default search action
Frank Li 0001
Person information
- affiliation: Georgia Institute of Technology, GA, USA
Other persons with the same name
- Frank Li 0002 — The Mind Lab
- Frank Li 0003 — University of Agder, Norway
- Frank Li 0004 — Alcatel-Lucent in Qingdao, China
- Frank Li 0005 — Emory University, Department of Radiology, Atlanta, GA, USA
- Frank Li 0006 — University of Washington, Seattle, WA, USA
- Frank Li 0007 — Columbia University, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Dhruv Kuchhal, Karthik Ramakrishnan, Frank Li:
Whatcha Lookin' At: Investigating Third-Party Web Content in Popular Android Apps. IMC 2024: 114-129 - [c37]Amanda Hsu, Frank Li, Paul Pearce, Oliver Gasser:
A First Look at NAT64 Deployment In-The-Wild. PAM (1) 2024: 112-129 - [c36]Qinge Xie, Frank Li:
Crawling to the Top: An Empirical Evaluation of Top List Use. PAM (1) 2024: 277-306 - [c35]Miuyin Yong Wong, Matthew Landen, Frank Li, Fabian Monrose, Mustaque Ahamad:
Comparing Malware Evasion Theory with Practice: Results from Interviews with Expert Analysts. SOUPS @ USENIX Security Symposium 2024: 61-80 - [c34]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. USENIX Security Symposium 2024 - [c33]Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, Paul Pearce:
6Sense: Internet-Wide IPv6 Scanning and its Security Applications. USENIX Security Symposium 2024 - [c32]Qinge Xie, Manoj Vignesh Kasi Murali, Paul Pearce, Frank Li:
Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content. USENIX Security Symposium 2024 - [i8]Mingyi Liu, Jun Ho Huh, HyungSeok Han, Jaehyuk Lee, Jihae Ahn, Frank Li, Hyoungshick Kim, Taesoo Kim:
I Experienced More than 10 DeFi Scams: On DeFi Users' Perception of Security Breaches and Countermeasures. CoRR abs/2406.15709 (2024) - 2023
- [j6]Amanda Hsu, Frank Li, Paul Pearce:
Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 21:1-21:24 (2023) - [c31]Dhruv Kuchhal, Muhammad Saad, Adam Oest, Frank Li:
Evaluating the Security Posture of Real-World FIDO2 Deployments. CCS 2023: 2381-2395 - [c30]Suood Alroomi, Frank Li:
Measuring Website Password Creation Policies At Scale. CCS 2023: 3108-3122 - [c29]Amanda Hsu, Frank Li, Paul Pearce:
Fiat Lux: Illuminating IPv6 Apportionment with Different Datasets. SIGMETRICS (Abstracts) 2023: 47-48 - [c28]Sena Sahin, Suood Abdulaziz Al-Roomi, Tara Poteat, Frank Li:
Investigating the Password Policy Practices of Website Administrators. SP 2023: 552-569 - [c27]Suood Abdulaziz Al-Roomi, Frank Li:
A Large-Scale Measurement of Website Login Policies. USENIX Security Symposium 2023: 2061-2078 - [i7]Suood Alroomi, Frank Li:
Measuring Website Password Creation Policies At Scale. CoRR abs/2309.03384 (2023) - [i6]Amanda Hsu, Frank Li, Paul Pearce, Oliver Gasser:
A First Look At NAT64 Deployment In-The-Wild. CoRR abs/2311.04181 (2023) - 2022
- [j5]Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. IEEE Trans. Dependable Secur. Comput. 19(6): 4255-4269 (2022) - [c26]Qinge Xie, Shujun Tang, Xiaofeng Zheng, Qingran Lin, Baojun Liu, Haixin Duan, Frank Li:
Building an Open, Robust, and Stable Voting-Based Domain Top List. USENIX Security Symposium 2022: 625-642 - [c25]Dhruv Kuchhal, Frank Li:
A View into YouTube View Fraud. WWW 2022: 555-563 - 2021
- [c24]Sena Sahin, Frank Li:
Don't Forget the Stuffing! Revisiting the Security Impact of Typo-Tolerant Password Authentication. CCS 2021: 252-270 - [c23]Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. DSN (Supplements) 2021: 1-2 - [c22]Tara Poteat, Frank Li:
Who you gonna call?: an empirical evaluation of website security.txt deployment. Internet Measurement Conference 2021: 526-532 - [c21]Dhruv Kuchhal, Frank Li:
Knock and talk: investigating local network communications on websites. Internet Measurement Conference 2021: 550-568 - [c20]Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, Paul Pearce:
Deep Entity Classification: Abusive Account Detection for Online Social Networks. USENIX Security Symposium 2021: 4097-4114 - 2020
- [j4]Danny Yuxing Huang, Noah J. Apthorpe, Frank Li, Gunes Acar, Nick Feamster:
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(2): 46:1-46:21 (2020) - [c19]Frank Li, David Freeman:
Towards A User-Level Understanding of IPv6 Behavior. Internet Measurement Conference 2020: 428-442 - [c18]Frank Li:
Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern Web. USENIX Security Symposium 2020: 649-664 - [i5]Afsah Anwar, Ahmed Abusnaina, Songqing Chen, Frank Li, David Mohaisen:
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses. CoRR abs/2006.15074 (2020)
2010 – 2019
- 2019
- [b1]Frank Li:
Remedying Security Concerns at an Internet Scale. University of California, Berkeley, USA, 2019 - [c17]Frank Li, Lisa Rogers, Arunesh Mathur, Nathan Malkin, Marshini Chetty:
Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines. SOUPS @ USENIX Security Symposium 2019 - [i4]Danny Yuxing Huang, Noah J. Apthorpe, Gunes Acar, Frank Li, Nick Feamster:
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale. CoRR abs/1909.09848 (2019) - 2018
- [j3]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Toward Continual Measurement of Global Network-Level Censorship. IEEE Secur. Priv. 16(1): 24-33 (2018) - [j2]Frank Li, Vern Paxson:
A Large-Scale Empirical Study of Security Patches. login Usenix Mag. 43(1) (2018) - [c16]Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow:
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. NDSS 2018 - [c15]Gunes Acar, Danny Yuxing Huang, Frank Li, Arvind Narayanan, Nick Feamster:
Web-based Attacks to Discover and Control Local IoT Devices. IoT S&P@SIGCOMM 2018: 29-35 - 2017
- [j1]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global-Scale Measurement of DNS Manipulation. login Usenix Mag. 42(4) (2017) - [c14]Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein:
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials. CCS 2017: 1421-1434 - [c13]Frank Li, Vern Paxson:
A Large-Scale Empirical Study of Security Patches. CCS 2017: 2201-2215 - [c12]Wenting Zheng, Frank H. Li, Raluca Ada Popa, Ion Stoica, Rachit Agarwal:
MiniCrypt: Reconciling Encryption and Compression for Big Data Stores. EuroSys 2017: 191-204 - [c11]Austin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, Vern Paxson:
Target generation for internet-wide IPv6 scanning. Internet Measurement Conference 2017: 242-253 - [c10]Paul Pearce, Roya Ensafi, Frank Li, Nick Feamster, Vern Paxson:
Augur: Internet-Wide Detection of Connectivity Disruptions. IEEE Symposium on Security and Privacy 2017: 427-443 - [c9]Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nicholas Weaver, Vern Paxson:
Global Measurement of DNS Manipulation. USENIX Security Symposium 2017: 307-323 - 2016
- [c8]Frank Li, Zakir Durumeric, Jakub Czyz, Mohammad Karami, Michael D. Bailey, Damon McCoy, Stefan Savage, Vern Paxson:
You've Got Vulnerability: Exploring Effective Vulnerability Notifications. USENIX Security Symposium 2016: 1033-1050 - [c7]Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson:
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. WWW 2016: 1009-1019 - 2015
- [c6]Frank Li, Richard Shin, Vern Paxson:
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. CCSW 2015: 53-64 - [i3]Frank Li, Richard Shin, Vern Paxson:
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. CoRR abs/1507.08309 (2015) - 2014
- [c5]Kurt Thomas, Frank Li, Chris Grier, Vern Paxson:
Consequences of Connectivity: Characterizing Account Hijacking on Twitter. CCS 2014: 489-500 - [c4]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - 2013
- [c3]Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song:
Data-Confined HTML5 Applications. ESORICS 2013: 736-754 - [c2]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IEEE Symposium on Security and Privacy 2013: 463-477 - [i2]Raluca A. Popa, Frank H. Li, Nickolai Zeldovich:
An Ideal-Security Protocol for Order-Preserving Encoding. IACR Cryptol. ePrint Arch. 2013: 129 (2013) - 2012
- [i1]Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov:
SybilControl: Practical Sybil Defense with Computational Puzzles. CoRR abs/1201.2657 (2012) - 2011
- [c1]Raluca A. Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li:
Privacy and accountability for location-based aggregate statistics. CCS 2011: 653-666
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint