David K. Y. Yau

According to our database1, David K. Y. Yau authored at least 150 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Performance and Resilience of Cyber-Physical Control Systems with Reactive Attack Mitigation.
CoRR, 2019

Assessing and mitigating impact of time delay attack: a case study for power grid frequency control.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

2018
Optimal-Cost Scheduling of Electrical Vehicle Charging Under Uncertainty.
IEEE Trans. Smart Grid, 2018

On Stability and Robustness of Demand Response in V2G Mobile Energy Networks.
IEEE Trans. Smart Grid, 2018

Exploiting Electrical Grid for Accurate and Secure Clock Synchronization.
TOSN, 2018

Natural Timestamps in Powerline Electromagnetic Radiation.
TOSN, 2018

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems.
TCPS, 2018

Defense Strategies for Asymmetric Networked Systems with Discrete Components.
Sensors, 2018

Cyber-Physical Correlation Effects in Defense Games for Large Discrete Infrastructures.
Games, 2018

Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
CoRR, 2018

Cost-Benefit Analysis of Moving-Target Defense in Power Grids.
CoRR, 2018

Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Never say never: Authoritative TLD nameserver-powered DNS amplification.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Cost-Benefit Analysis of Moving-Target Defense in Power Grids.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks.
TOSN, 2017

Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
IEEE Trans. Information Forensics and Security, 2017

Collaborative Load Management with Safety Assurance in Smart Grids.
TCPS, 2017

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems.
CoRR, 2017

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation.
CoRR, 2017

Botnet Command and Control Architectures Revisited: Tor Hidden Services and Fluxing.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Defense strategies for asymmetric networked systems under composite utilities.
Proceedings of the 2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2017

Natural timestamping using powerline electromagnetic radiation.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

Cost of differential privacy in demand reporting for smart grid economic dispatch.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Game-theoretic strategies for asymmetric networked systems.
Proceedings of the 20th International Conference on Information Fusion, 2017

Enforcing Memory Safety in Cyber-Physical Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation.
Proceedings of the Eighth International Conference on Future Energy Systems, 2017

Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach.
IEEE/ACM Trans. Netw., 2016

Scheduling for electricity cost in a smart grid.
J. Scheduling, 2016

Impact of integrity attacks on real-time pricing in smart grids.
CoRR, 2016

Data-Driven Evaluation of Building Demand Response Capacity.
CoRR, 2016

Data Driven Physical Modelling For Intrusion Detection In Cyber Physical Systems.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Exploiting Power Grid for Accurate and Secure Clock Synchronization in Industrial IoT.
Proceedings of the 2016 IEEE Real-Time Systems Symposium, 2016

Poster: Taming Asymmetric Delays for Network Time Protocol Using Electric Grid Frequency.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

On applying fault detectors against false data injection attacks in cyber-physical control systems.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Optimal False Data Injection Attack against Automatic Generation Control in Power Grids.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

On False Data Injection Attacks Against Railway Traction Power Systems.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
Integrity Attacks on Real-Time Pricing in Electric Power Grids.
ACM Trans. Inf. Syst. Secur., 2015

Tracking appliance usage information using harmonic signature sensing.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

JICE: Joint data compression and encryption for wireless energy auditing networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Integrated prefetching and caching for adaptive video streaming over HTTP: an online approach.
Proceedings of the 6th ACM Multimedia Systems Conference, 2015

On resilience of cyber-physical infrastructures using discrete product-form games.
Proceedings of the 18th International Conference on Information Fusion, 2015

On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Dynamic Activation Policies for Event Capture in Rechargeable Sensor Network.
IEEE Trans. Parallel Distrib. Syst., 2014

Data-driven evaluation of building demand response capacity.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

ERUPT: Energy-efficient trustworthy provenance trees for wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Proactive fault-tolerant aggregation protocol for privacy-assured smart metering.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Safety-assured collaborative load management in smart grids.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014

Cyber-physical correlations for infrastructure resilience: A game-theoretic approach.
Proceedings of the 17th International Conference on Information Fusion, 2014

2013
Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection.
IEEE Trans. Smart Grid, 2013

Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids.
IEEE Trans. Smart Grid, 2013

Privacy Vulnerability of Published Anonymous Mobility Traces.
IEEE/ACM Trans. Netw., 2013

Energy Provisioning in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2013

EnergyTrack: Sensor-Driven Energy Use Analysis System.
Proceedings of the BuildSys 2013, 2013

Supero: A sensor system for unsupervised residential power usage monitoring.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications, 2013

Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013

Near Optimal Charging and Scheduling Scheme for Stochastic Event Capture with Rechargeable Sensors.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Game-theoretic resilience analysis of Cyber-Physical Systems.
Proceedings of the 1st IEEE International Conference on Cyber-Physical Systems, 2013

Insured access: an approach to ad-hoc information sharing for virtual organizations.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Scheduling for Electricity Cost in Smart Grid.
Proceedings of the Combinatorial Optimization and Applications, 2013

Impact of integrity attacks on real-time pricing in smart grids.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Stochastic Steepest Descent Optimization of Multiple-Objective Mobile Sensor Coverage.
IEEE Trans. Vehicular Technology, 2012

Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep.
IEEE Trans. Parallel Distrib. Syst., 2012

Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2012

Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.
IEEE Trans. Dependable Sec. Comput., 2012

Using anisotropic magnetoresistive (AMR) sensor arrays for electric sub-metering.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Scalable load disaggregation system using distributed electrical signature detection.
Proceedings of the BuildSys '12 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, 2012

Dynamic Activation Policies for Event Capture with Rechargeable Sensors.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Cloud computing infrastructure robustness: A game theory approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

On performance of individual, collective and network detection of propagative sources.
Proceedings of the 15th International Conference on Information Fusion, 2012

2011
Control and optimization over wireless networks.
J. Network and Computer Applications, 2011

On robustness of a class of Cyber-Physical Network Infrastructures.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Energy provisioning in wireless rechargeable sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
On Optimal Information Capture by Energy-Constrained Mobile Sensors.
IEEE Trans. Vehicular Technology, 2010

Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage.
TOSN, 2010

Identification of low-level point radioactive sources using a sensor network.
TOSN, 2010

Detection of intelligent mobile target in a mobile sensor network.
IEEE/ACM Trans. Netw., 2010

Cross-Layer Optimization of Correlated Data Gathering in Wireless Sensor Networks.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Optimizing Link Assignment to Enhance Service in Probabilistic Network.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Privacy vulnerability of published anonymous mobility traces.
Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, 2010

Cyber-physical trade-offs in distributed detection networks.
Proceedings of the 2010 IEEE Conference on Multisensor Fusion and Integration for Intelligent Systems, 2010

Stochastic Steepest-Descent Optimization of Multiple-Objective Mobile Sensor Coverage.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Localization leads to improved distributed detection under non-smooth distributions.
Proceedings of the 13th Conference on Information Fusion, 2010

2009
Coverage in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Matching and Fairness in Threat-Based Mobile Sensor Coverage.
IEEE Trans. Mob. Comput., 2009

Distance Reduction in Mobile Wireless Communication: Lower Bound Analysis and Practical Attainment.
IEEE Trans. Mob. Comput., 2009

Energy-efficient capture of stochastic events by global- and local-periodic network coverage.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

Performance Analysis of Stochastic Network Coverage with Limited Mobility.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

On optimal information capture by energy-constrained mobile sensor.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Improved SPRT detection using localization with application to radiation sources.
Proceedings of the 12th International Conference on Information Fusion, 2009

2008
OS for Graphics and Multimedia.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching.
I. J. Network Security, 2008

Accurate localization of low-level radioactive source under noise and measurement errors.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

A low-cost, low-data-rate rapid structural assessment network: Design, implementation, and experimentation.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Identification of Low-Level Point Radiation Sources Using a Sensor Network.
Proceedings of the 7th International Conference on Information Processing in Sensor Networks, 2008

A hash-TLB approach for MMU virtualization in xen/IA64.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Localization under random measurements with application to radiation sources.
Proceedings of the 11th International Conference on Information Fusion, 2008

Quality of monitoring of stochastic events by periodic & proportional-share scheduling of sensor coverage.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
A Distributed Throttling Approach for Handling High Bandwidth Aggregates.
IEEE Trans. Parallel Distrib. Syst., 2007

SEAL: A secure communication library for building dynamic group key agreement applications.
Journal of Systems and Software, 2007

Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

On Intelligent Mobile Target Detection in a Mobile Sensor Network.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Distance Reduction in Mobile Wireless Communication: Lower Bound Analysis and Practical Attainment.
Proceedings of the 15th International Symposium on Modeling, 2007

On Area of Interest Coverage in Surveillance Mobile Sensor Networks.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

A sensor-cyber network testbed for plume detection, identification, and tracking.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Incentive and service differentiation in P2P networks: a game theoretic approach.
IEEE/ACM Trans. Netw., 2006

Distributed collaborative key agreement and authentication protocols for dynamic peer groups.
IEEE/ACM Trans. Netw., 2006

On the Effectiveness of Movement Prediction to Reduce Energy Consumption in Wireless Communication.
IEEE Trans. Mob. Comput., 2006

Distributed mechanism in detecting and defending against the low-rate TCP attack.
Computer Networks, 2006

Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds.
Computer Networks, 2006

Quality of service provisioning for composable routing elements.
Computer Networks, 2006

2005
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers.
IEEE Trans. Parallel Distrib. Syst., 2005

Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles.
IEEE/ACM Trans. Netw., 2005

A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation.
IEEE Trans. Multimedia, 2005

An opportunistic scheduler to balance performance measures and energy consumption in wireless networks: design and implementation.
Proceedings of the 1st International ICST Conference on Wireless Internet, 2005

Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback Control.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
A Proportional-Delay DiffServ-Enabled Web Server: Admission Control and Dynamic Adaptation.
IEEE Trans. Parallel Distrib. Syst., 2004

Composition of Java-based router elements and its application to generalized video multicast.
IEEE Network, 2004

A hybrid architecture for cost-effective on-demand media streaming.
Computer Networks, 2004

A game theoretic approach to provide incentive and service differentiation in P2P networks.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Small world overlay P2P networks.
Proceedings of the Quality of Service, 2004

Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

An Incentive Mechanism for P2P Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Incentive P2P networks: a protocol to encourage information sharing and contribution.
SIGMETRICS Performance Evaluation Review, 2003

On the effectiveness of movement prediction to reduce energy consumption in wireless communication.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

2002
Heterogeneous CPU Services Using Differentiated Admission Control.
Multimedia Tools Appl., 2002

Admission control and dynamic adaptation for a proportional-delay diffserv-enabled web server.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

A case for a multi-key secure video proxy: theory, design, and implementation.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002

You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers.
Proceedings of the 10th International Workshop on Modeling, 2002

Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

Predicting energy consumption of MPEG video playback on handhelds.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

2001
Adaptive proportional delay differentiated services: characterization and performance evaluation.
IEEE/ACM Trans. Netw., 2001

Automatic image segmentation by integrating color-edge extraction and seeded region growing.
IEEE Trans. Image Processing, 2001

Model-based semantic object extraction for content-based video representation and indexing.
Proceedings of the Storage and Retrieval for Media Databases 2001, 2001

2000
Adaptive motion-compensated video coding scheme towards content-based bit rate allocation.
J. Electronic Imaging, 2000

Intelligent QoS support for an adaptive video service.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

Characterization and Performance Evaluation for Proportional Delay Differentiated Services.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000

1999
ARC-H: Uniform CPU Scheduling for Heterogeneous Services.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
Migrating sockets--end system support for networking with quality of service guarantees.
IEEE/ACM Trans. Netw., 1998

Operating system support for distributed multimedia.
Int. J. Intell. Syst., 1998

1997
Adaptive rate-controlled scheduling for multimedia applications.
IEEE/ACM Trans. Netw., 1997

Migrating Sockets for networking with quality of service guarantees.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
A lossless smoothing algorithm for compressed video.
IEEE/ACM Trans. Netw., 1996

Adaptive Rate-Controlled Scheduling for Multimedia Applications.
Proceedings of the Forth ACM International Conference on Multimedia '96, 1996

1994
An Algorithm for Lossless Smoothing of MPEG Video.
Proceedings of the ACM SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, London, UK, August 31, 1994


  Loading...