Selected Publication (Full Publication)--- By Year, By Type

2025

  1. Boyu Chang, Binbin Zhao, Qiao Zhang, Peiyu Liu, Yuan Tian, Raheem Beyah, and Shouling Ji, FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization, IEEE S&P 2025. [PDF] [Github]
  2. Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, and Shouling Ji, CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models, NDSS 2025. [PDF] [Github]
  3. Zhenyu Wen, Wanglei Feng, Di Wu, Haozhen Hu, Chang Xu, Bin Qian, Zhen Hong, Cong Wang, and Shouling Ji, FLMarket: Enabling Privacy-preserved Pre-training Data Pricing for Federated Learning, KDD 2025.
  4. Jiahao Chen, Zhou Feng, Rui Zeng, Yuwen Pu, Chunyi Zhou, Yi Jiang, Yuyou Gan, Jinbao Li, and Shouling Ji, Enhancing Adversarial Transferability with Adversarial Weight Tuning, AAAI 2025.
  5. Tong Ye, Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji, and Wenhai Wang, Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting, AAAI 2025.
  6. Xing He, Jiahao Chen, Yuwen Pu, Qingming Li, Chunyi Zhou, Yingcai Wu, Jinbao Li, and Shouling Ji, CAMH: Advancing Model Hijacking Attack in Machine Learning, AAAI 2025.

2024

  1. Mingqi Lv, Hongzhe Gao, Xuebo Qiu, Tieming Chen, Tiantian Zhu, Jinyin Chen, and Shouling Ji, TREC: APT Tactic/Technique Recognition via Few-Shot Provenance Subgraph Learning, ACM CCS 2024. [PDF]
  2. Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, and Shouling Ji, SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems, ACM CCS 2024. [PDF] [Slides] [Github]
  3. Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Renyi Cai, and Qinming He, Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences, USENIX Security 2024. [PDF] [Slides]
  4. Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, and Wenhai Wang, Exploring ChatGPT’s Capabilities on Vulnerability Management, USENIX Security 2024. [PDF] [Slides]
  5. Dinghao Liu, Shouling Ji, Kangjie Lu, and Qinming He, Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis, USENIX Security 2024. [PDF] [Slides]
  6. Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, and Yanjun Wu, A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild, USENIX Security 2024.
  7. Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Xiao Xiao, Hong Liang, Jiacheng Xu, and Wenhai Wang, Critical Code Guided Directed Greybox Fuzzing for Commits, USENIX Security 2024.
  8. Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, and Ting Wang, On Defending Contrastive Learning against Backdoor Attacks, USENIX Security 2024.
  9. Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah, SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices, IEEE S&P 2024. [PDF] [Slides] [Github]
  10. Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, and Ting Wang, Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention, NDSS 2024. [PDF] [Slides] [Github]
  11. Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, and Jiming Chen, MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency, NDSS 2024.
  12. Linkang Du, Zhikun Zhang, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, and Jiming Chen, ORL-Auditor: Dataset Auditing in Offline Deep Reinforcement Learning, NDSS 2024. [PDF] [Slides]
  13. Yang Dai, Oubo Ma, Longfei Zhang, Xingxing Liang, Shengchao Hu, Mengzhu Wang, Shouling Ji, Jincai Huang, and Li Shen, Is Mamba Compatible with Trajectory Optimization in Offline Reinforcement Learning?, NeurIPS 2024.
  14. Dazhen Deng, Chuhan Zhang, Huawei Zheng, Yuwen Pu, Shouling Ji, and Yingcai Wu, AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow, IEEE VIS 2024.
    * Honorable Mention Award
  15. Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, and Long Liu, Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment, ISSTA 2024.
  16. Han Bao, Xuhong Zhang, Qinying Wang, KangMing Liang, Zonghui Wang, Shouling Ji, and Wenzhi Chen, Pluggable Watermarking of Deepfake Models for Deepfake Detection, IJCAI 2024. [PDF] [Github]
  17. Zeyu Li, Yuwen Pu, Xuhong Zhang, Yu LI, Jinbao Li, and Shouling Ji, Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage, IJCAI 2024. [PDF] [Slides]
  18. YunRuo Zhang,Lujia Shen,Shanqing Guo, and Shouling Ji, GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers, AAAI 2024.
  19. Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, and Shouling Ji, Integer is Enough: When Vertical Federated Learning Meets Rounding, AAAI 2024. [PDF] [Slides]
  20. Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, and Lei Yang, Let All be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval, AAAI 2024. [PDF] [Slides] [Github]
  21. Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, and Shouling Ji, AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection, AAAI 2024.
  22. Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, and Yanchun Zhang, Enhancing Transferability of Adversarial Examples through Mixed-Frequency Inputs, IEEE Transactions on Information Forensics & Security (TIFS), 2024.
  23. Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, and Chunming Wu, AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service, IEEE Transactions on Information Forensics & Security (TIFS), 2024.
  24. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, and Ting Wang, HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning, IEEE Transactions on Information Forensics & Security (TIFS), 2024. [PDF]
  25. Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, and Jiming Chen, VERIFI: Towards Verifiable Federated Unlearning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  26. Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, and Shouling Ji, EdgePro: Edge Deep Learning Model Protection via Neuron Authorization, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  27. Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, and Wenzhi Che, Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  28. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, and Ting Wang, Hijack Vertical Federated Learning Models As One Party, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024. [PDF]
  29. Chenghui Shi, Shouling Ji, Xudong Pan, Xuhong Zhang, Mi Zhang, Min Yang, Jun Zhou, Jianwei Yin, and Ting Wang, Towards Practical Backdoor Attacks on Federated Learning Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
  30. 王琴应, 许嘉诚, 李宇薇, 潘祖烈, 张玉清, 张超, 纪守领, 智能模糊测试综述:问题探索和方法分类, 计算机学报, 2024. [PDF]

2023

  1. Ping He, Yifan Xia, Xuhong Zhang, and Shouling Ji, Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting, ACM CCS 2023. [PDF] [Github]
  2. Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, and Zhiniang Peng, Detecting Union Type Confusion in Component Object Model, USENIX Security 2023. [PDF] [Slides]
  3. Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, and Ting Wang, On the Security Risks of Knowledge Graph Reasoning, USENIX Security 2023. [PDF]
  4. Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, and Raheem Beyah, UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware, USENIX Security 2023. [PDF]
  5. Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, and Jianwei Yin, FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases, USENIX Security 2023. [PDF] [Github]
  6. Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, and Raheem Beyah, MINER: A Hybrid Data-Driven Approach for REST API Fuzzing, USENIX Security 2023. [PDF] [Github]
  7. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, and Wenzhi Chen, How IoT Recycling Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices, IEEE S&P 2023. [PDF]
  8. Tianyu Du, Zhaohan Xi, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, and Ting Wang, Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks, NeurIPS 2023.
  9. Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, and Ting Wang, An Embarrassingly Simple Backdoor Attack on Self-supervised Learning, ICCV 2023.
  10. Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, and Ting Wang, The Dark Side of AutoML: Towards Architectural Backdoor Search, ICLR 2023.
  11. Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, and Shouling Ji, URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing, IEEE Transactions on Information Forensics & Security (TIFS), 2023.
  12. Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, and Yanjun Wu, Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art, Computers & Security, 2023.
  13. Hui Sun, Tianqing Zhu, Jie Li, Shouling Ji, and Wanlei Zhou, Attribute-based Membership Inference Attacks and Defenses on GANs, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
  14. Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, and Peng Lin, G-Fuzz: A Directed Fuzzing Framework for gVisor, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023. [Github]
  15. Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Reheem Beyah, One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware, IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.

2022

  1. Qingyang Zhou, Qiushi Wu, Dinghao Liu, Shouling Ji, and Kangjie Lu, Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs, ACM CCS 2022. [PDF] [Github]
  2. Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, and Ting Wang, ''Is your explanation stable?'': A Robustness Evaluation Framework for Feature Attribution, ACM CCS 2022. [PDF] [Github]
  3. Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, and Ting Wang, Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era, USENIX Security 2022. [PDF] [Slides]
  4. Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, and Ting Wang, On the Security Risks of AutoML, USENIX Security 2022. [PDF]
  5. Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, and Ting Wang, Label Inference Attacks Against Vertical Federated Learning, USENIX Security 2022. [PDF] [Slides] [Github]
  6. Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, and Ting Wang, Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings, IEEE S&P 2022. [PDF] [Slides] [Github]
  7. Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, and Dawn Song, Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models, IEEE S&P 2022. [PDF]
  8. Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Reheem Beyah, EMS: History-Driven Mutation for Coverage-based Fuzzing, NDSS 2022. [PDF] [Slides] [Github]
  9. Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah, SLIME: Program-sensitive Energy Allocation for Fuzzing, ISSTA 2022. [PDF] [Slides] [Github]
  10. Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Raheem Beyah, A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware, ISSTA 2022. [PDF] [Slides] [Github]
  11. Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, and Ting Wang, TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors, Euro S&P 2022. [PDF] [Github]
  12. Xiang Ling, Lingfei Wu, Wei Deng, Sheng Zhang, Zhenqing Qu, Jiangyu Zhang, Tengfei Ma, Bin Wang, Chunming Wu, and Shouling Ji, MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection, IEEE INFOCOM 2022. [PDF]
  13. Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, and Jinyin Chen, NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification, ICSE 2022.
  14. Tieming Chen, Chengyu Dong, Mingqi Lv, Qijie Song, Haiwen Liu, Tiantian Zhu, Kang Xu, Ling Chen, and Shouling Ji, APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  15. Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, and Ting Wang, Your Labels Are Selling You Out: Relation Leaks in Vertical Federated Learning, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  16. 纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿, 吴敬征, 李昀, 尹建伟, 武延军, 开源软件供应链安全研究综述, 软件学报, 2022. [PDF]
  17. Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, and Zhen Hong, EfficientTDNN: Efficient Architecture Search for Speaker Recognition, IEEE Transactions on Audio, Speech, and Language Processing (TASLP), 2022. [PDF]
  18. Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, and Raheem Beyah, Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.
  19. Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, and Li Cheng, Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction, IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), 2022.
  20. Yiming Wu, Qianjun Liu, Xiaojing Liao, Shouling Ji, Peng Wang, Xiaofeng Wang, Chunming Wu, and Zhao Li, Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures OF E-Commerce Cyber Threat Intelligence, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022.

2021

  1. Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, and Ting Wang, Backdoor Pre-trained Models Can Transfer to All, ACM CCS 2021. [PDF] [Slides]
  2. Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, and Qinming He, Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths, ACM CCS 2021. [PDF] [Slides]
  3. Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, and Yanjun Wu, CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels, ACM CCS 2021. [PDF] [Slides]
  4. Gaoning Pan, Xingwei Lin, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, Xinlei Ying, Jiashui Wang, and Yanjun Wu, V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing, ACM CCS 2021. [PDF] [Slides]
    * Best Paper Award
  5. Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, and Jiming Chen, AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy, ACM CCS 2021. [PDF] [Slides]
  6. Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, and Ting Wang, Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks, ACM CCS 2021. [PDF] [Slides]
  7. Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah, MPInspector: A Systematic and Automatic Approach for Evaluating the Security of Iot Messaging Protocols, USENIX Security 2021. [PDF] [Slides]
  8. Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang, Graph Backdoor, USENIX Security 2021. [PDF] [Slides] [Github]
  9. Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang, UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, USENIX Security 2021. [PDF] [Slides] [Github]
  10. Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, and Raheem Beyah, iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware, ASE 2021. [PDF] [Slides]
  11. Zhenguang Liu, Peng Qian, Xiang Wang, Lei Zhu, Qinming He, and Shouling Ji, Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion, IJCAI 2021.
  12. Zhenguang Liu, Haoming Chen, Runyang Feng, Shuang Wu, Shouling Ji, Bailin Yang, and Xun Wang, Deep Dual Consecutive Network for Human Pose Estimation, CVPR 2021.
  13. Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, and Liming Fang, Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining, ICDE 2021. [PDF]
  14. Zhenguang Liu, Kedi Lyu, Shuang Wu, Haipeng Chen, Yanbin Hao, and Shouling Ji, Aggregated Multi-GANs for Controlled 3D Human Motion Prediction, AAAI 2021. [PDF]
  15. Xinyang Zhang, Pang Ren, Shouling Ji, Fenglong Ma, and Ting Wang, i-Algebra: Towards Interactive Interpretability of Deep Neural Networks, AAAI 2021. [PDF]
  16. Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, and Ting Wang, Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021. [PDF]
  17. Jianfeng Dong, Zhe Ma, Xiaofeng Mao, Xun Yang, Yuan He, Richang Hong, and Shouling Ji, Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning, IEEE Transactions on Image Processing (TIP), 2021. [Slides]
  18. Shuiguang Deng, Yishan Chen, Gong Chen, Shouling Ji, Jianwei Yin, and Albert Y. Zomaya, Incentive-driven Proactive Application Deployment and Pricing on Distributed Edges, IEEE Transactions on Mobile Computing (TMC), 2021.
  19. Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu Bourgeois, and Raheem Beyah, This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems, IEEE Transactions on Dependable and Secure Computing (TDSC), 2021.
  20. Qianjun Liu, Shouling Ji, Changchang Liu, and Chunming Wu, A Practical Black-box Attack on Source Code Authorship Identification Classifiers, IEEE Transactions on Information Forensics & Security (TIFS), 2021. [PDF]
  21. Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang, Adversarial CAPTCHAs, IEEE Transactions on Cybernetics (TCYB), 2021. [PDF]
  22. 纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博, 深度学习模型鲁棒性研究综述, 计算机学报, 2021. [PDF]

2020

  1. Hanlu Wu, Tengfei Ma, Lingfei Wu, Tariro Manyumwa and Shouling Ji, Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning, EMNLP 2020. [PDF]
  2. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah, Understanding the Security Risks of Docker Hub, ESORICS 2020. [PDF]
  3. Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo and Ting Wang, AdvMind: Inferring Adversary Intent of Black-Box Attacks, KDD 2020. [PDF]
  4. Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, and Ting Wang, Text Captcha Is Dead? A Large Scale Deployment and Empirical Study, ACM CCS 2020. [PDF]
  5. Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, and Ting Wang, A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models, ACM CCS 2020. [PDF]
  6. Xudong Pan, Mi Zhang, Shouling Ji, and Min Yang, Privacy Risks of General-Purpose Language Models, IEEE S&P (Oakland) 2020. [PDF]
  7. Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, and Min Yang, Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent, USENIX Security 2020. [PDF]
  8. Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang, TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation, USENIX Security 2020. [PDF]
  9. Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, Ting Wang, Interpretable Deep Learning under Fire, USENIX Security 2020. [PDF] arXiv:1812.00891
  10. Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah, SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, ASIACCS 2020. [PDF]
  11. Zhao Li, Chenyi Lei, Pengcheng Zou, Donghui Ding, Shichang Hu, Zehong Hu, Shouling Ji and Jianliang Gao, Attention with Long-term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors, DASFAA 2020. [PDF]
  12. Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, De-Health: All Your Online Health Information Are Belong to Us, ICDE 2020. [PDF] arXiv:1902.00717
  13. Zhe Ma, Jianfeng Dong, Yao Zhang, Zhongzi Long, Yuan He, Hui Xue and Shouling Ji, Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network, AAAI 2020. [PDF]
  14. Binbin Zhao, Shouling Ji, Wei-han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang and Raheem Beyah, A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2020. [PDF]
  15. 李旭嵘,纪守领,吴春明,刘振广,邓水光,程鹏,杨珉,孔祥维, 深度伪造与检测技术综述, 软件学报, 2020. [PDF]
  16. Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, and Raheem Beyah, V-Fuzz: Vulnerability Prediction Assisted Evolutionary Fuzzing for Binary Programs, IEEE Transactions on Cybernetics, 2020. [PDF] [Slides] (IF: 11.079)
  17. Mingqi Lv, Zhaoxiong Hong, Ling Chen, Tieming Chen, Tiantian Zhu and Shouling Ji, Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction, IEEE Transactions on Intelligent Transportation Systems (TITS), 2020. [PDF]
  18. Jianhai Chen, Deshi Ye, Zhenguang Liu, Shouling Ji, Qinming He, and Yang Xiang, A Truthful and Near-optimal Mechanism for Colocation Emergency Demand Response, IEEE Transactions on Mobile Computing (TMC), 2020. [PDF]
  19. Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang, AsgLDP: Collecting and Generating Decentralized Attributed Graphs with Local Differential Privacy, IEEE Transactions on Information Forensics & Security (TIFS), 2020. [PDF]
  20. Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, and Zehong Cao, HandiText: Handwriting Recognition based on Dynamic Characteristics with Incremental LSTM, ACM Transactions on Data Science (TDS), 2020.
  21. 纪守领, 杜天宇, 李进锋, 沈超, 李博, 机器学习模型安全与隐私研究综述, 软件学报, 2020. [PDF]

2019

  1. Xu Duan, Jingzheng Wu, Shouling Ji, Zhiqing Rui , Tianyue Luo , Mutian Yang and Yanjun Wu, VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities, IJCAI 2019. [PDF] (Acceptance ratio: 850/4752 = 17.9%)
  2. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song and Raheem Beyah, MOpt: Optimized Mutation Scheduling for Fuzzers, USENIX Security 2019. [PDF] [Github]
  3. Lingfei Wu, Ian En-Hsu Yen, Siyu Huo, Liang Zhao, Kun Xu, Liang Ma, Shouling Ji and Charu Aggarwal, Efficient Global String Kernel with Random Features: Beyond Counting Substructures, KDD 2019. [PDF]
  4. Jianfeng Dong, Xirong Li, Chaoxi Xu, Shouling Ji, Yuan He, Gang Yang and Xun Wang, Dual Encoding for Zero-Example Video Retrieval, CVPR 2019. [PDF]
  5. Chenyi Lei, Zhao Li and Shouling Ji, TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors, WWW 2019. [PDF]
  6. Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He and Ting Wang, CATS: Cross-Platform E-commerce Fraud Detection, ICDE 2019. [PDF]
  7. Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu, A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers, IEEE INFOCOM 2019. [PDF] (Acceptance ratio: 288/1464=19.7%)
  8. Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li and Ting Wang, DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Models, IEEE S&P (Oakland) 2019. [PDF]
  9. Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, and Ting Wang, TextBugger: Generating Adversarial Text Against Real-world Applications, NDSS 2019. [PDF] (Acceptance ratio: 89/521 = 17.08%)
  10. 纪守领, 李进锋, 杜天宇, 李博, 机器学习模型可解释性方法、应用与安全研究综述, 计算机研究与发展, 2019. [PDF]
  11. Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, Raheem Beyah, OB-WSPES: A Uniform Evaluation System for Obfuscation-based Web Search Privacy, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF] GitHub
  12. 陈宇飞, 沈超, 王骞, 李琦, 王聪, 纪守领, 李康, 管晓宏, 人工智能系统安全与隐私风险, 计算机研究与发展, 2019. [PDF]
  13. Xurong Li, Shouling Ji, Meng Han, Juntao Ji, Zhenyu Ren, Yushan Liu, and Chunming Wu, Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF] arXiv:1901.01223
  14. Zhenyu Wen, Tao Lin, Renyu Yang, Shouling Ji, Rajiv Ranjan, Alexander Romanovsky, Changting Lin, and Jie Xu, GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2019. [PDF]
  15. Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, and Ruiying Du, Dynamic Group-Oriented Provable Data Possession in the Cloud, IEEE Transactions on Dependable and Secure Computing (TDSC), 2019. [PDF]
  16. Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Fast-RCM: Fast Tree based Unsupersived Rare Class Mining, IEEE Transactions on Cybernetics, 2019. [PDF] (IF: 10.387)
  17. Xuhong Zhang, Jun Wang, Shouling Ji, Jiangling Yin, Rui Wang, Xiaobo Zhou and Changjun Jiang, An I/O Efficient Distributed Approximation Framework Using Cluster Sampling, IEEE Transactions on Parallel and Distributed Systems (TPDS), 2019. [PDF]

2018

  1. Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, and Ting Wang, Model-Reuse Attacks on Learning Systems, ACM CCS 2018. [PDF]
  2. Haiqin Weng, Zhao Li, Shouling Ji, Chen Chu, Haifeng Lu, Tianyu Du, and Qinming He, Online E-Commerce Fraud: A Large-scale Detection and Analysis, ICDE 2018. [PDF]
  3. Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, and Raheem Beyah, Quantifying Graph Anonymity, Utility, and De-anonymity, IEEE INFOCOM 2018. [PDF]
  4. Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, and Ruiying Du, CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections, IEEE INFOCOM 2018. [PDF]
  5. Mutian Yang, Jingzheng Wu, Shouling Ji, Tianyue Luo, and Yanjun Wu, Pre-Patch: Find Hidden Threats in Open Software based on Machine Learning Method, SCF 2018. [PDF]
    * Best Paper Award
  6. Ningfei Wang, Shouling Ji and Ting Wang, Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization, AISec 2018. [PDF]
    * Best Paper Award
  7. Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He and Raheem Beyah, Towards Evaluating the Security of Image CAPTCHA in the Wild, AISec 2018. [PDF]
  8. Zhen Hong, Rui Wang, Shouling Ji, and Raheem Beyah, Attacker Location Evaluation-based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems, IEEE Transactions on Information Forensics & Security (TIFS), 2018. [PDF]
  9. Xiang Ling, Shouling Ji, and Kui Ren, Adversarial Example Attacks and Defenses of Deep Learning Systems, Communications of the CCF Vol. 14, No. 6, pp. 11 - 16, June, 2018. [PDF] 面向深度学习系统的对抗样本攻击与防御 (in Chinese)

2017

  1. Jingzheng Wu, Tianyue Luo, Shouling Ji, Mei Liu, and Mutian Yang, LaChouTi: Kernel Vulnerability Responding Framework for the Fragmented Android Devices, FSE/ESEC 2017. [PDF]
  2. Xinyang Zhang, Shouling Ji, HuiWang and Ting Wang, Private, yet Practical, Multiparty Deep Learning, ICDCS 2017. [PDF] (Acceptance ratio: 90/531 = 16.95%)
  3. Jingzheng Wu, Shen Liu, Shouling Ji, Mutian Yang, Yanjun Wu, Yongji Wang and Tianyue Luo, Exception Beyond Exception: Crashing Android System by Trapping in "Uncaught Exception", ICSE 2017. [PDF]
  4. Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, and Raheem Beyah, Password Correlation: Quantification, Evaluation and Application, IEEE INFOCOM 2017. [PDF] (Acceptance ratio: 292/1,395 = 20.9%)
  5. Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem Beyah, Fingerprinting for Cyber Physical System Security: Device Physics Matters Too, IEEE Security & Privacy. [PDF] 2017
  6. Shukun Yang, Shouling Ji, and Raheem Beyah, DPPG: A Dynamic Password Policy Generation System, IEEE Transactions on Information Forensics & Security (TIFS). [PDF] 2017
  7. Shouling Ji, Weiqing Li, Prateek Mittal, and Raheem Beyah, De-SAG: On the De-anonymization of Structure-Attribute Graph Data, IEEE Transactions on Dependable and Secure Computing (TDSC). [PDF] 2017

2016

  1. Yushan Liu, Shouling Ji, and Prateek Mittal, SmartWalk: Enhancing Social Network Security via Adaptive Random Walks, ACM CCS 2016. [PDF] (Acceptance ratio: 137/831 = 16.5%)
  2. Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, and Teryl Taylor, BotMeter: A Nimble Navigator for DGA-Botnet Landscape, ICDCS 2016. [PDF] (Acceptance ratio: 68/386 = 17.6%)
  3. Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah, On the Relative De-anonymizability of Graph Data: Quantification and Evaluation, IEEE INFOCOM 2016. [PDF] (Acceptance ratio: 300/1,644 = 18.25%)
    * IEEE INFOCOM 2016 Best-in-Session Presentation Award
  4. Shouling Ji, Prateek Mittal, and Raheem Beyah, Graph Data Anonymization, De-anonymization Attacks, and De-anonymizability Quantification: A Survey, IEEE Communications Surveys & Tutorials (COMST), 2016. [PDF] (Impact Factor = 22.973)
  5. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, General Graph Data De-anonymization: From Mobility Traces to Social Networks, ACM Transactions on Information and System Security (TISSEC). [PDF] 2016
  6. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Theory and Practice, IEEE/ACM Transactions on Networking (ToN). [PDF] 2016

2015

  1. Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-han Lee, and Raheem Beyah, PARS: A Uniform and Open-source Password Analysis and Research System, ACSAC 2015. (Acceptance ratio: 47/193 = 24.4%)
    * PARS Project
    * The IISP Demo Day Spring'16 Finalist
  2. Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah, SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization, USENIX Security 2015. (Acceptance ratio: 67/426 = 15.7%)
  3. Shouling Ji, Zhipeng Cai, Meng Han, and Raheem Beyah, Primary Social Behavior based Joint Routing and Scheduling for Cognitive Radio Networks, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  4. Shouling Ji, Zhipeng Cai, Jing (Selena) He, and Raheem Beyah, Whitespace Analysis and Virtual Backbone Construction in Cognitive Radio Networks: A Social Networking Perspective, IEEE SECON 2015. (Acceptance ratio: 55/194 = 28%)
  5. Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, and Raheem Beyah, On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge, NDSS 2015. San Diego, California, USA, February 8-11, 2015. (Acceptance ratio: 50/305 = 16.4%)
  6. Shouling Ji, Weiqing Li, Neil Gong, Prateek Mittal, and Raheem Beyah, Seed based De-anonymizability Quantification of Social Networks, IEEE Transactions on Information Forensics & Security (TIFS). 2015.
  7. Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah, Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords, IEEE Transactions on Dependable and Secure Computing (TDSC). 2015.
  8. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks, IEEE Transactions on Mobile Computing (TMC). 2015.
  9. Weiqing Li, Shouling Ji, and Raheem Beyah, ShareSafe: the Complete Collection of Tools for Graph Data Privacy Analysis, ACSAC 2015. poster session.
  10. Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah, Effectiveness and Soundness of Commercial Password Strength Meters, NDSS 2015. San Diego, California, USA, February 8-11, 2015.

2014

  1. Shouling Ji, Weiqing Li, M. Srivatsa, and Raheem Beyah, Structural Data De-anonymization: Quantification, Practice, and Implications, ACM CCS 2014. Scottsdale, Arizona, USA, November 3-7, 2014. (Acceptance ratio: 114/585 = 19.5%)
  2. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah, Structure based Data De-anonymization of Social Networks and Mobility Traces, ISC 2014. Hong Kong, October 12-14, 2014. (Acceptance ratio: 20/106 = 18.9%)
  3. Jing (Selena) He, Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-sized Influential Node Set Selection for Social Networks under the Independent Cascade Model, ACM MOBIHOC 2014. Philadelphia, PA, USA, August 11-14, 2014. (Acceptance ratio: 40/211 = 18.9%)
  4. Mingyuan Yan, Shouling Ji, Meng Han, Yingshu Li, and Zhipeng Cai, Data Aggregation Scheduling in Wireless Networks with Cognitive Radio Networks, IEEE SECON 2014. Singapore, June 30-July 3, 2014. (Acceptance ratio: 68/235 = 28.9%)
  5. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling with Latency and Redundancy Analysis for Cognitive Radio Networks, IEEE Transactions on Vehicular Technology (TVT). 2014.
  6. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks, IEEE Transactions on Mobile Computing (TMC). Vol. 13, No. 3, pp(s): 626-637, 2014.
  7. Meng Han, Mingyuan Yan, Jinbao Li, Shouling Ji, and Yingshu Li, Neighborhood-based Uncertainty Generation in Social Networks, Journal of Combinatorial Optimization (JCO). Vol. 28, pp(s): 561-576, 2014.
  8. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 25, No. 7, pp(s): 1681-1690, 2014.
  9. Zhipeng Cai, Shouling Ji, Jing (Selena) He, Lin Wei, and Anu G. Bourgeois, Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 25, No. 8, pp(s): 2020-2029, 2014.
  10. Shouling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, Xin Hu, and Raheem Beyah, Password Cracking: A Large-Scale Empirical Study, USENIX Security 2014. poster session, San Diego, CA, USA, August 20-22, 2014.
  11. Shouling Ji, Weiqing Li, Jing (Selena) He, Mudhakar Srivatsa, and Raheem Beyah, Optimization based Data De-anonymization, IEEE S&P 2014. poster session, San Jose, California, USA, May 18-21, 2014.
  12. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, and Raheem Beyah, De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information, NDSS 2014. Poster Session, San Diego, California, USA, February 23-26, 2014.

2013

  1. Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai, Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks, IEEE MASS 2013. Hangzhou, China, October 14-16, 2013. (Acceptance ratio: 55/186 = 29.6%)
  2. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks, IEEE SECON 2013. New Orleans, USA, June 24-27, 2013. (Acceptance ratio: 51/280 = 18.2%)
  3. Jing (Selena) He, Shouling Ji, Yi Pan, and Zhipeng Cai, Approximation Algorithms for Load-Balanced Virtual Backbone Construction in Wireless Sensor Networks, Theoretical Computer Science (TCS). Vol. 507, pp(s): 2-16, October 2013.
  4. Shouling Ji and Zhipeng Cai, Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks under the Generalized Physical Interference Model, IEEE/ACM Transactions on Networking (ToN). Vol. 21, No. 4, pp(s): 1270-1283, August 2013.
  5. Shouling Ji, Jing (Selena) He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li, Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN). Vol. 9, No. 4, July 2013.
  6. Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, Zhipeng Cai, Practical Unicast and Convergecast Scheduling Schemes for Cognitive Radio Networks, Journal of Combinatorial Optimization (JCO). Vol. 26, No. 1, pp(s): 161-177, 2013.
  7. Shouling Ji, Jing (Selena) He, Yi Pan, and Yingshu Li, Continuous Data Aggregation and Capacity in Probabilistic Wireless Sensor Netwroks, Journal of Parallel and Distributed Computing (JPDC). Vol. 73, No. 6, pp(s): 729-745, 2013.
  8. Shouling Ji, Mingyuan Yan, Yueming Duan, Jing (Selena) He, Raheem Beyah, and Zhipeng Cai, Broadcast Scheduling for Cognitive Radio Networks, IEEE INFOCOM 2013. Demo/Poster Session, Turin, Italy, April 14-19, 2013.

2012

  1. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks, IEEE MSN 2012. Chengdu, China, December 14-16, 2012.
    * Best Paper Award
  2. Zhipeng Cai, Shouling Ji, Jing (Selena) He, and Anu G. Bourgeois, Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks, ICDCS 2012. Macau, China, June 18-21, 2012. (Acceptance ratio: 71/515 = 13.8%)
  3. Shouling Ji, Raheem Beyah, and Zhipeng Cai, Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks, IEEE INFOCOM 2012. Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  4. Shouling Ji and Zhipeng Cai, Distributed Data Collection and Its Capacity in Asynchronous Wireless Sensor Networks, IEEE INFOCOM 2012. Orlando, Florida USA, March 25-30, 2012. (Acceptance ratio: 278/1547 = 18%)
  5. Shouling Ji, Zhipeng Cai, Yingshu Li, and Xiaohua Jia, Continuous Data Collection Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems (TPDS). Vol. 23, No. 10, pp(s): 1844-1855, October 2012.

2011

  1. Shouling Ji, Raheem Beyah, Yingshu Li, Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model, IEEE MASS 2011. Valencia, Spain, October 17-22, 2011.(Acceptance ratio: 49/256 = 19.1%)
  2. Shouling Ji, Yingshu Li, and Xiaohua Jia, Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection, IEEE INFOCOM 2011. Shanghai, China, April 10-15, 2011. (Acceptance ratio: 291/1823 = 16%)



DISSERTATION

  1. Shouling Ji, EVALUATING THE SECURITY OF ANONYMIZED BIG GRAPH/STRUCTURAL DATA (2015), Georgia Institute of Technology.
  2. Shouling Ji, DATA COLLECTION AND CAPACITY ANALYSIS IN LARGE-SCALE WIRELESS SENSOR NETWORKS, (2013). Computer Science Dissertations . Paper 76.

BOOK CHAPTERS

  1. Shouling Ji, Jing (Selena) He, and Zhipeng Cai, “ Data Gathering in Wireless Sensor Networks”, The Art of Wireless Sensor Networks Volume 1: Fundamentals, (Signals and Communications Technology Series), edited by Habib M. Ammari, Springer, January, 2014.
  2. Shouling Ji, Jing (Selena) He, and Yingshu Li, Optimizing Data Collection Capacity of Wireless Sensor Networks, Handbook of Combinatorial Optimization, 2nd Edition (edited by P. Pardalos, D.-Z. Du, and R. Graham), Springer, 2012.
  3. Jing (Selena) He, Shouling Ji, Yi Pan, and Yingshu Li, Reliable Minimum Connected Dominating Sets for Topology Control in Probabilistic Wireless Sensor Networks, Scalable Computing: Theory and Practice (edited by S. U. Khan, L. Wang, and A. Y. Zomaya), John Wiley & Sons, 2012.