Ke Xu

Orcid: 0000-0003-2587-8517

Affiliations:
  • Tsinghua University, Department of Computer Science, Beijing, China


According to our database1, Ke Xu authored at least 330 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds.
IEEE/ACM Trans. Netw., February, 2024

Galaxy: A Scalable BFT and Privacy-Preserving Pub/Sub IoT Data Sharing Framework Based on Blockchain.
IEEE Internet Things J., February, 2024

From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
CoRR, 2024

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
CoRR, 2024

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
CoRR, 2024

Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
CoRR, 2024

Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
CoRR, 2024

Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems.
CoRR, 2024

Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

Adversarial Robust Safeguard for Evading Deep Facial Manipulation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Enriching Large-Scale Trips With Fine-Grained Travel Purposes: A Semi-Supervised Deep Graph Embedding Framework.
IEEE Trans. Intell. Transp. Syst., November, 2023

A Negotiation-Based Scheme for Interconnecting Heterogeneous Networks With Enhanced Services.
IEEE Netw., September, 2023

MASK: Practical Source and Path Verification Based on Multi-AS-Key.
IEEE/ACM Trans. Netw., August, 2023

A delayed eviction caching replacement strategy with unified standard for edge servers.
Comput. Networks, July, 2023

Seeking Based on Dynamic Prices: Higher Earnings and Better Strategies in Ride-on-Demand Services.
IEEE Trans. Intell. Transp. Syst., May, 2023

Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction.
Sci. China Inf. Sci., May, 2023

Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework.
IEEE/ACM Trans. Netw., April, 2023

R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers.
IEEE/ACM Trans. Netw., April, 2023

Frequency Domain Feature Based Robust Malicious Traffic Detection.
IEEE/ACM Trans. Netw., February, 2023

FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur., 2023

AI-Bazaar: A Cloud-Edge Computing Power Trading Framework for Ubiquitous AI Services.
IEEE Trans. Cloud Comput., 2023

G-Routing: Graph Neural Networks-Based Flexible Online Routing.
IEEE Netw., 2023

DIT and Beyond: Interdomain Routing With Intradomain Awareness for IIoT.
IEEE Internet Things J., 2023

Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments.
CoRR, 2023

Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR, 2023

Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

Exploration of Reflective ASMs for Security.
Proceedings of the Rigorous State-Based Methods - 9th International Conference, 2023

Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification.
Proceedings of the ACM Web Conference 2023, 2023

FRAVaR: A Fast Failure Recovery Framework for Inter-DC Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

An Efficient Design of Intelligent Network Data Plane.
Proceedings of the 32nd USENIX Security Symposium, 2023

Cross Container Attacks: The Bewildered eBPF on Clouds.
Proceedings of the 32nd USENIX Security Symposium, 2023

Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Robust Multi-tab Website Fingerprinting Attacks in the Wild.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Poster: PolyCC: Poly-Algorithmic Congestion Control.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Poster: TOO: Accelerating Loss Recovery by Taming On-Off Traffic Patterns.
Proceedings of the ACM SIGCOMM 2023 Conference, 2023

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Grandet: Cost-aware Traffic Scheduling without Prior Knowledge in SD-WAN.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

ART: Adaptive Retransmission for Wide-Area Loss Recovery in the Wild.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

Differentially Private Learning with Per-Sample Adaptive Clipping.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw., 2022

A Force-Directed Approach to Seeking Route Recommendation in Ride-on-Demand Service Using Multi-Source Urban Data.
IEEE Trans. Mob. Comput., 2022

LRVP: Lightweight Real-Time Verification of Intradomain Forwarding Paths.
IEEE Syst. J., 2022

Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges.
IEEE Netw., 2022

Blockchain-Empowered Collaborative Task Offloading for Cloud-Edge-Device Computing.
IEEE J. Sel. Areas Commun., 2022

A&B: AI and Block-Based TCAM Entries Replacement Scheme for Routers.
IEEE J. Sel. Areas Commun., 2022

Wheels Know Why You Travel: Predicting Trip Purpose via a Dual-Attention Graph Embedding Network.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Differentially Private Learning with Per-Sample Adaptive Clipping.
CoRR, 2022

FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR, 2022

<i>Chameleon</i>: A Self-adaptive cache strategy under the ever-changing access frequency in edge network.
Comput. Commun., 2022

Interpreting AI for Networking: Where We Are and Where We Are Going.
IEEE Commun. Mag., 2022

Intelligent networking in adversarial environment: challenges and opportunities.
Sci. China Inf. Sci., 2022

WIP: When RDMA Meets Wireless.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Break the Blackbox! Desensitize Intra-domain Information for Inter-domain Routing.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

D3: Lightweight Secure Fault Localization in Edge Cloud.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Verifying the Quality of Outsourced Training on Clouds.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation.
IEEE/ACM Trans. Netw., 2021

Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation.
IEEE/ACM Trans. Netw., 2021

Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC.
Phys. Commun., 2021

Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services.
IEEE Netw., 2021

NetSpirit: A Smart Collaborative Learning Framework for DDoS Attack Detection.
IEEE Netw., 2021

MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities.
IEEE Internet Things J., 2021

Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021

Acknowledgment on Demand for Transport Control.
IEEE Internet Comput., 2021

AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning.
CoRR, 2021

A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks.
Comput. Networks, 2021

TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge Server.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

AIR: An AI-based TCAM Entry Replacement Scheme for Routers.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Demystifying the Relationship Between Network Latency and Mobility on High-Speed Rails: Measurement and Prediction.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

MASK: Practical Source and Path Verification based on Multi-AS-Key.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

FedPrune: Personalized and Communication-Efficient Federated Learning on Non-IID Data.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

R-AQM: Reverse ACK Active Queue Management in Multi-tenant Data Centers.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

A Deep Reinforcement Learning-based Routing Scheme with Two Modes for Dynamic Networks.
Proceedings of the ICC 2021, 2021

Frend for Edge Servers: Reduce Server Number! Keeping Service Quality!
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Toward Secure and Lightweight Access Authentication in SAGINs.
IEEE Wirel. Commun., 2020

Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Minimizing Tardiness for Data-Intensive Applications in Heterogeneous Systems: A Matching Theory Perspective.
IEEE Trans. Parallel Distributed Syst., 2020

ROD-Revenue: Seeking Strategies Analysis and Revenue Prediction in Ride-on-Demand Service Using Multi-Source Urban Data.
IEEE Trans. Mob. Comput., 2020

An Efficient and Compacted DAG-Based Blockchain Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

AutoSight: Distributed Edge Caching in Short Video Network.
IEEE Netw., 2020

ABQ: Active Buffer Queueing in Datacenters.
IEEE Netw., 2020

Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks.
IEEE Netw., 2020

ID-Based SDN for the Internet of Things.
IEEE Netw., 2020

Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020

Fine-grained Dynamic Price Prediction in Ride-on-demand Services: Models and Evaluations.
Mob. Networks Appl., 2020

Understand Love of Variety in Wireless Data Market Under Sponsored Data Plans.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT.
IEEE J. Sel. Areas Commun., 2020

Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities.
IEEE Internet Things J., 2020

Congestion avoidance transmission mechanism based on two-dimensional forwarding.
Future Gener. Comput. Syst., 2020

Robust Attacks on Deep Learning Face Recognition in the Physical World.
CoRR, 2020

Incentive mechanisms for mobile data offloading through operator-owned WiFi access points.
Comput. Networks, 2020

SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards.
IEEE Commun. Mag., 2020

TACK: Improving Wireless Transport Performance by Taming Acknowledgments.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

NoPTPeer: Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without Privilege.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

I Know If the Journey Changes: Flexible Source and Path Validation.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Federated Routing Scheme for Large-scale Cross Domain Network.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Off-Path TCP Exploits of the Mixed IPID Assignment.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Network Management in Cloud and Edge Computing
Springer, ISBN: 978-981-15-0137-1, 2020

Blockchain: Empowering Secure Data Sharing
Springer, ISBN: 978-981-15-5938-9, 2020

2019
Machine-Learning-Based Positioning: A Survey and Future Directions.
IEEE Netw., 2019

Guest Editorial: Smart Grid Inspired Data Sensing, Processing and Networking Technologies.
Mob. Networks Appl., 2019

Communication-Aware Container Placement and Reassignment in Large-Scale Internet Data Centers.
IEEE J. Sel. Areas Commun., 2019

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019

VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

RFL: Robust fault localization on unreliable communication channels.
Comput. Networks, 2019

Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks.
CCF Trans. Netw., 2019

Communication and computation cooperation in cloud radio access network with mobile edge computing.
CCF Trans. Netw., 2019

Variety matters: a new model for the wireless data market under sponsored data plans.
Proceedings of the International Symposium on Quality of Service, 2019

Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019

Exploring the Influence of News Articles on Bitcoin Price with Machine Learning.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
GreenLink: An Energy Efficient Scatternet Formation for BLE Devices.
Wirel. Commun. Mob. Comput., 2018

Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites.
IEEE Trans. Serv. Comput., 2018

Errata to "Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites".
IEEE Trans. Serv. Comput., 2018

Toward Cloud-Based Distributed Interactive Applications: Measurement, Modeling, and Analysis.
IEEE/ACM Trans. Netw., 2018

Migrating big video data to cloud: a peer-assisted approach for VoD.
Peer-to-Peer Netw. Appl., 2018

Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains.
IEEE Netw., 2018

SI-STIN: A Smart Identifier Framework for Space and Terrestrial Integrated Network.
IEEE Netw., 2018

A Simple but Quantifiable Approach to Dynamic Price Prediction in Ride-on-demand Services Leveraging Multi-source Urban Data.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Design, modeling, and analysis of online combinatorial double auction for mobile cloud computing markets.
Int. J. Commun. Syst., 2018

A measurement study on multi-path TCP with multiple cellular carriers on high speed rails.
Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, 2018

Dynamic Price Prediction in Ride-on-demand Service with Multi-source Urban Data.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

BDS: a centralized near-optimal overlay network for inter-datacenter data replication.
Proceedings of the Thirteenth EuroSys Conference, 2018

2017
SmartFix: Indoor Locating Optimization Algorithm for Energy-Constrained Wearable Devices.
Wirel. Commun. Mob. Comput., 2017

A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails.
IEEE/ACM Trans. Netw., 2017

Equilibrium Price and Dynamic Virtual Resource Allocation for Wireless Network Virtualization.
Mob. Networks Appl., 2017

Modelling Passengers' Reaction to Dynamic Prices in Ride-on-demand Services: A Search for the Best Fare.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code.
Future Gener. Comput. Syst., 2017

Interest-suppression-based NDN live video broadcasting over wireless LAN.
Frontiers Comput. Sci., 2017

Throughput optimization of TCP incast congestion control in large-scale datacenter networks.
Comput. Networks, 2017

Understanding ride-on-demand service: Demand and dynamic pricing.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Understanding passenger reaction to dynamic prices in ride-on-demand service.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

It Can be Cheaper: Using Price Prediction to Obtain Better Prices from Dynamic Pricing in Ride-on-demand Services.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

A measurement study on Skype voice and video calls in LTE networks on high speed rails.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Robust and lightweight fault localization.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

A Communication-Aware Container Re-Distribution Approach for High Performance VNFs.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

MINOS: regulating router dataplane actions in dynamic runtime environments.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Achieving Optimal Traffic Engineering Using a Generalized Routing Framework.
IEEE Trans. Parallel Distributed Syst., 2016

A tutorial on the internet of things: from a heterogeneous network integration perspective.
IEEE Netw., 2016

Toward software defined smart home.
IEEE Commun. Mag., 2016

Continuous double auction for cloud market: Pricing and bidding analysis.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

PieBridge: A Cross-DR scale Large Data Transmission Scheduling System.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Power-Aware Wireless Transmission for Computation Offloading in Mobile Cloud.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Towards Minimal Tardiness of Data-Intensive Applications in Heterogeneous Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Integrated, Distributed Traffic Control in Multidomain Networks.
IEEE Trans. Control. Syst. Technol., 2015

Exploring the policy selection of the P2P VoD system: A simulation-based research.
Peer-to-Peer Netw. Appl., 2015

A Family of Stable Multipath Dual Congestion Control Algorithms.
J. Comput. Sci. Technol., 2015

Toward a Practical Energy Conservation Mechanism With Assistance of Resourceful Mules.
IEEE Internet Things J., 2015

A neuro-fuzzy approach to self-management of virtual network resources.
Expert Syst. Appl., 2015

A bargaining game theoretic method for virtual resource allocation in LTE-based cellular networks.
Sci. China Inf. Sci., 2015

Special issue on big data inspired data sensing, processing and networking technologies.
Ad Hoc Networks, 2015

Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis.
IEEE Access, 2015

Modeling Multi-path TCP Throughput with Coupled Congestion Control and Flow Control.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Performance and incentive of teamwork-based channel allocation in spectrum access networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Enhancing TCP Incast congestion control over large-scale datacenter networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

TSP: A traffic sharing platform for mobile networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Towards shorter task completion time in datacenter networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Lifetime maximization in rechargeable wireless sensor networks with charging interference.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Virtual resource allocation for wireless virtualization networks using market equilibrium theory.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

A measurement study on TCP behaviors in HSPA+ networks on high-speed rails.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015

NDN Live Video Broadcasting over Wireless LAN.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

ESTRA: Incentivizing Storage Trading for Edge Caching in Mobile Content Delivery.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

SNACS: Social Network-Aware Cloud Assistance for Online Propagated Video Sharing.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Internet Resource Pricing Models.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8409-7, 2014

Can P2P Technology Benefit Eyeball ISPs? A Cooperative Profit Distribution Answer.
IEEE Trans. Parallel Distributed Syst., 2014

A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices.
IEEE Trans. Parallel Distributed Syst., 2014

Pushing Server Bandwidth Consumption to the Limit: Modeling and Analysis of Peer-Assisted VoD.
IEEE Trans. Netw. Serv. Manag., 2014

Energy Management in Cross-Domain Content Delivery Networks: A Theoretical Perspective.
IEEE Trans. Netw. Serv. Manag., 2014

Peer-to-peer as an infrastructure service.
Peer-to-Peer Netw. Appl., 2014

Toward a practical reconfigurable router: a software component development approach.
IEEE Netw., 2014

An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension.
IEEE Internet Things J., 2014

Configuring IPv4 over IPv6 Networks: Transitioning with DHCP.
IEEE Internet Comput., 2014

On IGP link weight optimization for joint energy efficiency and load balancing improvement.
Comput. Commun., 2014

Towards evolvable Internet architecture-design constraints and models analysis.
Sci. China Inf. Sci., 2014

Towards efficient virtual network embedding across multiple network domains.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Online combinatorial double auction for mobile cloud computing markets.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

TCP Performance over Mobile Networks in High-Speed Mobility Scenarios.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

On incentive of customer-provided resource sharing in cloud.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Torrents on Twitter: Explore Long-Term Social Relationships in Peer-to-Peer Systems.
IEEE Trans. Netw. Serv. Manag., 2013

A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios.
IEEE Netw., 2013

Accelerating Peer-to-Peer File Sharing with Social Relations.
IEEE J. Sel. Areas Commun., 2013

Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets.
CoRR, 2013

Resource management in radio access and IP-based core networks for IMT Advanced and Beyond.
Sci. China Inf. Sci., 2013

Research achievements on the new generation Internet architecture and protocols.
Sci. China Inf. Sci., 2013

Green IGP link weights for energy-efficiency and load-balancing in IP backbone networks.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

The 2ACT model-based evaluation for in-network caching mechanism.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Video requests from Online Social Networks: Characterization, analysis and generation.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Resource provisioning on customer-provided clouds: Optimization of service availability.
Proceedings of IEEE International Conference on Communications, 2013

SuperFlow: A Reliable, Controllable and Scalable Architecture for Large-Scale Enterprise Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

On popularity prediction of videos shared in online social networks.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Enhancing the Trust of Internet Routing With Lightweight Route Attestation.
IEEE Trans. Inf. Forensics Secur., 2012

Understand traffic locality of peer-to-peer video file swarming.
Comput. Commun., 2012

Measurement, modeling and enhancement of BitTorrent-based VoD system.
Comput. Networks, 2012

Video sharing in online social networks: measurement and analysis.
Proceedings of the Network and Operating System Support for Digital Audio and Video Workshop, 2012

Enhancing Traffic Locality in BitTorrent via Shared Trackers.
Proceedings of the NETWORKING 2012, 2012

Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF.
Proceedings of the NETWORKING 2012, 2012

Exploring the policy selection of P2P VoD system - A simulation based research.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Understanding video propagation in online social networks.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Will the three-network convergence happen? - An evolution model based analysis.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2011
LBMP: A Logarithm-Barrier-Based Multipath Protocol for Internet Traffic Management.
IEEE Trans. Parallel Distributed Syst., 2011

Defending Against Distance Cheating in Link-Weighted Application-Layer Multicast.
IEEE/ACM Trans. Netw., 2011

PACC: A Path Associativity Congestion Control and Throughput Model For Multi-path TCP.
Proceedings of the International Conference on Computational Science, 2011

A Large Family of Multi-path Dual Congestion Control Algorithms
CoRR, 2011

Internet Resource Pricing Models, Mechanisms, and Methods
CoRR, 2011

Impact of user selfishness in construction action on the streaming quality of overlay multicast.
Comput. Networks, 2011

Large-scale P2PVOD system: Focusing on clients.
Sci. China Inf. Sci., 2011

PPVA: A universal and transparent P2SP accelerator for online video sharing.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

Pitfalls of re-sharing BitTorrent contents: The failure of daily pattern.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

Access Path Based Source Address Validation in Mobile IPv6.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A model approach to estimate Peer-to-Peer traffic matrices.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

An Algebraic Approach to Computing the Reliability of Internet Routing.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

SafeZone: A Hierarchical Inter-Domain Authenticated Source Address Validation Solution.
Proceedings of the Global Communications Conference, 2011

Cost-Effective Partial Migration of VoD Services to Content Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Measurement and enhancement of BitTorrent-based video file swarming.
Peer-to-Peer Netw. Appl., 2010

Understanding peer distribution in the global internet.
IEEE Netw., 2010

Identify P2P traffic by inspecting data transfer behavior.
Comput. Commun., 2010

Proxy caching for peer-to-peer live streaming.
Comput. Networks, 2010

On Tracker Selection for Peer-to-Peer Traffic Locality.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Collaborative delay-aware scheduling in peer-to-peer UGC video sharing.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

PPVA: A universal and transparent peer-to-peer accelerator for interactive online video sharing.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Exploring BitTorrent peer distribution via hybrid PlanetLab-Internet measurement.
Proceedings of the 18th International Workshop on Quality of Service, 2010

The Minimum Server Bandwidth in Peer-Assisted VoD Systems.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

2009
Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Web 2.0 traffic measurement: analysis on online map applications.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2009

Identify P2P Traffic by Inspecting Data Transfer Behaviour.
Proceedings of the NETWORKING 2009, 2009

On the locality of BitTorrent-based video file swarming.
Proceedings of the 8th international conference on Peer-to-peer systems, 2009

Proportional fairness of call blocking probability.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

AutoSig-Automatically Generating Signatures for Applications.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience.
RFC, June, 2008

Edge overlay multicast to support comparable multi-class services.
J. High Speed Networks, 2008

Analysis and case study on multi-dimensional scalability of the Internet architecture.
Sci. China Ser. F Inf. Sci., 2008

NetRiver, a computer network experiment system.
Proceedings of the First ACM Summit on Computing Education in China, 2008

A High Performance and Scalable Packet Pattern-Matching Architecture.
Proceedings of the 2008 International Conference on Information Networking, 2008

Toward A Practical Scheme for IPSec Management.
Proceedings of the 2008 International Conference on Information Networking, 2008

Evaluating Service Scalability of Network Architectures.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Caching the P2P Traffic in ISP Network.
Proceedings of IEEE International Conference on Communications, 2008

A Hash Tree Based Authentication Scheme in SIP Applications.
Proceedings of IEEE International Conference on Communications, 2008

Quadratic Residue Based Address Allocation for Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

Tod-Cache: Peer-to-Peer Traffic Management and Optimization Using Combined Caching and Redirection.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Hierarchical Packet Scheduling for Satellite Multimedia Broadcasting: An Adaptive QoS-Aware Design.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Framework for end-to-end optimal traffic control law based on overlay mesh.
J. Commun. Networks, 2007

CBroadcast: an Application Layer Multicast mechanism based on combination of central control and self-organisation.
Int. J. Ad Hoc Ubiquitous Comput., 2007

Modified flap damping mechanism to improve inter-domain routing convergence.
Comput. Commun., 2007

A Strategyproof Protocol in Mesh-Based Overlay Streaming System.
Proceedings of the Advances in Multimedia Modeling, 2007

Optimization of Mobile IPv6 Handover Performance Using E-HCF Method.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Analysis of BGP Convergence Using SHLPN Model.
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007

2006
Research on Next-Generation Internet Architecture.
J. Comput. Sci. Technol., 2006

An integrated, distributed traffic control strategy for the future internet.
Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, 2006

A Variation of Route Flap Damping to Improve BGP Routing Convergence.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

On the Stability of Application-Layer Multicast Tree.
Proceedings of the Computer and Information Sciences, 2006

Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM.
Proceedings of the Computer and Information Sciences, 2006

An improved Wu-Manber multiple patterns matching algorithm.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Smooth Handoff Based on Virtual Interface in Wireless Network.
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006

BGP Route Selection Notice.
Proceedings of the Information Networking, 2006

RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks.
Proceedings of the Information Networking, 2006

PS<sup>2</sup>: An HA-Enabled Memory Management Scheme In Core Routers.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Building Trees to Support Comparable Multi-class Services in Edge Overlay Multicast.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

A Novel Control Plane Model of Extensible Routers.
Proceedings of the Computational Science, 2006

Handover Control Function Based Handover for Mobile IPv6.
Proceedings of the Computational Science, 2006

Segment-sending Schedule in Data-driven Overlay Network.
Proceedings of IEEE International Conference on Communications, 2006

A Tree-Based Distributed Model for BGP Route Processing.
Proceedings of the High Performance Computing and Communications, 2006

Heterogeneous QoS Multicast and Its Improvement on Edge-Based Overlay Networks.
Proceedings of the High Performance Computing and Communications, 2006

2005
Precomputation for intra-domain QoS routing.
Comput. Networks, 2005

Improvement of Multicast Routing Protocol Using Petri Nets.
Proceedings of the Rough Sets, 2005

Construct Optimal Diameter Network and d-partition Routing Algorithm.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

3Sons: Semi-structured Substrate Support for Overlay Network Services.
Proceedings of the Information Networking, 2005

ComBAQ: Provisioning Loss Differentiated Services for Hybrid Traffic in Routers.
Proceedings of the Information Networking, 2005

Overlay Logging: An IP Traceback Scheme in MPLS Network.
Proceedings of the Networking, 2005

S-Chord: Hybrid Topology Makes Chord Efficient.
Proceedings of the Networking, 2005

Quality of Service Routing Network and Performance Evaluation.
Proceedings of the Networking, 2005

On peer-to-peer client web cache sharing.
Proceedings of IEEE International Conference on Communications, 2005

Impact of receiver cheating on the stability of ALM tree.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Performance Analysis of Multicast Routing Protocol PIM-SM.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

2004
Using fuzzy-PI controller in active queue management.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A Novel ECN-Based Congestion Control and Avoidance Algorithm with Forecasting and Verifying.
Proceedings of the Telecommunications and Networking, 2004

A Scalable Parallel Lookup Framework Avoiding Longest Prefix Match.
Proceedings of the Information Networking, 2004

Multi-constrained End-to-End Admission Control in Core-Stateless Networks.
Proceedings of the Information Networking, 2004

Simple quality-of-service path first protocol and modeling analysis.
Proceedings of IEEE International Conference on Communications, 2004

2003
TMS: A Scalable Transition Multicast Scheme.
Proceedings of the Distributed Computing, 2003

Stability of a multicast tree in cumulative layered multicast congestion control.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Adjustable multi-constrained routing with a novel evaluation method.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

Precomputation for Multi-constrained QoS Routing in High-speed Networks.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

An equation-based network-supported for layered multicast congestion control.
Proceedings of the 11th IEEE International Conference on Networks, 2003

SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows.
Proceedings of the Information Networking, 2003

The Stability Problem of Multicast Trees in Layered Multicast.
Proceedings of the Information Networking, 2003

Optimal QoS Routing Based on Extended Simulated Annealing.
Proceedings of the Information Networking, 2003

Multi-constrained routing based on simulated annealing.
Proceedings of IEEE International Conference on Communications, 2003

Precomputation for finding paths with two additive weights.
Proceedings of IEEE International Conference on Communications, 2003

2002
A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm.
J. Comput. Sci. Technol., 2002

Rethink the tradeoff between proportional controller and PI controller.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

A hierarchical approach to establish an efficient upgrade plan.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

NLRI storage aggregation of BGP-4 routing information.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Stress testing of OSPF protocol implementation based on large-scale routing simulation.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Proportional fairness scheduling on tandem network.
Proceedings of the IEEE International Conference on Communications, 2002

2001
A fast IP classification algorithm applying to multiple fields.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...