default search action
Zhi Li 0018
Person information
- affiliation: Chinese Academy of Science, Institute of Information Engineering, State Key Laboratory of Information Security, China
Other persons with the same name
- Zhi Li — disambiguation page
- Zhi Li 0001 — Netflix Inc., Los Gatos, CA, USA (and 3 more)
- Zhi Li 0002 — AT&T (and 1 more)
- Zhi Li 0003 — Xi'an Jiaotong University, School of Electronics and Information Engineering, Sigpro Laboratory, China
- Zhi Li 0004 (aka: Zhi Jane Li) — Worcester Polytechnic Institute, Robotics Engineering Program, MA, USA (and 2 more)
- Zhi Li 0005 — Shanghai Jiaotong University
- Zhi Li 0006 — Logicalis, Australia (and 1 more)
- Zhi Li 0007 — University of Science and Technology of China, Hefei
- Zhi Li 0008 — Taiyuan University of Technology
- Zhi Li 0009 — Beihang University, School of Computer Science, Beijing, China
- Zhi Li 0010 — NICTA, Australia (and 1 more)
- Zhi Li 0011 — College of Mathematics, Sichuan University
- Zhi Li 0012 — Guizhou University, Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis, Guiyang, China
- Zhi Li 0013 — The University of Hong Kong
- Zhi Li 0014 — University of Ottawa
- Zhi Li 0015 — University of Florida
- Zhi Li 0016 — University of Kansas
- Zhi Li 0017 — Guangxi Normal University (and 1 more)
- Zhi Li 0019 — HKU-ZIRI Laboratory for Physical Internet, The University of Hong Kong
- Zhi Li 0020 — Shenzhen University
- Zhi Li 0021 — Deakin University
- Zhi Li 0022 — Department of Mathematics, East China Normal University
- Zhi Li 0023 — KAIST
- Zhi Li 0024 — Ningbo Institute of Technology, Zhejiang University
- Zhi Li 0025 — The Key Laboratory for Environmental and Urban Sciences, Shenzhen Graduate School of Peking University
- Zhi Li 0027 — Patent Agency Center, Huazhong University of Science and Technology
- Zhi Li 0028 — China University of Petroleum
- Zhi Li 0029 — Shenyang Institute of Engineering
- Zhi Li 0030 — China University of Geosciences
- Zhi Li 0032 — Chinese Academy of Sciences, Institute of Psychology, Key Laboratory of Mental Health, China
- Zhi Li 0035 — Institute of Textiles and Clothing, The Hong Kong Polytechnic University
- Zhi Li 0036 — Northwest A&F University (and 1 more)
- Zhi Li 0037 — School of Electronics and Information, Sichuan University
- Zhi Li 0038 — Tsinghua University, Department of Electronic Engineering, Tsinghua National Laboratory of Information Science and Technology, Beijing, China
- Zhi Li 0039 — Northeastern University, State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China (and 4 more)
- Zhi Li 0040 — National University of Ireland, Galway, Ireland
- Zhi Li 0041 — Northwestern Polytechnical University, School of Computer Science, Xi'an, China
- Zhi Li 0043 — Chinese Academy of Sciences, Xinjiang Institute of Ecology and Geography, State Key Laboratory of Desert and Oasis Ecology, Urumqi, China
- Zhi Li 0044 — Tianjin Polytechnic University, School of Economics and Management, China (and 1 more)
- Zhi Li 0045 — Jinan University, National Joint Engineering Research Center of Network Security Detection and Protection Technology, Guangzhou, China (and 1 more)
- Zhi Li 0046 — Nanjing University of Posts and Telecommunications, Jiangsu Key Laboratory of Wireless Communications, Nanjing, China
- Zhi Li 0047 — Sichuan University, College of Electronics and Information Engineering, Chengdu, China (and 1 more)
- Zhi Li 0048 — Huazhong University of Science and Technology, Cluster and Grid Computing Lab, Wuhan, China
- Zhi Li 0049 — Shanghai University of Engineering Science, China
- Zhi Li 0050 — China University of Mining and Technology, School of Mechanical Electronic and Information Engineering, Beijing, China
- Zhi Li 0051 — Nanjing University, Jinling Hospital, School of Medicine, Nanjing, Jiangsu, China
- Zhi Li 0052 — Hangzhou Dianzi University, College of Computer Science and Technology, China (and 1 more)
- Zhi Li 0053 — Guangdong University of Technology, Guangdong Provincial Key Laboratory of Computer Integrated Manufacturing Systems, China
- Zhi Li 0054 — Nanyang Technological University, School of Computer Science Engineering, Singapore
- Zhi Li 0055 — Max Planck Institute for Informatics, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning. Proc. ACM Softw. Eng. 1(FSE): 1679-1702 (2024) - [j14]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge. ACM Trans. Softw. Eng. Methodol. 33(1): 1:1-1:40 (2024) - [j13]Puzhuo Liu, Yaowen Zheng, Chengnian Sun, Hong Li, Zhi Li, Limin Sun:
Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers. ACM Trans. Softw. Eng. Methodol. 33(4): 108:1-108:26 (2024) - [j12]Yaqi Sun, Xiaolan Xie, Zhi Li, Kai Yang:
Batch-transformer for scene text image super-resolution. Vis. Comput. 40(10): 7399-7409 (2024) - [c19]Chunyang Zheng, Jinfa Wang, Shuaizong Si, Zhi Li, Nan Yu, Limin Sun:
MOMR: A Threat in Web Application Due to the Malicious Orchestration of Microservice Requests. ICC 2024: 3304-3309 - [c18]Chaopeng Dong, Siyuan Li, Shouguo Yang, Yang Xiao, Yongpan Wang, Hong Li, Zhi Li, Limin Sun:
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. ICSE 2024: 66:1-66:12 - [c17]Yue Sun, Guowei Yang, Shichao Lv, Zhi Li, Limin Sun:
Concrete Constraint Guided Symbolic Execution. ICSE 2024: 122:1-122:12 - [c16]Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. SP 2024: 2775-2793 - [i4]Xiaoling Zhang, Zhengzi Xu, Shouguo Yang, Zhi Li, Zhiqiang Shi, Limin Sun:
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning. CoRR abs/2405.09112 (2024) - 2023
- [j11]Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Zhi Li, Hongsong Zhu, Limin Sun:
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer. Knowl. Inf. Syst. 65(10): 4411-4429 (2023) - [j10]Zhaoteng Yan, Zhi Li, Hong Li, Shouguo Yang, Hongsong Zhu, Limin Sun:
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace. IEEE Trans. Dependable Secur. Comput. 20(5): 3890-3909 (2023) - [j9]Yue Sun, Zhi Li, Shichao Lv, Limin Sun:
Spenny: Extensive ICS Protocol Reverse Analysis via Field Guided Symbolic Execution. IEEE Trans. Dependable Secur. Comput. 20(6): 4502-4518 (2023) - [c15]Yimo Ren, Zhi Li, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet. DASFAA (Workshops) 2023: 19-33 - [c14]Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. DSN 2023: 165-178 - [c13]Jie Zhang, Hui Wen, Liting Deng, Mingfeng Xin, Zhi Li, Lun Li, Hongsong Zhu, Limin Sun:
HackMentor: Fine-Tuning Large Language Models for Cybersecurity. TrustCom 2023: 452-461 - [i3]Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun:
Asteria-Pro: Enhancing Deep-Learning Based Binary Code Similarity Detection by Incorporating Domain Knowledge. CoRR abs/2301.00511 (2023) - [i2]Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhi Li, Limin Sun:
Harnessing the Power of LLM to Support Binary Taint Analysis. CoRR abs/2310.08275 (2023) - 2022
- [j8]Kai Yang, Yueyang Zhang, Xiaodong Lin, Zhi Li, Limin Sun:
Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction. IEEE Internet Things J. 9(7): 5434-5446 (2022) - [j7]Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. IEEE Trans. Dependable Secur. Comput. 19(6): 4099-4112 (2022) - [c12]Ke Li, Zhi Li, Zhimin Gu, Jing Guo, Ziying Wang, Limin Sun:
Compromised IoT Devices Detection in Smart Home via Semantic Information. ICC 2022: 4986-4992 - 2021
- [c11]Zhaoteng Yan, Zhi Li, Wenping Bai, Nan Yu, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features. SciSec 2021: 21-35 - 2020
- [c10]Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. WASA (1) 2020: 602-614
2010 – 2019
- 2018
- [j6]Feng Yi, Guan Feng, Hongtao Wang, Zhi Li, Limin Sun:
MIAC: A mobility intention auto-completion model for location prediction. Intell. Syst. Account. Finance Manag. 25(4): 161-173 (2018) - [j5]Jiali Li, Yongle Chen, Zhi Li, Limin Sun:
基于协议状态图遍历的RTSP协议漏洞挖掘 (Mining RTSP Protocol Vulnerabilities Based on Traversal of Protocol State Graph). 计算机科学 45(9): 171-176 (2018) - [c9]Weidong Zhang, Yu Chen, Hong Li, Zhi Li, Limin Sun:
PANDORA: A Scalable and Efficient Scheme to Extract Version of Binaries in IoT Firmwares. ICC 2018: 1-6 - [c8]Qiang Li, Xuan Feng, Haining Wang, Zhi Li, Limin Sun:
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. INFOCOM 2018: 2537-2545 - 2017
- [c7]Feng Yi, Zhi Li, Hongtao Wang, Weimin Zheng, Limin Sun:
MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KSEM 2017: 432-444 - 2016
- [j4]Hongtao Wang, Qiang Li, Feng Yi, Zhi Li, Limin Sun:
Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP J. Wirel. Commun. Netw. 2016: 103 (2016) - [c6]Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun:
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. ICICS 2016: 27-36 - [c5]Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun:
GUIDE: Graphical user interface fingerprints physical devices. ICNP 2016: 1-2 - [c4]Hongtao Wang, Hui Wen, Feng Yi, Zhi Li, Limin Sun:
Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles. WASA 2016: 103-115 - 2015
- [j3]Yongle Chen, Wei Liu, Yongping Xiong, Jing Duan, Zhi Li, Hongsong Zhu:
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning. Int. J. Distributed Sens. Networks 11: 753191:1-753191:10 (2015) - [j2]Zhi Li, Yan Liu, Hongsong Zhu, Limin Sun:
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE Trans. Veh. Technol. 64(11): 5257-5268 (2015) - [c3]Kan Yu, Zhi Li, Qiang Li, Jiguo Yu:
A Poisson Distribution Based Topology Control Algorithm for Wireless Sensor Networks Under SINR Model. WASA 2015: 706-714 - [i1]Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Limin Sun:
Fog Computing: Focusing on Mobile Users at the Edge. CoRR abs/1502.01815 (2015) - 2014
- [c2]Yunhua He, Limin Sun, Zhi Li, Hong Li, Xiuzhen Cheng:
An optimal privacy-preserving mechanism for crowdsourced traffic monitoring. FOMC 2014: 11-18 - 2013
- [j1]Zhi Li, Limin Sun, Xinyun Zhou:
Amortized Fairness for Drive-Thru Internet. Int. J. Distributed Sens. Networks 9 (2013) - 2010
- [c1]Zhi Li, Limin Sun, Xinyun Zhou, Liqun Li:
Priority Linear Coding Based Opportunistic Routing for Video Streaming in Ad Hoc Networks. GLOBECOM 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint