According to our database1, Kai Bu authored at least 53 papers between 2008 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Efficient Polling-Based Information Collection in RFID Systems.
IEEE/ACM Trans. Netw., 2019
Privacy-Preserving Network Path Validation.
IACR Cryptology ePrint Archive, 2019
Fault Management in Software-Defined Networking: A Survey.
IEEE Communications Surveys and Tutorials, 2019
Thinking inside the Box: Differential Fault Localization for SDN Control Plane.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Information Forensics and Security, 2018
Fastlane-ing more flows with less bandwidth for software-Defined networking.
Computer Networks, 2018
SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
MemCloak: Practical Access Obfuscation for Untrusted Memory.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017
High performance and security in cloud computing.
Concurrency and Computation: Practice and Experience, 2017
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.
IEEE Communications Surveys and Tutorials, 2017
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016
Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016
A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommunication Systems, 2016
Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016
Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Toward Taming Policy Enforcement for SDN in the RIGHT Way: Or Can We?
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Reviving Android Malware with DroidRide: And How Not To.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distrib. Syst., 2015
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Industrial Informatics, 2015
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015
A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Gotta tell you switches only once: Toward bandwidth-efficient flow setup for SDN.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach.
IEEE/ACM Trans. Netw., 2014
A new differential RAID for high reliable All Flash Array.
IEICE Electronic Express, 2014
Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014
Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Efficient distributed query processing in large RFID-enabled supply chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
Reduction of data prevention cost and improvement of reliability in MLC NAND flash storage system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distrib. Syst., 2013
Robust localization against outliers in wireless sensor networks.
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Information Forensics and Security, 2013
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurrency and Computation: Practice and Experience, 2013
Secure P2P topology based on a multidimensional DHT space mapping.
SCIENCE CHINA Information Sciences, 2013
ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Less is More: Efficient RFID-Based 3D Localization.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2012
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Computer Communications, 2012
Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Fast cloned-tag identification protocols for large-scale RFID systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012
An Efficient Flash-Based Remote Sense Image Storage Approach for Fast Access Geographic Information System.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012
Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Efficient Monitoring of Dynamic Tag Populations in RFID Systems.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009
A Method Based on AMHI for DDoS Attacks Detection and Defense.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008