What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jianping Wu
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
Ziqiang Wang
Xuewei Feng
Qi Li
Kun Sun
Yuxiang Yang
Mengyuan Li
Ganqiu Du
Ke Xu
Jianping Wu
2024
journals/tifs
Proactively Verifying Quantitative Network Policy Across Unsafe and Unreliable Environments.
Yahui Li
Han Zhang
Jilong Wang
Xingang Shi
Xia Yin
Zhiliang Wang
Jiankun Hu
Congcong Miao
Jianping Wu
2024
conf/uss
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
Yihao Chen
Qilei Yin
Qi Li
Zhuotao Liu
Ke Xu
Yi Xu
Mingwei Xu
Ziqian Liu
Jianping Wu
2024
conf/sp
The Dark Side of Scale: Insecurity of Direct-to-Cell Satellite Mega-Constellations.
Wei Liu
Yuanjie Li
Hewu Li
Yimei Chen
Yufeng Wang
Jingyi Lan
Jianping Wu
Qian Wu
Jun Liu
Zeqi Lai
2023
conf/ccs
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Chuanpu Fu
Qi Li
Ke Xu
Jianping Wu
2023
conf/uss
Temporal CDN-Convex Lens: A CDN-Assisted Practical Pulsing DDoS Attack.
Run Guo
Jianjun Chen
Yihang Wang
Keran Mu
Baojun Liu
Xiang Li
Chao Zhang
Haixin Duan
Jianping Wu
2023
conf/sp
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Xinhao Deng
Qilei Yin
Zhuotao Liu
Xiyuan Zhao
Qi Li
Mingwei Xu
Ke Xu
Jianping Wu
2023
conf/ndss
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Zihao Jin
Shuo Chen
Yang Chen
Haixin Duan
Jianjun Chen
Jianping Wu
2022
journals/tifs
Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling.
Qi Li
Xinhao Deng
Zhuotao Liu
Yuan Yang
Xiaoyue Zou
Qian Wang
Mingwei Xu
Jianping Wu
2021
conf/ccs
Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence.
Yuanjie Li
Hewu Li
Zhizheng Lv
Xingkun Yao
Qianru Li
Jianping Wu
2021
conf/acsac
MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking.
Shize Zhang
Zhiliang Wang
Jiahai Yang
Xin Cheng
Xiaoqian Ma
Hui Zhang
Bo Wang
Zimu Li
Jianping Wu
2020
conf/ndss
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
Menghao Zhang
Guanyu Li
Shicheng Wang
Chang Liu
Ang Chen
Hongxin Hu
Guofei Gu
Qi Li
Mingwei Xu
Jianping Wu
2019
conf/acsac
Casino royale: a deep exploration of illegal online gambling.
Hao Yang
Kun Du
Yubao Zhang
Shuang Hao
Zhou Li
Mingxuan Liu
Haining Wang
Hai-Xin Duan
Yazhou Shi
XiaoDong Su
Guang Liu
Zhifeng Geng
Jianping Wu
2018
journals/tifs
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis.
Jing Zheng
Qi Li
Guofei Gu
Jiahao Cao
David K. Y. Yau
Jianping Wu
2017
conf/sp
How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
Hao Yang
Xiulin Ma
Kun Du
Zhou Li
Hai-Xin Duan
XiaoDong Su
Guang Liu
Zhifeng Geng
Jianping Wu
2016
conf/ccs
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Heyi Tang
Yong Cui
Chaowen Guan
Jianping Wu
Jian Weng
Kui Ren
2014
conf/sp
When HTTPS Meets CDN: A Case of Authentication in Delegated Service.
Jinjin Liang
Jian Jiang
Hai-Xin Duan
Kang Li
Tao Wan
Jianping Wu
2012
journals/tifs
Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
Qi Li
Mingwei Xu
Jianping Wu
Xinwen Zhang
Patrick P. C. Lee
Ke Xu
2012
conf/ndss
Ghost Domain Names: Revoked Yet Still Resolvable.
Jian Jiang
Jinjin Liang
Kang Li
Jun Li
Hai-Xin Duan
Jianping Wu
2011
conf/ccs
Enhancing the trust of internet routing with lightweight route attestation.
Qi Li
Mingwei Xu
Jianping Wu
Xinwen Zhang
Patrick P. C. Lee
Ke Xu
2009
journals/compsec
Towards secure dynamic collaborations with group-based RBAC model.
Qi Li
Xinwen Zhang
Mingwei Xu
Jianping Wu
Coauthors
Ang Chen
(1)
Baojun Liu
(1)
Bo Wang
(1)
Chang Liu
(1)
Chao Zhang
(1)
Chaowen Guan
(1)
Chuanpu Fu
(1)
Congcong Miao
(1)
David K. Y. Yau
(1)
Ganqiu Du
(1)
Guang Liu
(2)
Guanyu Li
(1)
Guofei Gu
(2)
Hai-Xin Duan
(4)
Haining Wang
(1)
Haixin Duan
(2)
Han Zhang
(1)
Hao Yang
(2)
Hewu Li
(2)
Heyi Tang
(1)
Hongxin Hu
(1)
Hui Zhang
(1)
Jiahai Yang
(1)
Jiahao Cao
(1)
Jian Jiang
(2)
Jian Weng
(1)
Jianjun Chen
(2)
Jiankun Hu
(1)
Jianping Wu
(21)
Jilong Wang
(1)
Jing Zheng
(1)
Jingyi Lan
(1)
Jinjin Liang
(2)
Jun Li
(1)
Jun Liu
(1)
Kang Li
(2)
Ke Xu
(6)
Keran Mu
(1)
Kui Ren
(1)
Kun Du
(2)
Kun Sun
(1)
Menghao Zhang
(1)
Mengyuan Li
(1)
Mingwei Xu
(7)
Mingxuan Liu
(1)
Patrick P. C. Lee
(2)
Qi Li
(10)
Qian Wang
(1)
Qian Wu
(1)
Qianru Li
(1)
Qilei Yin
(2)
Run Guo
(1)
Shicheng Wang
(1)
Shize Zhang
(1)
Shuang Hao
(1)
Shuo Chen
(1)
Tao Wan
(1)
Wei Liu
(1)
Xia Yin
(1)
Xiang Li
(1)
XiaoDong Su
(2)
Xiaoqian Ma
(1)
Xiaoyue Zou
(1)
Xin Cheng
(1)
Xingang Shi
(1)
Xingkun Yao
(1)
Xinhao Deng
(2)
Xinwen Zhang
(3)
Xiulin Ma
(1)
Xiyuan Zhao
(1)
Xuewei Feng
(1)
Yahui Li
(1)
Yang Chen
(1)
Yazhou Shi
(1)
Yi Xu
(1)
Yihang Wang
(1)
Yihao Chen
(1)
Yimei Chen
(1)
Yong Cui
(1)
Yuan Yang
(1)
Yuanjie Li
(2)
Yubao Zhang
(1)
Yufeng Wang
(1)
Yuxiang Yang
(1)
Zeqi Lai
(1)
Zhifeng Geng
(2)
Zhiliang Wang
(2)
Zhizheng Lv
(1)
Zhou Li
(2)
Zhuotao Liu
(3)
Zihao Jin
(1)
Zimu Li
(1)
Ziqian Liu
(1)
Ziqiang Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to