Follow
Jiahao Cao
Title
Cited by
Cited by
Year
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
2202018
The {CrossPath} attack: Disrupting the {SDN} control channel via shared links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
28th USENIX Security Symposium (USENIX Security 19), 19-36, 2019
862019
Disrupting SDN via the data plane: A low-rate flow table overflow attack
J Cao, M Xu, Q Li, K Sun, Y Yang, J Zheng
Security and Privacy in Communication Networks: 13th International …, 2018
702018
SAP-SSE: Protecting search patterns and access patterns in searchable symmetric encryption
Q Song, Z Liu, J Cao, K Sun, Q Li, C Wang
IEEE Transactions on Information Forensics and Security 16, 1795-1809, 2020
412020
When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition
S Wang, J Cao, X He, K Sun, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
412020
SoftGuard: Defend against the low-rate TCP attack in SDN
R Xie, M Xu, J Cao, Q Li
ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019
412019
Enhancing malware analysis sandboxes with emulated user behavior
S Liu, P Feng, S Wang, K Sun, J Cao
Computers & Security 115, 102613, 2022
352022
Rosetta: Enabling robust tls encrypted traffic classification in diverse network environments with tcp-aware traffic augmentation
R Xie, Y Wang, J Cao, E Dong, M Xu, K Sun, Q Li, L Shen, M Zhang
Proceedings of the ACM Turing Award Celebration Conference-China 2023, 131-132, 2023
292023
Fingerprinting {SDN} applications via encrypted control traffic
J Cao, Z Yang, K Sun, Q Li, M Xu, P Han
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
262019
Disrupting the SDN control channel via shared links: Attacks and countermeasures
R Xie, J Cao, Q Li, K Sun, G Gu, M Xu, Y Yang
IEEE/ACM Transactions on Networking 30 (5), 2158-2172, 2022
252022
When match fields do not need to match: Buffered packets hijacking in SDN
J Cao, R Xie, K Sun, Q Li, G Gu, M Xu
Proc. of the Network and Distributed System Security Symposium (NDSS'20), 2020
252020
The loft attack: Overflowing SDN flow tables at a low rate
J Cao, M Xu, Q Li, K Sun, Y Yang
IEEE/ACM Transactions on Networking 31 (3), 1416-1431, 2022
192022
CloudDLP: Transparent and scalable data sanitization for browser-based cloud storage
P Han, C Liu, J Cao, S Duan, H Pan, Z Cao, B Fang
IEEE Access 8, 68449-68459, 2020
182020
Try before you buy: Privacy-preserving data evaluation on cloud-based machine learning data marketplace
Q Song, J Cao, K Sun, Q Li, K Xu
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
172021
{SIEVE}: Secure {In-Vehicle} Automatic Speech Recognition Systems
S Wang, J Cao, K Sun, Q Li
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
172020
The devil is in the detail: Generating system call whitelist for Linux seccomp
Y Xing, J Cao, K Sun, F Yan, S Wan
Future Generation Computer Systems 135, 105-113, 2022
72022
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding
X Xiang, S Duan, H Pan, P Han, J Cao, C Liu
Proceedings of the 2020 International Conference on Cyberspace Innovation of …, 2020
62020
RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features
J Li, J Cao, Z Meng, R Xie, M Xu
ICC 2023-IEEE International Conference on Communications, 5240-5246, 2023
52023
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts
J Cao, K Sun, Q Li, M Xu, Z Yang, KJ Kwak, J Li
Security and Privacy in Communication Networks: 15th EAI International …, 2019
52019
cSFC: Building credible service function chain on the cloud
S Yao, M Xu, Q Li, J Cao, Q Song
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20