Jun Li's Presentations

[1] Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang. "SAVE: source address validity enforcement protocol," Presented by Jun Li at ISI, October 2001. PowerPoint slides and 4-up handout.

[2] Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang. "SAVE: source address validity enforcement protocol," Presented by Jelena Mirkovic at The Tenth USENIX Security Symposium, work-in-progress session, Washington, D.C., August 2001. PowerPoint slides and 4-up handout.

[3] Jun Li, Mark Yarvis, and Peter Reiher. "Securing distributed adaptation," Presented by Mark Yarvis at The Fourth IEEE Conference on Open Architecutres and Network Programming (OPENARCH 2001), Anchorage, Alaska, April 2001. 6-up handout.

[4] Mengqiu Wang, Jun Li, Jelena Mirkovic, Peter Reiher, Lixia Zhang. "SAVE: source address validity enforcement protocol (poster)," UCLA Computer Science Department Annual Research Review, April 2001. JPEG format poster

[5] Jun Li, Xiaoyan Hong, Mani Srivastava, Peter Reiher, Mario Gerla. "Gradient-Directed Data Dissemination in Wireless Sensor Networks (poster)," UCLA Computer Science Department Annual Research Review, April 2000. JPEG format poster

[6] Jun Li, Mark Yarvis, and Peter Reiher. "Security in agent-based adaptation (poster)," UCLA Computer Science Department Annual Research Review, April 1999. JPEG format poster

[7] Jun Li, Peter Reiher, Richard Guy, Gerald Popek, Geoff Kuenning. "Revere--Dissemination of Security Updates (poster)," UCLA Computer Science Department Annual Research Review, April 1999. JPEG format poster

[8] Jun Li, Mani Srivastava, Peter Reiher. "Simulation of Gradient-Based Data Dissemination in Wireless Sensor Networks," Presented by Jun Li at PARSEC Workshop'99 on Applications Using Parsec and Large Scale Models, UCLA, November 1999. PowerPoint slides and 4-up handout.

[9] Jun Li, Peter Reiher, and Gerald Popek. "Securing information transmission by redundancy," Presented by Peter Reiher at The 22nd National Information Systems Security Conference, Washington D.C., October 1999.

[10] Jun Li, Peter Reiher, and Gerald Popek. "Securing information transmission by redundancy," Presented by Jun Li at The Fifth New Security Paradigms Workshop, ACM SIGSAC, September 1999. PowerPoint slides and 4-up handout.