Author image not provided
 Li Zhuang

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article26.00
Citation Count182
Publication count7
Publication years2003-2011
Available for download4
Average downloads per article520.00
Downloads (cumulative)2,080
Downloads (12 Months)109
Downloads (6 Weeks)14
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1
June 2011 USENIXATC'11: Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Publisher: USENIX Association
Bibliometrics:
Citation Count: 25

Several cloud storage systems exist today, but none of them provide security guarantees in their Service Level Agreements (SLAs). This lack of security support has been a major hurdle for the adoption of cloud services, especially for enterprises and cautious consumers. To fix this issue, we present CloudProof, a secure ...

2 published by ACM
November 2009 ACM Transactions on Information and System Security (TISSEC): Volume 13 Issue 1, October 2009
Publisher: ACM
Bibliometrics:
Citation Count: 28
Downloads (6 Weeks): 12,   Downloads (12 Months): 69,   Downloads (Overall): 820

Full text available: PDFPDF
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard and recovering up to 96% of typed characters. There is no need for training recordings labeled with the corresponding clear text. ...
Keywords: electronic eavesdropping, hidden markov models, keyboards, Computer security, HMM, learning theory, privacy, acoustic manations, cepstrum, human factors, signal analysis

3
April 2008 LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Publisher: USENIX Association
Bibliometrics:
Citation Count: 47

We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. We have applied our technique against a trace of spam email from Hotmail Web mail services. In this trace, we ...

4
January 2008
Bibliometrics:
Citation Count: 0

My thesis is that contemporary information systems allow automatic extraction of security-related information from large amounts of noisy data. Extracting this information is the security inference problem: attackers or defenders extract information from noisy data that helps to compromise an adversary's security goals. I believe security inference is an important ...

5 published by ACM
November 2005 CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 35
Downloads (6 Weeks): 2,   Downloads (12 Months): 28,   Downloads (Overall): 1,051

Full text available: PDFPDF
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and then recovering up to 96% of typed characters. There is no need for a labeled training recording. Moreover the recognizer ...
Keywords: cepstrum, human factors, signal analysis, acoustic emanations, electronic eavesdropping, keyboards, HMM, hidden Markov models, learning theory, computer security, privacy

6
May 2005 NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Publisher: USENIX Association
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 129

Full text available: PDFPDF
Anonymous routing protects user communication from identification by third-party observers. Existing anonymous routing layers utilize Chaum-Mixes for anonymity by relaying traffic through relay nodes called mixes. The source defines a static forwarding path through which traffic is relayed to the destination. The resulting path is fragile and shortlived: failure of ...

7
June 2003 Middleware '03: Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 24
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 80

Full text available: PDFPDF
Recent work in P2P overlay networks allow for decentralized object location and routing (DOLR) across networks based on unique IDs. In this paper, we propose an extension to DOLR systems to publish objects using generic feature vectors instead of content-hashed GUIDs, which enables the systems to locate similar objects. We ...
Keywords: approximate text matching, tapestry, DOLR, peer-to-peer, spam filtering



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us