default search action
Jason H. Li
Person information
- affiliation: Intelligent Automation, Inc. (IAI), Rockville, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Guang Jin, Jason H. Li, Greg Briskin:
Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety Protection. SP (Workshops) 2024: 224-230 - 2021
- [c41]Kyle Denney, Robert Lychev, Donato Kava, Alice Lee, Michael Vai, Nick Evancich, Richard Clark, David Lide, Kyung Joon Kwak, Jason H. Li, Michael Lynch, Kyle Tillotson, Walt Tirenin, Douglas Schafer:
A Novel Approach to Cyber Situational Awareness in Embedded Systems. HPEC 2021: 1-5 - [c40]Michael Vai, David Whelihan, Kyle Denney, Robert Lychev, Jeffrey J. Hughes, Donato Kava, Alice Lee, Nick Evancich, Richard Clark, David Lide, Kyung Joon Kwak, Jason H. Li, Douglas Schafer, Michael Lynch, Kyle Tillotson, Wladimir Tirenin:
Agile and Resilient Embedded Systems. MILCOM 2021: 715-720
2010 – 2019
- 2019
- [c39]Jiahao Cao, Kun Sun, Qi Li, Mingwei Xu, Zijie Yang, Kyung Joon Kwak, Jason H. Li:
Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts. SecureComm (1) 2019: 429-449 - [i7]Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li:
Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data. CoRR abs/1901.09113 (2019) - [i6]Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. CoRR abs/1901.09247 (2019) - [i5]Sohraab Soltani, Yalin E. Sagduyu, Sean Scanlon, Yi Shi, Jason H. Li, Jared Feldman, John D. Matyjas:
Cross-layer Design and SDR Implementation of DSA, Backpressure Routing and Network Coding. CoRR abs/1912.05658 (2019) - 2018
- [j18]Yalin E. Sagduyu, Yi Shi, Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley, Clif Banner, Greg Heinen:
Optimal Network-Centric Planning for Airborne Relay Communications. IEEE Syst. J. 12(4): 3450-3460 (2018) - [c38]Hongfa Xue, Yurong Chen, Guru Venkataramani, Tian Lan, Guang Jin, Jason H. Li:
MORPH: Enhancing System Security through Interactive Customization of Application and Communication Protocol Features. CCS 2018: 2315-2317 - [c37]Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Zhuo Lu, Jason H. Li:
Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies. ICC Workshops 2018: 1-6 - [c36]Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li:
Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data. ISSPIT 2018: 453-458 - [c35]Yi Shi, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li:
Spectrum Data Poisoning with Adversarial Deep Learning. MILCOM 2018: 407-412 - [c34]Jason H. Li, Douglas Schafer, David Whelihan, Stefano Lassini, Nicholas Evancich, Kyung Joon Kwak, Michael Vai, Haley Whitman:
Designing Secure and Resilient Embedded Avionics Systems. SecDev 2018: 139 - [i4]Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li:
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls. CoRR abs/1811.01811 (2018) - 2017
- [j17]Yalin E. Sagduyu, Sohraab Soltani, Tugba Erpek, Yi Shi, Jason H. Li:
A Unified Solution to Cognitive Radio Programming, Test and Evaluation for Tactical Communications. IEEE Commun. Mag. 55(10): 12-20 (2017) - [j16]Yalin E. Sagduyu, Yi Shi, Anthony Fanous, Jason H. Li:
Wireless Network Inference and Optimization: Algorithm Design and Implementation. IEEE Trans. Mob. Comput. 16(1): 257-267 (2017) - [j15]Zhuo Lu, Yalin E. Sagduyu, Jason H. Li:
Securing the Backpressure Algorithm for Wireless Networks. IEEE Trans. Mob. Comput. 16(4): 1136-1148 (2017) - [c33]David Whelihan, Michael Vai, Nicholas Evancich, Kyung Joon Kwak, Jason H. Li, M. Britton, B. Frantz, D. Hadcock, Michael Lynch, Douglas Schafer, J. DeMatteis, D. Russo:
Designing agility and resilience into embedded systems. MILCOM 2017: 249-254 - [c32]Sohraab Soltani, Yalin E. Sagduyu, Sean Scanlon, Yi Shi, Jason H. Li, Jared Feldman, John D. Matyjas:
Joint network coding and backpressure algorithm for cognitive radio networks. MILCOM 2017: 858-863 - 2016
- [c31]Jason H. Li, Justin Yackoski, Nicholas Evancich:
Moving Target Defense: a Journey from Idea to Product. MTD@CCS 2016: 69-79 - [c30]Michael Vai, David Whelihan, Nicholas Evancich, Kyung Joon Kwak, Jason H. Li, M. Britton, J. Foley, Michael Lynch, Douglas Schafer, J. DeMatteis:
Systems design of cybersecurity in embedded systems. HPEC 2016: 1-6 - [c29]Yalin E. Sagduyu, Yi Shi, Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley, Clif Banner, Greg Heinen:
Optimal orbit selection and design for airborne relay communications. MILCOM 2016: 1161-1166 - [p8]Greg Briskin, Dan Fayette, Nick Evancich, Vahid Rajabian-Schwart, Anthony Macera, Jason H. Li:
Design Considerations for Building Cyber Deception Systems. Cyber Deception 2016: 71-97 - 2015
- [j14]Lei Yang, Yalin Evren Sagduyu, Junshan Zhang, Jason H. Li:
Deadline-Aware Scheduling With Adaptive Network Coding for Real-Time Traffic. IEEE/ACM Trans. Netw. 23(5): 1430-1443 (2015) - [j13]Yi Shi, Yalin Evren Sagduyu, Junshan Zhang, Jason H. Li:
Adaptive Coding Optimization in Wireless Networks: Design and Implementation Aspects. IEEE Trans. Wirel. Commun. 14(10): 5672-5680 (2015) - [c28]Zhuo Lu, Yalin Evren Sagduyu, Jason H. Li:
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks. INFOCOM 2015: 253-261 - [c27]Sohraab Soltani, Yalin Evren Sagduyu, Yi Shi, Jason H. Li, Jared Feldman, John D. Matyjas:
Distributed cognitive radio network architecture, SDR implementation and emulation testbed. MILCOM 2015: 438-443 - [c26]Yalin Evren Sagduyu, Yi Shi, Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley:
Optimal transmission decisions for airborne relay communications. MILCOM 2015: 1685-1690 - 2014
- [j12]Kyung Joon Kwak, Yalin Evren Sagduyu, Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Julia Deng, Jason H. Li:
Airborne network evaluation: challenges and high fidelity emulation solution. IEEE Commun. Mag. 52(10): 30-36 (2014) - [j11]Onur Savas, Yalin Evren Sagduyu, Julia Deng, Jason H. Li:
Tactical big data analytics: challenges, use cases, and solutions. SIGMETRICS Perform. Evaluation Rev. 41(4): 86-89 (2014) - [j10]Yi Shi, Yalin Evren Sagduyu, Jason H. Li:
Multi-layer optimization with backpressure and genetic algorithms for multi-hop wireless networks. Wirel. Networks 20(6): 1265-1273 (2014) - [c25]Sohraab Soltani, Yalin Evren Sagduyu, Jason H. Li, Jared Feldman, John D. Matyjas:
Demonstration of plug-and-play cognitive radio network emulation testbed. DySPAN 2014: 376-377 - [c24]Yi Shi, Yalin E. Sagduyu, Junshan Zhang, Jason H. Li:
System Design and Testbed Implementation of Adaptive Coding Optimization in Lossy Networks. MILCOM 2014: 968-974 - [p7]Nicholas Evancich, Zhuo Lu, Jason H. Li, Yi Cheng, Joshua Tuttle, Peng Xie:
Network-Wide Awareness. Cyber Defense and Situational Awareness 2014: 63-91 - [p6]Yi Cheng, Julia Deng, Jason H. Li, Scott A. DeLoach, Anoop Singhal, Xinming Ou:
Metrics of Security. Cyber Defense and Situational Awareness 2014: 263-295 - 2013
- [c23]Justin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou:
Mission-oriented moving target defense based on cryptographically strong network dynamics. CSIIRW 2013: 57 - [c22]Nikhil Bhagwat, Justin Yackoski, Jason H. Li, Kurt A. Turck:
Design of Mesh Enhancements to Airborne Links. MILCOM 2013: 876-881 - [c21]Lei Ding, Yalin E. Sagduyu, Tommaso Melodia, Jason H. Li, Jared Feldman, John D. Matyjas:
CREATE-NEST: A Distributed Cognitive Radio Network Platform with Physical Channel Awareness. MILCOM 2013: 1669-1674 - [c20]Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Alexey Bogaevskiy, Jason H. Li, Yalin Evren Sagduyu, Renato Levy:
Mobile network performance evaluation using the radio frequency network channel emulation simulation tool(RFnest™). MobiCom 2013: 155-158 - [p5]Justin Yackoski, Harry Bullen, Xiang Yu, Jason H. Li:
Applying Self-Shielding Dynamics to the Network Architecture. Moving Target Defense 2013: 97-115 - 2012
- [j9]Lei Yang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
Distributed stochastic power control in ad hoc networks: a nonconvex optimization case. EURASIP J. Wirel. Commun. Netw. 2012: 231 (2012) - [j8]Shanshan Wang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
The Impact of Induced Spectrum Predictability Via Wireless Network Coding. IEEE Trans. Veh. Technol. 61(2): 758-769 (2012) - [c19]Wei Chen, Alexander Grushin, Jason H. Li:
Mixed-initiative distributed simultaneous (MDS) planning. CTS 2012: 84-90 - [c18]Yan Liang Zhang, Jason H. Li, Steve To, Yong Zhang, Xutao Ye, Yu Sun:
Automated nanomanipulation for nano device construction. ICRA 2012: 1063-1068 - [c17]Yi Shi, Yalin E. Sagduyu, Jason H. Li:
Low complexity multi-layer optimization for multi-hop wireless networks. MILCOM 2012: 1-6 - [c16]Lei Yang, Yalin Evren Sagduyu, Jason Hongjun Li:
Adaptive network coding for scheduling real-time traffic with hard deadlines. MobiHoc 2012: 105-114 - [p4]Song Luo, Yalin E. Sagduyu, Jason H. Li:
Scented Node Protocol for MANET Routing. Biologically Inspired Networking and Sensing 2012: 242-267 - [i3]Lei Yang, Yalin Evren Sagduyu, Jason Hongjun Li, Junshan Zhang:
Adaptive Network Coding for Scheduling Real-time Traffic with Hard Deadlines. CoRR abs/1203.4008 (2012) - 2011
- [j7]Subir Das, Jing Deng, Mario Gerla, Nada Golmie, Jason H. Li, Jiang (Linda) Xie:
Guest Editorial. J. Commun. 6(1): 1-3 (2011) - [j6]Hui Zeng, Jason H. Li, Subir Das, Anthony J. McAuley, John Lee, Thomas Stuhrmann, Mario Gerla:
An Integrated Multi-layer Approach for Seamless Soft Handoff in Mobile Ad Hoc Networks. J. Commun. 6(1): 16-28 (2011) - [c15]Yalin Evren Sagduyu, Jason Hongjun Li:
Information-Geometric Wireless Network Inference. GLOBECOM 2011: 1-5 - [c14]Lei Yang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
Distributed Power Control for Ad-Hoc Communications via Stochastic Nonconvex Utility Optimization. ICC 2011: 1-5 - [c13]Shanshan Wang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
Spectrum shaping via network coding in cognitive radio networks. INFOCOM 2011: 396-400 - [c12]Shanshan Wang, Yalin E. Sagduyu, Junshan Zhang, Jason Hongjun Li:
Traffic shaping impact of network coding on spectrum predictability and jamming attacks. MILCOM 2011: 293-298 - [c11]Kun Sun, Sushil Jajodia, Jason H. Li, Yi Cheng, Wei Tang, Anoop Singhal:
Automatic security analysis using security metrics. MILCOM 2011: 1207-1212 - [c10]Justin Yackoski, Peng Xie, Harry Bullen, Jason H. Li, Kun Sun:
A Self-shielding Dynamic Network Architecture. MILCOM 2011: 1381-1386 - [c9]Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Jason H. Li, Yalin E. Sagduyu, Renato Levy:
RFnest™: Radio frequency network emulator simulator tool. MILCOM 2011: 1882-1887 - [i2]Lei Yang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
Distributed Stochastic Power Control in Ad-hoc Networks: A Nonconvex Case. CoRR abs/1106.0736 (2011) - 2010
- [c8]Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy:
Using Bayesian networks for cyber security analysis. DSN 2010: 211-220 - [p3]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p2]Jason H. Li, Xinming Ou, Siva Raj Rajagopalan:
Uncertainty and Risk Management in Cyber Situational Awareness. Cyber Situational Awareness 2010: 51-68 - [p1]Peng Liu, Xiaoqi Jia, Shengzhi Zhang, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li:
Cross-Layer Damage Assessment for Cyber Situational Awareness. Cyber Situational Awareness 2010: 155-176 - [i1]Shanshan Wang, Yalin Evren Sagduyu, Junshan Zhang, Jason Hongjun Li:
Spectrum Shaping via Network Coding in Cognitive Radio Networks. CoRR abs/1008.4413 (2010)
2000 – 2009
- 2008
- [j5]Jerry T. Ball, Chris Arney, Samuel G. Collins, Mitchell Marcus, Sergei Nirenburg, Antonio Chella, Kai Goebel, Jason H. Li, Margaret Lyell, Brian Magerko, Riccardo Manzotti, Clayton T. Morrison, Tim Oates, Mark O. Riedl, Goran Trajkovski, Walt Truszkowski, N. Serdar Uckun:
AAAI Fall Symposium Reports. AI Mag. 29(1): 99-104 (2008) - [j4]Jason H. Li, Bobby Bhattacharjee, Miao Yu, Renato Levy:
A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Gener. Comput. Syst. 24(8): 860-869 (2008) - [c7]Jason Hongjun Li, Song Luo, Wei Tang, Renato Levy, Kihong Park:
Heavy-Tailed Workload Aware Ad Hoc Routing. ICC 2008: 2437-2442 - [c6]Song Luo, Jason H. Li, Kihong Park, Renato Levy:
Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks. INFOCOM 2008: 2387-2395 - 2007
- [j3]Jason H. Li, Miao Yu:
Sensor coverage in wireless ad hoc sensor networks. Int. J. Sens. Networks 2(3/4): 218-229 (2007) - [c5]Tim Finin, Lalana Kagal, Elisa F. Kendall, Jason H. Li, Margaret Lyell, Walt Truszkowski:
Preface. AAAI Fall Symposium: Regarding the Intelligence in Distributed Intelligent Systems 2007 - [c4]Jason H. Li, Renato Levy, Peng Liu:
Intelligent Cyber Security Analysis in Enterprise Networks. AAAI Fall Symposium: Regarding the Intelligence in Distributed Intelligent Systems 2007: 75-78 - [e1]Tim Finin, Lalana Kagal, Elisa F. Kendall, Jason H. Li, Margaret Lyell, Walt Truszkowski:
Regarding the Intelligence in Distributed Intelligent Systems, Papers from the 2007 AAAI Fall Symposium, Arlington, Virginia, USA, November 9-11, 2007. AAAI Technical Report FS-07-06, AAAI Press 2007 [contents] - 2006
- [j2]Miao Yu, Jason H. Li, Renato Levy:
Mobility Resistant Clustering in Multi-Hop Wireless Networks. J. Networks 1(1): 12-19 (2006) - [j1]Jason H. Li, Miao Yu, Renato Levy, Anna Teittinen:
A Mobility-Resistant Efficient Clustering Approach for ad hoc and sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 10(2): 1-12 (2006) - [c3]Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee:
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620 - [c2]Jason H. Li, Renato Levy, Miao Yu, Bobby Bhattacharjee:
A scalable key management and clustering scheme for ad hoc networks. Infoscale 2006: 28 - 2005
- [c1]Jason H. Li, Miao Yu, Renato Levy:
A Distributed Efficient Clustering Approach for Ad Hoc and Sensor Networks. MSN 2005: 937-949
Coauthor Index
aka: Yalin Evren Sagduyu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint