Publications
Conference Papers
Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction
Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, Xi Xiao, and Yong Jiang
In Proceedings of the 43th IEEE Conference on Computer Communications (INFOCOM ‘24)Interpreting Unsupervised Anomaly Detection in Security via Rule Extraction
Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, and Yong Jiang
In Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS ‘23)IoTEnsemble: Detection of Botnet Attacks on Internet of Things
Ruoyu Li, Qing Li, Yucheng Huang, Wenbin Zhang, Peican Zhu, and Yong Jiang
In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS ‘22, acceptance rate: 18.5%)Proteus: A Difficulty-aware Deep Learning Framework for Real-time Malicious Traffic Detection (To appear)
Chupeng Cui, Qing Li, Guorui Xie, Ruoyu Li, Dan zhao, Zhenhui yuan, and Yong Jiang
In Proceedings of the 32nd IEEE International Conference on Network Protocols (ICNP ‘24)Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask
Jingyu Xiao, Zhiyao Xu, Qingsong Zou, Qing Li, Dan Zhao, Dong Fang, Ruoyu Li, Wenxin Tang, Kang Li, Xudong Zuo, Penghui Hu, Yong Jiang, Zixuan Weng, and Michael R.Lyv
In Proceedings of the 30th SIGKDD Conference on Knowledge Discovery and Data Mining (KDD ‘24)HorusEye: Realtime IoT Malicious Traffic Detection Framework with Programmable Switches
Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, and Mingwei Xu
In Proceedings of the 32nd USENIX Security Symposium (USENIX Security ‘23)IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic
Qingsong Zou, Qing Li, Ruoyu Li, Yucheng Huang, Gareth Tyson, Jingyu Xiao, and Yong Jiang
In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp/IMWUT ‘23)Dryad: Deploying Adaptive Trees on Programmable Switches for Networking Classification
Guorui Xie, Qing Li, Jiaye Lin, Gianni Antichi, Dan Zhao, Zhenhui Yuan, Ruoyu Li, and Yong Jiang
In Proceedings of the 31st IEEE International Conference on Network Protocols (ICNP ‘23)I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning
Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Zixuan Weng, Ruoyu Li, and Yong Jiang
In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp/IMWUT ‘23)HANZO: Collaborative Network Defense for Connected Things
Aman Singh, Shashank Murali, Lalka Rieger, Ruoyu Li, Stefan Hommes, Radu State, Gaston Ormazabal, and Henning Schulzrinne
In Proceedings of the 11th Principles, Systems and Applications of IP Telecommunications (IPTComm ‘18)SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection
Bo Wu, Qi Li, Ke Xu, Ruoyu Li, and Zhuotao Liu
In Proceedings of the 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS ‘18)
Journal Papers
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches
Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, and Yong Jiang
In IEEE/ACM Transactions on Networking, 2024IoTGemini: Modeling IoT Network Behaviors for Synthetic Traffic Generation
Ruoyu Li, Qing Li, Qingsong Zou, Dan Zhao, Xiangyi Zeng, Yucheng Huang, Yong Jiang, Feng Lyu, Gaston Ormazabal, Aman Singh, and Henning Schulzrinne
In IEEE Transactions on Mobile Computing, 2024SeIoT: Smart Home Network Anomaly Detection via Knowledge Graph
Ruoyu Li, Qing Li, Yucheng Huang, Qingsong Zou, Dan Zhao, Zhengxin Zhang, Yong Jiang, Fa Zhu, and Athanasios V. Vasilakos
In IEEE Transactions on Information Forensics and Security, 2024ADRIoT: An Edge-assisted Anomaly Detection Framework against IoT-based Network Attacks
Ruoyu Li, Qing Li, Jianer Zhou, and Yong Jiang
In IEEE Internet of Things Journal, 2021Intelligent In-Network Attack Detection on Programmable Switches with Soterv2
Guorui Xie, Qing Li, Chupeng Cui, Ruoyu Li, Lianbo Ma, Zhuyun Qi, and Yong Jiang
In IEEE Transactions on Dependable and Secure Computing, 2024A Comprehensive Survey on DDoS Defense Systems: New Trends and Challenges
Qing Li, He Huang, Ruoyu Li, Jianhui Lv, Zhenhui Yuan, Lianbo Ma, Yi Han, and Yong Jiang
In Computer Networks, 2023
Papers under revision/review
- Interpretation for black-box models, submitted to NeurIPS ‘24 (co-first author)
- Defense against fingerprinting, submitted to NDSS ‘25 (co-author)
- Regular expression enhancement, submitted to NSDI ‘25 (co-author)
- BGP anomaly detection, submitted to TDSC (co-author)