Technical Blogs
[2] Managing DeepSeek Traffic with Palo Alto Networks App-IDs
Jiangnan Li, Rakshith Shetty, Amy Fang
Palo Alto Networks LIVECommunity Blog
[1] Securing and Managing ChatGPT Traffic with Palo Alto Networks App-ID
Cecilia Hu, Jiangnan Li, Qi Deng
Conference Papers
[6] LightSentinel: A Lightweight Anomaly Detection System Leveraging Smart Devices
Yingyuan Yang, Xueli Huang, Sunshin Lee, Jiangnan Li
[5] Towards Adversarial-Resilient Deep Neural Networks for False Data Injection Detection in Power Grids
Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
[4] ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems
Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
[3] SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection
Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun
IEEE SmartGridComm 2020 [Paper]
[2] A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
Jiangnan Li, Xiangyu Niu, Jinyuan Stella Sun
[1] Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning
Xiangyu Niu, Jiangnan Li, Jinyuan Stella Sun, Kevin Tomsovic
Journal Papers
[2] EchoIA: Implicit Authentication System Based on User Feedback
Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Stella Sun
[1] BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems
Yingyuan Yang, Xueli Huang, Jiangnan Li, Jinyuan Stella Sun
IEEE Transactions on Mobile Computing [Paper]
Technical Posters
[3] SmartBullets: A Cloud-Assisted Bullet Screen Filter based on Deep Learning
Haoran Niu, Jiangnan Li, Yu Zhao
[2] Vulnerability Assessment of PV Inverter IoT Devices
Jiangnan Li, Jin Young Lee, Jinyuan Stella Sun, Kevin Tomsovic
CURENT 2019 Industry Day and NSF/DOE Site Visit [PDF]
[1] Synchronized Bad Data Injection Attack through PMUs on HTB
Jiangnan Li, Xiangyu Niu, Jinyuan Stella Sun