Kuai Xu

Orcid: 0000-0001-6659-6773

Affiliations:
  • Arizona State University, School of Mathematical and Natural Sciences, Tempe, AZ, USA
  • Yahoo! Inc., Sunnyvale, CA, USA (former)
  • University of Minnesota, USA (PhD 2006)


According to our database1, Kuai Xu authored at least 75 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Holistic Curriculum Towards Teaching Smart Home Security.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in a Weighted Attack Graph.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Extracting Spatial Information of IoT Device Events for Smart Home Safety Monitoring.
Proceedings of the IEEE INFOCOM 2023, 2023

2022
IoTAthena: Unveiling IoT Device Activities From Network Traffic.
IEEE Trans. Wirel. Commun., 2022

An Effective Machine Learning Based Algorithm for Inferring User Activities From IoT Device Events.
IEEE J. Sel. Areas Commun., 2022

IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart Homes.
Proceedings of the IEEE INFOCOM 2022, 2022

Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

An End-to-End System for Monitoring IoT Devices in Smart Homes.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Network Behavior Analysis - Measurement, Models, and Applications
Springer, ISBN: 978-981-16-8324-4, 2022

2021
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks.
IEEE Trans. Netw. Sci. Eng., 2021

2020
Mitigating the Impact of Data Sampling on Social Media Analysis and Mining.
IEEE Trans. Comput. Soc. Syst., 2020

Characterizing DNS Behaviors of Internet of Things in Edge Networks.
IEEE Internet Things J., 2020

Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks.
J. Grid Comput., 2020

IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Powering Smart Homes with Information-Centric Networking.
IEEE Commun. Mag., 2019

Securing ICN-Based UAV Ad Hoc Networks with Blockchain.
IEEE Commun. Mag., 2019

Multidimensional behavioral profiling of internet-of-things in edge networks.
Proceedings of the International Symposium on Quality of Service, 2019

Detecting Malicious Domains with Behavioral Modeling and Graph Embedding.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Towards Decentralized Equilibrium Asset Trading Based on Blockchain.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
An NDN IoT Content Distribution Model With Network Coding Enhanced Forwarding Strategy for 5G.
IEEE Trans. Ind. Informatics, 2018

Towards Understanding Community Interests With Topic Modeling.
IEEE Access, 2018

Understanding User Behavior in Sina Weibo Online Social Network: A Community Approach.
IEEE Access, 2018

A First Step Towards Combating Fake News over Online Social Media.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

IFS-RL: An Intelligent Forwarding Strategy Based on Reinforcement Learning in Named-Data Networking.
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018

2017
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks.
Peer-to-Peer Netw. Appl., 2017

2016
Secure the Internet, one home at a time.
Secur. Commun. Networks, 2016

Cyber security, crime, and forensics of wireless networks and applications.
Secur. Commun. Networks, 2016

Regional Level Influenza Study with Geo-Tagged Twitter Data.
J. Medical Syst., 2016

Internet Traffic Analysis in a Large University Town: A Graphical and Clustering Approach.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

2015
Network Coding for Effective NDN Content Delivery: Models, Experiments, and Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Profiling the followers of the most influential and verified users on Sina Weibo.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Extracting unknown words from Sina Weibo via data clustering.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

The Impact of Sampling on Big Data Analysis of Social Media: A Case Study on Flu and Ebola.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A RCP-Based Congestion Control Protocol in Named Data Networking.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2014
Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections.
IEEE/ACM Trans. Netw., 2014

Characterizing home network traffic: an inside view.
Pers. Ubiquitous Comput., 2014

Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Characterizing Tweeting Behaviors of Sina Weibo Users via Public Data Streaming.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Hot topic analysis and content mining in social media.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Financial fraud detection using social media crowdsourcing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

An encryption and probability based access control model for named data networking.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2013
Improving schedulability and energy efficiency for real-time systems with (m, k)-guarantee.
SIGBED Rev., 2013

Modeling Information Diffusion in Online Social Networks with Partial Differential Equations.
CoRR, 2013

Message from the IPCCC 2013 general chairs.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Monitoring home network traffic via programmable routers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Understanding Sina Weibo online social network: A community approach.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Positive influence dominating sets in power-law graphs.
Soc. Netw. Anal. Min., 2012

Lightweight and Informative Traffic Metrics for Data Center Monitoring.
J. Netw. Syst. Manag., 2012

Profiling-as-a-Service in Multi-tenant Cloud Computing Environments.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Discovering Shared Interests in Online Social Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

HomeTPS: Uncovering what is happening in home networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
On positive influence dominating sets in social networks.
Theor. Comput. Sci., 2011

Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks
CoRR, 2011

Network-aware behavior clustering of Internet end hosts.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A first look at inter-data center traffic characteristics via Yahoo! datasets.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Behavioral Graph Analysis of Internet Applications.
Proceedings of the Global Communications Conference, 2011

2010
Principal component analysis of BGP update streams.
J. Commun. Networks, 2010

Real-time behaviour profiling for network monitoring.
Int. J. Internet Protoc. Technol., 2010

Fast Anomaly Detection for Large Data Centers.
Proceedings of the Global Communications Conference, 2010

Behavior Profiling and Analysis in Wireless Home Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Positive Influence Dominating Set in Online Social Networks.
Proceedings of the Combinatorial Optimization and Applications, 2009

2008
Internet traffic behavior profiling for network security monitoring.
IEEE/ACM Trans. Netw., 2008

Cooperative Monitoring for Internet Data Centers.
Proceedings of the 2008 IEEE International Performance, 2008

2007
Damping BGP route flaps.
J. Commun. Networks, 2007

Fault tolerant topology control for one-to-all communications in symmetric wireless networks.
Int. J. Sens. Networks, 2007

Identifying and tracking suspicious activities through IP gray space analysis.
Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, 2007

A Real-Time Network Traffic Profiling System.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2005
Reducing Unwanted Traffic in a Backbone Network.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

Profiling internet backbone traffic: behavior models and applications.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

A first step toward understanding inter-domain routing dynamics.
Proceedings of the 1st Annual ACM Workshop on Mining Network Data, 2005

Improving VoIP quality through path switching.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Exploring the performance benefits of end-to-end path switching.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

On Properties of Internet Exchange Points and Their Impact on AS Topology and Relationship.
Proceedings of the NETWORKING 2004, 2004


  Loading...