordinate systems," in 20th IEEE/ACM International Workshop on Quality of Service (IWQoS), Coimbra, Portugal, June 2012, 9 pages. PDF Slides
  47. NDSS'12 J. Jiang, J. Liang, K. Li, J. Li, H. Duan, and J. Wu, "Ghost domain names: Revoked yet still resolvable," in 19th Network and Distributed System Security Symposium (NDSS), San Diego, California, February 2012, 13 pages. PDF Link
  48. ICNC'12 Jun Li, Dongting Yu, and Luke Maurer, "A resource management approach to web browser security," in Proceedings of the International Conference on Computing, Networking and Communications (ICNC), Maui, Hawaii, January 2012, pp. 697-701. PDF Slides
  49. Middleware'11 poster Lei Jiao, Tianyin Xu, Jun Li, and Xiaoming Fu, "Latency-aware data partitioning for geo-replicated online social networks," in Proceedings of ACM/IFIP/USENIX 12th International Middleware Conference (Middleware), Lisboa, Portugal, December 2011, poster paper. PDF Slides
  50. INFOCOM'11 Jun Li and Scott Brooks, "I-seismograph: Observing and measuring Internet earthquakes," in The 30th IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China, April 2011, pp. 2624-2632. PDF Slides
  51. RAID'10 Shad Stafford and Jun Li, "Behavior-based worm detectors compared," in 13th International Symposium on Recent Advances in Intrusion Detection (RAID), Ottawa, Canada, September 2010, pp. 38-57. PDF Slides
  52. SecureComm'10 Toby Ehrenkranz, Jun Li, and Patrick McDaniel, "Realizing a source authentic Internet," in 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), Singapore, September 2010, pp. 217-234. PDF Slides
  53. eCrime'09 Paul Knickerbocker, Dongting Yu, and Jun Li, "Humboldt: A distributed phishing disruption system, in The Anti-Phishing Working Group eCrime Researchers Summit, October 2009, 11 pages. PDF Slides
  54. ICISS'07 Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, and Jun Li, "Investigating the impact of real-world factors on Internet worm propagation," in International Conference on Information Systems Security, December 2007, pp. 10-24. PDF Slides
  55. ICISS'07 Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, and Yibo Wang, "On knowledge-based classification of abnormal BGP events," in International Conference on Information Systems Security, December 2007, pp. 267-271 (short paper). PDF Slides
  56. SIAM'07 Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, and Sheng Zhong, "Understanding and utilizing the hierarchy of abnormal BGP events," in SIAM International Conference on Data Mining, Minneapolis, Minnesota, April 2007, pp. 457-462 (short paper). PDF Slides
  57. GLOBECOM'06 Jun Li, Zhen Wu, and Eric Purpus, "Toward understanding the behavior of BGP during large-scale power outages," in IEEE GLOBECOM, San Francisco, CA, November 2006, 5 pages. PDF Slides
  58. SPECTS'06 Shad Stafford, Jun Li, and Toby Ehrenkranz, "On the performance of SWORD in detecting zero-day-worm-infected hosts," in Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Calgary, Canada, July 2006, vol. 38, pp. 559-566. PDF Slides
  59. SPECTS'06 Matthew Roughan, Jun Li, Randy Bush, Zhuoqing Mao, and Timothy Griffin, "Is BGP update storm a sign of trouble: Observing the Internet control and data planes during Internet worms," in Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Calgary, Canada, July 2006, vol. 38, pp. 535-542. PDF Slides
  60. PAM'06 Jun Li, Randy Bush, Zhuoqing Mao, Timothy Griffin, Matthew Roughan, Daniel Stutzbach, and Eric Purpus, "Watching data streams toward a multi-homed sink under routing changes introduced by a BGP beacon," in Passive and Active Measurement Conference (PAM), Adelaide, Australia, March 2006. PDF Slides
  61. ACSAC'05 Jun Li and Xun Kang, "mSSL: Extending SSL to support data sharing among collaborative clients," in Annual Computer Security Applications Conference, Tucson, Arizona, December 2005, pp. 357-368. PDF Slides
  62. AEPP'05 Jun Li and Xun Kang, "Proof of service in a hybrid P2P environment," in Springer LNCS 3759 of the International Workshop on Applications and Economics of Peer to Peer Systems, November 2005, pp. 64-73. PDF Slides
  63. HotP2P'05 Virginia Lo, Dayi Zhou, Yuhong Liu, Chris Gauthier-Dickey, and Jun Li, "Scalable supernode selection in peer-to-peer overlay networks," in International Workshop on Hot Topics in Peer-to-Peer Systems (HotP2P), San Diego, CA, July 2005, pp. 18-25. PDF Slides
  64. MMSM'05 Jun Li, Toby Ehrenkranz, Geoff Kuenning, and Peter Reiher, "Simulation and analysis on the resiliency and efficiency of malnets," in Symposium on Measurement, Modeling, and Simulation of Malware, Monterey, CA, June 2005, pp. 262-269. PDF Slides
  65. IM'05 Zhen Wu, Eric S. Purpus, and Jun Li, "BGP behavior analysis during the August 2003 blackout," in The 9th IFIP/IEEE International Symposium on Integrated Network Management, Nice, France, May 2005, 4 pages (short paper). PDF Slides
  66. SIGCOMM'04 poster Xun Kang, Dayi Zhou, Dan Rao, Jun Li, and Virginia Lo, "Sequoia--A robust communication architecture for collaborative security monitoring systems," in ACM SIGCOMM poster session, Portland, OR, August 2004, 1 page. PDF Slides
  67. WISA'04 Jun Li and Xun Kang, "mSSL: Securely sharing data from a server among clients," in Workshop on Information Security Applications (WISA), August 2004, pp. 567-570 (short paper). PDF Slides
  68. INFOCOM'02 Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, and Lixia Zhang, "SAVE: Source address validity enforcement protocol," in IEEE INFOCOM, New York, June 2002, pp. 1557-66. PDF Slides
  69. TestCom'02 Jun Li, Peter L. Reiher, Gerald J. Popek, Mark D. Yarvis, and Geoff Kuenning, "Position statement: An approach to measuring large-scale distributed systems," in IFIP 14th International Conference on Testing of Communicating Systems (TestCom 2002), Berlin, Germany, March 2002, pp. 9-18. PDF Slides
  70. OPENARCH'01 Jun Li, Mark D. Yarvis, and Peter L. Reiher, "Securing distributed adaptation," in the Fourth IEEE Conference on Open Architectures and Network Programming (OPENARCH 2001), Anchorage, Alaska, April 2001, pp. 71-82. A best paper and its extended version selected for journal publication. PDF Slides
  71. NSPW'99 Jun Li, Peter L. Reiher, and Gerald J. Popek, "Securing information transmission by redundancy," in ACM New Security Paradigms Workshop, Ontario, Canada, September 1999, pp. 112-117. A best paper and selected as a highlight for 22nd National Information Systems Security Conference. PDF Slides

Invited Publications

  1. IAnewsletter'06 Jun Li, "Data integrity and proof of service in Bittorrent-like P2P environments," IAnewsletter, Information Assurance Technology Analysis Center, vol. 9, no. 4, pp. 16-19, Winter 2006. PDF Slides

Patents

  1. USPatent'11 Jun Li, "Security protocols for hybrid peer-to-peer file sharing networks," September 27, 2011, number US 8,028,159 B2. PDF
  2. USPatent'11 Jun Li, "Security protocols for hybrid peer-to-peer file sharing networks," September 13, 2011, number US 8,019,988 B2. PDF