2021
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019
2018
Toward Accurate Network Delay Measurement on Android Phones.
IEEE Trans. Mob. Comput., 2018
Magic Train: Design of Measurement Methods against Bandwidth Inflation Attacks.
IEEE Trans. Dependable Secur. Comput., 2018
Enhancing the experience of multiplayer shooter games via advanced lag compensation.
Proceedings of the 9th ACM Multimedia Systems Conference, 2018
2017
Detecting Low-Quality Workers in QoE Crowdtesting: A Worker Behavior-Based Approach.
IEEE Trans. Multim., 2017
MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
On "shot around a corner" in first-person shooter games.
Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, 2017
2016
IRate: Initial Video Bitrate Selection System for HTTP Streaming.
IEEE J. Sel. Areas Commun., 2016
MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic.
CoRR, 2016
Harvesting File Download Exploits in the Web: A Hacker's View.
Comput. J., 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
ACM CoNEXT 2016 Student Workshop.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
2015
Indirect File Leaks in Mobile Applications.
CoRR, 2015
Improving the Packet Send-Time Accuracy in Embedded Devices.
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015
Evaluation of lag-related configurations in first-person shooter games.
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015
Detecting low-quality crowdtesting workers.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
On the accuracy of smartphone-based mobile network measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks.
IEEE Trans. Inf. Forensics Secur., 2014
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR, 2014
A user behavior based cheat detection mechanism for crowdtesting.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Analyzing Android Browser Apps for file: // Vulnerabilities.
Proceedings of the Information Security - 17th International Conference, 2014
2013
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE J. Sel. Areas Commun., 2013
Inference attacks against trust-based onion routing: Trust degree to the rescue.
Comput. Secur., 2013
SGor: Trust graph based onion routing.
Comput. Networks, 2013
OMware: an open measurement ware for stable residential broadband measurement.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Appraising the delay accuracy in browser-based network measurement.
Proceedings of the 2013 Internet Measurement Conference, 2013
MonoScope: Automating network faults diagnosis based on active measurements.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
An efficient approach to multi-level route analytics.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
2012
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics.
IEEE Trans. Dependable Secur. Comput., 2012
More Anonymity through Trust Degree in Trust-Based Onion Routing.
Proceedings of the Security and Privacy in Communication Networks, 2012
Characterizing Inter-domain Rerouting after Japan Earthquake.
Proceedings of the NETWORKING 2012, 2012
QDASH: a QoE-aware DASH system.
Proceedings of the Third Annual ACM SIGMM Conference on Multimedia Systems, 2012
LDC: Detecting BGP Prefix Hijacking by Load Distribution Change.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
2011
STor: Social Network based Anonymous Communication in Tor
CoRR, 2011
Inferring the QoE of HTTP video streaming from user-viewing activities.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011
Non-cooperative Diagnosis of Submarine Cable Faults.
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Proceedings of the Network and Distributed System Security Symposium, 2011
Measuring the quality of experience of HTTP video streaming.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Planetopus: A system for facilitating collaborative network monitoring.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
An integrative multi-level analysis of internet path changes.
Proceedings of The ACM CoNEXT Student Workshop, 2011
TRIO: measuring asymmetric capacity with three minimum round-trip times.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011
Exposing invisible timing-based traffic watermarks with BACKLIT.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Measurement of loss pairs in network paths.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Neighbor-Cooperative Measurement of Network Path Quality.
Proceedings of the Global Communications Conference, 2010
2009
Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals.
EURASIP J. Adv. Signal Process., 2009
Signal Processing Applications in Network Intrusion Detection Systems.
EURASIP J. Adv. Signal Process., 2009
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
On generalized low-rate denial-of-quality attack against Internet services.
Proceedings of the 17th International Workshop on Quality of Service, 2009
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding.
Proceedings of IEEE International Conference on Communications, 2009
Reliable asymmetric path capacity measurement.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009
2008
TCP covert timing channels: Design and detection.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Inter-AS Inbound Traffic Engineering via ASPP.
IEEE Trans. Netw. Serv. Manag., 2007
Crafting Web Counters into Covert Channels.
Proceedings of the New Approaches for Security, 2007
Protecting Internet Services from Low-Rate DoS Attacks.
Proceedings of the Critical Infrastructure Protection, 2007
An active approach to measuring routing dynamics induced by autonomous systems.
Proceedings of the Workshop on Experimental Computer Science, 2007
Cloak: A Ten-Fold Way for Reliable Covert Communications.
Proceedings of the Computer Security, 2007
2006
Stability-constrained optimization for energy efficiency in polling-based wireless networks.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006
Relative stability analysis of multiple queues.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006
Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
Inbound traffic engineering for multihomed ASs using AS path prepending.
IEEE Netw., 2005
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
Proceedings of the Network and Distributed System Security Symposium, 2005
Performance Analysis of TCP/AQM Under Denial-of-Service Attacks.
Proceedings of the 13th International Symposium on Modeling, 2005
Forwarding State Scalability-Aware Multicast Routing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Novel Approaches to End-to-End Packet Reordering Measurement.
Proceedings of the 5th Internet Measurement Conference, 2005
Optimizing the Pulsing Denial-of-Service Attacks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Inbound traffic engineering for multi-homed ASes using AS path prepending.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Teaching computer networking with the help of personal computer networks.
Proceedings of the 9th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2004
Strifeshadow Fantasy: a massive multi-player online game.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2003
Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks.
SIGMETRICS Perform. Evaluation Rev., 2003
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003
2002
Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies.
Comput. Networks, 2002
Defending against flooding-based distributed denial-of-service attacks: a tutorial.
IEEE Commun. Mag., 2002
Transport layer proxy for stateful UDP packet filtering.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Engineering of a global defense infrastructure for DDoS attacks.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002
2001
Per-queue stability analysis of a random access system.
IEEE Trans. Autom. Control., 2001
Stability comparison in single-server-multiple-queue systems.
SIGMETRICS Perform. Evaluation Rev., 2001
Routing Properties of a Recursive Interconnection Network.
J. Parallel Distributed Comput., 2001
A simulation study on the throughput fairness of TCP Vegas.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001
2000
A novel approach to queue stability analysis of polling models.
Perform. Evaluation, 2000
A Transport-Level Proxy for Secure Multimedia Streams.
IEEE Internet Comput., 2000
A Tree Switching Protocol for Multicast State Reduction.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
A throughput deadlock-free TCP for high-speed Internet.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000
1998
An optimal end-to-end bypass configuration algorithm for self-heating VP-based ATM networks.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
Improving the performance of reconfigurable WDM lightwave networks with deflection routing via node reassignment.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
Optimal node assignment in reconfigurable WDM lightwave networks with regular virtual topologies.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998