George Kesidis

Orcid: 0000-0001-7947-8127

Affiliations:
  • Pennsylvania State University, University Park, USA


According to our database1, George Kesidis authored at least 275 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks.
CoRR, 2024

GPU Cluster Scheduling for Network-Sensitive Deep Learning.
CoRR, 2024

Temporal-Distributed Backdoor Attack against Video Based Action Recognition.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Age of information using Markov-renewal methods.
Queueing Syst. Theory Appl., February, 2023

Post-Training Overfitting Mitigation in DNN Classifiers.
CoRR, 2023

Backdoor Mitigation by Correcting the Distribution of Neural Activations.
CoRR, 2023

Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection.
CoRR, 2023

Anomaly detection of adversarial examples using class-conditional generative adversarial networks.
Comput. Secur., 2023

A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers.
Proceedings of the 33rd IEEE International Workshop on Machine Learning for Signal Processing, 2023

Container Sizing for Microservices with Dynamic Workload by Online Optimization.
Proceedings of the 9th International Workshop on Container Technologies and Container Clouds, 2023

Stash: A Comprehensive Stall-Centric Characterization of Public Cloud VMs for Distributed Deep Learning.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Detection of Backdoors in Trained Classifiers Without Access to the Training Set.
IEEE Trans. Neural Networks Learn. Syst., 2022

In search of the least age of information.
Queueing Syst. Theory Appl., 2022

Training set cleansing of backdoor poisoning by self-supervised representation learning.
CoRR, 2022

Analysis of Distributed Deep Learning in the Cloud.
CoRR, 2022

IaaS Procurement by Simulated Annealing.
CoRR, 2022

Universal Post-Training Backdoor Detection.
CoRR, 2022

Multi-resource fair allocation for consolidated flash-based caching systems.
Proceedings of the Middleware '22: 23rd International Middleware Conference, Quebec, QC, Canada, November 7, 2022

Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Detecting Backdoor Attacks against Point Cloud Classifiers.
Proceedings of the IEEE International Conference on Acoustics, 2022

Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2022

Splice: An Automated Framework for Cost-and Performance-Aware Blending of Cloud Services.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set.
Neural Comput., 2021

Backdoor Attack and Defense for Deep Regression.
CoRR, 2021

Robust and Active Learning for Deep Neural Network Regression.
CoRR, 2021

Age of Information for Small Buffer Systems.
CoRR, 2021

Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks.
CoRR, 2021

Age of information distribution under dynamic service preemption.
CoRR, 2021

Age of information without service preemption.
CoRR, 2021

Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing.
Comput. Secur., 2021

A Backdoor Attack against 3D Point Cloud Classifiers.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set.
Proceedings of the IEEE International Conference on Acoustics, 2021

On Merits and Viability of Multi-Cloud Serverless.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

SHOWAR: Right-Sizing And Efficient Scheduling of Microservices.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

CASH: A Credit Aware Scheduling for Public Cloud Platforms.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?
IEEE/ACM Trans. Netw., 2020

TB/GI/1 queues with arrival traffic envelopes.
SIGMETRICS Perform. Evaluation Rev., 2020

The distribution of age-of-information performance measures for message processing systems.
Queueing Syst. Theory Appl., 2020

Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks.
Proc. IEEE, 2020

Scanning the Issue.
Proc. IEEE, 2020

Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.
Proceedings of the 30th IEEE International Workshop on Machine Learning for Signal Processing, 2020

Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Cloud.
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, 2020

SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and IaaS.
Proceedings of the Middleware '20: 21st International Middleware Conference, 2020

Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Microservices made attack-resilient using unsupervised service fissioning.
Proceedings of the 13th European Workshop on Systems Security, 2020

A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers.
Proceedings of the Dynamic Data Driven Applications Systems, 2020

2019
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
Neural Comput., 2019

A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers.
IEEE Netw. Lett., 2019

VNF Placement Optimization at the Edge and Cloud <sup>†</sup>.
Future Internet, 2019

Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.
CoRR, 2019

Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz Margin p-Values for Deep Neural Network Classifiers.
CoRR, 2019

A caching system with object sharing.
CoRR, 2019

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.
CoRR, 2019

Temporal Overbooking of Lambda Functions in the Cloud.
CoRR, 2019

A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense.
Proceedings of the 29th IEEE International Workshop on Machine Learning for Signal Processing, 2019

Overbooking Lambda Functions in the Cloud.
Proceedings of the 5th International Workshop on Container Technologies and Container Clouds, 2019

When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers.
Proceedings of the IEEE International Conference on Acoustics, 2019

SpIitServe: Efficiently Splitting Complex Workloads Across FaaS and IaaS.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers.
IEEE Trans. Parallel Distributed Syst., 2018

Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability.
ACM Trans. Auton. Adapt. Syst., 2018

Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations.
IEEE Syst. J., 2018

A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters.
CoRR, 2018

Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public Cloud.
CoRR, 2018

Average age of coupon type and related average age of information.
CoRR, 2018

Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms.
CoRR, 2018

Constrained max-min fair scheduling of variable-length packet-flows to multiple servers.
Ann. des Télécommunications, 2018

Considerations for a Successful Network Service Chain Deployment.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Balancing Delay and Cost in Virtual Network Function Placement and Chaining.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Anomaly Detection of Attacks (Ada) on DNN Classifiers at Test Time.
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018

Unsupervised Parsimonious Cluster-Based Anomaly Detection (PCAD).
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018

Scheduling Distributed Resources in Heterogeneous Private Clouds.
Proceedings of the 26th IEEE International Symposium on Modeling, 2018

An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance<sup>*</sup>.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model.
Proceedings of the 2018 International Conference on Computing, 2018

Stationary Distribution of a Generalized LRU-MRU Content Cache.
Proceedings of the 2018 International Conference on Computing, 2018

A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers.
Proceedings of the IEEE Global Communications Conference, 2018

Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response.
Proceedings of the Ninth International Conference on Future Energy Systems, 2018

Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem.
IEEE Trans. Netw. Serv. Manag., 2017

A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes.
IEEE Trans. Neural Networks Learn. Syst., 2017

Using Burstable Instances in the Public Cloud: Why, When and How?
Proc. ACM Meas. Anal. Comput. Syst., 2017

Optimal virtualized network function allocation for an SDN enabled cloud.
Comput. Stand. Interfaces, 2017

Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.
CoRR, 2017

Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part II.
CoRR, 2017

Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
CoRR, 2017

Efficient max-min and proportional fair constrained multiresource scheduling.
CoRR, 2017

Markovian models of Internet Caches including Closed-Form Stationary Distributions.
CoRR, 2017

Adversarial learning: A critical review and active learning study.
Proceedings of the 27th IEEE International Workshop on Machine Learning for Signal Processing, 2017

Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processors.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Multicommodity games in public-cloud markets considering subadditive resource demands.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Per-Server Dominant-Share Fairness (PS-DSF): A multi-resource fair allocation mechanism for heterogeneous servers.
Proceedings of the IEEE International Conference on Communications, 2017

Flow based botnet detection through semi-supervised active learning.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

Regulating wireless access costs for not vertically integrated content providers.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

A simulation framework for uneconomic virtual bidding in day-ahead electricity markets.
Proceedings of the 2017 American Control Conference, 2017

2016
A Stable Approach for Routing Queries in Unstructured P2P Networks.
IEEE/ACM Trans. Netw., 2016

On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk.
SIGMETRICS Perform. Evaluation Rev., 2016

IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Security and Privacy for Emerging Smart Community Infrastructures.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Dynamic virtualized network function allocation in a multi-cloud environment.
Proceedings of the 23rd International Conference on Telecommunications, 2016

Neutrality in Future Public Clouds: Implications and Challenges.
Proceedings of the 8th USENIX Workshop on Hot Topics in Cloud Computing, 2016

Optimal Power Flow with Random Wind Resources.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Resource Management and Orchestration for a Dynamic Service Chain Steering Model.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Profiling Memory Vulnerability of Big-Data Applications.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Migration to a non-neutral internet: Economics modeling and analysis of impact.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Multiperiod subscription pricing for cellular wireless entrants.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

Dynamic traffic steering of multi-tenant virtualized network functions in SDN enabled data centers.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

Performance analysis of virtualized network functions on virtualized systems architectures.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

2015
Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems.
IEEE/ACM Trans. Netw., 2015

Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker Intention.
IEEE Trans. Knowl. Data Eng., 2015

Network calculus for parallel processing.
SIGMETRICS Perform. Evaluation Rev., 2015

Optimizing cluster formation in super-peer networks via local incentive design.
Peer-to-Peer Netw. Appl., 2015

Generation bidding game with potentially false attestation of flexible demand.
EURASIP J. Adv. Signal Process., 2015

Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data.
Proceedings of the 25th IEEE International Workshop on Machine Learning for Signal Processing, 2015

Roaming charges for customers of cellular-wireless entrant providers.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

On Privacy Preserving Partial Image Sharing.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Recouping Energy Costs From Cloud Tenants: Tenant Demand Response Aware Pricing Design.
Proceedings of the 2015 ACM Sixth International Conference on Future Energy Systems, 2015

2014
Instance-Level Constraint-Based Semisupervised Learning With Imposed Space-Partitioning.
IEEE Trans. Neural Networks Learn. Syst., 2014

Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model.
SIGMETRICS Perform. Evaluation Rev., 2014

A Game of Uncoordinated Sharing of Private Spectrum Commons.
SIGMETRICS Perform. Evaluation Rev., 2014

Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands.
IEEE J. Sel. Areas Commun., 2014

Generation bidding game with flexible demand.
CoRR, 2014

Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model.
CoRR, 2014

Network calculus for parallel processing.
CoRR, 2014

Golden-rule capacity allocation for distributed delay management in peer-to-peer networks.
CoRR, 2014

Roaming charges for customers of cellular-wireless entrant and incumbent providers.
CoRR, 2014

An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies.
CoRR, 2014

Scalable and Anonymous Modeling of Large Populations of Flexible Appliances.
CoRR, 2014

Tit-for-tat capacity allocation for distributed delay management in peer-to-peer networks.
Proceedings of the 7th International Conference on NETwork Games, COntrol and OPtimization, 2014

A Hierarchical Demand Response Framework for Data Center Power Cost Optimization under Real-World Electricity Pricing.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Market-based power allocation for a differentially priced FDMA system.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

A simple two-sided market model with side-payments and ISP service classes.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A Case for Virtualizing the Electric Utility in Cloud Data Centers.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

A Bidding Game for Generators in the Presence of Flexible Demand.
Proceedings of the 9th International Workshop on Feedback Computing, 2014

Detecting anomalous latent classes in a batch of network traffic flows.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Behavior in a shared resource game with cooperative, greedy, and vigilante players.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Capturing aggregate flexibility in Demand Response.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning.
IEEE/ACM Trans. Netw., 2013

A model of network neutrality with usage-based prices.
Telecommun. Syst., 2013

Pricing of service in clouds: optimal response and strategic interactions.
SIGMETRICS Perform. Evaluation Rev., 2013

Distributed medium access control with conditionally altruistic users.
EURASIP J. Wirel. Commun. Netw., 2013

Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing.
CoRR, 2013

Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity.
CoRR, 2013

Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics.
CoRR, 2013

Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players.
CoRR, 2013

An agent-based framework for performance modeling of an optimistic parallel discrete event simulator.
Complex Adapt. Syst. Model., 2013

Data Center Power Cost Optimization via Workload Modulation.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Scalable model predictive control of demand for ancillary services.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Hybrid client-server and peer-to-peer caching systems with selfish peers.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Clustering consumption in queues: A scalable model for electric vehicle scheduling.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling.
Neural Comput., 2012

A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users.
IEEE J. Sel. Areas Commun., 2012

CSMA Local Area Networking under Dynamic Altruism
CoRR, 2012

Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection.
Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2012

Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Avoiding overages by deferred aggregate demand for PEV charging on the smart grid.
Proceedings of IEEE International Conference on Communications, 2012

A study of unsupervised adaptive crowdsourcing.
Proceedings of IEEE International Conference on Communications, 2012

Side-payment profitability under convex demand-response modeling congestion-sensitive applications.
Proceedings of IEEE International Conference on Communications, 2012

Stochastic Loss Aversion for Random Medium Access.
Proceedings of the Game Theory for Networks, 2012

Semisupervised domain adaptation for mixture model based classifiers.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

Decentralized capacity reallocation for a loss network.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

Distributed Medium Access Control with Dynamic Altruism.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
Denial-of-Service Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Flow Classifier with Tamper-Resistant Features and an Evaluation of Its Portability to New Domains.
IEEE J. Sel. Areas Commun., 2011

Side-payment profitability and interacting eyeball ISPs under convex demand-response modeling congestion-sensitive applications.
CoRR, 2011

Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra.
Comput. Networks, 2011

Salting Public Traces with Attack Traffic to Test Flow Classifiers.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

A graph partitioning game for distributed simulation of networks.
Proceedings of the 2011 International Workshop on Modeling, 2011

Sybil Detection via Distributed Sparse Cut Monitoring.
Proceedings of IEEE International Conference on Communications, 2011

An Epidemic Model of Bit Torrent with Control.
Proceedings of IEEE International Conference on Communications, 2011

Iterative partitioning scheme for distributed simulation of dynamic networks.
Proceedings of the 16th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2011

2010
An Introduction to Models of Online Peer-to-Peer Social Networking
Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers, ISBN: 978-3-031-79998-3, 2010

Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions.
IEEE Trans. Neural Networks, 2010

PWC: a proactive worm containment solution for enterprise networks.
Secur. Commun. Networks, 2010

Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior
CoRR, 2010

Worm virulence estimation for the containment of local worm outbreak.
Comput. Secur., 2010

Congestion control alternatives for residential broadband access.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

Improved Fine-Grained Component-Conditional Class Labeling with Active Learning.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

A Study of Non-neutral Networks with Usage-Based Prices.
Proceedings of the Incentives, 2010

Application neutrality and a paradox of side payments.
Proceedings of the Re-Architecting the Internet Workshop, 2010

File-sharing costs and quality-of-service.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A sybil-proof referral system based on multiplicative reputation chains.
IEEE Commun. Lett., 2009

A quantum computer network
CoRR, 2009

Peer-to-peer unstructured anycasting using correlated swarms.
Proceedings of the 21st International Teletraffic Congress, 2009

Clock-like Flow Replacement Schemes for Resilient Flow Monitoring.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Robust Sybil Detection for MANETs.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Mass Purging of Stale TCP Flows in Per-Flow Monitoring Systems.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

A simple reputation model for BitTorrent-like incentives.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Wireless mesh networking games.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
Proxy-RED: an AQM scheme for wireless local area networks.
Wirel. Commun. Mob. Comput., 2008

A model of the spread of randomly scanning Internet worms that saturate access links.
ACM Trans. Model. Comput. Simul., 2008

Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down.
ACM Trans. Model. Comput. Simul., 2008

A dynamic quarantine scheme for controlling unresponsive TCP sessions.
Telecommun. Syst., 2008

Decision Aggregation in Distributed Classification by a Transductive Extension of Maximum Entropy/Improved Iterative Scaling.
EURASIP J. Adv. Signal Process., 2008

Wireless mesh networks based on CDMA.
Comput. Commun., 2008

A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks.
Proceedings of the Network Control and Optimization, Second Euro-NF Workshop, 2008

SINR-sensitive routing in wireless 802.11 mesh networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Exploring Anti-Spam Models in Large Scale VoIP Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification.
Proceedings of the IEEE International Conference on Acoustics, 2008

Threshold Smart Walk for the Containment of Local Worm Outbreak.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On flat-rate and usage-based pricing for tiered commodity internet services.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs.
IEEE J. Sel. Areas Commun., 2007

Evaluation of Collaborative Worm Containments on DETER Testbed.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Memory-efficient content filtering hardware for high-speed intrusion detection systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Distributed Power Control in Multihop Ad Hoc CDMA Networks.
Proceedings of IEEE International Conference on Communications, 2007

Modeling file-sharing with BitTorrent-like incentives.
Proceedings of the IEEE International Conference on Acoustics, 2007

Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification.
IEEE J. Sel. Areas Commun., 2006

Charge sensitive and incentive compatible end-to-end window-based control for selfish users.
IEEE J. Sel. Areas Commun., 2006

Denial-of-Service Attack-Detection Techniques.
IEEE Internet Comput., 2006

A taxonomy of internet traceback.
Int. J. Secur. Networks, 2006

Path preserving scale down for validation of internet inter-domain routing protocols.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Visual toolkit for network security experiment specification and data analysis.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

Polymorphic worm detection and defense: system design, experimental methodology, and data resources.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006

Routing and Uplink-Downlink Scheduling in Ad Hoc CDMA Networks.
Proceedings of IEEE International Conference on Communications, 2006

On the Relation Between Capacity and Number of Sinks in an Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Toward a Framework for Forensic Analysis of Scanning Worms.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

Cumulative Reputation Systems for Peer-to-Peer Content Distribution.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Dynamics of usage-priced communication networks: the case of a single bottleneck resource.
IEEE/ACM Trans. Netw., 2005

Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms.
Proceedings of the Quality of Service in Multiservice IP Networks, 2005

Pheromone-aided robust multipath and multipriority routing in wireless MANETs.
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

Advances for networks & internet.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Hierarchical shaped deficit round-robin scheduling.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks.
IEEE Trans. Mob. Comput., 2004

A Class of Shaped Deficit Round-Robin (SDRR) Schedulers.
Telecommun. Syst., 2004

An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks.
Comput. Commun., 2004

Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Preliminary results using scale-down to explore worm dynamics.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks.
Proceedings of IEEE International Conference on Communications, 2004

TCP windowcontrol in a priced network.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks.
Proceedings of the IASTED International Conference on Communications, Internet, and Information Technology, November 22, 2004

2003
Nash equilibria of a generic networking game with applications to circuit-switched networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited.
Proceedings of the Global Telecommunications Conference, 2003

A control theoretic approach for designing adaptive AQM schemes.
Proceedings of the Global Telecommunications Conference, 2003

HaTCh: a two-level caching scheme for estimating the number of active flows.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003

2002
Equilibria of a noncooperative game for heterogeneous users of an ALOHA network.
IEEE Commun. Lett., 2002

A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks.
Proceedings of the 10th International Workshop on Modeling, 2002

An adaptive power-conserving service discipline for Bluetooth.
Proceedings of the IEEE International Conference on Communications, 2002

Providing fairness in DiffServ architecture.
Proceedings of the Global Telecommunications Conference, 2002

Stabilized virtual buffer (SVB) - an active queue management scheme for Internet quality-of-service.
Proceedings of the Global Telecommunications Conference, 2002

2001
General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud.
Proceedings of the Networking, 2001

2000
Extremal shape-controlled traffic patterns in high-speed networks.
IEEE Trans. Commun., 2000

Worst-case performance of a buffer with independent shaped arrival processes.
IEEE Commun. Lett., 2000

Traffic shaping for a loss system.
IEEE Commun. Lett., 2000

1998
ATM via satellite: A framework and implementation.
Wirel. Networks, 1998

ATM input-buffered switches with the guaranteed-rate property.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

1997
Broadband via Satellite.
IEEE Commun. Mag., 1997

Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
Bandwidth scheduling for wide-area ATM networks using virtual finishing times.
IEEE/ACM Trans. Netw., 1996

Bandwidth allocation for multiple qualities of service using generalized processor sharing.
IEEE Trans. Inf. Theory, 1996

1995
Analog optimization with Wong's stochastic neural network.
IEEE Trans. Neural Networks, 1995

Admission control and routing in ATM networks using inferences from measured buffer occupancy.
IEEE Trans. Commun., 1995

Resource Management in Wide-Area ATM Networks Using Effective Bandwiths.
IEEE J. Sel. Areas Commun., 1995

1994
Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Effective bandwidths for multiclass Markov fluids and other ATM sources.
IEEE/ACM Trans. Netw., 1993

Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources.
ACM Trans. Model. Comput. Simul., 1993

Relative entropy between Markov transition rate matrices.
IEEE Trans. Inf. Theory, 1993

A Review of Quick Simulation Methods for Queues.
Proceedings of the MASCOTS '93, 1993

1991
Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990).
IEEE Trans. Inf. Theory, 1991


  Loading...