Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Jun Li 0001
Author information
- University of Oregon, Ph.D. UCLA
Other persons with the same name
- Jun Li
- Jun Li 0002 — Institute of Computing Technology, Chinese Academy of Sciences
- Jun Li 0003 — Tsinghua National Lab for Information Science and Technology
- Jun Li 0004 — University of New South Wales, Sydney, NSW, Australia
- Jun Li 0005 — Institute for Infocomm Research, Singapore / Nanyang Technological University
- Jun Li 0006 — Communications Research Centre Canada
- Jun Li 0007 — National Laboratory of Radar Signal Processing, Xidian Unversity
- Jun Li 0008 — HP Laboratories, Palo Alto
- Jun Li 0009 — Hyperspectral Computing Laboratory, University of Extremadura / Instituto Superior Técnico, Lisboa
- Jun Li 0010 — Centre for Quantum Computation and Intelligent Systems, University of Technology Sydney
- Jun Li 0011 — School of Automation, Southeast University, Nanjing
- Jun Li 0012 — China West Normal University
- Jun Li 0013 — Department of Land Economy, University of Cambridge
- Jun Li 0014 — Communication University of China
- Jun Li 0015 — CAS Research Center on Fictitious Economy & Data Science
- Jun Li 0016 — CAS Research Center on Fictitious Economy & Data Science (PhD student of Peng Zhang)
- Jun Li 0017 — Fudan University
- Jun Li 0018 — College of Automation, Nanjing University of Technology
- Jun Li 0019 — Nanjing University of Posts and Telecommunication
- Jun Li 0020 — National University of Defense Technology, Changsha
- Jun Li 0021 — Peking University
- Jun Li 0022 — State Key Laboratory for Novel Software Technology, Nanjing University
- Jun Li 0023 — University of California, Riverside
- Jun Li 0024 — University of California, San Diego
2010 – today
- 2012
[c13]Jun Li, Toby Ehrenkranz, Paul Elliott: Buddyguard: A buddy system for fast and reliable detection of IP prefix anomalies. ICNP 2012: 1-10- 2011
[j9]Jun Li: mSSL: A framework for trusted and incentivized peer-to-peer data sharing between distrusted and selfish clients. Peer-to-Peer Networking and Applications 4(4): 325-345 (2011)
[c12]Jun Li, Scott Brooks: I-seismograph: Observing and measuring Internet earthquakes. INFOCOM 2011: 2624-2632- 2010
[c11]
[c10]Toby Ehrenkranz, Jun Li, Patrick McDaniel: Realizing a Source Authentic Internet. SecureComm 2010: 217-234
2000 – 2009
- 2009
[j8]Toby Ehrenkranz, Jun Li: On the state of IP spoofing defense. ACM Trans. Internet Techn. 9(2) (2009)- 2008
[j7]Jun Li, Jelena Mirkovic, Toby Ehrenkranz, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: Learning the valid incoming direction of IP packets. Computer Networks 52(2): 399-417 (2008)- 2007
[j6]Jun Li, Michael Guidero, Zhen Wu, Eric Purpus, Toby Ehrenkranz: BGP routing dynamics revisited. Computer Communication Review 37(2): 5-16 (2007)
[j5]Jun Li, Paul Knickerbocker: Functional similarities between computer worms and biological pathogens. Computers & Security 26(4): 338-347 (2007)
[j4]Shad Stafford, Jun Li, Toby Ehrenkranz: Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts. Simulation 83(2): 199-212 (2007)
[c9]
[c8]Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li: Investigating the Impact of Real-World Factors on Internet Worm Propagation. ICISS 2007: 10-24
[c7]Jun Li, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang: On Knowledge-Based Classification of Abnormal BGP Events. ICISS 2007: 267-271
[c6]Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Zhong: Understanding and Utilizing the Hierarchy of Abnormal BGP Events. SDM 2007- 2006
[c5]Jun Li, Zhen Wu, Eric Purpus: Toward Understanding the Behavior of BGP During Large-Scale Power Outages. GLOBECOM 2006- 2005
[j3]Jun Li, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal: An internet routing forensics framework for discovering rules of abnormal BGP events. Computer Communication Review 35(5): 55-66 (2005)
[c4]Jun Li, Xun Kang: mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. ACSAC 2005: 397-408
[c3]
[c2]Jun Li, Toby Ehrenkranz, Geoffrey H. Kuenning, Peter L. Reiher: Simulation and Analysis on the Resiliency and Efficiency of Malnets. PADS 2005: 262-269- 2004
[j2]Jun Li, Peter L. Reiher, Gerald J. Popek: Resilient self-organizing overlay networks for security update delivery. IEEE Journal on Selected Areas in Communications 22(1): 189-202 (2004)- 2002
[b1]Jun Li, Peter L. Reiher, Gerald J. Popek: Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144
[j1]Jun Li, Mark Yarvis, Peter L. Reiher: Securing distributed adaptation. Computer Networks 38(3): 347-371 (2002)
[c1]Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Reiher, Lixia Zhang: SAVE: Source Address Validity Enforcement Protocol. INFOCOM 2002
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-15 21:37 CEST by the dblp team



