Publications:
- Jie Su and Zhen Hong and Lei Ye and Tao Liu and Sizhuang Liang and Shouling Ji and Gagangeet Singh Aujla and Raheem Beyah and Zhenyu Wen. "Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices." In the IEEE Transactions on Consumer Electronics, 2023
- Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah. "One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware." In the IEEE Transactions on Dependable and Secure Computing, 2023
- Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, and Ting Wang. "DetectSec: Evaluating the Robustness of Object Detection Models to Adversarial Attacks." In International Journal of Intelligent Systems, Vol. 37, No. 9, pp. 6463-6492, February 2022.
- Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Zhoujun Jun, Ting Wang, and Raheem Beyah. "Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study." In the IEEE Transactions on Dependable and Secure Computing, February 2022.
- Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, and Ting Wang. "Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification, Applications." In the IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 6, pp. 3987-4001, September 2021.
- Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu Bourgeois, and Raheem Beyah. "This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems." In the IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 5, pp. 3218-3230, June 2021.
- Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang. "Adversarial CAPTCHAs." In the IEEE Transactions on Cybernetics, Vol. 52, No. 7, pp. 6095-6108, May 2021
- Binbin Zhao, Shouling Ji, Weihan Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, and Raheem Beyah. "A Large-scale Empirical Study on the Vulnerability of Deployed IoT Devices". In the IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 3, pp. 1826-1840, November 2020
- Yuwei Li, Shouling Ji, Chenyang Lv, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, and Raheem Beyah. "V-Fuzz: Vulnerability Prediction Assisted EVolutionary Fuzzing for Binary Programs." In the IEEE Transactions on Cybernetics, Vol. 52, No. 5, pp. 3745-3756, September 2020
- Chengkun Wei, Qinchen Gu, Shouling Ji, Wenzhi Chen, Zonghui Wang, and Raheem Beyah. "OB-WSPES: A Uniform Evaluation System for Obfuscation-based Web Search Privacy." In the IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 6, pp. 2719-2735, December 2019
- Zhen Hong, Rui Wang, Shouling Ji, and Raheem Beyah. "Attacker Location Evaluation-based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems." In IEEE Transactions on Information Forensics & Security, Vol. 14, No. 5, pp. 1337-1350, October 2018.
- Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem Beyah. "Fingerprinting for Cyber Physical System Security: Device Physics Matters Too." In the IEEE Security & Privacy Magazine, Vol. 16, No. 5, September/October 2018.
- Shukun Yang, Shouling Ji, and Raheem Beyah. "DPPG: A Dynamic Password Policy Generation System." In the IEEE Transactions on Information Forensics and Security, Vol. 13, No. 3, August 2017.
- Shouling Ji, Weiqing Li, Prateek Mittal, and Raheem Beyah. "De-SAG: On the De-anonymization of Structure-Attribute Graph Data." In the IEEE Transactions on Dependable and Secure Computing, Vol. 16, No. 4, pp. 594-607, 2017.
- Shouling Ji, Prateek Mittal, and Raheem Beyah, "Graph Data Anonymization, De-anonymization Attacks, and De-anonymizability Quantification: A Survey." IEEE Communications Surveys and Tutorials (COMST), Vol. 19, No. 2, Secondquarter 2017.
- Shouling Ji, Weiqing Li, Mudhakar Srivasta, Jing He, and Raheem Beyah. "General Graph Data De-anonymizatiQuantificationon: From Mobility Traces to Social Networks." In the ACM Transactions on Information and System Security (TISSEC), Vol. 18, No. 4, May 2016.
- Shouling Ji, Weiqing Li, Mudhakar Srivasta, and Raheem Beyah. "Structural Data De-anonymization: Theory and Practice." In the IEEE/ACM Transactions on Networking, Vol. 24, No. 6, December 2016.
- Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem Beyah. "Seed based De-anonymizablity Quantification of Social Networks." In the IEEE Transactions on Information Forensics and Security, Vol. 11, No. 7, July 2016.
- Shouling Ji, Shukun Yang, Xin Hu, Weili Han, Zhigong Li, and Raheem Beyah. "Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords." In the IEEE Transactions on Dependable and Secure Computing, Vol. 14, No. 5, September 2015.
- Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai. "Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks." In the IEEE Transactions on Mobile Computing, Vol. 15, No. 4, June 2015.
- Jing (Selena) He, Shouling Ji, Raheem Beyah, Ying Xie, and Yingshu Li. "Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks via Multi-Objective Genetic Algorithm." In the Transactions on Emerging Telecommunications Technologies, Vol 26, No. 2, February 2015.
- Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Broadcast Scheduling with Latency and Redundancy Analysis for Cognitive Radio Networks." In the IEEE Transactions on Vehicular Technology, Vol. 64, No. 7, July 2015.
- Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks." In the IEEE Transactions on Mobile Computing, Vol. 13, No. 3, March 2014.
- Shouling Ji, Jing He, A. Selcuk Uluagac, Raheem Beyah, and Yingshu Li. "Cell-based Snapshot and Continuous Data Collection in Wireless Sensor Networks." In the ACM Transactions on Sensor Networks, Vol. 9, No. 4, 2013.
- Shouling Ji, A. Selcuk Uluagac, Raheem Beyah, and Zhipeng Cai. "Practical Unicast and Convergecast Scheduling Schemes for Cognitive Radio Networks." In the Journal of Combinatorial Optimization, Vol. 26, No. 1, July 2013.
- Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, and Raheem Beyah. "SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices." In the 45th IEEE Symposium on Security and Privacy (S&P 2024).
- Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, and Raheem Beyah. "UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware." In the 32nd USENIX Security Symposium (USENIX Security 23).
- Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Chen, and Raheem Beyah. "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing." In the 32nd USENIX Security Symposium (USENIX Security 23).
- Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, and Raheem Beyah. "A Large-Scale Empirical Analysis of the Vulnerabilities Introduced by Third-party Components in IoT Firmware." In the 31st International Symposium on Software Testing and Analysis (ISSTA 2022).
- Chenyang Lyu, Hong Liang, Shouling Ji, Xuhong Zhang, Binbin Zhao, Meng Han, Yun Li, Zhe Wang, Wenhai Wang, and Raheem Beyah. "SLIME: Program-sensitive Energy Allocation for Fuzzing." In the 31st International Symposium on Software Testing and Analysis (ISSTA 2022).
- Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, and Ting Wang. "Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings." In the 43rd IEEE Symposium on Security and Privacy (S&P 2022).
- Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, and Raheem Beyah. "EMS: History-Driven Mutation for Coverage-based Fuzzing." In the 29th Annual Network and Distributed System Security Symposium (NDSS 2022).
- Peiyu Liu, Shouling Ji, Xuhong Zhang, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah. "iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware." In the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021).
- Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, and Raheem Beyah. "MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols." In the 30th USENIX Security Symposium, August 2021.
- Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, and Ting Wang. "Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks." In the ACM Conference on Computer and Communications Security (ACM CCS), 2021.
- Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang. "UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers." In the USENIX Security Symposium, August 2021.
- Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen and Raheem Beyah. "Understanding the Security Risks of Docker Hub." In the Proceedings of the European Symposium on Research in Computer Security (ESORICS), September 2020.
- Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, and Ting Wang. "Text Captcha Is Dead? A Large Scale Deployment and Empirical Study." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), October 2020.
- Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah. "SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems." In the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020).
- Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, "De-Health: All Your Online Health Information Are Belong to Us." In the IEEE International Conference on Data Engineering (ICDE) 2020.
- Chenyang Lv, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. "MOPT: Optimized Mutation Scheduling for Fuzzers". In the Proceedings of the USENIX Security Symposium, 2019.
- Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, and Raheem Beyah. "Towards Evaluating the Security of Image CAPTCHA in the Wild." In the ACM Workshop on Artificial Intelligence and Security (AiSec), Toronto, Canada, October 2018.
- Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, and Raheem Beyah. "Quantifying Graph Anonymity, Utility, and De-anonymity." In the Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, April 2018.
- Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu and Raheem Beyah. "HSTS Measurement and A New Stripping Attack Against HTTPS." In the Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm), Niagra Falls, Canada, October 2017.
- Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, and Raheem Beyah. "Password Correlation: Quantification, Evaluation and Application." In the Proceedings of IEEE International Conference on Computer Communications (INFOCOM), May 2017.
- Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, and Raheem Beyah. "On the Relative De-anonymizability of Graph Data: Quantification and Evaluation." In the Proceedings of IEEE International Conference on Computer Communications (INFOCOM), April 2016.
- Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, and Raheem Beyah. "PARS: A Uniform and Open-source Password Analysis and Research System." In the Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2015.
- Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah. "SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization." In the Proceedings of USENIX Security (Security) Symposium, August 2015.
- Shouling Ji, Zhipeng Cai, Jing (Selena) He, and Raheem Beyah. "Primary Social Behavior aware Routing and Scheduling for Cognitive Radio Networks." In the IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2015.
- Shouling Ji, Meng Han, Raheem Beyah, and Zhipeng Cai. "Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective." In the IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2015.
- Shouling Ji, Weiqing Li, Neil Z. Gong, Prateek Mittal, and Raheem Beyah. "On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge." In the Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2015.
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah. "Structure based Data De-anonymization of Social Networks and Mobility Traces." In the Proceedings of the Information Security Conference (ISC), October 2014.
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. "Structural Data De-anonymization: Quantification, Practice, and Implications." In the Proceedings of the ACM Conference on Computer and Communications Security (CCS), November 2014.
- Jing (Selena) He, Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Minimum-sized Influential Node Set Selection for Social Networks under the Independent Cascade Model." In the Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), August 2014.
- Jing (Selena) He, Shouling Ji, Xiaojing Liao, Hisham Haddad, and Raheem Beyah. "Minimum-sized Positive Influential Node Set Selection for Social Networks: Considering Both Positive and Negative Influences." In the IEEE International Performance, Computing, and Communication Conference (IPCCC), December 2013.
- Shouling Ji, Mingyuan Yan, Raheem Beyah, and Zhipeng Cai. "Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks." In the Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2013. (short paper)
- Jing (Selena) He, Shouling Ji, Raheem Beyah, and Yingshu Li. "A Multi-Objective Genetic Algorithm for Constructing Load-Balanced Virtual Backbones in Probabilistic Wireless Sensor Networks." In the Proceedings of in the IEEE Global Communications Conference (GLOBECOM), December 2013.
- Shouling Ji, Raheem Beyah, and Zhipeng Cai. "Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks." In the Proceedings of the IEEE International Conference on Sensing, Communication, and Networking (SECON), June 2013.
- Shouling Ji, Raheem A. Beyah, and Zhipeng Cai. "Snapshot/Continuous Data Collection Capacity for Large-Scale Probabilistic Wireless Sensor Networks." In the Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), March 2012.
- Shouling Ji, Raheem A. Beyah, and Yingshu Li. "Continuous Data Collection Capacity of Wireless Sensor Networks Under Physical Interference Model." In the Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011.
- Jing Selena He, Zhipeng Cai, Shouling Ji, Raheem Beyah and Yi Pan. "A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks." In the Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (WASA 2011), August 2011.
- Qinchen Gu, Shouling Ji, and Raheem Beyah. "Towards Understanding Health Information Leakage through Social Networks." IEEE Symposium on Security & Privacy(IEEE Posters), May 2016. (Poster)
- Weiqing Li, Shouling Ji, and Raheem Beyah. "ShareSafe the Complete Collection of Tools for Graph Data Privacy Analysis." The Annual Computer Security Applications Conference (ACSAC Posters), December 2015. (Poster)
- Shukun Yang, Shouling Ji, Xin Hu, and Raheem Beyah. "Effectiveness and Soundness of Commercial Password Strength Meters." The Network and Distributed System Security (NDSS) Symposium (NDSS Posters), February 2015. (Poster)
- Shouling Ji, Shukun Yang, Weiqing Li, Xiaojing Liao, and Raheem Beyah. "Password Cracking: A Large-Scale Empirical Study." Usenix Security Conference (USENIX Security Posters), August 2014.
- Shouling Ji, Weiqing Li, Jing S. He, Mudhakar Srivatsa, Raheem Beyah. "Optimization based Data De-anonymization." The IEEE Symposium on Security & Privacy (Oakland Poster), May 2014.
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, and Raheem Beyah. "De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information." Network and Distributed System Security (NDSS) Symposium (NDSS Poster), February 2014. (Poster)
- Shouling Ji, Mingyuan Yan, Yueming Duan, Jing He, Raheem Beyah, and Zhipeng Cai. "Broadcast Scheduling for Cognitive Radio Networks." The International Conference on Computer Communications Posters (INFOCOM Posters), April 2013. (Poster)
|