实验室首页 |  教师介绍  |  学生简历  |  课题研究  |  成果共享  |  联系方式  |  学术活动 

 

文章发表(2017年以前):

[132] Xiang Wang, Weiqi Shi, Yang Xiang and Jun Li. Efficient Network Security Policy Enforcement with Policy Space Analysis. IEEE/ACM Transactions on Networking, pp2926-2938, Vol. 24, No. 5,Octorber 2016.

[131] Zhenlong Yuan, Jie Xu, Yibo Xue and Mihaela van der Schaar. Bits Learning: User-adjustable Privacy versus Accuracy in Internet Traffic Classification. IEEE Communications Letters, pp704-707, Vol. 20, Issue 4, 2016.

[130] Chang Chen, Xiaohe Hu, Kai Zheng, Xiang Wang, Yang Xiang and Jun Li. Optimizing Reactive Rule Dispatching in Software-Defined Networks. Tsinghua Science and Technology, pp196-209, Vol. 21, No. 2,April 2016.

[129] Zhe Fu, Zhi Liu and Jun Li. ParaRegex: Towards Fast Regular Expression Matching in Parallel. Proc. of the 12th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2016. (poster)

[128] Zhi Liu, Xiang Wang, Jun Li. From CIA to PDR: A Top-Down Survey of SDN Security for Cloud DCN. ZTE COMMUNICATIONS, pp54-60, Volume.14, No.1, February 2016.

[127] Chang Lan, Justine Sherry, Raluca Ada Popa, and Sylvia Ratnasamy, Zhi Liu. Embark: Securely Outsourcing Middleboxes to the Cloud. Proc. of the USENIX NSDI, 2016.

[126] Zhenlong Yuan, Yongqiang Lu and Yibo Xue. DroidDetector: Android Malware Characterization and Detection Using Deep Learning. Tsinghua Science and Technology, pp114-123, Volume.21, Issue 1, 2016.

[125] Zhe Fu, Xiaohe Hu, Xiang Wang, Chang Chen and Jun Li. AP MATRIX: A New Access Point Architecture for Reliable Public Wi-Fi Services. Proc. of the International Conference on Computing, Networking and Communications (ICNC), 2016.

[124] Jiaqi Gao, Xiaohe Hu and Jun Li. Scalable Multi-Field Packet Classification Using Fixed-Length Compression Bit Vector. Transactions on Computer Science and Technology, pp59-65, Volume. 4, Issue 4, 2015.

[123] Yiyang Shao, Yihang Luo, Xiaohe Hu, Yibo Xue, Yang Xiang and Kevin Yin. FLAX: A Flexible Architecture for Large Scale Cloud Fabric. Proc. of the 5th International Symposium on Cloud and Service Computing(SC2), 2015. (poster)

[122] Zhi Liu, Xiang Wang, Baohua Yang and Jun Li. BitCuts: Towards Fast Packet Classification for Order-independent Rules. Proc. of the ACM SIGCOMM, 2015. (poster)

[121] Zhenlong Yuan, Yibo Xue and Mihaela van der Schaar. BitMiner: Bits Mining in Internet Traffic Classification. Proc. of the ACM SIGCOMM, 2015. (poster)

[120] Xiang Wang, Yaxuan Qi, Kai Wang, Yibo Xue and Jun Li. Towards Efficient Security Policy Lookup on Many-core Network Processing Platforms. China Communications, pp146-160, Vol. 12, No. 8, August 2015.

[119] Kai Wang and Jun Li. FREME: A Pattern Partition based Engine for Fast and Scalable Regular Expression Matching in Practice. Journal of Networking and Computer Applications, pp154-169, Vol. 55, September 2015.

[118] Chang Chen, Liangwei Cai, Yang Xiang and Jun Li. SwinTop: Optimizing Memory Efficiency of Packet Classification in Network Devices. Proc. of the 7th International Conference on Communication Software and Networks (ICCSN), 2015.

[117] Feng Xie, Zhen Chen, Jiaxing Shang, Xiaoping Feng and Jun Li. A Link Prediction Approach for Item Recommendation with Complex Number. Knowledge based Systems, pp148-158, Vol. 81, Jun 2015.

[116] Feng Xie, Zhen Chen, Jiaxing Shang, Wenliang Huang and Jun Li. Item Similarity Learning Methods for Collaborative Filtering Recommender Systems. Proc. of the 29th International Conference on Advanced Information Networking and Applications, 2015.

[115] Zhi Liu, Xiang Wang, Weishen Pan, Baohua Yang, Xiaohe Hu and Jun Li. Towards Efficient Load Distribution in Big Data Cloud. Proc. of the International Conference on Computing, Networking and Communications (ICNC), 2015.

[114] Feng Xie, Zhen Chen, Jiaxing Shang, Xiaoping Feng, Wenliang Huang and Jun Li. A link prediction approach for item recommendation with complex number. Proc. of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies (WI-IAT), 2014.

[113] Zhe Fu and Jun Li. Spectral Clustering based Regular Expression Grouping. Proc. of the 10th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2014. (poster)

[112] Kai Wang, Zhe Fu, Xiaohe Hu and Jun Li. Practical Regular Expression Matching Free of Scalability and Performance Barriers. Computer Communications, pp97-119, Vol. 54, December 2014.

[111] Yiyang Shao, Luoshi Zhang, Xiaoxian Chen and Yibo Xue. Towards Time-varying Classification Based on Traffic Pattern. Proc. of the 2nd IEEE Conference on Communications and Network Security (CNS), 2014. (poster)

[110] Yiyang Shao, Yibo Xue and Jun Li. PPP: Towards Parallel Protocol Parsing. China Communications, pp106-116, Vol. 11, No. 10, Oct 2014.

[109] Zhenlong Yuan, Yongqiang Lu, Zhaoguo Wang and Yibo Xue. Droid-Sec: Deep Learning in Android Malware Detection. Proc. of the ACM SIGCOMM, 2014. (poster)

[108] Zhenlong Yuan, Xiaoxian Chen, Yibo Xue and Yingfei Dong. Cloud-Entry: Elusive Tor Entry Points in Cloud. Proc. of the 35th IEEE Symposium on Security and Privacy, 2014. (poster)

[107] Colin Scott, Andreas Wundsam, Aurojit Panda, Barath Raghavan, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, H.B. Acharya, Kyriakos Zarifis and Scott Shenker. Troubleshooting SDN Control Software with Minimal Causal Sequences. Proc. of the ACM SIGCOMM, 2014.

[106] Zhe Fu, Kai Wang, Liangwei Cai and Jun Li. Intelligent Grouping Algorithms for Regular Expressions in Deep Inspection. Proc. of the 23rd International Conference on Computer Communications and Networks (ICCCN), 2014.

[105] Xiang Wang, Zhi Liu, Baohua Yang, Yaxuan Qi and Jun Li. Tualatin: Towards Network Security Service Provision in Cloud Datacenters. Proc. of the 23rd International Conference on Computer Communications and Networks (ICCCN), 2014.

[104] Feng Xie, Zhen Chen, Jiaxing Shang and Geoffrey C. Fox. Grey Forecast Model for Accurate Recommendation in Presence of Data Sparsity and Correlation. Knowledge-Based Systems, pp179-190, Vol. 69, Oct 2014.

[103] Baohua Yang, Junda Liu, Scott Shenker, Jun Li and Kai Zheng. Keep Forwarding: Towards K-link Failure Resilient Routing. Proc. of the 33th IEEE INFOCOM, 2014.

[102] Baohua Yang, Jeffrey Fong, Weirong Jiang, Yibo Xue and Jun Li. Practical Multituple Packet Classification using Dynamic Discrete Bit Selection. IEEE Transactions on Computers, pp424-434, Vol. 63, No. 2, Feb 2014.

[101] Yiyang Shao, Baohua Yang, Jingjie Jiang, Yibo Xue and Jun Li. Emilie: Enhance the Power of Traffic Identification. Proc. of the International Conference on Computing, Networking and Communications (ICNC), 2014.

[100] Zhenlong Yuan, Cuilan Du, Xiaoxian Chen, Dawei Wang and Yibo Xue. SkyTracer: Towards Fine-Grained Identification for Skype Traffic via Sequence Signatures. Proc. of the International Conference on Computing, Networking and Communications (ICNC), 2014.

[99] Feng Xie, Zhen Chen, Hongfeng Xu, Xiwei Feng and Qi Hou. TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing. Tsinghua Science and Technology, pp318-327, Vol. 18, No. 3, Jun 2013.

[98] Xiaoqi Ren, Zhi Liu, Yaxuan Qi, Jun Li and Shanghua Teng. Sampling-based Smoothed Analysis for Network Algorithm Evaluation. Proc. of the IEEE GLOBECOM, 2013.

[97] Zhenlong Yuan, Yibo Xue and Wei Xia. PPI: Towards Precise Page Identification for Encrypted Web-browsing Traffic. Proc. of the 9th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2013. (poster)

[96] Zhenlong Yuan, Yibo Xue and Yingfei Dong. Harvesting Unique Characteristics in Packet Sequences for Effective Application Classification. Proc. of the 1st IEEE Conference on Communications and Network Security (CNS), 2013.

[95] Kai Wang and Jun Li. Towards Fast Regular Expression Matching in Practice. Proc. of the ACM SIGCOMM, 2013. (poster)

[94] Xiang Wang, Chang Chen and Jun Li. Replication Free Rule Grouping for Packet Classification. Proc. of the ACM SIGCOMM, 2013. (poster)

[93] Yang Gao, Yibo Xue and Jun Li. A Novel Utilization-aware Allocation Method for Multi-Tenant Datacenters. Proc. of the first International Workshop on Resource Management of Cloud Computing (CCRM), 2013.

[92] Zhenlong Yuan, Baohua Yang, Xiaoqi Ren and Yibo Xue. TFD: A Multi-pattern Matching Algorithm for Large-scale URL Filtering. Proc. of the International Conference on Computing, Networking and Communications (ICNC), 2013.

[91] Xiang Wang, Yaxuan Qi, Zhi Liu and Jun Li. LiveCloud: A Lucid Orchestrator for Cloud Datacenters. Proc. of the 4th IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2012.

[90] Xiang Wang, Zhi Liu, Yaxuan Qi and Jun Li. Structural Compression of Packet Classification Trees. Proc. of the 8th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2012. (poster)

[89] Jeffrey Fong, Yaxuan Qi, Jun Li and Weirong Jiang. ParaSplit: A Scalable Architecture on FPGA for Terabit Packet Classification. Proc. of the 20th Annual IEEE Symposium on High Performance Interconnects (HOTI), 2012.

[88] Kai Wang, Yaxuan Qi, Baohua Yang, Yibo Xue and Jun Li. LiveSec: Towards Effective Security Management in Large-scale Production Networks. Proc. of the 3rd ICDCS Workshop on Security and Privacy in Cloud Computing, 2012.

[87] Feng Xie, Ming Xu and Zhen Chen. RBRA: A Simple and Efficient Rating-Based Recommender Algorithm to Cope with Sparsity in Recommender Systems. Proc. of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012.

[86] Yang Gao, Lu Li, Jingjie Jiang, Baohua Yang, Yibo Xue and Jun Li. SEAL: Hybrid Resource Distribution for Multi-tenant Data Centers. Proc. of the 2nd International Conference on Computer and Management (CAMAN), 2012.

[85] Yaxuan Qi, Yibo Xue and Jun Li. High-Performance Packet Classification on Multi-Core Network Processing Platforms. Tsinghua Science and Technology, pp432-439, Vol. 16, No. 4, Aug 2011.

[84] Hui Zhang, Jin Zhou and Jun Li. Minimizing Delay for Video Conference with Network Coding. International Journal of Information and Coding Theory, pp38-58, Vol. 2, No. 1, Dec 2011.

[83] Junda Liu, Baohua Yang, Scott Shenker and Michael Schapira. Data-Driven Network Connectivity. Proc. of the 10th ACM Workshop on Hot Topics in Networks (HotNets-X), 2011.

[82] Baohua Yang, Guangdong Hou, Lingyun Ruan, Yibo Xue and Jun Li. SMILER: Towards Practical Online Traffic Classification. Proc. of the 7th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011.

[81] Xinming Chen, Kailin Ge, Zhen Chen and Jun Li. AC-Suffix-Tree: Buffer Free String Matching on Out-of-Sequence Packets. Proc. of the 7th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011.

[80] Fei He, Fan Xiang, Yibo Xue and Jun Li. Towards High-Performance Network Application Identification with Aggregate-Flow Cache. International Journal of Computer Networks & Communications (IJCNC), pp68-79, Vol. 3, No. 3, May 2011.

[79] Fei He, Fan Xiang, Yiyang Shao, Yibo Xue and Jun Li. Accelerating Application Identification with Two-stage Matching and Pre-classification. Tsinghua Science and Technology, pp422-431, Vol. 16, No. 4, Aug 2011.

[78] Beipeng Mu, Xinming Chen and Zhen Chen. A Collaborative Network Security Management System in Metropolitan Area Network. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.

[77] Xinming Chen, Beipeng Mu and Zhen Chen, NetSecu: A Collaborative Network Security Platform for in-network Security. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.

[76] Lingyun Ruan, Anan Luo and Zhen Chen. TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution. Proc. of the 3rd International Conference on Communications and Mobile Computing (CMC), 2011.

[75] Kai Wang, Yaxuan Qi, Yibo Xue and Jun Li. Reorganized and Compact DFA for Efficient Regular Expression Matching. Proc. of the 2011 IEEE International Conference on Communications (ICC), 2011.

[74] Yaxuan Qi, Kai Wang, Jeffrey Fong, Yibo Xue, Jun Li, Weirong Jiang and Viktor Prasanna. FEACAN: Front-End Acceleration for Content-Aware Network Processing. Proc. of the 30th IEEE INFOCOM, 2011.

[73] Hui Zhang, Wei Jiang, Jin Zhou, Zhen Chen and Jun Li. M3FEC: Joint Multiple Description Coding and Forward Error Correction for Interactive Multimedia in Multiple Path Transmission. Tsinghua Science and Technology, pp320-331, Vol. 16, No. 3, June 2011.

[72] Chenglong Li, Yibo Xue, Yingfei Dong and Dongsheng wang. HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic. Proc. of IEEE GLOBECOM, 2010.

[71] Guanglu Sun, Yibo Xue, Yingfei Dong, Chenglong Li and Dongsheng Wang. A Novel Hybrid Method for Effectively Classifying Encrypted Traffic. Proc. of IEEE GLOBECOM, 2010.

[70] Jinli Meng, Xinming Chen, Zhen Chen, Chuang Lin, Beipeng Mu and Lingyun Ruan. Towards High-performance IPsec on Cavium OCTEON Platform. Proc. of the 2nd International Conference on Trusted Systems (INTRUST), 2010.

[69] Weirong Jiang and Yaxuan Qi. Power-Aware Parallel Forwarding: An Optimization Study. Proc. of the 2010 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2010.

[68] Baohua Yang, Guodong Li, Yaxuan Qi, Yibo Xue and Jun Li. DFC: Towards Effective Feedback Flow Management for Datacenters. Proc. of the 9th International Conference on Grid and Cloud Computing (GCC), 2010.

[67] Yaxuan Qi, Jeffrey Fong, Weirong Jiang, Bo Xu, Jun Li and Viktor Prasanna. Multi-dimensional Packet Classification on FPGA: 100 Gbps and Beyond. Proc. of the 2010 International Conference on Field-Programmable Technology (FPT), 2010.

[66] Yaxuan Qi, Zongwei Zhou, Yiyao Wu, Yibo Xue and Jun Li. Towards High-performance Pattern Matching on Multi-core Network Processing Platforms. Proc. of IEEE GLOBECOM, 2010.

[65] Fei He, Yaxuan Qi, Yibo Xue and Jun Li. YACA: Yet Another Cluster-based Architecture for Network Intrusion Prevention. Proc. of IEEE GLOBECOM, 2010.

[64] Zhiming Zhang, Ranran Hou, Hao Chen, Jin Zhou and Jun Li. Network Coding Based Live Peer-to-Peer Streaming Towards Minimizing Buffering Delay. Proc. of the 2010 International Conference on Computer Application and System Modeling (ICCASM), 2010.

[63] Zhen Chen, Fachao Deng, Anan Luo, Xin Jiang, Guodong Li, Runhua Zhang and Chuang Lin. Application Level Network Access Control System Based on TNC Architecture for Enterprise Network. Proc. of the 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010.

[62] Bo Xu, Kai Zheng, Yibo Xue and Jun Li. Scalable String Matching Framework Enhanced by Pattern Clustering. Ubiquitous Computing and Communication Journal, Vol.5 No.2, 2010.

[61] Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue and Jun Li. OpenGate: Towards an Open Network Services Gateway. Computer Communications, pp200-208, Vol.34, No.2, 2010.

[60] Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang and Baohua Yang. Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching. Proc. of the 29th IEEE INFOCOM, 2010.

[59] Hui Zhang, Jin Zhou and Jun Li. M2FEC: an Effective FEC based Multi-path Transmission Scheme for Interactive Multimedia Communication. Journal of Visual Communication and Image Representation, pp120-128, Vol.21, No.2, 2010.

[58] Guodong Li, Zhen chen, Anan Luo, Yibo Xue and Chuang Lin. A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network. Proc. of the 2th International Conference on Communication Software and Networks(ICCSN), 2010.

[57] Li Tang, Zhen Chen, Hao Yin, Jun Li and Yanda Li. CORS: A Cooperative Overlay Routing Service to Enhance Interactive Multimedia Communications. Journal of Visual Communication and Image Representation, pp107-119, Vol.21, No.2, 2010.

[56] Li Tang, Yin Huai, Jin Zhou, Hao Yin, Zhen Chen and Jun Li. A Measurement Study on the Benefits of Open Routers for Overlay Routing. Journal of Communications, pp714-723, Vol. 4 No. 9, 2009.

[55] Li Tang, Jun Li, Yanda Li and Scott Shenker. An investigation of the Internet's IP-layer connectivity. Computer Communications, pp913-926, Vol.32 No.5, 2009.

[54] Bo Xu, Jian Chang, Shimeng Huang, Yibo Xue and Jun Li. Efficiency Analysis of Cache Mechanism for Network Processors. Tsinghua Science and Technology, Vol. 14 No. 5, Oct 2009.

[53] Xiang Wang, Yaxuan Qi, Yibo Xue and Jun Li. Towards High-Performance Network Intrusion Prevention System on Multi-core Network Service Processor. Proc. of the 15th IEEE International Conference on Parallel and Distributed System (ICPADS), 2009.

[52] Baohua Yang, Xiang Wang, Yibo Xue and Jun Li. DBS: A Bit-level Heuristic Packet classification Algorithm for High Speed Network. Proc. of the 15th IEEE International Conference on Parallel and Distributed System (ICPADS), 2009.

[51] Xinming Chen, Yiyao Wu, Lianghong Xu, Yibo Xue and Jun Li. Para-Snort : A Multi-thread Snort on Multi-Core IA Platform. Proc. of the 21th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), 2009.

[50] Bo Xu, Fei He, Yibo Xue and Jun Li. Architecture-Aware Session Lookup Design for Inline Deep Inspection on Network Processor. Tsinghua Science and Technology, pp19-28, Vol. 14, No.1, 2009.

[49] Yaxuan Qi, Fei He, Xiang Wang, Xinming Chen, Yibo Xue and Jun Li. OASis: Towards Extensible Open-Architecture Services Platforms. Proc. of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2009. (poster)

[48] Fei He, Yaxuan Qi, Yibo Xue and Jun Li. SANS: A Scalable Architecture for Network Intrusion Prevention with Stateful Frontend. Proc. of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2009. (poster)

[47] Hui Zhang, Jin Zhou, Zhen Chen and Jun Li. Minimizing Delay for Video Conference with Network Coding. Proc. of the ACM SIGCOMM 2009. (poster)

[46] Aditya Dhananjay, Hui Zhang, Jinyang Li and Lakshmi Submaranian. Practical, Distributed Channel Assignment and Routing in Dual-radio Mesh Networks. Proc. of the ACM SIGCOMM 2009.

[45] Li Tang, Jun Li, Yanda Li, and Scott Shenker, An Investigation of the Internet’s IP-layer Connectivity, Computer Communications, pp913-9264, Vol.32 No.5, March 2009.

[44] Baohua Yang, Yaxuan Qi, Fe He, Yibo Xue and Jun Li. Discrete Bit Selection: Towards a Bit-level Heuristic Framework for Multi-dimensional Packet Classification. Proc. of the 28th IEEE INFOCOM, 2009. (poster)

[43] Yaxuan Qi, Lianghong Xu, Baohua Yang, Yibo Xue and Jun Li. Packet Classification Algorithms: From Theory to Practice. Proc. of the 28th IEEE INFOCOM, 2009.

[42] Fachao Deng, Anan Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, and Dongsheng Peng, TNC-UTM: A Holistic Solution to Secure Enterprise Networks, Proc. of the 2008 International Symposium on Trusted Computing (TrustCom), 2008.

[41] Bo Xu, Fei He, Yibo Xue and Jun Li, Architecture-Aware Session Lookup Design for Inline Deep Inspection on Network Processor, Tsinghua Science and Technology, Vol. 14, No.1, 2009.

[40] Bo Xu, Guangyu Zhou, Yibo Xue and Jun Li, AHSM: Adaptive Packet Filtering with Network Traffic Statistics, Proc. of the 20th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), 2008.

[39] Fei He, Yaxuan Qi, Yibo Xu e and Jun Li, Load Scheduling for Flow-based Packet Processing on Multi-core Network Processors, Proc. of the 20th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), 2008.

[38] Yaxuan Qi, Zongwei Zhou, Baohua Yang, Fei He, Yibo Xue and Jun Li, Towards Effective Network Algorithms on Multi-core Network Processors, Proc. of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS, Poster), 2008.

[37] Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue and Jun Li, Fast Path Session Creation on Network Processors, Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS), 2008.

[36] Yin Chen, Li Tang and Jun Li, Heuristic Relay Node Selection Algorithm for One-hop Overlay Routing, Proc. of the 2nd IEEE International Workshop on Cooperative Distributed Systems (CDS), 2008.

[35] Xin Zhou, Bo Xu, Yaxuan Qi and Jun Li, MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications, Proc. of the 7th International Conference on Networking (ICN), 2008.

[34] Tian Song, Wei Zhang, Dongsheng Wang and Yibo Xue, Memory Efficient Multiple Pattern Matching Architecture for Network Security, Proc. of the 27th IEEE INFOCOM, 2008.

[33] Wei Wang and Jun Li, An XML Firewall on Embedded Network Processor, Proc. of the 4th International Conference on Networking and Services (ICNS), 2008.

[32] Yaxuan Qi, Bo Xu, Fei He, Baohua Yang, Jianming Yu and Jun Li, Towards High-performance Flow-level Packet Processing on Multi-core Network Processors, Proc. of the 3rd ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2007.

[31] Zongwei Zhou,Yibo Xue, Junda Liu, Wei Zhang, and Jun Li, MDH: A High Speed Multi-Phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set, Proc. of the 9th International Conference on Information and Communication Security (ICICS), 2007.

[30] Zongwei Zhou, Security Enhancement Over Ad-hoc AODV Routing Protocol, Proc. of the 4th IASTED Conference on Communication, Network, and Information Security (CNIS), 2007.

[29] Yaxuan Qi, Bo Xu, Fei He, Xin Zhou, Jianming Yu, and Jun Li, Towards Optimized Packet Classification Algorithms for Multi-Core Network Processors, Proc. of the 2007 International Conference on Parallel Processing (ICPP), 2007.

[28] Wei Wang, Security Based Heuristic SAX for XML Parsing, Proc. of the 2007 International Conference on Security and Management (SAM), 2007.

[27] Hui Zhang, Li Tang, Zhen Chen, and Jun Li, Empirical Study on Multi-path Benefits on Interactive Video, Proc. of the 2007 IEEE International Conference on Multimedia & Expo (ICME), 2007.

[26] Yaxuan Qi, Baohua Yang, Bo Xu, and Jun Li, Towards System-level Optimization for High Performance Unified Threat Management, Proc. of the 3rd International Conference on Networking and Services (ICNS), 2007.

[25] Li Tang, Zhijie Sun, Zhen Chen, and Jun Li, On the Feasibility of Enhancing Interactivity for Real-time Communications using Overlay Routing, Proc. of the 3rd International Conference on Networking and Services (ICNS), 2007.

[24] Jianming Yu, Yibo Xue, and Jun Li, Memory Efficient String Matching Algorithm for Network Intrusion Management System, Tsinghua Science and Technology, pp585-593, Vol 12, No.5, Oct 2007

[23] Lei Shi, Yue Zhang, Jianming Yu, Bo Xu, Bin Liu, and Jun Li, On the Extreme Parallelism Inside Next-Generation Network Processors, Proc. of the 26th IEEE INFOCOM, 2007.

[22] Zhiming Zhang, Weirong Jiang, and Yibo Xue, A Trust Model Based Cooperation Enforcement Mechanism in Mesh Networks, Proc. of the 6th International Conference on Networking (ICN), 2007.

[21] Li Tang, Yin Chen, Fei Li, Hui Zhang, and Jun Li, Empirical Study on the Evolution of PlanetLab, Proc. of the 6th International Conference on Networking (ICN), 2007.

[20] Yaxuan Qi and Jun Li, Towards Effective Packet Classification, Proc. of the 3rd IASTED Conference on Communication, Network, and Information Security (CNIS), 2006. (Cited by others: 1)

[19] Yaxuan Qi and Jun Li, An Efficient Hybrid Algorithm for Multidimensional Packet Classification, Proc. of the 3rd IASTED Conference on Communication, Network, and Information Security (CNIS), 2006.

[18] Jianming Yu and Yibo Xue, Robust Quick String Matching Algorithm for Network Security, International Journal of Computer Science & Network Security, pp180~184, Vol.6 No.7B, July 2006.

[17] Hui Zhang, Li Tang, and Jun Li, Impact of Overlay Routing on End-to-End Delay, Proc. of 15th International Conference on Computer Communications and Networks (ICCCN), 2006.

[16] Jianming Yu, Quan Huang, and Yibo Xue, Optimizing Multi-thread String Matching for Network Processor-Based Intrusion Management System, Proc. of the 3rd IASTED Conference on Communication, Network, and Information Security (CNIS), 2006.

[15] Li Tang, Hui Zhang, Jun Li, and Yanda Li, End-to-End Delay Behavior in the Internet, Proc. of 14th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2006. (IF: 0.43)

[14] Shenke Qiu, Huaxia Rui, and Le Zhang, No-reference Perceptual Quality Assessment for Streaming Video Based on Simple End-to-end Network Measures, Proc. of the 2006 International Conference on Networking and Services (ICNS), 2006. (Cited by others 1)

[13] Bo Xu, Xin Zhou and Jun Li, Recursive Shift Indexing: A Fast Multi-Pattern String Matching Algorithm, Proc. of the 4th International Conference on Applied Cryptography and Network Security (ACNS), 2006. (Cited by others: 1 2 3)

[12] Weirong Jiang and Chao Zhang, A Portable Real-time Emulator for Testing Multi-Radio MANETs, Proc. of the 14th IEEE Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), 2006.

[11] Quan Huang, Shenke Qiu, Shicun Qin, and Cheng Cao, An Embedded Firewall Based on Network Processor, Proc. of the 2nd International Conference on Embedded Software and Systems (ICESS), 2005.

[10] Yaxuan Qi and Jun Li, Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification, Proc. of the 2005 International Conference on Networking and Services (ICNS), 2005.

[9] Weirong Jiang, A Lightweight Secure SIP Model for End-to-End Communication, Proc. of the 10th International Symposium on Broadcasting Technology (ISBT), 2005.

[8] Li Tang, Jun Li, Jin Zhou, Zhizhi Zhou, Hao Wang, and Kai Li, FreeRank: Implementing Independent Ranking Service for Multiplayer Online Games, Proc. of the 4th Workshop on Network & System Support for Games (NetGames), 2005. (Cited by others: 1)

[7] Weirong Jiang, Data Structure Optimization of AS_PATH in BGP, Proc. of the 3rd International Conference on Computer Networks and Mobile Computing (ICCNMC), 2005.

[6] Jianming Yu and Jun Li, A Parallel NIDS Pattern Matching Engine and Its Implementation on Network Processor, Proc. of the 2005 International Conference on Security and Management (SAM), 2005.

[5] Bo Xu, Dongyi Jiang, and Jun Li, HSM: A Fast Packet Classification Algorithm, Proc. of the 19th Advanced Information Networking and Applications (AINA), 2005. (Cited by others: 1)

[4] Yaxuan Qi and Jun Li, Dynamic Cuttings: Packet Classification with Network Traffic Statistics, Proc. of the 3rd Trusted Internet Workshop (TIW), 2004.

[3] Li Tang, Identifying Resource Authenticity in P2P Networks, Proc. of the 2nd International Conference of Applied Cryptography and Network Security (ACNS), 2004.

[2] Jin Zhou, Kai Li, and Li Tang, Coopeer: A Peer-to-Peer Web Search Engine Towards Collaboration, Humanization and Personalization, Proc. of the 23rd IEEE International Performance Computing and Communications Conference (IPCCC), 2004.

[1] Jin Zhou, Kai Li, Li Tang, and Zengxiang Lu, Towards a Fully Distributed P2P Search Engine, Proc. of the 11th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS), 2004. (Cited by others: 1 2 3)