Alex X. Liu

Orcid: 0000-0002-6916-1326

Affiliations:
  • Michigan State University, East Lansing, Department of Computer Science and Engineering
  • University of Texas at Austin, Department of Computer Science


According to our database1, Alex X. Liu authored at least 336 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Omnidirectional Chargability With Directional Antennas.
IEEE Trans. Mob. Comput., May, 2024

Hybrid Physical-Layer Authentication.
IEEE Trans. Mob. Comput., February, 2024

An Optimization Framework for Active Physical-Layer Authentication.
IEEE Trans. Mob. Comput., January, 2024

G-Fuzz: A Directed Fuzzing Framework for gVisor.
IEEE Trans. Dependable Secur. Comput., 2024

DeepSeek LLM: Scaling Open-Source Language Models with Longtermism.
CoRR, 2024

2023
Identifying RFID Tags in Collisions.
IEEE/ACM Trans. Netw., August, 2023

On the Evolutionary of Bloom Filter False Positives - An Information Theoretical Approach to Optimizing Bloom Filter Parameters.
IEEE Trans. Knowl. Data Eng., July, 2023

Bloom Filter With Noisy Coding Framework for Multi-Set Membership Testing.
IEEE Trans. Knowl. Data Eng., July, 2023

A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic.
IEEE/ACM Trans. Netw., June, 2023

Dynamic Task Scheduling in Cloud-Assisted Mobile Edge Computing.
IEEE Trans. Mob. Comput., April, 2023

Efficient Resource Scheduling for Interference Alleviation in Dynamic Coexisting WBANs.
IEEE Trans. Mob. Comput., March, 2023

Multilevel Graph Matching Networks for Deep Graph Similarity Learning.
IEEE Trans. Neural Networks Learn. Syst., February, 2023

A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data.
Entropy, February, 2023

An Efficient Missing Tag Identification Approach in RFID Collisions.
IEEE Trans. Mob. Comput., 2023

On Goodness of WiFi Based Monitoring of Sleep Vital Signs in the Wild.
IEEE Trans. Mob. Comput., 2023

Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Hybrid Inlining: A Framework for Compositional and Context-Sensitive Static Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

FedWM: Federated Crowdsourcing Workforce Management Service for Productive Laziness.
Proceedings of the IEEE International Conference on Web Services, 2023

Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Deep Learning-based Digital Twin for Human Activity Recognition.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Capture-Aware Identification of Mobile RFID Tags With Unreliable Channels.
IEEE Trans. Mob. Comput., 2022

UltraGesture: Fine-Grained Gesture Sensing and Recognition.
IEEE Trans. Mob. Comput., 2022

QoS Driven Task Offloading With Statistical Guarantee in Mobile Edge Computing.
IEEE Trans. Mob. Comput., 2022

Monitoring Browsing Behavior of Customers in Retail Stores via RFID Imaging.
IEEE Trans. Mob. Comput., 2022

Fine-Grained Vibration Based Sensing Using a Smartphone.
IEEE Trans. Mob. Comput., 2022

Adaptively Secure and Fast Processing of Conjunctive Queries Over Encrypted Data.
IEEE Trans. Knowl. Data Eng., 2022

Detection of Information Hiding at Physical Layer in Wireless Communications.
IEEE Trans. Dependable Secur. Comput., 2022

Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

Physical Layer Security in Distributed Antenna Systems Using One-Bit Feedback Information.
IEEE Netw., 2022

Multi-Access Channel Based on Quantum Detection in Wireless Optical Communication.
Entropy, 2022

Hybrid Inlining: A Compositional and Context Sensitive Static Analysis Framework.
CoRR, 2022

Special Issue on IFIP Networking 2019.
Comput. Commun., 2022

Label Inference Attacks Against Vertical Federated Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Regularized Graph Structure Learning with Semantic Knowledge for Multi-variates Time-Series Forecasting.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Field-Based Static Taint Analysis for Industrial Microservices.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

Record and Replay of Online Traffic for Microservices with Automatic Mocking Point Identification.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

Pyraformer: Low-Complexity Pyramidal Attention for Long-Range Time Series Modeling and Forecasting.
Proceedings of the Tenth International Conference on Learning Representations, 2022

DeepScaling: microservices autoscaling for stable CPU utilization in large scale cloud systems.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022

2021
Physical-Layer Authentication in Wirelessly Powered Communication Networks.
IEEE/ACM Trans. Netw., 2021

Pairwise-Based Multi-Attribute Decision Making Approach for Wireless Network.
IEEE/ACM Trans. Netw., 2021

Radiation Constrained Wireless Charger Placement.
IEEE/ACM Trans. Netw., 2021

Distributed Spectrum Sharing for Enterprise Powerline Communication Networks.
IEEE/ACM Trans. Netw., 2021

DeepCC: Multi-Agent Deep Reinforcement Learning Congestion Control for Multi-Path TCP Based on Self-Attention.
IEEE Trans. Netw. Serv. Manag., 2021

Generative Adversarial Network-Based Transfer Reinforcement Learning for Routing With Prior Knowledge.
IEEE Trans. Netw. Serv. Manag., 2021

Connectivity-Constrained Placement of Wireless Chargers.
IEEE Trans. Mob. Comput., 2021

WiTrace: Centimeter-Level Passive Gesture Tracking Using OFDM Signals.
IEEE Trans. Mob. Comput., 2021

Charging Task Scheduling for Directional Wireless Charger Networks.
IEEE Trans. Mob. Comput., 2021

Deep Graph Matching and Searching for Semantic Code Retrieval.
ACM Trans. Knowl. Discov. Data, 2021

Trust Assessment in Online Social Networks.
IEEE Trans. Dependable Secur. Comput., 2021

FPGA Resource Pooling in Cloud Computing.
IEEE Trans. Cloud Comput., 2021

An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing.
Concurr. Comput. Pract. Exp., 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Algorithms for Data and Computation Privacy
Springer, ISBN: 978-3-030-58895-3, 2021

2020
A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems.
IEEE Trans. Wirel. Commun., 2020

Optimizing Geo-Distributed Data Analytics with Coordinated Task Scheduling and Routing.
IEEE Trans. Parallel Distributed Syst., 2020

Online Resource Allocation With Machine Variability: A Bandit Perspective.
IEEE/ACM Trans. Netw., 2020

Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems.
IEEE/ACM Trans. Netw., 2020

A Machine Learning Approach to Blind Multi-Path Classification for Massive MIMO Systems.
IEEE/ACM Trans. Netw., 2020

Spectrum Sharing in mmWave Cellular Networks Using Clustering Algorithms.
IEEE/ACM Trans. Netw., 2020

A Partitioning Approach to RFID Identification.
IEEE/ACM Trans. Netw., 2020

Network Scheduling and Compute Resource Aware Task Placement in Datacenters.
IEEE/ACM Trans. Netw., 2020

Fast and Accurate Detection of Unknown Tags for RFID Systems - Hash Collisions are Desirable.
IEEE/ACM Trans. Netw., 2020

Thresholded Monitoring in Distributed Data Streams.
IEEE/ACM Trans. Netw., 2020

Finding Persistent Items in Distributed Datasets.
IEEE/ACM Trans. Netw., 2020

Publishing Social Network Graph Eigenspectrum With Privacy Guarantees.
IEEE Trans. Netw. Sci. Eng., 2020

Large Scale Characterization of Software Vulnerability Life Cycles.
IEEE Trans. Dependable Secur. Comput., 2020

A Machine Learning Approach to Phase Reference Estimation With Noise.
IEEE Trans. Commun., 2020

A Group-Based Binary Splitting Algorithm for UHF RFID Anti-Collision Systems.
IEEE Trans. Commun., 2020

From M-Ary Query to Bit Query: A New Strategy for Efficient Large-Scale RFID Identification.
IEEE Trans. Commun., 2020

Optimizing Taxi Driver Profit Efficiency: A Spatial Network-Based Markov Decision Process Approach.
IEEE Trans. Big Data, 2020

Differentially Private and Budget-Limited Bandit Learning over Matroids.
INFORMS J. Comput., 2020

Special issue on natural computation, fuzzy systems and knowledge discovery from the ICNC&FSKD 2017.
Neurocomputing, 2020

Zero-error channel capacity of quantum 5-symbol obfuscation model.
Int. J. Embed. Syst., 2020

Unambiguous discrimination of binary coherent states.
Int. J. Comput. Sci. Eng., 2020

Hierarchical Graph Matching Networks for Deep Graph Similarity Learning.
CoRR, 2020

Self-adaptive parameter and strategy based particle swarm optimization for large-scale feature selection problems with multiple classifiers.
Appl. Soft Comput., 2020

An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

An Inter-blockchain Escrow Approach for Fast Bitcoin Payment.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

The Numerical Results of Binary Coherent-State Signal's Quantum Detection in the Presence of Noise.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Fast and Secure kNN Query Processing in Cloud Computing.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Design and Implementation of Datacenter Protocols for Cloud Computing
WorldScientific, ISBN: 9789811224065, 2020

2019
Predictable Privacy-Preserving Mobile Crowd Sensing: A Tale of Two Roles.
IEEE/ACM Trans. Netw., 2019

A De-Compositional Approach to Regular Expression Matching for Network Security.
IEEE/ACM Trans. Netw., 2019

Appearance-consistent Video Object Segmentation Based on a Multinomial Event Model.
ACM Trans. Multim. Comput. Commun. Appl., 2019

Multilevel Model for Video Object Segmentation Based on Supervision Optimization.
IEEE Trans. Multim., 2019

Writing in the Air with WiFi Signals for Virtual Reality Devices.
IEEE Trans. Mob. Comput., 2019

Counting Human Objects Using Backscattered Radio Frequency Signals.
IEEE Trans. Mob. Comput., 2019

Fast Splitting-Based Tag Identification Algorithm For Anti-Collision in UHF RFID System.
IEEE Trans. Commun., 2019

An efficient urban localization method based on speed humps.
Sustain. Comput. Informatics Syst., 2019

Zero-Error Coding via Classical and Quantum Channels in Sensor Networks.
Sensors, 2019

Assessing User Mental Workload for Smartphone Applications With Built-In Sensors.
IEEE Pervasive Comput., 2019

Feedforward neural network based on ensemble evolutionary algorithm with self-adaptive strategy and parameter for intrusion detection.
Int. J. Wirel. Mob. Comput., 2019

A framework of cloud service selection with criteria interactions.
Future Gener. Comput. Syst., 2019

The Network-based Candidate Forwarding Set Optimization Approach for Opportunistic Routing in Wireless Sensor Network.
CoRR, 2019

Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing.
CoRR, 2019

Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network.
CoRR, 2019

Large-Scale Feedforward Neural Network Optimization by a Self-Adaptive Strategy and Parameter Based Particle Swarm Optimization.
IEEE Access, 2019

Speech Based Human Authentication on Smartphones.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Recognizing Driver Talking Direction in Running Vehicles with a Smartphone.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic Environments.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Insecurity and Hardness of Nearest Neighbor Queries Over Encrypted Data.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Particle Swarm Optimization with Filter-based Population Initialization for Feature Selection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Dynamic Resource Allocation for Load Balancing in Fog Environment.
Wirel. Commun. Mob. Comput., 2018

Minimize the Make-span of Batched Requests for FPGA Pooling in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2018

CoMan: Managing Bandwidth Across Computing Frameworks in Multiplexed Datacenters.
IEEE Trans. Parallel Distributed Syst., 2018

A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classification.
IEEE/ACM Trans. Netw., 2018

Constant IP Lookup With FIB Explosion.
IEEE/ACM Trans. Netw., 2018

Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals.
IEEE/ACM Trans. Netw., 2018

Synchronize Inertial Readings From Multiple Mobile Devices in Spatial Dimension.
IEEE/ACM Trans. Netw., 2018

Noise Tolerant Localization for Sensor Networks.
IEEE/ACM Trans. Netw., 2018

OpenFunction: An Extensible Data Plane Abstraction Protocol for Platform-Independent Software-Defined Middleboxes.
IEEE/ACM Trans. Netw., 2018

A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems.
IEEE/ACM Trans. Netw., 2018

Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters.
IEEE/ACM Trans. Netw., 2018

Wireless Charger Placement for Directional Charging.
IEEE/ACM Trans. Netw., 2018

Identifying and Estimating Persistent Items in Data Streams.
IEEE/ACM Trans. Netw., 2018

Radiation Constrained Scheduling of Wireless Charging Tasks.
IEEE/ACM Trans. Netw., 2018

SCAPE: Safe Charging With Adjustable Power.
IEEE/ACM Trans. Netw., 2018

Optimizing Internet Transit Routing for Content Delivery Networks.
IEEE/ACM Trans. Netw., 2018

Fast Identification of Blocked RFID Tags.
IEEE Trans. Mob. Comput., 2018

Semantic-Aware Searching Over Encrypted Data for Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Inf. Forensics Secur., 2018

QGesture: Quantifying Gesture Distance and Direction with WiFi Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

PCIAS: Precise and Contactless Measurement of Instantaneous Angular Speed Using a Smartphone.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

An evolutionary classification method based on fireworks algorithm.
Int. J. Bio Inspired Comput., 2018

Aggregation Functions Considering Criteria Interrelationships in Fuzzy Multi-Criteria Decision Making: State-of-the-Art.
IEEE Access, 2018

WiTrace: Centimeter-Level Passive Gesture Tracking Using WiFi Signals.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

UltraGesture: Fine-Grained Gesture Sensing and Recognition.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Depth Aware Finger Tapping on Virtual Displays.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Multi-Objective Data Placement Method for IoT Applications Over Big Data Using NSGA-II.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Placement of Connected Wireless Chargers.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Finding Persistent Items in Distributed Datasets.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Fast OpenFlow Table Lookup with Fast Update.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Cache Assisted Randomized Sharing Counters in Network Measurement.
Proceedings of the 47th International Conference on Parallel Processing, 2018

Distributed access control in wireless networks.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

The Insecurity of Home Digital Voice Assistants - Vulnerabilities, Attacks and Countermeasures.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

A Heuristic Virtual Machine Scheduling Method for Load Balancing in Fog-Cloud Computing.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
A Shifting Framework for Set Queries.
IEEE/ACM Trans. Netw., 2017

STPP: Spatial-Temporal Phase Profiling-Based Method for Relative RFID Tag Localization.
IEEE/ACM Trans. Netw., 2017

PASE: Synthesizing Existing Transport Strategies for Near-Optimal Data Center Transport.
IEEE/ACM Trans. Netw., 2017

RFID Estimation With Blocker Tags.
IEEE/ACM Trans. Netw., 2017

Multi-Category RFID Estimation.
IEEE/ACM Trans. Netw., 2017

Top-k Queries for Categorized RFID Systems.
IEEE/ACM Trans. Netw., 2017

Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks.
IEEE/ACM Trans. Netw., 2017

Safe Charging for Wireless Power Transfer.
IEEE/ACM Trans. Netw., 2017

Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services Based on TCP Loss Ratio and Round Trip Time.
IEEE/ACM Trans. Netw., 2017

Automated Online Exam Proctoring.
IEEE Trans. Multim., 2017

Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures.
IEEE Trans. Mob. Comput., 2017

A Traffic Flow Approach to Early Detection of Gathering Events: Comprehensive Results.
ACM Trans. Intell. Syst. Technol., 2017

Firewall Fingerprinting and Denial of Firewalling Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds.
Secur. Commun. Networks, 2017

Device-Free Human Activity Recognition Using Commercial WiFi Devices.
IEEE J. Sel. Areas Commun., 2017

Dynamic Scaling of Virtualized, Distributed Service Chains: A Case Study of IMS.
IEEE J. Sel. Areas Commun., 2017

Recognizing Keystrokes Using WiFi Devices.
IEEE J. Sel. Areas Commun., 2017

The Insecurity of Home Digital Voice Assistants - Amazon Alexa as a Case Study.
CoRR, 2017

A Speed Hump Sensing Approach to Global Positioning in Urban Cities without Gps Signals.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Performance of Container Networking Technologies.
Proceedings of the Workshop on Hot Topics in Container Networking and Networked Systems, 2017

A graph theoretic approach to fast and accurate malware detection.
Proceedings of the 2017 IFIP Networking Conference, 2017

Cascade size prediction in online social networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

A template approach for group key distribution in dynamic ad-hoc groups.
Proceedings of the 2017 IFIP Networking Conference, 2017

Radiation Constrained Scheduling of Wireless Charging Tasks.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion control.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Optimizing wireless charger placement for directional charging.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Multipath TCP traffic diversion attacks and countermeasures.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Adaptively Secure Conjunctive Query Processing over Encrypted Data for Cloud Computing.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Secure KNN Queries over Encrypted Data: Dimensionality Is Not Always a Curse.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Fast and Accurate Tracking of Population Dynamics in RFID Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Freeweb: P2P-Assisted Collaborative Censorship-Resistant Web Browsing.
IEEE Trans. Parallel Distributed Syst., 2016

Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild.
IEEE/ACM Trans. Netw., 2016

Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping.
IEEE/ACM Trans. Netw., 2016

Characterizing and Optimizing Cellular Network Performance During Crowded Events.
IEEE/ACM Trans. Netw., 2016

Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching.
IEEE/ACM Trans. Netw., 2016

Packet Classification Using Binary Content Addressable Memory.
IEEE/ACM Trans. Netw., 2016

Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing.
IEEE/ACM Trans. Netw., 2016

A Difference Resolution Approach to Compressing Access Control Lists.
IEEE/ACM Trans. Netw., 2016

Editor's Note.
IEEE Trans. Dependable Secur. Comput., 2016

A Shifting Bloom Filter Framework for Set Queries.
Proc. VLDB Endow., 2016

Finding Persistent Items in Data Streams.
Proc. VLDB Endow., 2016

Modeling packet loss probability and busy time in multi-hop wireless networks.
EURASIP J. Wirel. Commun. Netw., 2016

OpenFunction: Data Plane Abstraction for Software-Defined Middleboxes.
CoRR, 2016

Towards Designing PLC Networks for Ubiquitous Connectivity in Enterprises.
CoRR, 2016

Noisy Bloom Filters for Multi-Set Membership Testing.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing.
Proceedings of the Provable Security, 2016

A stochastic frame based approach to RFID tag searching.
Proceedings of the 2016 IFIP Networking Conference, 2016

Device-free gesture tracking using acoustic signals: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Device-free gesture tracking using acoustic signals.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Characterizing caching workload of a large commercial Content Delivery Network.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Top-k queries for multi-category RFID systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Radiation constrained wireless charger placement.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A sorted partitioning approach to high-speed and fast-update OpenFlow classification.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Fit the elephant in a box - towards IP lookup at on-chip memory access speed.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxes.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Omnidirectional chargability with directional antennas.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A template approach to group key establishment in dynamic ad-hoc groups.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Boosting powerline communications for ubiquitous connectivity in enterprises.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A De-compositional Approach to Regular Expression Matching for Network Security Applications.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

The Internet is for Porn: Measurement and Analysis of Online Adult Traffic.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Social Graph Publishing with Privacy Guarantees.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Detecting national political unrest on Twitter.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Gait recognition using wifi signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

A traffic flow approach to early detection of gathering events.
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2016, Burlingame, California, USA, October 31, 2016

Network Scheduling Aware Task Placement in Datacenters.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

The Rich and the Poor: A Markov Decision Process Approach to Optimizing Taxi Driver Revenue Efficiency.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Online VNF Scaling in Datacenters.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Probabilistic Optimal Tree Hopping for RFID Identification.
IEEE/ACM Trans. Netw., 2015

Fast and Accurate Estimation of RFID Tags.
IEEE/ACM Trans. Netw., 2015

Privacy-Preserving Quantification of Cross-Domain Network Reachability.
IEEE/ACM Trans. Netw., 2015

Geospatial and Temporal Dynamics of Application Usage in Cellular Data Networks.
IEEE Trans. Mob. Comput., 2015

Topological Transformation Approaches to Database Query Processing.
IEEE Trans. Knowl. Data Eng., 2015

Sampling Bloom Filter-Based Detection of Unknown RFID Tags.
IEEE Trans. Commun., 2015

Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way.
IEEE Trans. Computers, 2015

Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Relative Localization of RFID Tags using Spatial-Temporal Phase Profiling.
Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation, 2015

Understanding and Modeling of WiFi Signal Based Human Activity Recognition.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Keystroke Recognition Using WiFi Signals.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

RFID cardinality estimation with blocker tags.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Human object estimation via backscattered radio frequency signal.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Privacy Preserving String Matching for Cloud Computing.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

IM session identification by outlier detection in cross-correlation functions.
Proceedings of the 49th Annual Conference on Information Sciences and Systems, 2015

2014
Energy-Aware Virtual Network Embedding.
IEEE/ACM Trans. Netw., 2014

Bypassing Space Explosion in High-Speed Regular Expression Matching.
IEEE/ACM Trans. Netw., 2014

Fast Regular Expression Matching Using Small TCAM.
IEEE/ACM Trans. Netw., 2014

A Multiple Hashing Approach to Complete Identification of Missing RFID Tags.
IEEE Trans. Commun., 2014

Fast Range Query Processing with Strong Privacy Protection for Cloud Computing.
Proc. VLDB Endow., 2014

High-Speed Application Protocol Parsing and Extraction for Deep Flow Inspection.
IEEE J. Sel. Areas Commun., 2014

Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation.
IEEE J. Sel. Areas Commun., 2014

Multiple bulk data transfers scheduling among datacenters.
Comput. Networks, 2014

Noise can help: accurate and efficient per-flow latency measurement without packet probing and time stamping.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Revisiting caching in content delivery networks.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Understanding the impact of network dynamics on mobile video user engagement.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Guarantee IP lookup performance with FIB explosion.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Friends, not foes: synthesizing existing transport strategies for data center networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Privacy and integrity preserving multi-dimensional range queries for cloud computing.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

An overlay automata approach to regular expression matching.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Breaching IM session privacy using causality.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Large-Scale Measurement and Characterization of Cellular Machine-to-Machine Traffic.
IEEE/ACM Trans. Netw., 2013

Quantifying and Verifying Reachability for Access Controlled Networks.
IEEE/ACM Trans. Netw., 2013

An Information-Theoretical Approach to High-Speed Flow Nature Identification.
IEEE/ACM Trans. Netw., 2013

Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
IEEE/ACM Trans. Netw., 2013

Dynamic camouflage event based malicious node detection architecture.
J. Supercomput., 2013

Identifying Leaders and Followers in Online Social Networks.
IEEE J. Sel. Areas Commun., 2013

A Distributed Algorithm for Identifying Information Hubs in Social Networks.
IEEE J. Sel. Areas Commun., 2013

TCAMChecker: A Software Approach to the Error Detection and Correction of TCAM-Based Networking Systems.
J. Netw. Syst. Manag., 2013

Modeling Morphology of Social Network Cascades
CoRR, 2013

A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing.
CoRR, 2013

A first look at cellular network performance during crowded events.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

Time- and Energy-Efficient Detection of Unknown Tags in Large-Scale RFID Systems.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A Multi-partitioning Approach to Building Fast and Accurate Counting Bloom Filters.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

A digital watermarking approach to secure and precise range query processing in sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Freeweb: P2P-Assisted Collaborative Censorship-Resistant Web Browsing.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

A few bits are enough - ASIC friendly Regular Expression matching for high speed network security systems.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Who are you talking to? Breaching privacy in encrypted IM networks.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Cross-path inference attacks on multipath TCP.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

GAMT: A fast and scalable IP lookup engine for GPU-based software routers.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

Scalable TCAM-based regular expression matching with compressed finite automata.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs.
IEEE/ACM Trans. Netw., 2012

Privacy- and integrity-preserving range queries in sensor networks.
IEEE/ACM Trans. Netw., 2012

Firewall policy change-impact analysis.
ACM Trans. Internet Techn., 2012

Systematic Structural Testing of Firewall Policies.
IEEE Trans. Netw. Serv. Manag., 2012

Towards high performance security policy evaluation.
J. Supercomput., 2012

First step towards automatic correction of firewall policy faults.
ACM Trans. Auton. Adapt. Syst., 2012

A secure cookie scheme.
Comput. Networks, 2012

First Step toward Cloud-Based Firewalling.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

A first look at cellular machine-to-machine traffic: large scale measurement and characterization.
Proceedings of the ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, 2012

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms.
Proceedings of the NETWORKING 2012, 2012

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Every bit counts: fast and scalable RFID estimation.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Characterizing geospatial dynamics of application usage in a 3G cellular data network.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Firewall fingerprinting.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A large scale exploratory analysis of software vulnerability life cycles.
Proceedings of the 34th International Conference on Software Engineering, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

A Prefiltering Approach to Regular Expression Matching for Network Security Systems.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Compressing Network Access Control Lists.
IEEE Trans. Parallel Distributed Syst., 2011

Privacy Preserving Collaborative Enforcement of Firewall Policies in Virtual Private Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough.
IEEE Trans. Parallel Distributed Syst., 2011

Topological transformation approaches to TCAM-based packet classification.
IEEE/ACM Trans. Netw., 2011

Designing Fast and Scalable XACML Policy Evaluation Engines.
IEEE Trans. Computers, 2011

Characterizing and modeling internet traffic dynamics of cellular devices.
Proceedings of the SIGMETRICS 2011, 2011

A Random Walk Approach to Modeling the Dynamics of the Blogosphere.
Proceedings of the NETWORKING 2011, 2011

Collaborative firewalling in wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A distributed and privacy preserving algorithm for identifying information hubs in social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Offset addressing approach to memory-efficient IP address lookup.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A cross-domain privacy-preserving protocol for cooperative firewall optimization.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving cross-domain network reachability quantification.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Large scale Hamming distance query processing.
Proceedings of the 27th International Conference on Data Engineering, 2011

Split: Optimizing Space, Power, and Throughput for TCAM-Based Classification.
Proceedings of the 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011

2010
Complete Redundancy Removal for Packet Classifiers in TCAMs.
IEEE Trans. Parallel Distributed Syst., 2010

TCAM Razor: a systematic approach towards minimizing packet classifiers in TCAMs.
IEEE/ACM Trans. Netw., 2010

RFIDGuard: a lightweight privacy and authentication protocol for passive RFID tags.
Secur. Commun. Networks, 2010

Transforming Range Queries To Equivalent Box Queries To Optimize Page Access.
Proc. VLDB Endow., 2010

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems.
Proceedings of the 19th USENIX Security Symposium, 2010

SafeQ: Secure and Efficient Query Processing in Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Quantifying and Querying Network Reachability.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Firewall Design and Analysis
Computer and Network Security 4, World Scientific, ISBN: 978-981-4468-37-4, 2010

2009
Firewall Policy Queries.
IEEE Trans. Parallel Distributed Syst., 2009

PAP: A privacy and authentication protocol for passive RFID tags.
Comput. Commun., 2009

Firewall policy verification and troubleshooting.
Comput. Networks, 2009

Fault Localization for Firewall Policies.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Topological transformation approaches to optimizing TCAM-based packet classification systems.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009

CENDA-Camouflage Event Based Malicious Node Detection Architecture.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

High-Speed Flow Nature Identification.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Diverse Firewall Design.
IEEE Trans. Parallel Distributed Syst., 2008

Formal Specification and Verification of a Secure Micropayment Protocol.
Int. J. Netw. Secur., 2008

Algorithmic approaches to redesigning tcam-based systems.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Xengine: a fast and scalable XACML policy evaluation engine.
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008

Collaborative enforcement of firewall policies in virtual private networks.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Firewall Compressor: An Algorithm for Minimizing Firewall Policies.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Formal Verification of Firewall Policies.
Proceedings of IEEE International Conference on Communications, 2008

Securing Sensor Nodes Against Side Channel Attacks.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Verification of Distributed Firewalls.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
SPP: An anti-phishing single password protocol.
Comput. Networks, 2007

Structured firewall design.
Comput. Networks, 2007

Change-Impact Analysis of Firewall Policies.
Proceedings of the Computer Security, 2007

2006
Key bundles and parcels: Secure communication in many groups.
Comput. Networks, 2006

On capturing and containing E-mail worms.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Zmail: Zero-Sum Free Market Control of Spam.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A secure cookie protocol.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

A Model of Stateful Firewalls and Its Properties.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Complete Redundancy Detection in Firewalls.
Proceedings of the Data and Applications Security XIX, 2005

2004
Firewall Queries.
Proceedings of the Principles of Distributed Systems, 8th International Conference, 2004

Firewall Design: Consistency, Completeness, and Compactness.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Formal Specification and Verification of a Micropayment Protocol.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
Key Bundels and Parcels: Secure Communication in Many Groups.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003


  Loading...