Z. Morley Mao

According to our database1, Z. Morley Mao authored at least 163 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
ADD: Application and Data-Driven Controller Design.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019

Understanding the Networking Performance of Wear OS.
Proceedings of the Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, 2019

Leveraging Context-Triggered Measurements to Characterize LTE Handover Performance.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

MP-H2: A Client-only Multipath Solution for HTTP/2.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

PerfProbe: a systematic, cross-layer performance diagnosis framework for mobile platforms.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
Production as a Service: A Digital Manufacturing Framework for Optimizing Utilization.
IEEE Trans. Automation Science and Engineering, 2018

Dragon: Scalable, Flexible, and Efficient Traffic Engineering in Software Defined ISP Networks.
IEEE Journal on Selected Areas in Communications, 2018

SoftBox: A Customizable, Low-Latency, and Scalable 5G Core Network Architecture.
IEEE Journal on Selected Areas in Communications, 2018

CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Pausing and Resuming Network Flows using Programmable Buffers.
Proceedings of the Symposium on SDN Research, 2018

Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

QoE Inference and Improvement Without End-Host Control.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

RENEW: Programmable and Observable Massive MIMO Networks.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms.
IEEE Robotics and Automation Letters, 2017

Push or Request: An Investigation of HTTP/2 Server Push for Improving Mobile Performance.
Proceedings of the 26th International Conference on World Wide Web, 2017

ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Demo: DEMS: DEcoupled Multipath Scheduler for Accelerating Multipath Transport.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Accelerating Multipath Transport Through Balanced Subflow Completion.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Towards secure and safe appified automated vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

Dissecting VOD services for cellular: performance, root causes and best practices.
Proceedings of the 2017 Internet Measurement Conference, 2017

Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

An Initial Investigation of Protocol Customization.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Production as a service: A centralized framework for small batch manufacturing.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Diagnosing Mobile Apps' Quality of Experience: Challenges and Promising Directions.
IEEE Internet Computing, 2016

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks.
Proceedings of the Symposium on SDN Research, 2016

QoE Inference Without Application Control.
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

An in-depth understanding of multipath TCP on mobile devices: measurement and system design.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Understanding On-device Bufferbloat for Cellular Upload.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

The Misuse of Android Unix Domain Sockets and Security Implications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015

Tango: Accelerating Mobile Applications through Flip-Flop Replication.
GetMobile, 2015

suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure.
GetMobile, 2015

Poster: Context-Triggered Mobile Network Measurement.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Demo: Mobilyzer: Mobile Network Measurement Made Easy.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Mobilyzer: An Open Platform for Controllable Mobile Network Measurements.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Accelerating Mobile Applications through Flip-Flop Replication.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Automatic generation of mobile app signatures from traffic observations.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

WACCO and LOKO: Strong Consistency at Global Scale.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones.
IEEE Internet Computing, 2014

MCNet: Crowdsourcing wireless performance measurements through the eyes of mobile devices.
IEEE Communications Magazine, 2014

Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

FLOWR: a self-learning system for classifying mobileapplication traffic.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

SoftMoW: a dynamic and scalable software defined architecture for cellular WANs.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Diagnosing Path Inflation of Mobile Client Traffic.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET).
Proceedings of the 14th International Conference on New Interfaces for Musical Expression, 2014

Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Understanding RRC state dynamics through client measurements with mobilyzer.
Proceedings of the 6th annual workshop on Wireless of the students, 2014

Discovering fine-grained RRC state dynamics and performance impacts in cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014

SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
An in-depth study of LTE: effect of network protocol and application behavior on performance.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

How to Reduce Smartphone Traffic Volume by 30%?
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

PROTEUS: network performance forecast for real-time, interactive mobile applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Panappticon: Event-based tracing to measure mobile application and platform performance.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2013

AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Periodic transfers in mobile applications: network-wide origin, impact, and optimization.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

COMET: Code Offload by Migrating Execution Transparently.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Web caching on smartphones: ideal vs. reality.
Proceedings of the 10th International Conference on Mobile Systems, 2012

A close examination of performance and power characteristics of 4G LTE networks.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Screen-off traffic characterization and optimization in 3G/4G networks.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Toward Software-Defined Cellular Networks.
Proceedings of the European Workshop on Software Defined Networking, 2012

ADEL: an automatic detector of energy leaks for smartphone applications.
Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, 2012

Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Can deterministic replay be an enabling tool for mobile computing?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Cellular data network infrastructure characterization and implication on mobile content placement.
Proceedings of the SIGMETRICS 2011, 2011

An untold story of middleboxes in cellular networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

Internet Censorship in China: Where Does the Filtering Occur?
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011

AccuLoc: practical localization of performance measurements in 3G networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Demo: mobile application resource optimizer (ARO).
Proceedings of the 9th International Conference on Mobile Systems, 2011

Profiling resource usage for mobile applications: a cross-layer approach.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Contrail: Enabling Decentralized Social Networks on Smartphones.
Proceedings of the Middleware 2011, 2011

Identifying diverse usage behaviors of smartphone apps.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
DECOR: DEClarative network management and OpeRation.
Computer Communication Review, 2010

Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

A case for unsupervised-learning-based spam filtering.
Proceedings of the SIGMETRICS 2010, 2010

On Network-level Clusters for Spam Detection.
Proceedings of the Network and Distributed System Security Symposium, 2010

On the Safety of Enterprise Policy Deployment.
Proceedings of the Network and Distributed System Security Symposium, 2010

Anatomizing application performance differences on smartphones.
Proceedings of the 8th International Conference on Mobile Systems, 2010

Cache contention and application performance prediction for multi-core systems.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2010

Characterizing radio resource allocation for 3G networks.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Location, location, location!: modeling data proximity in the cloud.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

Performance and power modeling in a multi-programmed multi-core environment.
Proceedings of the 47th Design Automation Conference, 2010

Declarative configuration management for complex and dynamic networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Accurate online power estimation and automatic battery behavior based power model generation for smartphones.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010

2009
ShadowNet: A Platform for Rapid and Safe Network Evolution.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Botnet spam campaigns can be long lasting: evidence, implications, and analysis.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009

DECOR: DEClaritive network management and OpeRation.
Proceedings of the ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow, 2009

Ensemble: Community-Based Anomaly Detection for Popular Applications.
Proceedings of the Security and Privacy in Communication Networks, 2009

Detecting traffic differentiation in backbone ISPs with NetPolice.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

TCP revisited: a fresh look at TCP in the wild.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

HC-BGP: A light-weight and flexible scheme for securing prefix ownership.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

PACMAN: a platform for automated and controlled network operations and configuration management.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Ispy: detecting ip prefix hijacking on my own.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

A Measurement Study of Internet Delay Asymmetry.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Effective Diagnosis of Routing Disruptions from End Systems.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Peeking into Spammer Behavior from a Unique Vantage Point.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Wide-Area IP Network Mobility.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Accurate Real-time Identification of IP Prefix Hijacking.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Understanding network delay changes caused by routing events.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

Automated Classification and Analysis of Internet Malware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing.
Proceedings of the Network and Distributed System Security Symposium, 2007

MIDAS: An Impact Scale for DDoS attacks.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

A Framework for Measuring and Predicting the Impact of Routing Changes.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

On the impact of route monitor selection.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

A Firewall for Routers: Protecting against Routing Misbehavior.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Characterizing Dark DNS Behavior.
Proceedings of the Detection of Intrusions and Malware, 2007

Practical defenses against BGP prefix hijacking.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

Internet routing resilience to failures: analysis and implications.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

2006
Internet-scale malware mitigation: combining intelligence of the control and data plane.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies.
Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, USA, May 30, 2006

A measurement study on the impact of routing events on end-to-end internet path performance.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

On the impact of research network based testbeds on wide-area experiments.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Differentiated BGP Update Processing for Improved Routing Convergence.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Guest editorial - Interdomain routing and the border gateway protocol.
IEEE Network, 2005

On AS-level path inference.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

HLP: a next generation inter-domain routing protocol.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Enriching Intrusion Alerts Through Multi-Host Causality.
Proceedings of the Network and Distributed System Security Symposium, 2005

A measurement study of Internet bottlenecks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

An Empirical Approach to Modeling Inter-AS Traffic Matrices.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Toward understanding distributed blackhole placement.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Combining routing and traffic data for detection of IP forwarding anomalies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Locating internet bottlenecks: algorithms, measurements, and implications.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Locating internet routing instabilities.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Scalable and Accurate Identification of AS-level Forwarding Paths.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

BorderGuard: detecting cold potatoes from peers.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Efficient and robust streaming provisioning in VPNs.
Proceedings of the Twelfth International World Wide Web Conference, 2003

Towards an accurate AS-level traceroute tool.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003

BGP beacons.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

2002
A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002

Route flap damping exacerbates internet routing convergence.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002


2001
The Ninja architecture for robust Internet-scale systems and services.
Computer Networks, 2001

Network support for mobile multimedia using a self-adaptive distributed proxy.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001

2000
ICEBERG: an Internet core network architecture for integrated communications.
IEEE Personal Commun., 2000


  Loading...