Kai Bu

According to our database1, Kai Bu authored at least 53 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Efficient Polling-Based Information Collection in RFID Systems.
IEEE/ACM Trans. Netw., 2019

Privacy-Preserving Network Path Validation.
IACR Cryptology ePrint Archive, 2019

Fault Management in Software-Defined Networking: A Survey.
IEEE Communications Surveys and Tutorials, 2019

Thinking inside the Box: Differential Fault Localization for SDN Control Plane.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Information Forensics and Security, 2018

Fastlane-ing more flows with less bandwidth for software-Defined networking.
Computer Networks, 2018

SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

MemCloak: Practical Access Obfuscation for Untrusted Memory.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

High performance and security in cloud computing.
Concurrency and Computation: Practice and Experience, 2017

You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.
IEEE Communications Surveys and Tutorials, 2017

2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016

A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommunication Systems, 2016

Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016

Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Toward Taming Policy Enforcement for SDN in the RIGHT Way: Or Can We?
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reviving Android Malware with DroidRide: And How Not To.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distrib. Syst., 2015

Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Industrial Informatics, 2015

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Gotta tell you switches only once: Toward bandwidth-efficient flow setup for SDN.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach.
IEEE/ACM Trans. Netw., 2014

A new differential RAID for high reliable All Flash Array.
IEICE Electronic Express, 2014

Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014

Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Efficient distributed query processing in large RFID-enabled supply chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Reduction of data prevention cost and improvement of reliability in MLC NAND flash storage system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distrib. Syst., 2013

Robust localization against outliers in wireless sensor networks.
TOSN, 2013

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Information Forensics and Security, 2013

Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurrency and Computation: Practice and Experience, 2013

Secure P2P topology based on a multidimensional DHT space mapping.
SCIENCE CHINA Information Sciences, 2013

ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Less is More: Efficient RFID-Based 3D Localization.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013

2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distrib. Syst., 2012

Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Computer Communications, 2012

Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Fast cloned-tag identification protocols for large-scale RFID systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

An Efficient Flash-Based Remote Sense Image Storage Approach for Fast Access Geographic Information System.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2011
Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Efficient Monitoring of Dynamic Tag Populations in RFID Systems.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2009
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

2008
A Method Based on AMHI for DDoS Attacks Detection and Defense.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...