Volgen
Frank Li
Frank Li
Assistant Professor, Georgia Tech
Geverifieerd e-mailadres voor gatech.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
The matter of heartbleed
Z Durumeric, F Li, J Kasten, N Weaver, J Amann, J Beekman, M Payer, ...
Proceedings of the 2014 Conference on Internet Measurement Conference, 475-488, 2014
8982014
An Ideal-Security Protocol for Order-Preserving Encoding.
RA Popa, FH Li, N Zeldovich
IEEE S&P 2013, 2013
4882013
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1762017
A large-scale empirical study of security patches
F Li, V Paxson
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1642017
Privacy and accountability for location-based aggregate statistics
RA Popa, AJ Blumberg, H Balakrishnan, FH Li
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1362011
Global measurement of DNS manipulation
P Pearce, B Jones, F Li, R Ensafi, N Feamster, N Weaver, V Paxson
26th USENIX Security Symposium, 2017
1352017
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
F Li, Z Durumeric, J Czyz, M Karami, M Bailey, D McCoy, S Savage, ...
USENIX Security Symposium 16, 2016
1282016
Iot inspector: Crowdsourcing labeled network traffic from smart home devices at scale
DY Huang, N Apthorpe, F Li, G Acar, N Feamster
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
1082020
Consequences of connectivity: Characterizing account hijacking on twitter
K Thomas, F Li, C Grier, V Paxson
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
822014
Augur: Internet-wide detection of connectivity disruptions
P Pearce, R Ensafi, F Li, N Feamster, V Paxson
2017 IEEE Symposium on Security and Privacy (SP), 427-443, 2017
712017
Target generation for internet-wide IPv6 scanning
A Murdock, F Li, P Bramsen, Z Durumeric, V Paxson
Proceedings of the 2017 Internet Measurement Conference, 242-253, 2017
682017
SybilControl: Practical Sybil defense with computational puzzles
F Li, P Mittal, M Caesar, N Borisov
Proceedings of the seventh ACM workshop on Scalable trusted computing, 67-78, 2012
612012
Didn’t you hear me?—Towards more successful web vulnerability notifications
B Stock, G Pellegrino, F Li, M Backes, C Rossow
602018
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
602016
Web-based attacks to discover and control local iot devices
G Acar, DY Huang, F Li, A Narayanan, N Feamster
Proceedings of the 2018 Workshop on IoT Security and Privacy, 29-35, 2018
512018
Keepers of the machines: examining how system administrators manage software updates
F Li, L Rogers, A Mathur, N Malkin, M Chetty
Proceedings of the Fifteenth USENIX Conference on Usable Privacy and …, 2019
382019
Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners
F Li, R Shin, V Paxson
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 53-64, 2015
332015
Data-confined HTML5 applications
D Akhawe, F Li, W He, P Saxena, D Song
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
322013
Deep entity classification: Abusive account detection for online social networks
T Xu, G Goossen, HK Cevahir, S Khodeir, Y Jin, F Li, S Shan, S Patel, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
222021
Cleaning the NVD: Comprehensive quality assessment, improvements, and analyses
A Anwar, A Abusnaina, S Chen, F Li, D Mohaisen
IEEE Transactions on Dependable and Secure Computing 19 (6), 4255-4269, 2021
212021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20