Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis C Fu, Q Li, M Shen, K Xu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 148 | 2021 |
Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis C Fu, Q Li, K Xu 30th Annual Network and Distributed System Security Symposium (NDSS'23), 2023 | 66 | 2023 |
An Efficient Design of Intelligent Network Data Plane G Zhou, Z Liu, C Fu, Q Li, K Xu 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 63 | 2023 |
Off-Path TCP Exploits of the Mixed IPID Assignment X Feng, C Fu, Q Li, K Sun, K Xu Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 50 | 2020 |
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems T Cui, Y Wang, C Fu, Y Xiao, S Li, X Deng, Y Liu, Q Zhang, Z Qiu, P Li, ... arXiv preprint arXiv:2401.05778, 2024 | 49 | 2024 |
Frequency domain feature based robust malicious traffic detection C Fu, Q Li, M Shen, K Xu IEEE/ACM Transactions on Networking 31 (1), 452-467, 2022 | 33 | 2022 |
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID X Feng, Q Li, K Sun, C Fu, K Xu IEEE/ACM Transactions on Networking 30 (1), 409-422, 2021 | 23 | 2021 |
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks X Feng, Q Li, K Sun, Z Qian, G Zhao, X Kuang, C Fu, K Xu 31st USENIX Security Symposium (USENIX Security 22), 2619-2636, 2022 | 17 | 2022 |
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms C Fu, Q Li, K Xu, J Wu Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 12 | 2023 |
Detecting tunneled flooding traffic via deep semantic analysis of packet length patterns C Fu, Q Li, M Shen, K Xu Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 3 | 2024 |
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection C Fu, Q Li, K Xu IEEE/ACM Transactions on Networking, 2024 | 3 | 2024 |
Wedjat: Detecting Sophisticated Evasion Attacks via Real-time Causal Analysis L Gao, C Fu, X Deng, K Xu, Q Li | | 2025 |