Shigang Chen

Orcid: 0000-0001-7867-7765

Affiliations:
  • University of Florida, Gainesville, FL, USA


According to our database1, Shigang Chen authored at least 260 papers between 1995 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to quality of service provisioning and policy-based security management in computer networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Spatial-Logic-Aware Weakly Supervised Learning for Flood Mapping on Earth Imagery.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Accurate and O(1)-Time Query of Per-Flow Cardinality in High-Speed Networks.
IEEE/ACM Trans. Netw., December, 2023

Universal and Accurate Sketch for Estimating Heavy Hitters and Moments in Data Streams.
IEEE/ACM Trans. Netw., October, 2023

Policy enforcement in traditional non-SDN networks.
J. Parallel Distributed Comput., July, 2023

Self-Adaptive Sampling Based Per-Flow Traffic Measurement.
IEEE/ACM Trans. Netw., June, 2023

Coupon Filter: A Universal and Lightweight Filter Framework for More Accurate Data Stream Processing.
Comput. Networks, June, 2023

Randomized Error Removal for Online Spread Estimation in High-Speed Networks.
IEEE/ACM Trans. Netw., April, 2023

Enabling smart curb management with spatiotemporal deep learning.
Comput. Environ. Urban Syst., 2023

Robust Task Offloading in Dynamic Edge Computing.
IEEE Trans. Mob. Comput., 2023

Single Update Sketch with Variable Counter Structure.
Proc. VLDB Endow., 2023

Real-time Spread Burst Detection in Data Streaming.
Proc. ACM Meas. Anal. Comput. Syst., 2023

A Hierarchical Spatial Transformer for Massive Point Samples in Continuous Space.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
When Tags 'Read' Each Other: Enabling Low-Cost and Convenient Tag Mutual Identification.
ACM Trans. Sens. Networks, 2022

Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps.
IEEE/ACM Trans. Netw., 2022

Virtual Filter for Non-Duplicate Sampling With Network Applications.
IEEE/ACM Trans. Netw., 2022

Super Spreader Identification Using Geometric-Min Filter.
IEEE/ACM Trans. Netw., 2022

Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement.
IEEE/ACM Trans. Netw., 2022

Toward Differential Privacy for Traffic Measurement in Vehicular Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2022

Probabilistic Data Prefetching for Data Transportation in Smart Cities.
IEEE Internet Things J., 2022

Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications.
IACR Cryptol. ePrint Arch., 2022

Achieving Differential Privacy with Matrix Masking in Big Data.
CoRR, 2022

ChopTags: An Accurate and Low-cost Interface to Identify User/Item Interactions.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

An Efficient Adaptive Denoising Sketch for Per-flow Traffic Measurement.
Proceedings of the IEEE International Performance, 2022

Short-Term Memory Sampling for Spread Measurement in High-Speed Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

HeavyTracker: An Efficient Algorithm for Heavy-Hitter Detection in High-Speed Networks.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Is LoRaWAN Really Wide? Fine-grained LoRa Link-level Measurement in An Urban Environment.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Online Cardinality Estimation by Self-morphing Bitmaps.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Supporting Real-time Networkwide T-Queries in High-speed Networks.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Training Medical-Diagnosis Neural Networks on the Cloud with Privacy-Sensitive Patient Data from Multiple Clients.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
Indirect Multi-Mapping for Burstiness Management in Software Defined Networks.
IEEE/ACM Trans. Netw., 2021

Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching.
IEEE/ACM Trans. Netw., 2021

Spread Estimation With Non-Duplicate Sampling in High-Speed Networks.
IEEE/ACM Trans. Netw., 2021

Randomized Error Removal for Online Spread Estimation in Data Streaming.
Proc. VLDB Endow., 2021

ActiveKeeper: An Accurate and Efficient Algorithm for Finding Top-k Elephant Flows.
IEEE Commun. Lett., 2021

Noise Measurement and Removal for Data Streaming Algorithms with Network Applications.
Proceedings of the IFIP Networking Conference, 2021

Thermotag: item-level temperature sensing with a passive RFID tag.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

Supporting Flow-Cardinality Queries with O(1) Time Complexity in High-speed Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Self-Adaptive Sampling for Network Traffic Measurement.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

On Outsourcing Artificial Neural Network Learning of Privacy-Sensitive Medical Data to the Cloud.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Virtual Filter for Non-duplicate Sampling.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Rumor Remove Order Strategy on Social Networks.
Proceedings of the ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2021

A Survey on Mainstream Dimensions of Edge Computing.
Proceedings of the ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2021

A Full Mirror Computation Model for Edge-Cloud Computing.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

Supporting Real-Time ${T}$-Queries on Network Traffic with a Cloud-Based Offloading Model.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

Dynamic Edge-Twin Computing for Vehicle Tracking.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Efficient Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets With Unreliable Channels.
IEEE/ACM Trans. Netw., 2020

Missing-Tag Detection With Unknown Tags.
IEEE/ACM Trans. Netw., 2020

Estimating Cardinality for Arbitrarily Large Data Stream With Improved Memory Efficiency.
IEEE/ACM Trans. Netw., 2020

Pose Sensing With a Single RFID Tag.
IEEE/ACM Trans. Netw., 2020

An Efficient K-Persistent Spread Estimator for Traffic Measurement in High-Speed Networks.
IEEE/ACM Trans. Netw., 2020

Retwork: Exploring Reader Network with COTS RFID Systems.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Universal Online Sketch for Tracking Heavy Hitters and Estimating Moments of Data Streams.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Online Spread Estimation with Non-duplicate Sampling.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Accurate Hierarchical Traffic Measurement in Datacenters Through Differentiated Memory Allocation.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

An Experimental Study on the Impact of Execution Location in Edge-Cloud Computing.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

2019
SPATH: Finding the Safest Walking Path in Smart Cities.
IEEE Trans. Veh. Technol., 2019

Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System.
IEEE/ACM Trans. Netw., 2019

A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System.
IEEE/ACM Trans. Netw., 2019

Efficient Information Sampling in Multi-Category RFID Systems.
IEEE/ACM Trans. Netw., 2019

HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows.
IEEE/ACM Trans. Netw., 2019

Persistent Traffic Measurement through Vehicle-to-Infrastructure Communications in Cyber-Physical Road Systems.
IEEE Trans. Mob. Comput., 2019

Generalized Sketch Families for Network Traffic Measurement.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Monitoring Bodily Oscillation With RFID Tags.
IEEE Internet Things J., 2019

Privacy-Preserving Estimation of k-Persistent Traffic in Vehicular Cyber-Physical Systems.
IEEE Internet Things J., 2019

Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones.
IEEE Internet Things J., 2019

Trajectory similarity clustering based on multi-feature distance measurement.
Appl. Intell., 2019

Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag Matrix.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Dependable Policy Enforcement in Traditional Non-SDN Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Collision-resistant Communication Model for State-free Networked Tags.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Threshold-Based Widespread Event Detection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Scalable and Balanced Policy Enforcement through Hybrid SDN-Label Switching.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Joint Optimization of Flow Table and Group Table for Default Paths in SDNs.
IEEE/ACM Trans. Netw., 2018

Achieving High Scalability Through Hybrid Switching in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2018

Session-Based Cooperation in Cognitive Radio Networks: A Network-Level Approach.
IEEE/ACM Trans. Netw., 2018

A UHF RFID-Based System for Children Tracking.
IEEE Internet Things J., 2018

HeavyKeeper: An Accurate Algorithm for Finding Top-k Elephant Flows.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Missing-Tag Detection with Presence of Unknown Tags.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Using Wireless Tags to Monitor Bodily Oscillation.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

You Can Drop but You Can't Hide: K-persistent Spread Estimation in High-speed Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Highly Compact Virtual Active Counters for Per-flow Traffic Measurement.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Data Locality Exploitation in Cache Compression.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
Large-Scale VM Placement with Disk Anti-Colocation Constraints Using Hierarchical Decomposition and Mixed Integer Programming.
IEEE Trans. Parallel Distributed Syst., 2017

Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems.
IEEE/ACM Trans. Netw., 2017

Cardinality Estimation for Elephant Flows: A Compact Solution Based on Virtual Register Sharing.
IEEE/ACM Trans. Netw., 2017

Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System.
IEEE/ACM Trans. Netw., 2017

Identifying State-Free Networked Tags.
IEEE/ACM Trans. Netw., 2017

Lightweight Anonymous Authentication Protocols for RFID Systems.
IEEE/ACM Trans. Netw., 2017

Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement.
IEEE/ACM Trans. Netw., 2017

Pyramid Sketch: a Sketch Framework for Frequency Estimation of Data Streams.
Proc. VLDB Endow., 2017

Persistent Spread Measurement for Big Network Data Based on Register Intersection.
Proc. ACM Meas. Anal. Comput. Syst., 2017

Per-flow counting for big network data stream over sliding windows.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Scalable software-defined networking through hybrid switching.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Better with fewer bits: Improving the performance of cardinality estimation of large data streams.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Tag-compass: Determining the spatial direction of an object with small dimensions.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

DBF: A general framework for anomaly detection in RFID systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Deploying default paths by joint optimization of flow table and group table in SDNs.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Achieving Strong Privacy in Online Survey.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Category Information Collection in RFID Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ABC: A practicable sketch framework for non-uniform multisets.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Using Integer Programming for Workflow Scheduling in the Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Efficient Hierarchical Traffic Measurement in Software-Defined Datacenter Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
RFID Technologies for Internet of Things
Wireless Networks, Springer, ISBN: 978-3-319-47355-0, 2016

Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems.
IEEE Trans. Veh. Technol., 2016

When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications.
IEEE/ACM Trans. Netw., 2016

Tag-Ordering Polling Protocols in RFID Systems.
IEEE/ACM Trans. Netw., 2016

An Efficient Protocol for RFID Multigroup Threshold-Based Classification Based on Sampling and Logical Bitmap.
IEEE/ACM Trans. Netw., 2016

Efficient RFID Grouping Protocols.
IEEE/ACM Trans. Netw., 2016

An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel.
IEEE/ACM Trans. Netw., 2016

An Energy-Efficient Strategy for Secondary Users in Cooperative Cognitive Radio Networks for Green Communications.
IEEE J. Sel. Areas Commun., 2016

A New Data Collection Technique for Preserving Privacy.
J. Priv. Confidentiality, 2016

Survey on key security technologies for space information networks.
J. Commun. Inf. Networks, 2016

Limiting Self-Propagating Malware Based on Connection Failure Behavior through Hyper-Compact Estimators.
CoRR, 2016

Joint property estimation for multiple RFID tag sets using snapshots of variable lengths.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Anonymous category-level joint tag estimation: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

A communication model for stateless networked tags.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Efficient anonymous category-level joint Tag estimation.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Highly Compact Virtual Counters for Per-Flow Traffic Measurement through Register Sharing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

MVP: An Efficient Anonymous E-Voting Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Demonstrating Scalability and Efficiency of Pack-centric Resource Management for Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications.
IEEE Trans. Veh. Technol., 2015

Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets.
IEEE Trans. Mob. Comput., 2015

Pack Up Cloud: Recursive Datacenter Resource Management and Experimental Studies.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable Lengths.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Fast RFID grouping protocols.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Identifying State-Free Networked Tags.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

ETAP: Enable Lightweight Anonymous RFID Authentication with O(1) Overhead.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Toward Hierarchical Mixed Integer Programming for Pack-to-Swad Placement in Datacenters.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

2014
Fast Bloom Filters and Their Generalization.
IEEE Trans. Parallel Distributed Syst., 2014

Unknown-Target Information Collection in Sensor-Enabled RFID Systems.
IEEE/ACM Trans. Netw., 2014

Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels.
IEEE/ACM Trans. Netw., 2014

Pandaka: A lightweight cipher for RFID systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Estimating the Persistent Spreads in High-Speed Networks.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Highly compact virtual maximum likelihood sketches for counting big network data.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

On Deletion of Outsourced Data in Cloud Computing.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
RFID as an Infrastructure.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-5230-0, 2013

Traffic Measurement on the Internet.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-4851-8, 2013

Maximizing Lifetime Vector in Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

Spreader Classification Based on Optimal Dynamic Bit Sharing.
IEEE/ACM Trans. Netw., 2013

Efficient Protocols for Identifying the Missing Tags in a Large RFID System.
IEEE/ACM Trans. Netw., 2013

Estimating the Cardinality of a Mobile Peer-to-Peer Network.
IEEE J. Sel. Areas Commun., 2013

Differential estimation in dynamic RFID systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An efficient protocol for RFID multigroup threshold-based classification.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An efficient tag search protocol in large-scale RFID systems.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Guided multiple hashing: Achieving near perfect balance for fast routing lookup.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems.
Proceedings of the 1st IEEE International Conference on Cyber-Physical Systems, 2013

2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2012

Generalized energy-efficient algorithms for the RFID estimation problem.
IEEE/ACM Trans. Netw., 2012

Per-Flow Traffic Measurement Through Randomized Counter Sharing.
IEEE/ACM Trans. Netw., 2012

End-to-end maxmin fairness in multihop wireless networks: Theory and protocol.
J. Parallel Distributed Comput., 2012

An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks.
J. Parallel Distributed Comput., 2012

An incrementally deployable path address scheme.
J. Parallel Distributed Comput., 2012

Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

A time-efficient information collection protocol for large-scale RFID systems.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Privacy-preserving RFID authentication based on cryptographical encoding.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Origin-destination flow measurement in high-speed networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity.
Proceedings of IEEE International Conference on Communications, 2012

2011
Fit a Compact Spread Estimator in Small High-Speed Memory.
IEEE/ACM Trans. Netw., 2011

Achieving MAC-Layer Fairness in CSMA/CA Networks.
IEEE/ACM Trans. Netw., 2011

PSON: A scalable P2P file sharing system with efficient complex query support.
Peer-to-Peer Netw. Appl., 2011

Detecting Stealthy Spreaders by Random Aging Streaming Filters.
IEICE Trans. Commun., 2011

Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Energy-efficient polling protocols in RFID systems.
Proceedings of the 12th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2011

One memory access bloom filters and their generalization.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient missing tag detection in RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Scan detection in high-speed networks based on optimal dynamic bit sharing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Fast and compact per-flow traffic measurement through randomized counter sharing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Efficient information collection protocols for sensor-augmented RFID networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Analysis of power-aware buffering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2010

Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis.
IEEE/ACM Trans. Netw., 2010

Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls.
IEEE Trans. Computers, 2010

Identifying the missing tags in a large RFID system.
Proceedings of the 11th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2010

MAC-layer Time Fairness across Multiple Wireless LANs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Energy Efficient Algorithms for the RFID Estimation Problem.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Fast routing table lookup based on deterministic multi-hashing.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Using Analog Network Coding to Improve the RFID Reading Throughput.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Fair End-to-End Bandwidth Distribution in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Probabilistic Approach for Improving TCP Fairness across Multiple Contending WLANs.
Proceedings of the Global Communications Conference, 2010

2009
Algorithms and performance of load-balancing with multiple hash functions in massive content distribution.
Comput. Networks, 2009

Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Fit a Spread Estimator in Small Memory.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

2008
A novel scheme for protecting receiver's location privacy in wireless sensor networks.
IEEE Trans. Wirel. Commun., 2008

Two techniques for fast computation of constrained shortest paths.
IEEE/ACM Trans. Netw., 2008

SoMR: A scalable distributed QoS multicast routing protocol.
J. Parallel Distributed Comput., 2008

Efficient file search in non-DHT P2P networks.
Comput. Commun., 2008

Can CSMA/CA networks be made fair?
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

DAWN: A Novel Strategy for Detecting ASCII Worms in Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Exact Modeling of Propagation for Permutation-Scanning Worms.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

New adaptive protocols for fine-level end-to-end rate control in wireless networks.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Achieving Global End-to-End Maxmin in Multihop Wireless Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Analysis of Maximum Executable Length for Detecting Text-Based Malware.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Novel Solution for End-to-End Fairness Problem in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Real-Time Detection of Invisible Spreaders.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Building a Scalable P2P Network with Small Routing Delay.
Proceedings of the Progress in WWW Research and Development, 2008

2007
An Automated Signature-Based Approach against Polymorphic Internet Worms.
IEEE Trans. Parallel Distributed Syst., 2007

A Scalable Overlay Multicast Architecture for Large-Scale Applications.
IEEE Trans. Parallel Distributed Syst., 2007

DAW: A Distributed Antiworm System.
IEEE Trans. Parallel Distributed Syst., 2007

ACOM: Any-source Capacity-constrained Overlay Multicast in Non-DHT P2P Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2007

Stateful DDoS attacks and targeted filtering.
J. Netw. Comput. Appl., 2007

Spiral-based data dissemination in sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2007

State aggregation of large network domains.
Comput. Commun., 2007

AID: A global anti-DoS service.
Comput. Networks, 2007

A Hybrid Query Scheme to Speed Up Queries in Unstructured Peer-to-Peer Networks.
Adv. Multim., 2007

Toward the Next-Generation Peer-to-Peer Services.
Adv. Multim., 2007

MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Protecting Receiver-Location Privacy in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Speed Up Queries in Unstructured Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2007

Reducing the Size of Rule Set in a Firewall.
Proceedings of IEEE International Conference on Communications, 2007

2006
Special Section on Cross-Layer Design for Mobile Ad Hoc Networks and Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2006

Capacity-Aware Multicast Algorithms on Heterogeneous Overlay Networks.
IEEE Trans. Parallel Distributed Syst., 2006

Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2006

On Optimal Deadlock Detection Scheduling.
IEEE Trans. Computers, 2006

Avoid 'void' in geographic routing for data aggregation in sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2006

Localized algorithm for aggregate fairness in wireless sensor networks.
Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, 2006

Scalable and energy efficient data dissemination in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

A Distributed Hybrid Scheme for Unstructured Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2006

2005
Perimeter-Based Defense against High Bandwidth DDoS Attacks.
IEEE Trans. Parallel Distributed Syst., 2005

Detecting Internet worms at early stage.
IEEE J. Sel. Areas Commun., 2005

Stochastic analysis of distributed deadlock scheduling.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

Defending against Internet worms: a signature-based approach.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Resilient Capacity-Aware Multicast Based on Overlay Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Online identification of multi-attribute high-volume traffic aggregates through sampling.
Proceedings of IEEE International Conference on Communications, 2005

2004
On the Performance Regularity of Web Servers.
World Wide Web, 2004

Routing with topology aggregation in delay-bandwidth sensitive networks.
IEEE/ACM Trans. Netw., 2004

Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.
Proceedings of the Information Security, 7th International Conference, 2004

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A peer-to-peer network positioning architecture.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Slowing Down Internet Worms.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

QoS information approximation for aggregated networks.
Proceedings of IEEE International Conference on Communications, 2004

A scalable distributed QoS multicast routing protocol.
Proceedings of IEEE International Conference on Communications, 2004

An Internet-worm early warning system.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

A New Perspective in Defending against DDoS.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

2000
A QoS-aware multicast routing protocol.
IEEE J. Sel. Areas Commun., 2000

Hierarchical QoS Routing in Delay-Bandwidth Sensitive Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1999
Routing Support for Providing Guaranteed End-to-End Quality-of-Service
PhD thesis, 1999

Distributed quality-of-service routing in ad hoc networks.
IEEE J. Sel. Areas Commun., 1999

Routing by distributed recursive computation and information reuse.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Hierarchical Scheduling for Multiple Classes of Applications in Connection-Oriented Integrated-Service Networks.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
An overview of quality of service routing for next-generation high-speed networks: problems and solutions.
IEEE Netw., 1998

Distributed Quality-of-Service Routing in High-Speed Networks Based on Selective Probing.
Proceedings of the Proceedings 23rd Conference on Local Computer Networks, 1998

Distributed QoS Routing with Imprecise State Information.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

On finding multi-constrained paths.
Proceedings of the 1998 IEEE International Conference on Communications, 1998

1996
Optimal Deadlock Detection in Distributed Systems Based on Locally Constructed Wait-for Graphs.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Efficient algorithms for detection and resolution of distributed deadlocks.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995


  Loading...