Full Publication (Selected Publication)---By Year, By Type

SURVEYS

  1. Shouling Ji, Prateek Mittal, and Raheem Beyah, Graph Data Anonymization, De-anonymization Attacks, and De-anonymizability Quantification: A Survey, IEEE Communications Surveys & Tutorials (COMST), 2016. [PDF] (Impact Factor = 22.973)

FULL JOURNALS

  1. Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, and Chunming Wu, AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service, IEEE Transactions on Information Forensics & Security (TIFS), 2024.
  2. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, and Ting Wang, HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning, IEEE Transactions on Information Forensics & Security (TIFS), 2024. [PDF]
  3. Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, and Jiming Chen, VERIFI: Towards Verifiable Federated Unlearning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  4. Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, and Shouling Ji, EdgePro: Edge Deep Learning Model Protection via Neuron Authorization, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  5. Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, and Wenzhi Che, Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  6. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, and Ting Wang, Hijack Vertical Federated Learning Models As One Party, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. [PDF]
  7. Chenghui Shi, Shouling Ji, Xudong Pan, Xuhong Zhang, Mi Zhang, Min Yang, Jun Zhou, Jianwei Yin, and Ting Wang, Towards Practical Backdoor Attacks on Federated Learning Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  8. Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, and Shouling Ji, URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing, IEEE Transactions on Information Forensics & Security (TIFS), 2023.
  9. Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, and Yanjun Wu, Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art, Computers & Security, 2023.
  10. Hui Sun, Tianqing Zhu, Jie Li, Shouling Ji, and Wanlei Zhou, Attribute-based Membership Inference Attacks and Defenses on GANs, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
  11. Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, and Peng Lin, G-Fuzz: A Directed Fuzzing Framework for gVisor, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023. [Github]
  12. Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Reheem Beyah, One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
  13. Tieming Chen, Chengyu Dong, Mingqi Lv, Qijie Song, Haiwen Liu, Tiantian Zhu, Kang Xu, Ling Chen, and Shouling Ji, APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  14. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, and Ting Wang, Your Labels Are Selling You Out: Relation Leaks in Vertical Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  15. 纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, 武延军, 开源软件供应链安全研究综述, 软件学报, 2022. [PDF]
  16. Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, and Zhen Hong, EfficientTDNN: Efficient Architecture Search for Speaker Recognition, IEEE Transactions on Audio, Speech, and Language Processing (TASLP), 2022. [PDF]
  17. Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, and Raheem Beyah, Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  18. Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, and Li Cheng, Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022.
  19. Yiming Wu, Qianjun Liu, Xiaojing Liao, Shouling Ji, Peng Wang, Xiaofeng Wang, Chunming Wu, and Zhao Li, Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  20. Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, and Ting Wang, Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021. [PDF]
  21. Jianfeng Dong, Zhe Ma, Xiaofeng Mao, Xun Yang, Yuan He, Richang Hong, and Shouling Ji, Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning, IEEE Transactions on Image Processing (TIP), 2021. [Slides]
  22. Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Chunming Wu, and Shouling Ji, Multi-level Graph Matching Networks for Deep Graph Similarity LearningSystems, IEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2021. [PDF]
  23. Shuiguang Deng, Yishan Chen, Gong Chen, Shouling Ji, Jianwei Yin, and Albert Y. Zomaya, Incentive-driven Proactive Application Deployment and Pricing on Distributed Edges, IEEE Transactions on Mobile Computing (TMC), 2021.
  24. Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu Bourgeois, and Raheem Beyah, This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
  25. Zhangjie Fu, Yueyan Zhi, Shouling Ji, and Xingming Sun, Remote Attacks on Drones Vision Sensors: An Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
  26. Hanlu Wu, Tengfei Ma, Lingfei Wu, and Shouling Ji, Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing, ACM Transactions on Knowledge Discovery from Data (TKDD), 2021. [PDF]
  27. Qianjun Liu, Shouling Ji, Changchang Liu, and Chunming Wu, A Practical Black-box Attack on Source Code Authorship Identification Classifiers, IEEE Transactions on Information Forensics & Security (TIFS), 2021. [PDF]
  28. Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang, Adversarial CAPTCHAs, IEEE Transactions on Cybernetics (TCYB), 2021. [PDF]
  29. 纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博, 深度学习模型鲁棒性研究综述, 计算机学报, 2021. [PDF]
  30. Jianfeng Dong, Zhongzi Long, Xiaofeng Mao, Changting Lin, YuanHe, and Shouling Ji, Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval, Neurocomputing, 2021.
  31. Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, and Shouling Ji, Deep Graph Matching and Searching for Semantic Code Retrieval, ACM Transactions on Knowledge Discovery from Data (TKDD), 2021. [PDF]
  32. Mingqi Lv, Dajian Zeng, Ling Chen, Tieming Chen, Tiantian Zhu, and Shouling Ji, Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and EncoderDecoder Network, IEEE Transactions on Mobile Computing (TMC), 2021.
  33. Xiang Li, Yuwei Li, Junan Yang, Hui Liu, and Pengjiang Hu, A Relation Aware Embedding Mechanism for Relation Extraction, Applied Intelligence, 2021. (IF: 5.086)
  34. Binbin Zhao, Shouling Ji, Wei-han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang and Raheem Beyah, A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2020. [PDF]
  35. 李旭嵘,纪守领,吴春明,刘振广,邓水光,程鹏,杨珉,孔祥维, 深度伪造与检测技术综述, 软件学报, 2020. [PDF]
  36. Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, and Raheem Beyah, V-Fuzz: Vulnerability Prediction Assisted Evolutionary Fuzzing for Binary Programs, IEEE Transactions on Cybernetics, 2020. [PDF] [Slides] (IF: 11.079)
  37. Mingqi Lv, Zhaoxiong Hong, Ling Chen, Tieming Chen, Tiantian Zhu and Shouling Ji, Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction, IEEE Transactions on Intelligent Transportation Systems (TITS), 2020. [PDF]
  38. Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, and Yang Xiang, A Truthful and Near-optimal Mechanism for Colocation Emergency Demand Response, IEEE Transactions on Mobile Computing (TMC), 2020. [PDF]
  39. Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang, AsgLDP: Collecting and Generating Decentralized Attributed Graphs with Local Differential Privacy, IEEE Transactions on Information Forensics & Security (TIFS), 2020. [PDF]
  40. Xurong Li, Shouling Ji, Juntao Ji, Zhenyu Ren, Chunming Wu, Bo Li, Ting Wang, Adversarial Examples Detection through the Sensibility in Space Mappings, IET Computer Vision, 2020. [PDF]
  41. Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, and Zehong Cao, HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM, ACM Transactions on Data Science (TDS), 2020.
  42. 纪守领, 杜天宇, 李进锋, 沈超, 李博, 机器学习模型安全与隐私研究综述, 软件学报, 2020. [PDF]
  43. Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao and M Tanveer, THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-based IoT Network, IEEE Internet of Things Journal, 2019. [PDF]
  44. Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, Raheem Beyah, OB-WSPES: A Uniform Evaluation System for Obfuscation-based Web Search Privacy, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF] GitHub
  45. 陈宇飞, 沈超, 王骞, 李琦, 王聪, 纪守领, 李康, 管晓宏, 人工智能系统安全与隐私风险, 计算机研究与发展, 2019. [PDF]
  46. Xurong Li, Shouling Ji, Meng Han, Juntao Ji, Zhenyu Ren, Yushan Liu, and Chunming Wu, Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF] arXiv:1901.01223
  47. Zhenyu Wen, Tao Lin, Renyu Yang, Shouling Ji, Rajiv Ranjan, Alexander Romanovsky, Changting Lin, and Jie Xu, GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2019. [PDF]
  48. Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, and Ruiying Du, Dynamic Group-Oriented Provable Data Possession in the Cloud, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF]
  49. Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Fast-RCM: Fast Tree based Unsupersived Rare Class Mining, IEEE Transactions on Cybernetics, 2019. [PDF] (IF: 10.387)
  50. Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah, Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services, Big Data Mining and Analytics, 2019. [PDF]
  51. Jing S. He, Meng Han, Shouling Ji, Tianyu Du, Zhao Li, Spreading social influence with both positive and negative opinions in online networks, Big Data Mining and Analytics, 2019. [PDF]
  52. Xuhong Zhang, Jun Wang, Shouling Ji, Jiangling Yin, Rui Wang, Xiaobo Zhou and Changjun Jiang, An I/O Efficient Distributed Approximation Framework Using Cluster Sampling, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2019. [PDF]
  53. Zhen Hong, Rui Wang, Shouling Ji, and Raheem Beyah, Attacker Location Evaluation-based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems, IEEE Transactions on Information Forensics & Security (TIFS), 2018. [PDF]
  54. Xiang Ling, Shouling Ji, and Kui Ren, Adversarial Example Attacks and Defenses of Deep Learning Systems, Communications of the CCF Vol. 14, No. 6, pp. 11 - 16, June, 2018. [PDF] 面向深度学习系统的对抗样本攻击与防御 (in Chinese)
  55. Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem Beyah, Fingerprinting for Cyber Physical System Security: Device Physics Matters Too, IEEE Security & Privacy. [PDF] 2017
  56. Shukun Yang, Shouling Ji, and Raheem Beyah, DPPG: A Dynamic Password Policy Generation System, IEEE Transactions on Information Forensics & Security (TIFS). [PDF] 2017
  57. Shouling Ji, Weiqing Li, Prateek Mittal, and Raheem Beyah, De-SAG: On the De-anonymization of Structure-Attribute Graph Data, IEEE Transactions on Dependable and Secure Computing (TDSC). [PDF] 2017
  58. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, General Graph Data De-anonymization: From Mobility Traces to Social Networks, ACM Transactions on Information and System Security (TISSEC). [PDF] 2016
  59. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Theory and Practice, IEEE/ACM Transactions on Networking (ToN). [PDF] 2016
  60. Shouling Ji, Weiqing Li, Neil Gong, Prateek Mittal, and Raheem Beyah, Seed based De-anonymizability Quantification of Social Networks, IEEE Transactions on Information Forensics & Security (TIFS). 2015.
  61. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah, Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC). 2015.
  62. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks, IEEE Transactions on Mobile Computing (TMC). 2015.
  63. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling with Latency and Redundancy Analysis for Cognitive Radio Networks, IEEE Transactions on Vehicular Technology (TVT). 2014.
  64. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks, IEEE Transactions on Mobile Computing (TMC). Vol. 13, No. 3, pp(s): 626-637, 2014.
  65. Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, and Yingshu Li, Neighborhood-based Uncertainty Generation in Social Networks, Journal of Combinatorial Optimization (JCO). Vol. 28, pp(s): 561-576, 2014.
  66. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 25, No. 7, pp(s): 1681-1690, 2014.
  67. Zhipeng Cai, Shouling Ji, Jing (Selena) He, Lin Wei, and Anu G. Bourgeois, Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 25, No. 8, pp(s): 2020-2029, 2014.
  68. Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai, Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Theoretical Computer Science (TCS). Vol. 507, pp(s): 2-16, October 2013.
  69. Shouling Ji and Zhipeng Cai, Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks under the Generalized Physical Interference Model, IEEE/ACM Transactions on Networking (ToN). Vol. 21, No. 4, pp(s): 1270-1283, August 2013.
  70. Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li, Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN). Vol. 9, No. 4, July 2013.
  71. Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, Zhipeng Cai, Practical Unicast and Convergecast Scheduling Schemes for Cognitive Radio Networks, Journal of Combinatorial Optimization (JCO). Vol. 26, No. 1, pp(s): 161-177, 2013.
  72. Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li, Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Netwroks, Journal of Parallel and Distributed Computing (JPDC). Vol. 73, No. 6, pp(s): 729-745, 2013.
  73. Shouling Ji, Zhipeng Cai, Yingshu Li, and Xiaohua Jia, Continuous Data Collection Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 23, No. 10, pp(s): 1844-1855, October 2012.
  74. Shouling Ji, Weiqing Li, Neil Gong, Prateek Mittal, and Raheem Beyah, Seed based De-anonymizability Quantification of Social Networks, to appear in the IEEE Transactions on Information Forensics & Security (TIFS), 2015.
  75. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah, Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, to appear in the IEEE Transactions on Dependable and Secure Computing (TDSC), 2015.
  76. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks, to appear in the IEEE Transactions on Mobile Computing (TMC), 2015.
  77. Jinbao Li, Xiaohang Guo, Longjiang Guo, Shouling Ji, Meng Han, and Zhipeng Cai, Optimal Routing with Scheduling and Channel Assignment in Multi-Power Multi-Radio Wireless Sensor Networks, to appear in the Ad Hoc Networks, 2015.
  78. Jing (Selena) He , Shouling Ji, Raheem Beyah, Ying Xie, and Yingshu Li, Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks via Multi-Objective Genetic Algorithm, to appear in the Transactions on Emerging Telecommunications Technologies (ETT), 2014.
  79. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling with Latency and Redundancy Analysis for Cognitive Radio Networks, to appear in the IEEE Transactions on Vehicular Technology (TVT), 2014.
  80. Guoliang Liu, Shouling Ji, and Zhipeng Cai, Strengthen Nodal Cooperation for Data Dissemination in Mobile Social Networks, to appear in the Personal and Ubiquitous Computing, 2014.
  81. Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai, A Genetic Algorithm with Immigrants Schemes for Constructing aσ - Reliable MCDS in Probabilistic Wireless Networks, Ad Hoc & Sensor Wireless Networks (AHSWN), Vol. 20, No. 3, pp(s): 153-178, 2014.
  82. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks, IEEE Transactions on Mobile Computing (TMC), Vol. 13, No. 3, pp(s): 626-637, 2014.
  83. Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, and Yingshu Li, Neighborhood-based Uncertainty Generation in Social Networks, Journal of Combinatorial Optimization (JCO), Vol. 28, pp(s): 561-576, 2014.
  84. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 7, pp(s): 1681-1690, 2014.
  85. Zhipeng Cai, Shouling Ji, Jing (Selena) He, Lin Wei, and Anu G. Bourgeois, Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration, IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 8, pp(s): 2020-2029, 2014.
  86. Mingyuan Yan, Jing (Selena) He, Shouling Ji, and Yingshu Li, Multi-Regional Query Scheduling in Wireless Sensor Networks with Minimum Latency, Wireless Communications and Mobile Computing (WCMC), Vol. 14, No.9, pp(s): 849-864, 2014.
  87. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Greedy Construction of Load-Balanced Virtual Backbones in Wireless Sensor Networks, Wireless Communications and Mobile Computing (WCMC), Vol. 14, No. 7, pp(s): 673-688, 2014.
  88. Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai, Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Theoretical Computer Science (TCS), Vol. 507, pp(s): 2-16, October 2013.
  89. Shouling Ji and Zhipeng Cai, Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks under the Generalized Physical Interference Model, IEEE/ACM Transactions on Networking (ToN), Vol. 21, No. 4, pp(s): 1270-1283, August 2013.
  90. Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li, Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN), Vol. 9, No. 4, July 2013.
  91. Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, Zhipeng Cai, Practical Unicast and Convergecast Scheduling Schemes for Cognitive Radio Networks, Journal of Combinatorial Optimization (JCO), Vol. 26, No. 1, pp(s): 161-177, 2013.
  92. Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li, Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Netwroks, Journal of Parallel and Distributed Computing (JPDC), Vol. 73, No. 6, pp(s): 729-745, 2013.
  93. Shouling Ji, Zhipeng Cai, Yingshu Li, and Xiaohua Jia, Continuous Data Collection Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 23, No. 10, pp(s): 1844-1855, October 2012.
  94. Jing (Selena) He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li, Load-Balanced CDS Construction in Wireless Sensor Networks Via Genetic Algorithm, International Journal of Sensor Networks (IJSNet), Vol. 11, No. 3, pp(s): 166-178, 2012.
  95. Zhipeng Cai, Shouling Ji, and Jinbao Li, Data Caching Based Query Processing in Multi-Sink Wireless Sensor Networks, International Journal of Sensor Networks (IJSNet), Vol. 11, No. 2, pp(s): 109-125, 2012.

CONFERENCE PAPERS

  1. Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Xiao Xiao, Hong Liang, Jiacheng Xu, and Wenhai Wang, Critical Code Guided Directed Greybox Fuzzing for Commits, USENIX Security 2024.
  2. Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, and Ting Wang, On Defending Contrastive Learning against Backdoor Attacks, USENIX Security 2024.
  3. Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah, SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices, IEEE S&P 2024. [PDF] [Slides] [Github]
  4. Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, and Ting Wang, Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention, NDSS 2024. [PDF] [Slides] [Github]
  5. Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, and Jiming Chen, MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency, NDSS 2024.
  6. Linkang Du, Zhikun Zhang, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, and Jiming Chen, ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning, NDSS 2024.
  7. YunRuo Zhang,Lujia Shen,Shanqing Guo, and Shouling Ji, GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers, AAAI 2024.
  8. Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, and Shouling Ji, Integer is Enough: When Vertical Federated Learning Meets Rounding, AAAI 2024. [PDF] [Slides]
  9. Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, and Lei Yang, Let All be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval, AAAI 2024. [PDF] [Slides] [Github]
  10. Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, and Shouling Ji, AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection, AAAI 2024.
  11. Ping He, Yifan Xia, Xuhong Zhang, and Shouling Ji, Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting, ACM CCS 2023. [PDF] [Github]
  12. Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, and Zhiniang Peng, Detecting Union Type Confusion in Component Object Model, USENIX Security 2023.
  13. Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, and Ting Wang, On the Security Risks of Knowledge Graph Reasoning, USENIX Security 2023. [PDF]
  14. Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, and Raheem Beyah, UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware, USENIX Security 2023. [PDF]
  15. Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, and Jianwei Yin, FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases, USENIX Security 2023. [PDF] [Github]
  16. Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, and Raheem Beyah, MINER: A Hybrid Data-Driven Approach for REST API Fuzzing, USENIX Security 2023. [PDF] [Github]
  17. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, and Wenzhi Chen, How IoT Recycling Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices, IEEE S&P 2023. [PDF]
  18. Yi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian, and Shouling Ji, Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models, Inscrypt 2023. [PDF] [Slides]
    * Best Student Paper Award
  19. Tianyu Du, Zhaohan Xi, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, and Ting Wang, Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks, NeurIPS 2023.
  20. Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, and Ting Wang, An Embarrassingly Simple Backdoor Attack on Self-supervised Learning, ICCV 2023.
  21. Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, and Ting Wang, The Dark Side of AutoML: Towards Architectural Backdoor Search, ICLR 2023.
  22. Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, and Wenhai Wang, Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection, ESORICS 2023. [PDF] [Slides]
  23. Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, and Kangjie Lu, Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs, ACM CCS 2022. [PDF] [Github]
  24. Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, and Ting Wang, ''Is your explanation stable?'': A Robustness Evaluation Framework for Feature Attribution, ACM CCS 2022. [PDF] [Github]
  25. Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, and Ting Wang, Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era, USENIX Security 2022. [PDF] [Slides]
  26. Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, and Ting Wang, On the Security Risks of AutoML, USENIX Security 2022. [PDF]
  27. Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, and Ting Wang, Label Inference Attacks Against Vertical Federated Learning, USENIX Security 2022. [PDF] [Slides] [Github]
  28. Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, and Ting Wang, Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings, IEEE S&P 2022. [PDF] [Slides] [Github]
  29. Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, and Dawn Song, Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models, IEEE S&P 2022. [PDF]
  30. Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Reheem Beyah, EMS: History-Driven Mutation for Coverage-based Fuzzing, NDSS 2022. [PDF] [Slides] [Github]
  31. Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah, SLIME: Program-sensitive Energy Allocation for Fuzzing, ISSTA 2022. [PDF] [Slides] [Github]
  32. Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Raheem Beyah, A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware, ISSTA 2022. [PDF] [Slides] [Github]
  33. Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, and Ting Wang, TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors, Euro S&P 2022. [PDF] [Github]
  34. Xiang Ling, Lingfei Wu, Wei Deng, Sheng Zhang, Zhenqing Qu, Jiangyu Zhang, Tengfei Ma, Bin Wang, Chunming Wu, and Shouling Ji, MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection, IEEE INFOCOM 2022. [PDF]
  35. Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, and Jinyin Chen, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE 2022.
  36. Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, and Ting Wang, Backdoor Pre-trained Models Can Transfer to All, ACM CCS 2021. [PDF] [Slides]
  37. Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, and Qinming He, Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths, ACM CCS 2021. [PDF] [Slides]
  38. Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, and Yanjun Wu, CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels, ACM CCS 2021. [PDF] [Slides]
  39. Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, and Yanjun Wu, V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing, ACM CCS 2021. [PDF] [Slides]
    * Best Paper Award
  40. Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, and Jiming Chen, AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy, ACM CCS 2021. [PDF] [Slides]
  41. Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, and Ting Wang, Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks, ACM CCS 2021. [PDF] [Slides]
  42. Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah, MPInspector: A Systematic and Automatic Approach for Evaluating the Security of Iot Messaging Protocols, USENIX Security 2021. [PDF] [Slides]
  43. Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang, Graph Backdoor, USENIX Security 2021. [PDF] [Slides] [Github]
  44. Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang, UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, USENIX Security 2021. [PDF] [Slides] [Github]
  45. Yangkai Du, Tengfei Ma, Lingfei Wu, Fangli Xu, Xuhong Zhang, and Shouling Ji, Constructing Contrastive samples via Summarization for Text Classification with limited annotations, EMNLP 2021.
  46. Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, and Raheem Beyah, iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware, ASE 2021. [PDF] [Slides]
  47. Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, and Shouling Ji, Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion, IJCAI 2021.
  48. Zhenguang Liu, Haoming Chen, Runyang Feng, Shuang Wu, Shouling Ji, Bailin Yang, and Xun Wang, Deep Dual Consecutive Network for Human Pose Estimation, CVPR 2021.
  49. Xinyang Zhang, Zheng Zhang, Shouling Ji, and Ting Wang, Trojaning Language Models for Fun and Profit, Euro S&P 2021.
  50. Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, and Liming Fang, Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining, ICDE 2021. [PDF]
  51. Zhixiao Fu, Xinyuan Chen, Jianfeng Dong, and Shouling Ji, Multi-order Adversarial Representation Learning for Composed Query Image Retrieval, ICASSP 2021.
  52. Jinfeng Li, Tianyu Du, Xiangyu Liu, Rong Zhang, Hui Xue, and Shouling Ji, Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation, ICASSP 2021.
  53. Zhe Ma, Fenghao Liu, Jianfeng Dong, Xiaoye Qu, Yuan He, and Shouling Ji, Hierarchical Similarity Learning for Language-based Product Image Retrieval, ICASSP 2021. [PDF] [Slides] [Github]
  54. Zhenguang Liu, Kedi Lyu, Shuang Wu, Haipeng Chen, Yanbin Hao, and Shouling Ji, Aggregated Multi-GANs for Controlled 3D Human Motion Prediction, AAAI 2021. [PDF]
  55. Xinyang Zhang, Pang Ren, Shouling Ji, Fenglong Ma, and Ting Wang, i-Algebra: Towards Interactive Interpretability of Deep Neural Networks, AAAI 2021. [PDF]
  56. Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, and Shouling Ji, PROCESS: Privacy-Preserving On-Chain Certificate Status Service, IEEE INFOCOM 2021. [PDF]
  57. Haibin Zheng, Jinyin Chen, Hang Du, Weipeng Zhu, Shouling Ji, and Xuhong Zhang, GRIP-GAN: An Attack-Free Defense through General Robust Inverse Perturbation, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
  58. Xurong Li, Kun Yu, Shouling Ji, Yan Wang, Chunming Wu, and Hui Xue, Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN), WWW 2020.
  59. Hanlu Wu, Tengfei Ma, Lingfei Wu, Tariro Manyumwa and Shouling Ji, Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning, EMNLP 2020. [PDF]
  60. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah, Understanding the Security Risks of Docker Hub, ESORICS 2020. [PDF]
  61. Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo and Ting Wang, AdvMind: Inferring Adversary Intent of Black-Box Attacks, KDD 2020. [PDF]
  62. Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, and Ting Wang, Text Captcha Is Dead? A Large Scale Deployment and Empirical Study, ACM CCS 2020. [PDF]
  63. Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, and Ting Wang, A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models, ACM CCS 2020. [PDF]
  64. Xudong Pan, Mi Zhang, Shouling Ji, and Min Yang, Privacy Risks of General-Purpose Language Models, IEEE S&P (Oakland) 2020. [PDF]
  65. Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, and Min Yang, Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent, USENIX Security 2020. [PDF]
  66. Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang, TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation, USENIX Security 2020. [PDF]
  67. Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, Ting Wang, Interpretable Deep Learning under Fire, USENIX Security 2020. [PDF] arXiv:1812.00891
  68. Yining Lang, Yuan He, Fan Yang, Jianfeng Dong, Hui Xue, Which is Plagiarism: Fashion Image Retrieval based on Regional Representation for Design Protection, CVPR 2020. [PDF]
  69. Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah, SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, ASIACCS 2020. [PDF]
  70. Zhao Li, Chenyi Lei, Pengcheng Zou, Donghui Ding, Shichang Hu, Zehong Hu, Shouling Ji and Jianliang Gao, Attention with Long-term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors, DASFAA 2020. [PDF]
  71. Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, De-Health: All Your Online Health Information Are Belong to Us, ICDE 2020. [PDF] arXiv:1902.00717
  72. Zhe Ma, Jianfeng Dong, Yao Zhang, Zhongzi Long, Yuan He, Hui Xue and Shouling Ji, Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network, AAAI 2020. [PDF]
  73. Xu Duan, Jingzheng Wu, Shouling Ji, Zhiqing Rui , Tianyue Luo , Mutian Yang and Yanjun Wu, VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities, IJCAI 2019. [PDF] (Acceptance ratio: 850/4752 = 17.9%)
  74. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song and Raheem Beyah, MOpt: Optimized Mutation Scheduling for Fuzzers, USENIX Security 2019. [PDF] [Github]
  75. Lingfei Wu, Ian En-Hsu Yen, Siyu Huo, Liang Zhao, Kun Xu, Liang Ma, Shouling Ji and Charu Aggarwal, Efficient Global String Kernel with Random Features: Beyond Counting Substructures, KDD 2019. [PDF]
  76. Jianfeng Dong, Xirong Li, Chaoxi Xu, Shouling Ji, Yuan He, Gang Yang and Xun Wang, Dual Encoding for Zero-Example Video Retrieval, CVPR 2019. [PDF]
  77. Chenyi Lei, Zhao Li and Shouling Ji, TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors, WWW 2019. [PDF]
  78. Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah, SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, NDSS 2019 Poster Session. [PDF]
  79. Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He and Ting Wang, CATS: Cross-Platform E-commerce Fraud Detection, ICDE 2019. [PDF]
  80. Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu, A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers, IEEE INFOCOM 2019. [PDF] (Acceptance ratio: 288/1464=19.7%)
  81. Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li and Ting Wang, DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Models, IEEE S&P (Oakland) 2019. [PDF]
  82. Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, and Ting Wang, TextBugger: Generating Adversarial Text Against Real-world Applications, NDSS 2019. [PDF] (Acceptance ratio: 89/521 = 17.08%)
  83. 纪守领, 李进锋, 杜天宇, 李博, 机器学习模型可解释性方法、应用与安全研究综述, 计算机研究与发展, 2019. [PDF]
  84. Tianyu Du, Tao Tao, Bijing Liu, Xueqi Jin, Jinfeng Li, and Shouling Ji, You Are What You Search: Attribute Inference Attacks Through Web Search Queries, SICBS 2018. [PDF]
  85. Zhengwei Jiang, Chenyang Lyu, Bo Zhang, Chao Zhang, Wei Lu, and Shouling Ji, Dynamic Network Configuration: an Effective Defensive Protocol for Public Blockchain, SICBS 2018. [PDF]
  86. Tao Tao, Yuan Chen, Bijing Liu, Xueqi Jin, Mingyuan Yan and Shouling Ji, Security Analysis of Bioinformatics WEB Application, SICBS 2018. [PDF]
  87. Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, and Ting Wang, Model-Reuse Attacks on Learning Systems, ACM CCS 2018. [PDF]
  88. Haiqin Weng, Zhao Li, Shouling Ji, Chen Chu, Haifeng Lu, Tianyu Du, and Qinming He, Online E-Commerce Fraud: A Large-scale Detection and Analysis, ICDE 2018. [PDF]
  89. Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, and Raheem Beyah, Quantifying Graph Anonymity, Utility, and De-anonymity, IEEE INFOCOM 2018. [PDF]
  90. Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, and Ruiying Du, CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections, IEEE INFOCOM 2018. [PDF]
  91. Mutian Yang, Jingzheng Wu, Shouling Ji, Tianyue Luo, and Yanjun Wu, Pre-Patch: Find Hidden Threats in Open Software based on Machine Learning Method, SCF 2018. [PDF]
    * Best Paper Award
  92. Ningfei Wang, Shouling Ji and Ting Wang, Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization, AISec 2018. [PDF]
    * Best Paper Award
  93. Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He and Raheem Beyah, Towards Evaluating the Security of Image CAPTCHA in the Wild, AISec 2018. [PDF]
  94. Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, and Raheem Beyah, HSTS Measurement and an Enhanced Stripping Attack Against HTTPS, SECURECOMM 2017. [PDF]
  95. Xiang Ling, Chunming Wu, Shouling Ji, and Meng Han, H2DoS: An Application-Layer DoS Attack towards HTTP/2 Protocol, SECURECOMM 2017. [PDF]
  96. Bin Xiong, Guangli Xiang, Tianyu Du, Jing (Selena) He, Shouling Ji, Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications, CSS 2017. [PDF]
  97. Jingzheng Wu, Tianyue Luo, Shouling Ji, Mei Liu, and Mutian Yang, LaChouTi: Kernel Vulnerability Responding Framework for the Fragmented Android Devices, FSE/ESEC 2017. [PDF]
  98. Xinyang Zhang, Shouling Ji, HuiWang and Ting Wang, Private, yet Practical, Multiparty Deep Learning, ICDCS 2017. [PDF] (Acceptance ratio: 90/531 = 16.95%)
  99. Jingzheng Wu, Shen Liu, Shouling Ji, Mutian Yang, Yanjun Wu, Yongji Wang and Tianyue Luo, Exception Beyond Exception: Crashing Android System by Trapping in "Uncaught Exception", ICSE 2017. [PDF]
  100. Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, and Raheem Beyah, Password Correlation: Quantification, Evaluation and Application, IEEE INFOCOM 2017. [PDF] (Acceptance ratio: 292/1,395 = 20.9%)
  101. Changting Lin, Chunming Wu, Yifei Tian, Zhenyu Wen and Shouling Ji, PBUF: Sharing Buffer to Mitigate Flooding Attacks, ICPADS 2017. [PDF]
  102. Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal and Ruby Lee, Blind De-anonymization Attacks using Social Networks, WPES 2017. [PDF] (in conjunction with ACM CCS 2017)
  103. Jing He, Yiming Wu, Shouling Ji, and Guangli Xiang, Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data, CSS 2017. [PDF]
  104. Jing (Selena) He, Shouling Ji, and Patrick O. Bobbie, Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education, ACMSE 2017. [PDF]
  105. Jing (Selena) He, Ying Xie, Tianyu Du, Shouling Ji, and Zhao Li, Influence Spread in Social Networks with Both Positive and Negative Influences, CSoNet 2017. [PDF]
  106. Wei-han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee, Quantifying Deanonymization Risks in Social Systems, ICISSP 2017. [PDF]
  107. Gong Chen, Shouling Ji, and John A. Copeland, Towards a Framework to Facilitate the Mobile Advertising Ecosystem, ICPADS 2016. [PDF]
  108. Yushan Liu, Shouling Ji, and Prateek Mittal, SmartWalk: Enhancing Social Network Security via Adaptive Random Walks, ACM CCS 2016. [PDF] (Acceptance ratio: 137/831 = 16.5%)
  109. Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor, BotMeter: A Nimble Navigator for DGA-Botnet Landscape, ICDCS 2016. [PDF] (Acceptance ratio: 68/386 = 17.6%)
  110. Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah, On the Relative De-anonymizability of Graph Data: Quantification and Evaluation, IEEE INFOCOM 2016. [PDF] (Acceptance ratio: 300/1,644 = 18.25%)
    * IEEE INFOCOM 2016 Best-in-Session Presentation Award
  111. Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-han Lee, and Raheem Beyah, PARS: A Uniform and Open-source Password Analysis and Research System, ACSAC 2015. (Acceptance ratio: 47/193 = 24.4%)
    * PARS Project
    * The IISP Demo Day Spring'16 Finalist
  112. Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah, SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization, USENIX Security 2015. (Acceptance ratio: 67/426 = 15.7%)
  113. Shouling Ji, Zhipeng Cai, Meng Han, and Raheem Beyah, Primary Social Behavior based Joint Routing and Scheduling for Cognitive Radio Networks, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  114. Shouling Ji, Zhipeng Cai, Jing (Selena) He, and Raheem Beyah, Whitespace Analysis and Virtual Backbone Construction in Cognitive Radio Networks: A Social Networking Perspective, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  115. Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, and Raheem Beyah, On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge, NDSS 2015. San Diego, California, USA, February 8-11, 2015. (Acceptance ratio: 50/305 = 16.4%)
  116. Shouling Ji, Weiqing Li, M. Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Quantification, Practice, and Implications, ACM CCS 2014. Scottsdale, Arizona, USA, November 3-7, 2014. (Acceptance ratio: 114/585 = 19.5%)
  117. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, Structure based Data De-anonymization of Social Networks and Mobility Traces, ISC 2014. Hong Kong, October 12-14, 2014. (Acceptance ratio: 20/106 = 18.9%)
  118. Jing (Selena) He, Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-sized Influential Node Set Selection for Social Networks under the Independent Cascade Model, ACM MOBIHOC 2014. Philadelphia, PA, USA, August 11-14, 2014. (Acceptance ratio: 40/211 = 18.9%)
  119. Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai, Data Aggregation Scheduling in Wireless Networks with Cognitive Radio Networks, IEEE SECON 2014. Singapore, June 30-July 3, 2014. (Acceptance ratio: 68/235 = 28.9%)
  120. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks, IEEE MASS 2013. Hangzhou, China, October 14-16, 2013. (Acceptance ratio: 55/186 = 29.6%)
  121. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks, IEEE SECON 2013. New Orleans, USA, June 24-27, 2013. (Acceptance ratio: 51/280 = 18.2%)
  122. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE MSN 2012. Chengdu, China, December 14-16, 2012.
    * Best Paper Award
  123. Zhipeng Cai, Shouling Ji, Jing (Selena) He, and Anu G. Bourgeois, Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks, ICDCS 2012. Macau, China, June 18-21, 2012. (Acceptance ratio: 71/515 = 13.8%)
  124. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks, IEEE INFOCOM 2012. Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  125. Shouling Ji and Zhipeng Cai, Distributed Data Collection and Its Capacity in Asynchronous Wireless Sensor Networks, IEEE INFOCOM 2012. Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  126. Shouling Ji, Raheem Beyah, Yingshu Li, Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model, IEEE MASS 2011. Valencia, Spain, October 17-22, 2011.(Acceptance ratio: 49/256 = 19.1%)
  127. Shouling Ji, Yingshu Li, and Xiaohua Jia, Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection, IEEE INFOCOM 2011. Shanghai, China, April 10-15, 2011. (Acceptance ratio: 291/1823 = 16%)
  128. Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-han Lee, and Raheem Beyah, PARS: A Uniform and Open-source Password Analysis and Research System, ACSAC 2015. (Acceptance ratio: 47/193 = 24.4%)
    * The IISP Demo Day Spring'16 Finalist
  129. Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah, SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization, USENIX Security 2015. (Acceptance ratio: 67/426 = 15.7%)
  130. Shouling Ji, Zhipeng Cai, Meng Han, and Raheem Beyah, Primary Social Behavior based Joint Routing and Scheduling for Cognitive Radio Networks, IEEE SECON 2015.(Acceptance ratio: 55/194 = 28%)
  131. Shouling Ji, Zhipeng Cai, Jing (Selena) He, and Raheem Beyah, Whitespace Analysis and Virtual Backbone Construction in Cognitive Radio Networks: A Social Networking Perspective, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  132. Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, and Raheem Beyah, On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge, NDSS 2015, San Diego, California, USA, February 8-11, 2015. (Acceptance ratio: 50/305 = 16.4%)
  133. Shouling Ji, Weiqing Li, M. Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Quantification, Practice, and Implications, ACM CCS 2014, Scottsdale, Arizona, USA, November 3-7, 2014. (Acceptance ratio: 114/585 = 19.5%)
  134. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, Structure based Data De-anonymization of Social Networks and Mobility Traces, ISC 2014, Hong Kong, October 12-14, 2014. (Acceptance ratio: 20/106 = 18.9%)
  135. Jing (Selena) He, Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-sized Influential Node Set Selection for Social Networks under the Independent Cascade Model, ACM MOBIHOC 2014, Philadelphia, PA, USA, August 11-14, 2014. (Acceptance ratio: 40/211 = 18.9%)
  136. Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai, Data Aggregation Scheduling in Wireless Networks with Cognitive Radio Networks, IEEE SECON 2014, Singapore, June 30-July 3, 2014. (Acceptance ratio: 68/235 = 28.9%)
  137. Jing (Selena) He, Shouling Ji, Xiaojing Liao, Hisham Haddad, and Raheem Beyah, Minimum-sized Positive Influential Node Set Selection for Social Networks: Considering Both Positive and Negative Influences, IPCCC 2013, San Diego, California, USA, December 6-8, 2013.
  138. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks, IEEE MASS 2013, Hangzhou, China, October 14-16, 2013. (Acceptance ratio: 55/186 = 29.6%)
  139. Jing (Selena) He, Shouling Ji, Raheem Beyah, and Yingshu Li, A Multi-Objective Genetic Algorithm for Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks, IEEE GLOBECOM 2013, Atlanta, GA USA, December 9-13, 2013.
  140. Mingyuan Yan, Shouling Ji, and Zhipeng Cai, Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks, IEEE GLOBECOM 2013, Atlanta, GA USA, December 9-13, 2013.
  141. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks, IEEE SECON 2013, New Orleans, USA, June 24-27, 2013. (Acceptance ratio: 51/280 = 18.2%)
  142. Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, and Yingshu Li, Generating Uncertain Networks based on Historical Network Snapshots, CSoNet 2013 in conjunction with COCOON 2013, Hangzhou, China, June 21-23, 2013.
  143. Shouling Ji, Mingyuan Yan, Yueming Duan, Jing (Selena) He, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling for Cognitive Radio Networks, IEEE INFOCOM 2013, Demo/Poster Session, Turin, Italy, April 14-19, 2013.
  144. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE MSN 2012, Chengdu, China, December 14-16, 2012.
    * Best Paper Award
  145. Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai, Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks, COCOA 2012, Banff, Canada, August 5-9, 2012.
  146. Zhipeng Cai, Shouling Ji, Jing (Selena) He, and Anu G. Bourgeois, Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks, ICDCS 2012, Macau, China, June 18-21, 2012. (Acceptance ratio: 71/515 = 13.8%)
  147. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks, IEEE INFOCOM 2012, Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  148. Shouling Ji and Zhipeng Cai, Distributed Data Collection and Its Capacity in Asynchronous Wireless Sensor Networks, IEEE INFOCOM 2012, Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  149. Mingyuan Yan, Jing (Selena) He, Shouling Ji, Yingshu Li, Minimum Latency Scheduling for Multi-Regional Query in Wireless Sensor Networks, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011.
  150. Yueming Duan, Shouling Ji, and Zhipeng Cai, Generalized Broadcast Scheduling in Duty-Cycle Multi-Hop Wireless Networks, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011.
  151. Shouling Ji, Raheem Beyah, Yingshu Li, Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model, IEEE MASS 2011, Valencia, Spain, October 17-22, 2011.(Acceptance ratio: 49/256 = 19.1%)
  152. Jing (Selena) He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li, Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks, MILCOM 2011, Baltimore, Maryland, USA, November 7-10, 2011.
  153. Jing (Selena) He, Zhipeng Cai, Shouling Ji, Raheem Beyah, and Yi Pan, A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless NetworksWASA 2011, Chengdu, China, August 11-13, 2011.
  154. Shouling Ji, Yingshu Li, and Xiaohua Jia, Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection, IEEE INFOCOM 2011, Shanghai, China, April 10-15, 2011. (Acceptance ratio: 291/1823 = 16%)
  155. Jinbao Li, Desheng Zhang, Shouling Ji, and Longjiang Guo, RCS: a Random Channel Selection with Probabilistic Backoff for Multi-Channel MAC Protocols in WSNs, IEEE GLOBECOM 2010, Miami, Florida, USA, December 6-10, 2010.
  156. Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, and Yingshu Li, M-cube: A Duty Cycle Based Multi-Channel MAC Protocol with Multiple Channel Reservation for WSNs, The 16th International Conference on Parallel and Distributed Systems (ICPADS 2010), Shanghai, China, December 8-10, 2010.
  157. Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji and Yingshu Li, ARM: an Asynchronous Receiver-initiated Multichannel MAC Protocol with Duty Cycling for WSNs, The 29th IEEE International Performance Computing and Communications Conference (IPCCC 2010), Albuquerque, NM, December 9-11, 2010.
  158. Jinbao Li, Shouling Ji, and Jinghua Zhu, Data Caching Based Queries in Multi-Sink Sensor Networks, International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2009),Wu Yi Mountain, China, December 14-16, 2009.

POSTERS

  1. Weiqing Li, Shouling Ji, and Raheem Beyah, ShareSafe: the Complete Collection of Tools for Graph Data Privacy Analysis, ACSAC 2015. poster session.
  2. Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah, Effectiveness and Soundness of Commercial Password Strength Meters, NDSS 2015. San Diego, California, USA, February 8-11, 2015.
  3. Shouling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, Xin Hu, and Raheem Beyah, Password Cracking: A Large-Scale Empirical Study, USENIX Security 2014. poster session, San Diego, CA, USA, August 20-22, 2014.
  4. Shouling Ji, Weiqing Li, Jing (Selena) He, Mudhakar Srivatsa, and Raheem Beyah, Optimization based Data De-anonymization, IEEE S&P 2014. poster session, San Jose, California, USA, May 18-21, 2014.
  5. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, and Raheem Beyah, De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information, NDSS 2014. Poster Session, San Diego, California, USA, February 23-26, 2014.
  6. Shouling Ji, Mingyuan Yan, Yueming Duan, Jing (Selena) He, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling for Cognitive Radio Networks, IEEE INFOCOM 2013. Demo/Poster Session, Turin, Italy, April 14-19, 2013.
  7. eiqing Li, Shouling Ji, and Raheem Beyah, ShareSafe: the Complete Collection of Tools for Graph Data Privacy Analysis, ACSAC 2015 poster session.
  8. Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah, Effectiveness and Soundness of Commercial Password Strength Meters, NDSS 2015, San Diego, California, USA, February 8-11, 2015.
  9. houling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, Xin Hu, and Raheem Beyah, Password Cracking: A Large-Scale Empirical Study, USENIX Security 2014 poster session, San Diego, CA, USA, August 20-22, 2014.
  10. Shouling Ji, Weiqing Li, Jing (Selena) He, Mudhakar Srivatsa, and Raheem Beyah, Optimization based Data De-anonymization, IEEE S&P 2014 poster session, San Jose, California, USA, May 18-21, 2014.
  11. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, and Raheem Beyah, De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information, NDSS 2014, Poster Session, San Diego, California, USA, February 23-26, 2014.
  12. Shouling Ji, Mingyuan Yan, Yueming Duan, Jing (Selena) He, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling for Cognitive Radio Networks, IEEE INFOCOM 2013, Demo/Poster Session, Turin, Italy, April 14-19, 2013.

DISSERTATION

  1. Shouling Ji, EVALUATING THE SECURITY OF ANONYMIZED BIG GRAPH/STRUCTURAL DATA (2015), Georgia Institute of Technology.
  2. Shouling Ji, DATA COLLECTION AND CAPACITY ANALYSIS IN LARGE-SCALE WIRELESS SENSOR NETWORKS, (2013). Computer Science Dissertations. Paper 76.

BOOK CHAPTERS

  1. Shouling Ji, Jing (Selena) He, and Zhipeng Cai, “Data Gathering in Wireless Sensor Networks”, The Art of Wireless Sensor Networks Volume 1: Fundamentals, (Signals and Communications Technology Series), edited by Habib M. Ammari, Springer, January, 2014.
  2. Shouling Ji, Jing (Selena) He, and Yingshu Li, Optimizing Data Collection Capacity of Wireless Sensor Networks, Handbook of Combinatorial Optimization, 2nd Edition (edited by P. Pardalos, D.-Z. Du, and R. Graham), Springer, 2012.
  3. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Reliable Minimum Connected Dominating Sets for Topology Control in Probabilistic Wireless Sensor Networks, Scalable Computing: Theory and Practice (edited by S. U. Khan, L. Wang, and A. Y. Zomaya), John Wiley & Sons, 2012.