default search action
Song Li 0006
Person information
- affiliation: School of Cyber Science and Technology/College of Computer Science and Technology, Zhejiang University, China
Other persons with the same name
- Song Li — disambiguation page
- Song Li 0001 — China University of Mining and Technology, School of Information and Control Engineering, Xuzhou, China (and 1 more)
- Song Li 0002 — Zhejiang University, School of Mathematical Sciences, Hangzhou, China
- Song Li 0003 — Anhui Medical University, School of Stomatology, Hefei, China
- Song Li 0004 — South China University of Technology, School of Mechanical and Automotive Engineering, Guangzhou, China
- Song Li 0005 — NewSky Security Solution Inc., Redmond, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Guangyuan Gao, Weina Niu, Jiacheng Gong, Dujuan Gu, Song Li, Mingxue Zhang, Xiaosong Zhang:
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph. IEEE Trans. Inf. Forensics Secur. 19: 7705-7719 (2024) - [j1]Jiacheng Gong, Weina Niu, Song Li, Mingxue Zhang, Xiaosong Zhang:
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics. IEEE Trans. Inf. Forensics Secur. 19: 9216-9229 (2024) - [c13]Xin Liu, Yuanyuan Huang, Tianyi Wang, Song Li, Weina Niu, Jun Shen, Qingguo Zhou, Xiaokang Zhou:
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware. SoCC 2024: 69-82 - [c12]Xuan Hai, Xin Liu, Zhaorun Chen, Yuan Tan, Song Li, Weina Niu, Gang Liu, Rui Zhou, Qingguo Zhou:
Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors. ICME 2024: 1-6 - [c11]Xuan Hai, Xin Liu, Yuan Tan, Gang Liu, Song Li, Weina Niu, Rui Zhou, Xiaokang Zhou:
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection. ACM Multimedia 2024: 6900-6909 - 2023
- [c10]Jianjia Yu, Song Li, Junmin Zhu, Yinzhi Cao:
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation. CCS 2023: 2441-2455 - [c9]Mingqing Kang, Yichao Xu, Song Li, Rigel Gjomemo, Jianwei Hou, V. N. Venkatakrishnan, Yinzhi Cao:
Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability. SP 2023: 1059-1076 - 2022
- [c8]Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong:
GraphTrack: A Graph-based Cross-Device Tracking Framework. AsiaCCS 2022: 82-96 - [c7]Zifeng Kang, Song Li, Yinzhi Cao:
Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites. NDSS 2022 - [c6]Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao:
Mining Node.js Vulnerabilities via Object Dependence Graph and Query. USENIX Security Symposium 2022: 143-160 - [i2]Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong:
GraphTrack: A Graph-based Cross-Device Tracking Framework. CoRR abs/2203.06833 (2022) - 2021
- [c5]Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao:
Detecting Node.js prototype pollution vulnerabilities via object lookup analysis. ESEC/SIGSOFT FSE 2021: 268-279 - 2020
- [c4]Song Li, Yinzhi Cao:
Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint Dynamics. Internet Measurement Conference 2020: 370-385
2010 – 2019
- 2019
- [c3]Shujiang Wu, Song Li, Yinzhi Cao, Ningfei Wang:
Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting. USENIX Security Symposium 2019: 1645-1660 - 2017
- [c2]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CCS 2017: 163-178 - [c1]Yinzhi Cao, Song Li, Erik Wijmans:
(Cross-)Browser Fingerprinting via OS and Hardware Level Features. NDSS 2017 - [i1]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CoRR abs/1708.06774 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint