Songqing Chen

Orcid: 0000-0003-4650-7125

Affiliations:
  • George Mason University, Department of Computer Science, Fairfax, VA, USA


According to our database1, Songqing Chen authored at least 166 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Zero-Trust Security for the Metaverse.
IEEE Commun. Mag., 2024

2023
CoMIC: A Collaborative Mobile Immersive Computing Infrastructure for Conducting Multi-User XR Research.
IEEE Netw., November, 2023

Can I Own Your NFTs? Understanding the New Attack Surface to NFTs.
IEEE Commun. Mag., September, 2023

Elastically Augmenting the Control-path Throughput in SDN to Deal with Internet DDoS Attacks.
ACM Trans. Internet Techn., 2023

Byzantine Tolerant Algorithms for Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2023

Towards Software Defined Measurement in Data Centers: A Comparative Study of Designs, Implementation, and Evaluation.
IEEE Trans. Cloud Comput., 2023

An Efficient and Robust Cloud-Based Deep Learning With Knowledge Distillation.
IEEE Trans. Cloud Comput., 2023

Measuring and Modeling the Free Content Web.
CoRR, 2023

Towards Zero-trust Security for the Metaverse.
CoRR, 2023

ScaleFlow: Efficient Deep Vision Pipeline with Closed-Loop Scale-Adaptive Inference.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Immersive Computing: Vision, Infrastructure, and Use Cases.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

2022
Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses.
IEEE Trans. Dependable Secur. Comput., 2022

Will Metaverse Be NextG Internet? Vision, Hype, and Reality.
IEEE Netw., 2022

Understanding Internet of Things malware by analyzing endpoints in their static artifacts.
Comput. Networks, 2022

Reality Check of Metaverse: A First Look at Commercial Social Virtual Reality Platforms.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022

SFS: Smart OS Scheduling for Serverless Functions.
Proceedings of the SC22: International Conference for High Performance Computing, 2022

BinProv: Binary Code Provenance Identification without Disassembly.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Preserving privacy in mobile spatial computing.
Proceedings of the 32nd ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2022

EZPath: Expediting Container Network Traffic via Programmable Switches.
Proceedings of the IFIP Networking Conference, 2022

A Reality Check of Positioning in Multiuser Mobile Augmented Reality: Measurement and Analysis.
Proceedings of the 4th ACM International Conference on Multimedia in Asia, 2022

Exploring Spherical Autoencoder for Spherical Video Content Processing.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Towards Accurate Positioning in Multiuser Augmented Reality on Mobile Devices.
Proceedings of the IEEE International Symposium on Multimedia, 2022

Are we ready for metaverse?: a measurement study of social virtual reality platforms.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

2021
Towards an Accurate Latency Model for Convolutional Neural Network Layers on GPUs.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Root Cause Analyses for the Deteriorating Bitcoin Network Synchronization.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

CE-SGD: Communication-Efficient Distributed Machine Learning.
Proceedings of the IEEE Global Communications Conference, 2021

Mind the Gap: Broken Promises of CPU Reservations in Containerized Multi-tenant Clouds.
Proceedings of the SoCC '21: ACM Symposium on Cloud Computing, 2021

SyncAttack: Double-spending in Bitcoin Without Mining Power.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
A Data-Driven Study of DDoS Attacks and Their Dynamics.
IEEE Trans. Dependable Secur. Comput., 2020

Internet and Beyond: Towards a Better Connected World.
IEEE Internet Comput., 2020

Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks.
Proceedings of the Information Security Applications - 21st International Conference, 2020

From Blue-Sky to Practical Adversarial Learning.
Proceedings of the Second IEEE International Conference on Trust, 2020

Towards field-of-view prediction for augmented reality applications on mobile devices.
Proceedings of the 12th ACM International Workshop on Immersive Mixed and Virtual Environment Systems, 2020

Statically Dissecting Internet of Things Malware: Analysis, Characterization, and Detection.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform.
EAI Endorsed Trans. Security Safety, 2019

Software-Defined Networking Enhanced Edge Computing: A Network-Centric Survey.
Proc. IEEE, 2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection.
CoRR, 2019

vCPU as a container: towards accurate CPU allocation for VMs.
Proceedings of the 15th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2019

Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One.
Proceedings of the First IEEE International Conference on Trust, 2019

Companion Paper for.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

XLF: A Cross-layer Framework to Secure the Internet of Things (IoT).
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A SDN-based network layer for edge computing: poster.
Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, 2019

Honor among Thieves: Towards Understanding the Dynamics and Interdependencies in IoT Botnets.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

BotSifter: An SDN-based Online Bot Detection Framework in Data Centers.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A New Deep Learning-Based Food Recognition System for Dietary Assessment on An Edge Computing Service Infrastructure.
IEEE Trans. Serv. Comput., 2018

Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis.
IEEE/ACM Trans. Netw., 2018

Attribution of Economic Denial of Sustainability Attacks in Public Clouds.
EAI Endorsed Trans. Security Safety, 2018

Risk-aware multi-objective optimized virtual machine placement in the cloud.
J. Comput. Secur., 2018

Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges.
Proceedings of the Symposium on SDN Research, 2018

Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling.
Proceedings of the Security and Privacy in Communication Networks, 2018

MiniView Layout for Bandwidth-Efficient 360-Degree Video.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

BAS-360°: Exploring Spatial and Temporal Adaptability in 360-degree Videos over HTTP/2.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Empirical Evaluation of the Hypervisor Scheduling on Side Channel Attacks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Fog Computing.
IEEE Internet Comput., 2017

Understanding Adversarial Strategies from Bot Recruitment to Scheduling.
Proceedings of the Security and Privacy in Communication Networks, 2017

OpTile: Toward Optimal Tiling in 360-degree Video Streaming.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

vPROM: VSwitch enhanced programmable measurement in SDN.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

An Adversary-Centric Behavior Modeling of DDoS Attacks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Reducing Security Risks of Clouds Through Virtual Machine Placement.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

WebTrap: A dynamic defense scheme against economic denial of sustainability attacks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Content-Adaptive Display Power Saving for Internet Video Applications on Mobile Devices.
ACM Trans. Multim. Comput. Commun. Appl., 2016

The blocking lemma and group incentive compatibility for matching with contracts.
Math. Soc. Sci., 2016

GoCAD: GPU-Assisted Online Content-Adaptive Display Power Saving for Mobile Devices in Internet Streaming.
Proceedings of the 25th International Conference on World Wide Web, 2016

Abusing Public Third-Party Services for EDoS Attacks.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Attribution of Economic Denial of Sustainability Attacks in Public Clouds.
Proceedings of the Security and Privacy in Communication Networks, 2016

Evaluating and improving push based video streaming with HTTP/2.
Proceedings of the 26th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2016

DASH2M: Exploring HTTP/2 for Internet Streaming to Mobile Devices.
Proceedings of the 2016 ACM Conference on Multimedia Conference, 2016

ExtensionGuard: Towards runtime browser extension information leakage detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
Introduction to the Special Issue on MMSys 2014 and NOSSDAV 2014.
ACM Trans. Multim. Comput. Commun. Appl., 2015

Help your mobile applications with fog computing.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

A Quantitative Study of Video Duplicate Levels in YouTube.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015

Content-adaptive display power saving in internet mobile streaming.
Proceedings of the 25th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2015

Elicit: Efficiently identify computation-intensive tasks in mobile applications for offloading.
Proceedings of the 10th IEEE International Conference on Networking, 2015

FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Distributed Analytics and Edge Intelligence: Pervasive Health Monitoring at the Era of Fog Computing.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

Reducing display power consumption for real-time video calls on mobile devices.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2015

AppGuard: A hardware virtualization based approach on protecting user applications from untrusted commodity operating system.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

CodePlugin: Plugging Deduplication into Erasure Coding for Cloud Storage.
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015

Capturing DDoS Attack Dynamics Behind the Scenes.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

UMON: flexible and fine grained traffic monitoring in open vSwitch.
Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, 2015

Measuring Botnets in the Wild: Some New Trends.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Investigating Redundant Internet Video Streaming Traffic on iOS Devices: Causes and Solutions.
IEEE Trans. Multim., 2014

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment.
ACM Trans. Auton. Adapt. Syst., 2014

Characterizing botnets-as-a-service.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

POMAC: Properly Offloading Mobile Applications to Clouds.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

Scotch: Elastically Scaling up SDN Control-Plane using vSwitch based Overlay.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

POSTER: How Distributed Are Today's DDoS Attacks?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Measurement and Analysis of an Internet Streaming Service to Mobile Devices.
IEEE Trans. Parallel Distributed Syst., 2013

Using adaptively coupled models and high-performance computing for enabling the computability of dust storm forecasting.
Int. J. Geogr. Inf. Sci., 2013

Utilize cloud computing to support dust storm forecasting.
Int. J. Digit. Earth, 2013

A Comparative Study of Android and iOS for Accessing Internet Streaming Services.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

Effectively minimizing redundant Internet streaming traffic to iOS devices.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Defeat Information Leakage from Browser Extensions via Data Obfuscation.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

UNIK: unsupervised social network spam detection.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Building an efficient transcoding overlay for P2P streaming to heterogeneous devices.
ACM Trans. Multim. Comput. Commun. Appl., 2012

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012

Chrome Extensions: Threat Analysis and Countermeasures.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

vUPS: Virtually Unifying Personal Storage for Fast and Pervasive Data Accesses.
Proceedings of the Mobile Computing, Applications, and Services, 2012

A server's perspective of Internet streaming delivery to mobile devices.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Spammer Behavior Analysis and Detection in User Generated Content on Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

An experimental study of open-source cloud platforms for dust storm forecasting.
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012

2011
Some special minimum k-geodetically connected graphs.
Discret. Appl. Math., 2011

Botnet with Browser Extensions.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A measurement study of resource utilization in internet mobile streaming.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2011

An Investigation of Different Computing Sources for Mobile Application Outsourcing on the Road.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2011

Mobile MapReduce: Minimizing Response Time of Computing Intensive Mobile Applications.
Proceedings of the Mobile Computing, Applications, and Services, 2011

BlueStreaming: towards power-efficient internet P2P streaming to mobile devices.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

An empirical evaluation of battery power consumption for streaming data transmission to mobile devices.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

RatBot: Anti-enumeration Peer-to-Peer Botnets.
Proceedings of the Information Security, 14th International Conference, 2011

2010
An Application-Level Data Transparent Authentication Scheme without Communication Overhead.
IEEE Trans. Computers, 2010

Reducing data request contentions for improved streaming quality.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

Online learning approaches in maximizing weighted throughput.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
VirusMeter: Preventing Your Cellphone from Spies.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Analyzing patterns of user content generation in online social networks.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

CUBS: Coordinated Upload Bandwidth Sharing in Residential Networks.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Towards Optimal Resource Utilization in Heterogeneous P2P Streaming.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

A Case Study of Traffic Locality in Internet P2P Live Streaming Systems.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Run-Time Detection of Malwares via Dynamic Control-Flow Inspection.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009

Exploitation and threat analysis of open mobile devices.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Achieving simultaneous distribution control and privacy protection for Internet media delivery.
ACM Trans. Multim. Comput. Commun. Appl., 2008

Modeling and Optimization of Meta-Caching Assisted Transcoding.
IEEE Trans. Multim., 2008

The stretched exponential distribution of internet media access patterns.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls.
Proceedings of the 16th International Workshop on Quality of Service, 2008

BotTracer: Execution-Based Bot-Like Malware Detection.
Proceedings of the Information Security, 11th International Conference, 2008

2007
SProxy: A Caching Infrastructure to Support Internet Streaming.
IEEE Trans. Multim., 2007

Cooperative Relay Service in a Wireless LAN.
IEEE J. Sel. Areas Commun., 2007

A performance study of BitTorrent-like peer-to-peer systems.
IEEE J. Sel. Areas Commun., 2007

Does internet media traffic really follow Zipf-like distribution?
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

PSM-throttling: Minimizing Energy Consumption for Bulk Data Communications in WLANs.
Proceedings of the IEEE International Conference on Network Protocols, 2007

SCAP: Smart Caching inWireless Access Points to Improve P2P Streaming.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Segment-based streaming media proxy: modeling and optimization.
IEEE Trans. Multim., 2006

Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery.
IEEE Trans. Knowl. Data Eng., 2006

DaTA - Data-Transparent Authentication Without Communication Overhead.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

AMTrac: adaptive meta-caching for transcoding.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2006

Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Delving into internet streaming media delivery: a quality and resource utilization perspective.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

A Case for Internet Streaming via Web Servers.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006

V-COPS: A Vulnerability-Based Cooperative Alert Distribution System.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Fast proxy delivery of multiple streaming sessions in shared running buffers.
IEEE Trans. Multim., 2005

Enhancing Data Authenticity and Integrity in P2P Systems.
IEEE Internet Comput., 2005

Segment-Based Proxy Caching for Internet Streaming Media Delivery.
IEEE Multim., 2005

Evolution and Computing Challenges of Distributed GIS.
Ann. GIS, 2005

Analysis of multimedia workloads with implications for internet streaming.
Proceedings of the 14th international conference on World Wide Web, 2005

Measurements, Analysis, and Modeling of BitTorrent-like Systems.
Proceedings of the 5th Internet Measurement Conference, 2005

DISC: Dynamic Interleaved Segment Caching for Interactive Streaming.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

2004
Adaptive Memory Allocations in Clusters to Handle Unexpectedly Large Data-Intensive Jobs.
IEEE Trans. Parallel Distributed Syst., 2004

Building a Large and Efficient Hybrid Peer-to-Peer Internet Caching System.
IEEE Trans. Knowl. Data Eng., 2004

Enforcing direct communications between clients and Web servers to improve proxy performance and security.
Softw. Pract. Exp., 2004

An Empirical Study of a Segment-Based Streaming Proxy in an Enterprise Environment.
Proceedings of the Web Content Caching and Distribution: 9th International Workshop, 2004

Designs of High Quality Streaming Proxy Systems.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Buffer Sharing for Proxy Caching of Streaming Sessions.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

Streaming Flow Analyses for Prefetching in Segment-Based Proxy Caching to Improve Delivery Quality.
Proceedings of the Web Content Caching and Distribution, 8th International Workshop, 2003

Adaptive and lazy segmentation based proxy caching for streaming media delivery.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2003

2002
Dynamic Cluster Resource Allocations for Jobs with Known and Unknown Memory Demands.
IEEE Trans. Parallel Distributed Syst., 2002

Adaptive and Virtual Reconfigurations for Effective Dynamic Job Scheduling in Cluster Systems.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Dynamic Load Sharing with Unknown Memory Demands in Clusters.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001


  Loading...