Haining Wang

Orcid: 0000-0002-4174-3009

According to our database1, Haining Wang authored at least 289 papers between 1998 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2020, "for contributions to network and cloud security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms.
IEEE Internet Things J., April, 2024

OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones.
Sensors, March, 2024

Fingerprinting Industrial IoT devices based on multi-branch neural network.
Expert Syst. Appl., March, 2024

A multiview clustering framework for detecting deceptive reviews.
J. Comput. Secur., 2024

3.4 A 14b 98Hz-to-5.9kHz 1.7-to-50.8 μ W BW/Power Scalable Sensor Interface with a Dynamic Bandgap Reference and an Untrimmed Gain Error of ± 0.26 % from -40°C to 125°C.
Proceedings of the IEEE International Solid-State Circuits Conference, 2024

A Content-Based Novelty Measure for Scholarly Publications: A Proof of Concept.
Proceedings of the Wisdom, Well-Being, Win-Win, 2024

Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023

MOPISDE: A collaborative multi-objective information-sharing DE algorithm for software clustering.
Expert Syst. Appl., September, 2023

iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023

Cross-modality image translation: CT image synthesis of MR brain images using multi generative network with perceptual supervision.
Comput. Methods Programs Biomed., July, 2023

A Two-Branch Neural Network for Short-Axis PET Image Quality Enhancement.
IEEE J. Biomed. Health Informatics, June, 2023

Correction to: TMHSCA: a novel hybrid two-stage mutation with a sine cosine algorithm for discounted {0-1} knapsack problems.
Neural Comput. Appl., June, 2023

TMHSCA: a novel hybrid two-stage mutation with a sine cosine algorithm for discounted {0-1} knapsack problems.
Neural Comput. Appl., June, 2023

Learning geometric Jensen-Shannon divergence for tiny object detection in remote sensing images.
Frontiers Neurorobotics, June, 2023

PILOT: High-Precision Indoor Localization for Autonomous Drones.
IEEE Trans. Veh. Technol., May, 2023

STGHTN: Spatial-temporal gated hybrid transformer network for traffic flow forecasting.
Appl. Intell., May, 2023

DevTag: A Benchmark for Fingerprinting IoT Devices.
IEEE Internet Things J., April, 2023

BDR-Net: Bhattacharyya Distance-Based Distribution Metric Modeling for Rotating Object Detection in Remote Sensing.
IEEE Trans. Instrum. Meas., 2023

A Hybrid Two-Stage Teaching-Learning-Based Optimization Algorithm for Feature Selection in Bioinformatics.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes.
CoRR, 2023

An Internet-wide Penetration Study on NAT Boxes via TCP/IP Side Channel.
CoRR, 2023

Defending Against Authorship Identification Attacks.
CoRR, 2023

The Many Voices of Duying: Revisiting the Disputed Essays Between Lu Xun and Zhou Zuoren.
CoRR, 2023

Enhancing Representation Generalization in Authorship Identification.
CoRR, 2023

Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Securing 5G OpenRAN with a Scalable Authorization Framework for xApps.
Proceedings of the IEEE INFOCOM 2023, 2023

Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Effects of Image Size and Position on Text Legibility of Foldable Smartphones.
Proceedings of the Design, User Experience, and Usability, 2023

The Effects of Primary Output Design of True Wireless Earbuds on the Wearing Comfort.
Proceedings of the Design, User Experience, and Usability, 2023

Perception of the Vibration Intensity of Smartwatches in the Notification Scene.
Proceedings of the Design, User Experience, and Usability, 2023

Grip Comfort Study of Virtual Reality Handles.
Proceedings of the HCI International 2023 - Late Breaking Papers, 2023

Vibration Strength Comfort of Smartwatch in Notification Scene.
Proceedings of the Design, User Experience, and Usability, 2023

2022
HWOA: an intelligent hybrid whale optimization algorithm for multi-objective task selection strategy in edge cloud computing system.
World Wide Web, 2022

Adaptive Harmonic Impedance Reshaping Control Strategy Based on a Consensus Algorithm for Harmonic Sharing and Power Quality Improvement in Microgrids With Complex Feeder Networks.
IEEE Trans. Smart Grid, 2022

Impedance-Based Adaptively Reshaping Method for Enhancing Nonlinear Load Sharing and Voltage Quality in Islanded Microgrids With Virtual Synchronous Generator.
IEEE Trans. Smart Grid, 2022

Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding Account Recovery in the Wild and its Security Implications.
IEEE Trans. Dependable Secur. Comput., 2022

Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding the Security Implication of Aborting Virtual Machine Live Migration.
IEEE Trans. Cloud Comput., 2022

Reproduction and Replication of an Adversarial Stylometry Experiment.
CoRR, 2022

Water Goes Where? A Water Resource Allocation Method Based on Multi-Objective Decision-Making.
CoRR, 2022

Multi-distribution noise quantisation: an extreme compression scheme for transformer according to parameter distribution.
Connect. Sci., 2022

Shining a light on dark places: A comprehensive analysis of open proxy ecosystem.
Comput. Networks, 2022

ISA-Net: Improved spatial attention network for PET-CT tumor segmentation.
Comput. Methods Programs Biomed., 2022

An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022

TG-Net: Combining transformer and GAN for nasopharyngeal carcinoma tumor segmentation based on total-body uEXPLORER PET/CT scanner.
Comput. Biol. Medicine, 2022

Scaling Network Slices with a 5G Testbed: A Resource Consumption Study.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

RAIL: Robust Acoustic Indoor Localization for Drones.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Exploring the Unchartered Space of Container Registry Typosquatting.
Proceedings of the 31st USENIX Security Symposium, 2022

An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

BinProv: Binary Code Provenance Identification without Disassembly.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

CCTAA: A Reproducible Corpus for Chinese Authorship Attribution Research.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

SPIN: Sensor Placement for Indoor Navigation of Drones.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

GPS Spoofing Detection by Leveraging 5G Positioning Capabilities.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

A Noise Type Classifier for Speech Enhancement in DCT Domain.
Proceedings of the 21st International Symposium on Communications and Information Technologies, 2022

Mandarin Tone Sandhi Realization: Evidence from Large Speech Corpora.
Proceedings of the Interspeech 2022, 2022

Comparison of Usability and Immersion Between Touch-Based and Mouse-Based Interaction: A Study of Online Exhibitions.
Proceedings of the Design, User Experience, and Usability: UX Research, Design, and Assessment, 2022

Online Virtual Simulation Course Design for VR Glasses Fit Analysis.
Proceedings of the Design, User Experience, and Usability: UX Research, Design, and Assessment, 2022

A Web-Based Application for TWS Earphone Design and Fit Evaluation.
Proceedings of the Design, User Experience, and Usability: Design Thinking and Practice in Contemporary and Emerging Technologies, 2022

Pressure Sensitivity Mapping of the Head Region for Chinese Adults for AR Glasses Design.
Proceedings of the Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture, 2022

Fit Improvement of Facial Interface for Steam Massage Glasses Based on Principal Component Analysis Panel.
Proceedings of the Design, User Experience, and Usability: Design Thinking and Practice in Contemporary and Emerging Technologies, 2022

Anthropometric Hand Dimensions of Chinese Adults Using Three-Dimensional Scanning Technique.
Proceedings of the Design, User Experience, and Usability: Design for Emotion, Well-being and Health, Learning, and Culture, 2022

Combining Virtual Reality and Eye Tracking to Recognize Users' Aesthetic Preference for Product Modeling.
Proceedings of the Design, User Experience, and Usability: UX Research, Design, and Assessment, 2022

Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed.
Proceedings of the IEEE Global Communications Conference, 2022

Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Ready Raider One: Exploring the Misuse of Cloud Gaming Services.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Radar Target Tracking Based on Interactive Multi-model Cubature Kalman Filter.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks.
IEEE/ACM Trans. Netw., 2021

A Study on the Security Implications of Information Leakages in Container Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds.
IEEE Trans. Cloud Comput., 2021

Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements.
Proc. ACM Meas. Anal. Comput. Syst., 2021

A brief survey on RGB-D semantic segmentation using deep learning.
Displays, 2021

Stereo disparity optimization with depth change constraint based on a continuous video.
Displays, 2021

User input enrichment via sensing devices.
Comput. Networks, 2021

Progressive Guided Fusion Network With Multi-Modal and Multi-Scale Attention for RGB-D Salient Object Detection.
IEEE Access, 2021

An Investigation of Identity-Account Inconsistency in Single Sign-On.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Understanding the Impact of Encrypted DNS on Internet Censorship.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage.
Proceedings of the 30th USENIX Security Symposium, 2021

A Comprehensive Measurement-based Investigation of DNS Hijacking.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

A Call for Clarity in Contemporary Authorship Attribution Evaluation.
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021), 2021

DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

Mode Effects' Challenge to Authorship Attribution.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021

PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

The Challenge of Vernacular and Classical Chinese Cross-Register Authorship Attribution.
Proceedings of the Conference on Computational Humanities Research, 2021

The Stability of Headphones.
Proceedings of the Advances in Ergonomics in Design, 2021

Naturalistic Data Collection of Head Movements During Headphone Use.
Proceedings of the Advances in Ergonomics in Design, 2021

An Exploration of ARM System-Level Cache and GPU Side Channels.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
An Enhancing Grid Stiffness Control Strategy of STATCOM/BESS for Damping Sub-Synchronous Resonance in Wind Farm Connected to Weak Grid.
IEEE Trans. Ind. Informatics, 2020

Understanding the Manipulation on Recommender Systems through Web Injection.
IEEE Trans. Inf. Forensics Secur., 2020

Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild.
Proc. ACM Meas. Anal. Comput. Syst., 2020

From Design to Practice: ETSI ENI Reference Architecture and Instantiation for Network Management and Orchestration Using Artificial Intelligence.
IEEE Commun. Stand. Mag., 2020

Modeling and Control Parameters Design for Grid-Connected Inverter System Considering the Effect of PLL and Grid Impedance.
IEEE Access, 2020

Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Review Trade: Everything Is Free in Incentivized Review Groups.
Proceedings of the Security and Privacy in Communication Networks, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection.
EAI Endorsed Trans. Security Safety, 2019

BluePass: A Mobile Device Assisted Password Manager.
EAI Endorsed Trans. Security Safety, 2019

Towards passive analysis of anycast in global routing: unintended impact of remote peering.
Comput. Commun. Rev., 2019

Shoe-Print Image Retrieval With Multi-Part Weighted CNN.
IEEE Access, 2019

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

The Impact of Deep Learning on Organizational Agility.
Proceedings of the 40th International Conference on Information Systems, 2019

An investigation on information leakage of DNS over TLS.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

Casino royale: a deep exploration of illegal online gambling.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Towards Transparent Debugging.
IEEE Trans. Dependable Secur. Comput., 2018

Understanding the Usage of Industrial Control System Devices on the Internet.
IEEE Internet Things J., 2018

Network Management and Orchestration Using Artificial Intelligence: Overview of ETSI ENI.
IEEE Commun. Stand. Mag., 2018

End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 27th USENIX Security Symposium, 2018

Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Privacy Risk Assessment on Email Tracking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Discovery of Internet of Thing devices based on rules.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Email as a Master Key: Analyzing Account Recovery in the Wild.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Responsive Web Design for Chinese Head and Facial Database.
Proceedings of the Cross-Cultural Design. Methods, Tools, and Users, 2018

A 3D Head Model Fitting Method Using Chinese Head Anthropometric Data.
Proceedings of the Cross-Cultural Design. Methods, Tools, and Users, 2018

Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace.
Proceedings of the Computer Security, 2018

Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Bot or Human? A Behavior-Based Online Bot Detection System.
Proceedings of the From Database to Cyber Security, 2018

2017
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service.
ACM Trans. Web, 2017

Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending.
IEEE Trans. Inf. Forensics Secur., 2017

Personal Information in Passwords and Its Security Implications.
IEEE Trans. Inf. Forensics Secur., 2017

Analysis of Targeted Mouse Movements for Gender Classification.
EAI Endorsed Trans. Security Safety, 2017

Exploring Domain Name Based Features on the Effectiveness of DNS Caching.
Comput. Commun. Rev., 2017

Why "Some" Like It Hot Too: Thermal Attack on Data Centers.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

BluePass: A Secure Hand-Free Password Manager.
Proceedings of the Security and Privacy in Communication Networks, 2017

Automatically Discovering Surveillance Devices in the Cyberspace.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Location Privacy Breach: Apps Are Watching You in Background.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

E-Android: A New Energy Profiling Tool for Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A measurement study on Amazon wishlist and its privacy exposure.
Proceedings of the IEEE International Conference on Communications, 2017

Low Complexity Node Clustering in Cloud-RAN for Service Provisioning and Resource Allocation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Arbitrating Traffic Contention for Power Saving with Multiple PSM Clients.
IEEE Trans. Wirel. Commun., 2016

Femtocell Power Control for Interference Management Based on Macrolayer Feedback.
IEEE Trans. Veh. Technol., 2016

Throughput Assurance for Multiple Body Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2016

An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics.
ACM Trans. Inf. Syst. Secur., 2016

Profiling Online Social Behaviors for Compromised Account Detection.
IEEE Trans. Inf. Forensics Secur., 2016

Hyperprobe: Towards Virtual Machine Extrospection.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

A Behavioral Biometrics Based Approach to Online Gender Classification.
Proceedings of the Security and Privacy in Communication Networks, 2016

SERF: optimization of socially sourced images using psychovisual enhancements.
Proceedings of the 7th International Conference on Multimedia Systems, 2016

A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

GUIDE: Graphical user interface fingerprints physical devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

ASCEND: A search engine for online industrial control devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Characterizing industrial control system devices on the Internet.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Joint power and rate optimization for co-channel small cells using Frank-Wolfe algorithm.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

On Energy Security of Smartphones.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Distributed Power Control in a Two-Tier Heterogeneous Network.
IEEE Trans. Wirel. Commun., 2015

Power Control and Resource Allocation for Outage Balancing in Femtocell Networks.
IEEE Trans. Wirel. Commun., 2015

Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud.
IEEE/ACM Trans. Netw., 2015

PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency.
IEEE Trans. Computers, 2015

E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015

A Measurement Study on Co-residence Threat inside the Cloud.
Proceedings of the 24th USENIX Security Symposium, 2015

PmDroid: Permission Supervision for Android Advertising.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Kernel Data Attack Is a Realistic Security Threat.
Proceedings of the Security and Privacy in Communication Networks, 2015

Defeating Kernel Driver Purifier.
Proceedings of the Security and Privacy in Communication Networks, 2015

Privacy Risk Assessment on Online Photos.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On the DNS Deployment of Modern Web Services.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

TrustLogin: Securing Password-Login on Commodity Operating Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

Exploiting Eye Tracking for Smartphone Authentication.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Macrocell-Queue-Stabilization-Based Power Control of Femtocell Networks.
IEEE Trans. Wirel. Commun., 2014

Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing.
IEEE Internet Things J., 2014

Gemini: An Emergency Line of Defense against Phishing Attacks.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

GridMap: Enhanced Security in Cued-Recall Graphical Passwords.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Power Attack: An Increasing Threat to Data Centers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Improving Spectral Efficiency of MIMO Ad Hoc Network via Greedy MCS Packing.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

PHY and MAC Design for Distributed Tx-Rx beamforming in Mobile Ad Hoc Networks.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

What scale of audience a campaign can reach in what price on Twitter?
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

You Are How You Touch: User Verification on Smartphones via Tapping Behaviors.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Power control and rate allocation for outage balancing in femtocell networks.
Proceedings of the IEEE Global Communications Conference, 2014

A Framework to Secure Peripherals at Runtime.
Proceedings of the Computer Security - ESORICS 2014, 2014

Click Fraud Detection on the Advertiser Side.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detecting Malicious Javascript in PDF through Document Instrumentation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Activity Spoofing and Its Defense in Android Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A measurement study of insecure javascript practices on the web.
ACM Trans. Web, 2013

On Number of Almost Blank Subframes in Heterogeneous Cellular Networks.
IEEE Trans. Wirel. Commun., 2013

Automating Cloud Network Optimization and Evolution.
IEEE J. Sel. Areas Commun., 2013

Blog or block: Detecting blog bots through behavioral biometrics.
Comput. Networks, 2013

A Low-Complexity Algorithm for Worst-Case Utility Maximization in Multiuser MISO Downlink.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Unveiling Privacy Setting Breaches in Online Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

Time domain bi-level downlink power control for cross-tier interference mitigation in HetNet.
Proceedings of IEEE International Conference on Communications, 2013

Security implications of memory deduplication in a virtualized environment.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Evasive bots masquerading as human beings on the web.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes.
IEEE Trans. Parallel Distributed Syst., 2012

On Energy Security of Server Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
IEEE Trans. Dependable Secur. Comput., 2012

Secure instant messaging in enterprise-like networks.
Comput. Networks, 2012

Surviving a search engine overload.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

A Voice Spam Filter to Clean Subscribers' Mailbox.
Proceedings of the Security and Privacy in Communication Networks, 2012

m.Site: Efficient Content Adaptation for Mobile Devices.
Proceedings of the Middleware 2012, 2012

NetDEO: Automating network design, evolution, and optimization.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Enhancing cache robustness for content-centric networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency.
Proceedings of the 9th International Conference on Autonomic Computing, 2012

Understanding performance implications of nested file systems in a virtualized environment.
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012

A covert channel construction in a virtualized environment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Detecting Social Spam Campaigns on Twitter.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
An Effective Memory Optimization for Virtual Machine-Based Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Design and Implementation of a Fast Dynamic Packet Filter.
IEEE/ACM Trans. Netw., 2011

Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011

An Entropy-Based Approach to Detecting Covert Timing Channels.
IEEE Trans. Dependable Secur. Comput., 2011

Special Issue: Securing Distributed Networks and Systems.
Concurr. Comput. Pract. Exp., 2011

An investigation of hotlinking and its countermeasures.
Comput. Commun., 2011

Energy Attack on Server Systems.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An efficient user verification system via mouse movements.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
BogusBiter: A transparent protection against phishing attacks.
ACM Trans. Internet Techn., 2010

Security in next generation wireless networks.
Secur. Commun. Networks, 2010

Keychain-Based Signatures for Securing BGP.
IEEE J. Sel. Areas Commun., 2010

PowerTracer: Tracing requests in multi-tier services to save cluster power consumption
CoRR, 2010

An automatic HTTP cookie management system.
Comput. Networks, 2010

An effective feedback-driven approach for energy saving in battery powered systems.
Proceedings of the 18th International Workshop on Quality of Service, 2010

A Collaboration-based Autonomous Reputation System for Email Services.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Tracking Skype VoIP Calls Over The Internet.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Mimimorphism: a new approach to binary code obfuscation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Profit-aware overload protection in E-commerce Web sites.
J. Netw. Comput. Appl., 2009

Characterizing insecure javascript practices on the web.
Proceedings of the 18th International Conference on World Wide Web, 2009

RCB: A Simple and Practical Framework for Real-time Collaborative Browsing.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Secure Passwords Through Enhanced Hashing.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Online detection of network traffic anomalies using behavioral distance.
Proceedings of the 17th International Workshop on Quality of Service, 2009

SessionMagnifier: a simple approach to secure and convenient kiosk browsing.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Efficient resource management on template-based web servers.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Battle of Botcraft: fighting bots in online games with human observational proofs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Detecting VoIP Floods Using the Hellinger Distance.
IEEE Trans. Parallel Distributed Syst., 2008

Thwarting E-mail Spam Laundering.
ACM Trans. Inf. Syst. Secur., 2008

Measurement and Classification of Humans and Bots in Internet Chat.
Proceedings of the 17th USENIX Security Symposium, 2008

Model-Based Covert Timing Channels: Automated Modeling and Evasion.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Swift: A Fast Dynamic Packet Filter.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Application and Practice of System Integration Approach in Intelligent Human Motion Recognition.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Anti-Phishing in Offense and Defense.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Building an application-aware IPsec policy system.
IEEE/ACM Trans. Netw., 2007

Defense against spoofed IP traffic using hop-count filtering.
IEEE/ACM Trans. Netw., 2007

Maintaining Strong Cache Consistency for the Domain Name System.
IEEE Trans. Knowl. Data Eng., 2007

Cooperative Relay Service in a Wireless LAN.
IEEE J. Sel. Areas Commun., 2007

Profit-aware Admission Control for Overload Protection in E-commerce Web Sites.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Securing BGP through Keychain-based Signatures.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Automatic Cookie Usage Setting with CookiePicker.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Detecting covert timing channels: an entropy-based approach.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Identifying Low-ProfileWeb Server's IP Fingerprint.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Fast Detection of Denial-of-Service Attacks on IP Telephony.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

DNScup: Strong Cache Consistency Protocol for DNS.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

VoIP Intrusion Detection Through Interacting Protocol State Machines.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

An effective defense against email spam laundering.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
IP Easy-pass: a light-weight network-edge resource access control.
IEEE/ACM Trans. Netw., 2005

A study on object tracking quality under probabilistic coverage in sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Segment-Based Proxy Caching for Internet Streaming Media Delivery.
IEEE Multim., 2005

Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

SCOPE: scalable consistency maintenance in structured P2P systems.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2004
Change-Point Monitoring for the Detection of DoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2004

Robust TCP congestion recovery.
J. High Speed Networks, 2004

IP Easy-pass: Edge Resource Access Control.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Countering distributed denial of service attacks.
PhD thesis, 2003

Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks.
IEEE Trans. Parallel Distributed Syst., 2003

Statistical Characterization for Per-hop QoS.
Proceedings of the Quality of Service, 2003

Hop-count filtering: an effective defense against spoofed DDoS traffic.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Layer-4 Service Differentiation and Resource Isolation.
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002

Detecting SYN Flooding Attacks.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

SYN-dog: Sniffing SYN Flooding Sources.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Adaptive-weighted packet scheduling for premium service.
Proceedings of the IEEE International Conference on Communications, 2001

2000
A Simple Refinement of Slow-Start of TCP Congestion Control.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1999
Scalability Evaluation of Multi-Protocol Over ATM (MPOA).
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

1998
A New Scheme for TCP Congestion Control: Smooth-Start and Dynamic Recovery.
Proceedings of the MASCOTS 1998, 1998


  Loading...