Rocky K. C. Chang

Orcid: 0000-0002-2648-5814

Affiliations:
  • Hong Kong Polytechnic University


According to our database1, Rocky K. C. Chang authored at least 91 papers between 1998 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019

2018
Toward Accurate Network Delay Measurement on Android Phones.
IEEE Trans. Mob. Comput., 2018

Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

Enhancing the experience of multiplayer shooter games via advanced lag compensation.
Proceedings of the 9th ACM Multimedia Systems Conference, 2018

2017
Detecting Low-Quality Workers in QoE Crowdtesting: A Worker Behavior-Based Approach.
IEEE Trans. Multim., 2017

MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

On "shot around a corner" in first-person shooter games.
Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, 2017

2016
IRate: Initial Video Bitrate Selection System for HTTP Streaming.
IEEE J. Sel. Areas Commun., 2016

MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic.
CoRR, 2016

Harvesting File Download Exploits in the Web: A Hacker's View.
Comput. J., 2016

Time to Measure the Pi.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

ACM CoNEXT 2016 Student Workshop.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016

2015
Indirect File Leaks in Mobile Applications.
CoRR, 2015

Improving the Packet Send-Time Accuracy in Embedded Devices.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Evaluation of lag-related configurations in first-person shooter games.
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015

Detecting low-quality crowdtesting workers.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

On the accuracy of smartphone-based mobile network measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks.
IEEE Trans. Inf. Forensics Secur., 2014

A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR, 2014

A user behavior based cheat detection mechanism for crowdtesting.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Analyzing Android Browser Apps for file: // Vulnerabilities.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE J. Sel. Areas Commun., 2013

Inference attacks against trust-based onion routing: Trust degree to the rescue.
Comput. Secur., 2013

SGor: Trust graph based onion routing.
Comput. Networks, 2013

OMware: an open measurement ware for stable residential broadband measurement.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Appraising the delay accuracy in browser-based network measurement.
Proceedings of the 2013 Internet Measurement Conference, 2013

MonoScope: Automating network faults diagnosis based on active measurements.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

An efficient approach to multi-level route analytics.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics.
IEEE Trans. Dependable Secur. Comput., 2012

More Anonymity through Trust Degree in Trust-Based Onion Routing.
Proceedings of the Security and Privacy in Communication Networks, 2012

Characterizing Inter-domain Rerouting after Japan Earthquake.
Proceedings of the NETWORKING 2012, 2012

QDASH: a QoE-aware DASH system.
Proceedings of the Third Annual ACM SIGMM Conference on Multimedia Systems, 2012

LDC: Detecting BGP Prefix Hijacking by Load Distribution Change.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

2011
STor: Social Network based Anonymous Communication in Tor
CoRR, 2011

Inferring the QoE of HTTP video streaming from user-viewing activities.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

Non-cooperative Diagnosis of Submarine Cable Faults.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011

Measuring the quality of experience of HTTP video streaming.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Planetopus: A system for facilitating collaborative network monitoring.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

An integrative multi-level analysis of internet path changes.
Proceedings of The ACM CoNEXT Student Workshop, 2011

TRIO: measuring asymmetric capacity with three minimum round-trip times.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

Exposing invisible timing-based traffic watermarks with BACKLIT.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Measurement of loss pairs in network paths.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Neighbor-Cooperative Measurement of Network Path Quality.
Proceedings of the Global Communications Conference, 2010

2009
Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals.
EURASIP J. Adv. Signal Process., 2009

Signal Processing Applications in Network Intrusion Detection Systems.
EURASIP J. Adv. Signal Process., 2009

Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

On generalized low-rate denial-of-quality attack against Internet services.
Proceedings of the 17th International Workshop on Quality of Service, 2009

CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding.
Proceedings of IEEE International Conference on Communications, 2009

Reliable asymmetric path capacity measurement.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009

A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
TCP covert timing channels: Design and detection.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Inter-AS Inbound Traffic Engineering via ASPP.
IEEE Trans. Netw. Serv. Manag., 2007

Crafting Web Counters into Covert Channels.
Proceedings of the New Approaches for Security, 2007

Protecting Internet Services from Low-Rate DoS Attacks.
Proceedings of the Critical Infrastructure Protection, 2007

An active approach to measuring routing dynamics induced by autonomous systems.
Proceedings of the Workshop on Experimental Computer Science, 2007

Cloak: A Ten-Fold Way for Reliable Covert Communications.
Proceedings of the Computer Security, 2007

2006
Stability-constrained optimization for energy efficiency in polling-based wireless networks.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

Relative stability analysis of multiple queues.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Inbound traffic engineering for multihomed ASs using AS path prepending.
IEEE Netw., 2005

On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
Proceedings of the Network and Distributed System Security Symposium, 2005

Performance Analysis of TCP/AQM Under Denial-of-Service Attacks.
Proceedings of the 13th International Symposium on Modeling, 2005

Forwarding State Scalability-Aware Multicast Routing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Novel Approaches to End-to-End Packet Reordering Measurement.
Proceedings of the 5th Internet Measurement Conference, 2005

Optimizing the Pulsing Denial-of-Service Attacks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Inbound traffic engineering for multi-homed ASes using AS path prepending.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Teaching computer networking with the help of personal computer networks.
Proceedings of the 9th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2004

Strifeshadow Fantasy: a massive multi-player online game.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks.
SIGMETRICS Perform. Evaluation Rev., 2003

A Multicast-On-Large-Demand Approach to the Flash Crowd Problem.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

2002
Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies.
Comput. Networks, 2002

Defending against flooding-based distributed denial-of-service attacks: a tutorial.
IEEE Commun. Mag., 2002

Transport layer proxy for stateful UDP packet filtering.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Engineering of a global defense infrastructure for DDoS attacks.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

2001
Per-queue stability analysis of a random access system.
IEEE Trans. Autom. Control., 2001

Stability comparison in single-server-multiple-queue systems.
SIGMETRICS Perform. Evaluation Rev., 2001

Routing Properties of a Recursive Interconnection Network.
J. Parallel Distributed Comput., 2001

A simulation study on the throughput fairness of TCP Vegas.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
A novel approach to queue stability analysis of polling models.
Perform. Evaluation, 2000

A Transport-Level Proxy for Secure Multimedia Streams.
IEEE Internet Comput., 2000

A Tree Switching Protocol for Multicast State Reduction.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

A throughput deadlock-free TCP for high-speed Internet.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1998
An optimal end-to-end bypass configuration algorithm for self-heating VP-based ATM networks.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

Improving the performance of reconfigurable WDM lightwave networks with deflection routing via node reassignment.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998

Optimal node assignment in reconfigurable WDM lightwave networks with regular virtual topologies.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998


  Loading...