Technical Blogs

[2] Managing DeepSeek Traffic with Palo Alto Networks App-IDs

Jiangnan Li, Rakshith Shetty, Amy Fang

Palo Alto Networks LIVECommunity Blog

[1] Securing and Managing ChatGPT Traffic with Palo Alto Networks App-ID

Cecilia Hu, Jiangnan Li, Qi Deng

Palo Alto Networks Blogs

Conference Papers

[6] LightSentinel: A Lightweight Anomaly Detection System Leveraging Smart Devices

Yingyuan Yang, Xueli Huang, Sunshin Lee, Jiangnan Li

IEEE Globecom 2024 [Paper]

[5] Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Detection in Power Grids

Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi

IEEE ICCCN 2023 [Paper]

[4] ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi

ACM AsiaCCS 2021 [Paper]

[3] SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection

Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun

IEEE SmartGridComm 2020 [Paper]

[2] A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

Jiangnan Li, Xiangyu Niu, Jinyuan Stella Sun

IEEE ICC 2019 [Paper]

[1] Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning

Xiangyu Niu, Jiangnan Li, Jinyuan Stella Sun, Kevin Tomsovic

IEEE ISGT 2019 [Paper]

Journal Papers

[2] EchoIA: Implicit Authentication System Based on User Feedback

Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Stella Sun

Network [Paper]

[1] BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Stella Sun

IEEE Transactions on Mobile Computing [Paper]

Technical Posters

[3] SmartBullets: A Cloud-Assisted Bullet Screen Filter based on Deep Learning

Haoran Niu, Jiangnan Li, Yu Zhao

IEEE ICCCN 2020 [Poster]

[2] Vulnerability Assessment of PV Inverter IoT Devices

Jiangnan Li, Jin Young Lee, Jinyuan Stella Sun, Kevin Tomsovic

CURENT 2019 Industry Day and NSF/DOE Site Visit [PDF]

[1] Synchronized Bad Data Injection Attack through PMUs on HTB

Jiangnan Li, Xiangyu Niu, Jinyuan Stella Sun

CURENT 2018 Industry Day and NSF/DOE Site Visit [PDF]