2025
MineShark: Cryptomining Traffic Detection at Scale.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
2024
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2024
SwiftParade: Anti-Burst Multipath Validation.
IEEE Trans. Dependable Secur. Comput., 2024
Cora: Accelerating Stateful Network Applications with SmartNICs.
CoRR, 2024
Symphony: Path Validation at Scale.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Design and Test of Mems Resonant Pressure Sensor with A Novel Membrane Structure.
Proceedings of the 2024 IEEE SENSORS, Kobe, Japan, October 20-23, 2024, 2024
Fabrication and Assembly of All-quartz Integrated Resonant Accelerometer with High Stability.
Proceedings of the 2024 IEEE SENSORS, Kobe, Japan, October 20-23, 2024, 2024
2023
Hitchhiker: Accelerating ORAM With Dynamic Scheduling.
IEEE Trans. Computers, August, 2023
RuleOut Forwarding Anomalies for SDN.
IEEE/ACM Trans. Netw., February, 2023
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling.
IEEE Trans. Inf. Forensics Secur., 2023
2022
IEEE Trans. Cybern., 2022
SwiftDir: Secure Cache Coherence without Overprotection.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022
unXpec: Breaking Undo-based Safe Speculation.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021
Securing middlebox policy enforcement in SDN.
Comput. Networks, 2021
2020
Privacy-preserving Network Path Validation.
ACM Trans. Internet Techn., 2020
Atomos: Constant-Size Path Validation Proof.
IEEE Trans. Inf. Forensics Secur., 2020
Atlas: A First Step Toward Multipath Validation.
Comput. Networks, 2020
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Efficient Polling-Based Information Collection in RFID Systems.
IEEE/ACM Trans. Netw., 2019
Fault Management in Software-Defined Networking: A Survey.
IEEE Commun. Surv. Tutorials, 2019
Falcon: Differential fault localization for SDN control plane.
Comput. Networks, 2019
A lightweight policy enforcement system for resource protection and management in the SDN-based cloud.
Comput. Networks, 2019
Thinking inside the Box: Differential Fault Localization for SDN Control Plane.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
2018
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Inf. Forensics Secur., 2018
What's (Not) Validating Network Paths: A Survey.
CoRR, 2018
Fastlane-ing more flows with less bandwidth for software-Defined networking.
Comput. Networks, 2018
SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
MemCloak: Practical Access Obfuscation for Untrusted Memory.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017
High performance and security in cloud computing.
Concurr. Comput. Pract. Exp., 2017
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.
IEEE Commun. Surv. Tutorials, 2017
2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016
Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016
A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommun. Syst., 2016
Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016
Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Toward Taming Policy Enforcement for SDN in the RIGHT Way: Or Can We?
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Reviving Android Malware with DroidRide: And How Not To.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016
2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distributed Syst., 2015
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2015
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015
A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Gotta tell you switches only once: Toward bandwidth-efficient flow setup for SDN.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
2014
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach.
IEEE/ACM Trans. Netw., 2014
A new differential RAID for high reliable All Flash Array.
IEICE Electron. Express, 2014
Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014
Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Efficient distributed query processing in large RFID-enabled supply chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
Reduction of data prevention cost and improvement of reliability in MLC NAND flash storage system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distributed Syst., 2013
Robust localization against outliers in wireless sensor networks.
ACM Trans. Sens. Networks, 2013
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2013
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurr. Comput. Pract. Exp., 2013
Secure P2P topology based on a multidimensional DHT space mapping.
Sci. China Inf. Sci., 2013
ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Less is More: Efficient RFID-Based 3D Localization.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013
2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2012
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Comput. Commun., 2012
Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Fast cloned-tag identification protocols for large-scale RFID systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012
An Efficient Flash-Based Remote Sense Image Storage Approach for Fast Access Geographic Information System.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012
2011
Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Efficient Monitoring of Dynamic Tag Populations in RFID Systems.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
2009
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009
2008
A Method Based on AMHI for DDoS Attacks Detection and Defense.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008