Publications
Conference Papers
Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction
Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, Xi Xiao, and Yong Jiang
In Proceedings of the 43th IEEE Conference on Computer Communications (INFOCOM ‘24)Interpreting Unsupervised Anomaly Detection in Security via Rule Extraction
Ruoyu Li, Qing Li, Yu Zhang, Dan Zhao, and Yong Jiang
In Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS ‘23)IoTEnsemble: Detection of Botnet Attacks on Internet of Things
Ruoyu Li, Qing Li, Yucheng Huang, Wenbin Zhang, Peican Zhu, and Yong Jiang
In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS ‘22, acceptance rate: 18.5%)HorusEye: Realtime IoT Malicious Traffic Detection Framework with Programmable Switches
Yutao Dong, Qing Li, Kaidong Wu, Ruoyu Li, Dan Zhao, Gareth Tyson, Junkun Peng, Yong Jiang, Shutao Xia, and Mingwei Xu
In Proceedings of the 32nd USENIX Security Symposium (USENIX Security ‘23)IoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Traffic
Qingsong Zou, Qing Li, Ruoyu Li, Yucheng Huang, Gareth Tyson, Jingyu Xiao, and Yong Jiang
In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp/IMWUT ‘23)Dryad: Deploying Adaptive Trees on Programmable Switches for Networking Classification
Guorui Xie, Qing Li, Jiaye Lin, Gianni Antichi, Dan Zhao, Zhenhui Yuan, Ruoyu Li, and Yong Jiang
In Proceedings of the 31st IEEE International Conference on Network Protocols (ICNP ‘23)I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning
Jingyu Xiao, Qingsong Zou, Qing Li, Dan Zhao, Kang Li, Zixuan Weng, Ruoyu Li, and Yong Jiang
In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp/IMWUT ‘23)HANZO: Collaborative Network Defense for Connected Things
Aman Singh, Shashank Murali, Lalka Rieger, Ruoyu Li, Stefan Hommes, Radu State, Gaston Ormazabal, and Henning Schulzrinne
In Proceedings of the 11th Principles, Systems and Applications of IP Telecommunications (IPTComm ‘18)SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection
Bo Wu, Qi Li, Ke Xu, Ruoyu Li, and Zhuotao Liu
In Proceedings of the 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS ‘18)
Journal Papers
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches
Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, and Yong Jiang
In IEEE/ACM Transactions on Networking, 2024ADRIoT: An Edge-assisted Anomaly Detection Framework against IoT-based Network Attacks
Ruoyu Li, Qing Li, Jianer Zhou, and Yong Jiang
In IEEE Internet of Things Journal, 2021A Comprehensive Survey on DDoS Defense Systems: New Trends and Challenges
Qing Li, He Huang, Ruoyu Li, Jianhui Lv, Zhenhui Yuan, Lianbo Ma, Yi Han, and Yong Jiang
In Computer Networks, 2023
Papers under revision/review
- IoT synthetic traffic generation, under revision by TMC (first author)
- Smart home anomaly detection, under revision by TIFS (first author)
- Malicious traffic detection, under revision TDSC (co-author)
- Defense against fingerprinting, submitted to CCS ‘24 (co-author)
- Regular expression enhancement, submitted to CCS ‘24 (co-author)
- Malicious traffic detection, submitted to KDD ‘24 (co-author)
- Smart home anomaly detection, submitted to KDD ‘24 (co-author)
- BGP anomaly detection, submitted to TDSC (co-author)