Follow
Kang Li
Title
Cited by
Cited by
Year
Collafl: Path sensitive fuzzing
S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen
2018 IEEE Symposium on Security and Privacy (SP), 679-696, 2018
3522018
Approximate caches for packet classification
F Chang, W Feng, K Li
IEEE INFOCOM 2004 4, 2196-2207, 2004
1732004
New methods for passive estimation of TCP round-trip times
B Veal, K Li, D Lowenthal
Passive and Active Network Measurement: 6th International Workshop, PAM 2005 …, 2005
1652005
Large online social footprints--an emerging threat
D Irani, S Webb, K Li, C Pu
2009 International conference on computational science and engineering 3 …, 2009
1512009
When HTTPS meets CDN: A case of authentication in delegated service
J Liang, J Jiang, H Duan, K Li, T Wan, J Wu
2014 IEEE Symposium on Security and Privacy, 67-82, 2014
1442014
The case for streaming multimedia with TCP
C Krasic, K Li, J Walpole
Interactive Distributed Multimedia Systems: 8th International Workshop, IDMS …, 2001
1362001
Modeling unintended personal-information leakage from multiple online social networks
D Irani, S Webb, K Li, C Pu
IEEE Internet Computing 15 (3), 13-19, 2011
1142011
Study of trend-stuffing on twitter through text classification
D Irani, S Webb, C Pu, K Li
Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010
922010
Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms.
Q Xiao, Y Chen, C Shen, Y Chen, K Li
USENIX Security Symposium, 443-460, 2019
702019
Clickminer: Towards forensic reconstruction of user-browser interactions from network traces
C Neasbitt, R Perdisci, K Li, T Nelms
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
702014
Fast statistical spam filter by approximate classifications
K Li, Z Zhong
Proceedings of the joint international conference on measurement and …, 2006
702006
Peerrush: Mining for unwanted p2p traffic
B Rahbarinia, R Perdisci, A Lanzi, K Li
Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013
672013
Privacy-aware collaborative spam filtering
K Li, Z Zhong, L Ramaswamy
IEEE Transactions on Parallel and Distributed systems 20 (5), 725-739, 2008
662008
Supporting low latency TCP-based media streams
A Goel, C Krasic, K Li, J Walpole
IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No …, 2002
652002
Security risks in deep learning implementations
Q Xiao, K Li, D Zhang, W Xu
2018 IEEE Security and privacy workshops (SPW), 123-128, 2018
592018
Peerrush: Mining for unwanted p2p traffic
B Rahbarinia, R Perdisci, A Lanzi, K Li
Journal of Information Security and Applications 19 (3), 194-208, 2014
582014
Hold-on: Protecting against on-path DNS poisoning
H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson
Proc. Workshop on Securing and Trusting Internet Names, SATIN, 2012
522012
Measuring and detecting malware downloads in live network traffic
P Vadrevu, B Rahbarinia, R Perdisci, K Li, M Antonakakis
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
512013
Human motion capture data compression by model-based indexing: A power aware approach
S Chattopadhyay, SM Bhandarkar, K Li
IEEE transactions on visualization and computer graphics 13 (1), 5-14, 2006
502006
Measuring query latency of top level DNS servers
J Liang, J Jiang, H Duan, K Li, J Wu
Passive and Active Measurement: 14th International Conference, PAM 2013 …, 2013
452013
The system can't perform the operation now. Try again later.
Articles 1–20