Publications
- Xuejiao Luo, Pengcheng Wei, Wenyin Liu*, Jiahao Cao*, Jiang Li, and Binbin Chen. GM-BFD: A Generalizable Multi-view Framework for Botnet Flow Detection. IEEE International Conference on Computer Communications (INFOCOM), London, United Kingdom, May 19-22, 2025. (CCF A, top conference in Computer Networks)
- Qiyang Song, Heqing Huang, Xiaoqi Jia, Yuanbo Xie, Jiahao Cao. Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection. In Proc. of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 23–28, 2025 (CCF-A, top conference in Network and Information Security)
- Yixiong Ji#, Jiahao Cao#, Qi Li, Yao Liu, Tao Wei, Ke Xu, Jianping Wu. Constructing SDN Covert Timing Channels between Hosts with Unprivileged Attackers. In IEEE/ACM Transactions on Networking (ToN), 2024. (CCF A, top journal in Computer Networks)
- Jiang Li, Jiahao Cao*, Zili Meng, Renjie Xie, Qi Li, Yuan Yang, Mingwei Xu*. RoLL+: Real-time and Accurate Route Leak Locating with AS Triplet Features at Scale. In IEEE/ACM Transactions on Networking (ToN), 2024. (CCF A, top journal in Computer Networks)
- Ziteng Chen, Menghao Zhang, Guanyu Li, Jiahao Cao, Yang Jing, Mingwei Xu, Renjie Xie, He Liu, Fangzheng Jiao, Xiaohe Hu. Paraleon: Automatic and Adaptive Tuning for DCQCN Parameters in RDMA Networks. In the 32nd IEEE International Conference on Network Protocols (ICNP), Charleroi, Belgium, October 28-31, 2024 (CCF-B, full paper acceptance ratio: 50/205=24.4%)
- Renjie Xie, Jiahao Cao*, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu*, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li. Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. In IEEE Transactions on Information Forensics and Security (TIFS), vol. 19, pp. 7659-7673, 2024 (CCF-A, top journal in Network and Information Security)
- Renjie Xie, Jiahao Cao*, Enhuan Dong, Mingwei Xu*, Kun Sun, Qi Li, Licheng Shen, and Menghao Zhang. Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. In Proc. of the 32nd USENIX Security Symposium (USENIX Security), Anaheim, CA, USA, August 2023. (CCF A, top conference in Network and Information Security)
- Zijie Yang#, Jiahao Cao#, Zhuotao Liu, Xiaoli Zhang, Kun Sun and Qi Li. “Good Learning, Bad Performance: A Novel Attack against RL-based Congestion Control Systems.” In IEEE Transactions on Information Forensics & Security (TIFS), vol. 17, pp. 1069-1082, 2022. (CCF A, top journal in Network and Information Security)
- Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, and Yuan Yang. The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. In IEEE/ACM Transactions on Networking (ToN), vol. 31, no. 3, pp. 1416-1431, 2022. (CCF A, top journal in Computer Networks)
- Xu He, Jiahao Cao*, Shu Wang, Kun Sun, Lisong Xu, and Qi Li*. Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks. IEEE International Conference on Computer Communications (INFOCOM), Virtual Conference, May 2-5, 2022. (CCF A, top conference in Computer Networks)
- Renjie Xie#, Jiahao Cao#, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. In IEEE/ACM Transactions on Networking (ToN), vol. 30, no. 5, pp. 2158-2172, 2022. (CCF A, top journal in Computer Networks)
- Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. In Proc. of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2020. (Acceptance Ratio: 17.4%=88/506, CCF A, top conference in Network and Information Security)
- Shu Wang, Jiahao Cao*, Xu He, Kun Sun, and Qi Li*. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. (CCF A, top conference in Network and Information Security)
- Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. In Proc. of the 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, USA, August 2019 (Student Travel Grant, First Round Acceptance Ratio: 9.8%=25/254, Total Acceptance Ratio:15.27%=113/740, CCF A, top conference in Network and Information Security)
Papers in 2025
- Xuejiao Luo, Pengcheng Wei, Wenyin Liu*, Jiahao Cao*, Jiang Li, and Binbin Chen. GM-BFD: A Generalizable Multi-view Framework for Botnet Flow Detection. IEEE International Conference on Computer Communications (INFOCOM), London, United Kingdom, May 19-22, 2025. (CCF A, top conference in Computer Networks)
- Qiyang Song, Heqing Huang, Xiaoqi Jia, Yuanbo Xie, Jiahao Cao. Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection. In Proc. of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 23–28, 2025 (CCF-A, top conference in Network and Information Security)
Papers in 2024
- Yixiong Ji#, Jiahao Cao#, Qi Li, Yao Liu, Tao Wei, Ke Xu, Jianping Wu. Constructing SDN Covert Timing Channels between Hosts with Unprivileged Attackers. In IEEE/ACM Transactions on Networking (ToN), 2024. (CCF A, top journal in Computer Networks)
- Yuxi Zhu, Hanyi Peng, Jiahao Cao*, Renjie Xie, Xinda Wang, Mingwei Xu*, Jianping Wu. Poster: Automatic Network Protocol Fingerprint Discovery with Difference-Guided Fuzzing. In ICNP’24 Posters and Demos, Charleroi, Belgium, October 28-31, 2024
- Yizhi Li, Jiang Li, Jiahao Cao*, Renjie Xie, Yangyang Wang, Mingwei Xu*. Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-Training. In ACM CCS’24 Posters and Demos, Salt Lake City, USA, October 14-18, 2024
- Jiang Li, Jiahao Cao*, Zili Meng, Renjie Xie, Qi Li, Yuan Yang, Mingwei Xu*. RoLL+: Real-time and Accurate Route Leak Locating with AS Triplet Features at Scale. In IEEE/ACM Transactions on Networking (ToN), 2024. (CCF A, top journal in Computer Networks)
- Ziteng Chen, Menghao Zhang, Guanyu Li, Jiahao Cao, Yang Jing, Mingwei Xu, Renjie Xie, He Liu, Fangzheng Jiao, Xiaohe Hu. Paraleon: Automatic and Adaptive Tuning for DCQCN Parameters in RDMA Networks. In the 32nd IEEE International Conference on Network Protocols (ICNP), Charleroi, Belgium, October 28-31, 2024 (CCF-B, full paper acceptance ratio: 50/205=24.4%)
- Renjie Xie, Jiahao Cao*, Yuxi Zhu, Yixiang Zhang, Yi He, Hanyi Peng, Yixiao Wang, Mingwei Xu*, Kun Sun, Enhuan Dong, Qi Li, Menghao Zhang, Jiang Li. Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side. In IEEE Transactions on Information Forensics and Security (TIFS), vol. 19, pp. 7659-7673, 2024 (CCF-A, top journal in Network and Information Security)
- Shiguang Zhang, Jiahao Cao*, Menghao Zhang, Mingwei Xu, Wei Han, Yanbin Zhai, Zhiming Zhang. Co4U: Efficient and Robust HTTP Message Compression for Edge Computing Networks. In SIGCOMM Posters and Demos, Sydney, Australia, August 4-8, 2024
- Weiliang Qi, Jiahao Cao, Darsh Poddar, Sophia Li, Xinda Wang. Enhancing Pre-Trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation. In Proc. of the 20th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Dubai, UAE, October 28-30, 2024. (CCF C)
Papers in 2023
- Renjie Xie, Jiahao Cao*, Enhuan Dong, Mingwei Xu*, Kun Sun, Qi Li, Licheng Shen, and Menghao Zhang. Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation. In Proc. of the 32nd USENIX Security Symposium (USENIX Security), Anaheim, CA, USA, August 2023. (CCF A, top conference in Network and Information Security)
- Guoqiang Zhang, Jiahao Cao*, Mingwei Xu*, and Xinhao Deng. Unsupervised and Adaptive Tor Website Fingerprinting. In Proc. of the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Hong Kong, China, October 19-21, 2023. (CCF C)
- Jiang Li, Jiahao Cao, Yuan Yang, Zhuotao Liu, Qi Li, Yangyang Wang, Zili Meng, Renjie Xie, and Mingwei Xu*. DeBGP: Decentralized and Efficient BGP Hijacking Prevention System. The 32nd International Conference on Computer Communications and Networks (ICCCN 2023), HI, USA, July 24 - July 26, 2023. (CCF C)
- Jiang Li, Mingwei Xu*, Jiahao Cao*, Zili Meng, and Guoqiang Zhang. Decentralized Internet Number Resource Management System based on Blockchain Technology. In Journal of Tsinghua University (Science and Technology), 2023. (in Chinese)
- Jiang Li, Jiahao Cao*, Zili Meng, Renjie Xie, and Mingwei Xu*. RoLL: Real-time and Accurate Route Leak Location with AS Triplet Features. IEEE International Conference on Communications (ICC), Rome, Italy, 28 May – 01 June, 2023. (CCF C)
Papers in 2022
- Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, and Yuan Yang. The LOFT Attack: Overflowing SDN Flow Tables at a Low Rate. In IEEE/ACM Transactions on Networking (ToN), vol. 31, no. 3, pp. 1416-1431, 2022. (CCF A, top journal in Computer Networks)
- Renjie Xie#, Jiahao Cao#, Qi Li, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures. In IEEE/ACM Transactions on Networking (ToN), vol. 30, no. 5, pp. 2158-2172, 2022. (CCF A, top journal in Computer Networks)
- Zijie Yang#, Jiahao Cao#, Zhuotao Liu, Xiaoli Zhang, Kun Sun and Qi Li. Good Learning, Bad Performance: A Novel Attack against RL-based Congestion Control Systems. In IEEE Transactions on Information Forensics & Security (TIFS), vol. 17, pp. 1069-1082, 2022. (CCF A, top journal in Network and Information Security)
- Xu He, Jiahao Cao*, Shu Wang, Kun Sun, Lisong Xu and Qi Li*. Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks. IEEE International Conference on Computer Communications (INFOCOM), Virtual Conference, May 2-5, 2022. (CCF A)
- Guoqiang Zhang, Jiahao Cao, Mingwei Xu and Qi Li. Less is More: Mitigating Tor Traffic Correlation With Distance-Aware Path Selection. The 2022 IEEE International Conference on High Performance Computing and Communications, Cheng Du, China, December 18-21, 2022. (CCF C)
- Yunlong Xing, Jiahao Cao, Xinda Wang, Sadegh Torabi, Kun Sun, Fei Yan, and Qi Li. SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images. 2022 IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA, October 3–5, 2022.
- Songsong Liu, Pengbin Feng, Jiahao Cao, Xu He, Tommy Chin, Kun Sun, and Qi Li. Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots. In Proc. of the 19th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Cagliari, Italy, June 29 - July 1, 2022. (CCF C)
- Yunlong Xing, Jiahao Cao, Kun Sun, Fei Yan, and Shengyi Wan. The Devil is in the Detail: Generating System Call Whitelist for Linux Seccomp. In Future Generation Computer Systems (FGCS), 2022. (CCF C)
- Songsong Liu, Pengbin Feng, Shu Wang, Kun Sun and Jiahao Cao. Enhancing Malware Analysis Sandboxes with Emulated User Behavior. In Computers & Security, vol. 115, pp. 102613, 2022. (CCF B)
Papers in 2021
- Haibo Wang, Tao Gao, Weizhen Dang, JingAn Xue, Jiahao Cao, Fenghua Li, Jilong Wang. Hopping on Spectrum: Measuring and Boosting a Large-scale Dual-band Wireless Network. The 29th IEEE International Conference on Network Protocols (ICNP), Virtual Conference, November 1-5, 2021. (CCF B)
- Qiyang Song, Jiahao Cao*, Kun Sun, Qi Li*, Ke Xu. Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. Annual Computer Security Applications Conference (ACSAC), Virtual Conference, December 6-11, 2021. (CCF B)
- Xinyu Yang, Jiahao Cao, and Mingwei Xu. SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags. IEEE 39th International Performance Computing and Communications Conference (IPCCC), Virtual Conference, November 6-8, 2021. (CCF C)
Papers in 2020
- Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, and Mingwei Xu. When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. In Proc. of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2020. (Acceptance Ratio: 17.4%=88/506, CCF A, top conference in Network and Information Security)
- Jiahao Cao, Qi Li, Renjie Xie, Kun Sun, Guofei Gu, Mingwei Xu, and Yuan Yang. The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links. In Proc. of the 28th USENIX Security Symposium (USENIX Security), Santa Clara, CA, USA, August 2019 (Student Travel Grant, First Round Acceptance Ratio: 9.8%=25/254, Total Acceptance Ratio:15.27%=113/740, CCF A, , top conference in Network and Information Security)
- Shu Wang, Jiahao Cao*, Xu He, Kun Sun, and Qi Li*. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. ACM Conference on Computer and Communications Security (CCS), Orlando, USA, November 9-13, 2020. (Top Security Conference, CCF A)
- Qiyang Song, Zhuotao Liu, Jiahao Cao, Kun Sun, Qi Li, and Cong Wang. SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption. In IEEE Transactions on Information Forensics & Security (TIFS), vol. 16, pp. 1795-1809, 2020. (CCF A)
- Shu Wang, Jiahao Cao*, Kun Sun, and Qi Li*. SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. In Proc. of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), Donostia / San Sebastian, Spain, October 14-16, 2020. (Acceptance Ratio: 25.6%=31/121, CCF B )
- Peiyi Han, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan, Zekun Cao, and Bingxing Fang. CloudDLP: Transparent and Scalable Data Sanitization for Browser-based Cloud Storage. In IEEE Access, vol. 8, pp. 68449-68459, 2020.
- Xiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Jiahao Cao, and Chuanyi Liu. From One-Hot Encoding to Privacy-Preserving Synthetic Electronic Health Records Embedding. In Proc. of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, Guangzhou, China, December 4 - 6, 2020.
Papers Before 2020
- Jiahao Cao, Zijie Yang, Kun Sun, Qi Li, Mingwei Xu, and Peiyi Han. Fingerprinting SDN Applications via Encrypted Control Traffic. In Proc. of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Beijing, China, September 2019. (Acceptance ratio: 22.28%=37/166, CCF B )
- Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, and Jason Li. Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. In Proc. of the 15th International Conference on Security and Privacy in Communication Networks (SecureComm 2019), Orlando, FL, USA, October 2019. (Full Paper Acceptance ratio: 25.5%=38/149, CCF C )
- Renjie Xie, Mingwei Xu, Jiahao Cao, and Qi Li. SoftGuard: Defend against the Low-Rate TCP Attack in SDN. In Proc. of the 53rd IEEE International Conference on Communications (ICC), Shanghai, China, May 2019. (CCF C)
- Shengsheng Yao, Mingwei Xu, Qi Li, Jiahao Cao, and Qiyang Song. cSFC: Building Credible Service Function Chain on the Cloud. In the 2019 IEEE Global Communications Conference (GLOBECOM), Hawaii, USA, December 2019. (CCF C)
- Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, David K.Y. Yau, and Jianping Wu. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. In IEEE Transactions on Information Forensics & Security (TIFS), vol. 13, no. 7, pp. 1838-1853, 2018. (CCF A)
- Jiahao Cao, Mingwei Xu, Qi Li, Kun Sun, Yuan Yang, and Jing Zheng. Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack. In Proc. of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Niagara Falls, Canada, October 2017. (Best Paper Award, CCF C)
- Zheng Liu, Mingwei Xu, Jiahao Cao, and Qi Li. TSA: A Two-phase Scheme against Amplification DDoS Attack in SDN. In Proc. of the 13th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), Beijing, China, December 2017. (CCF C)
Book Chapter
- Qi Li, Jiahao Cao, Mingwei Xu, and Kun Sun. Flow Table Overflow Attacks. In Encyclopedia of Wireless Networks, Xuemin (Sherman) Shen, Xiaodong Lin, and Kuan Zhang (Eds.), Springer.
Patents