2025
SwingArena: Competitive Programming Arena for Long-context GitHub Issue Solving.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, May, 2025
PhyX: Does Your Model Have the "Wits" for Physical Reasoning?
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
CoRR, May, 2025
HeterMoE: Efficient Training of Mixture-of-Experts Models on Heterogeneous GPUs.
CoRR, April, 2025
Learnings from Deploying Network QoS Alignment to Application Priorities for Storage Services.
Proceedings of the 22nd USENIX Symposium on Networked Systems Design and Implementation, 2025
AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
2024
FATH: Authentication-based Test-time Defense against Indirect Prompt Injection Attacks.
CoRR, 2024
Compute Or Load KV Cache? Why Not Both?
CoRR, 2024
Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models.
CoRR, 2024
Eagle: Efficient Training-Free Router for Multi-LLM Inference.
CoRR, 2024
AutoSpec: Automated Generation of Neural Network Specifications.
CoRR, 2024
Adaptive Skeleton Graph Decoding.
CoRR, 2024
QUIC is not Quick Enough over Fast Internet.
Proceedings of the ACM on Web Conference 2024, 2024
The Case for Boosting Mobile Application QoE via Smart Band Switching in 5G/xG Networks.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024
State Consistent Edge-enhanced Perception for Connected and Automated Vehicles.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024
On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024
Boosting Collaborative Vehicular Perception on the Edge with Vehicle-to-Vehicle Communication.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024
Vulcan: Automatic Query Planning for Live ML Analytics.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024
Learn To be Efficient: Build Structured Sparsity in Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
OASIS: Collaborative Neural-Enhanced Mobile Video Streaming.
Proceedings of the 15th ACM Multimedia Systems Conference, 2024
CloudEval-YAML: A Practical Benchmark for Cloud Configuration Generation.
,
,
,
,
,
,
,
,
,
,
Proceedings of the Seventh Annual Conference on Machine Learning and Systems, 2024
CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation.
Proceedings of the Computer Vision - ECCV 2024, 2024
Stealthy Data Fabrication in Collaborative Vehicular Perception.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
2023
Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration.
IEEE Trans. Intell. Transp. Syst., September, 2023
Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion.
Trans. Mach. Learn. Res., 2023
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Robust Real-time Multi-vehicle Collaboration on Asynchronous Sensors.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
VPA: Fully Test-Time Visual Prompt Adaptation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Detecting Data Spoofing in Connected Vehicle based Intelligent Traffic Signal Control using Infrastructure-Side Sensors and Traffic Invariants.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023
Poster: QUIC is not Quick Enough over Fast Internet.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023
A Critical Revisit of Adversarial Robustness in 3D Point Cloud Recognition with Diffusion-Driven Purification.
Proceedings of the International Conference on Machine Learning, 2023
LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023
ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency.
Proceedings of the 34th British Machine Vision Conference 2023, 2023
2022
On the Cybersecurity of Traffic Signal Control System With Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition.
CoRR, 2022
A Cooperative Perception Environment for Traffic Operations and Control.
CoRR, 2022
Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions.
CoRR, 2022
Toward an Automated Learning Control Architecture for Cyber-Physical Manufacturing Systems.
IEEE Access, 2022
Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles.
Proceedings of the 31st USENIX Security Symposium, 2022
Vivisecting mobility management in 5G cellular networks.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022
Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022
Adversarial Unlearning of Backdoors via Implicit Hypergradient.
Proceedings of the Tenth International Conference on Learning Representations, 2022
A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness.
Proceedings of the Computer Vision - ECCV 2022, 2022
On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Robust Trajectory Prediction against Adversarial Attacks.
Proceedings of the Conference on Robot Learning, 2022
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines.
CoRR, 2021
SkyCore: moving core to the edge for untethered and reliable UAV-based LTE networks.
Commun. ACM, 2021
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
A variegated look at 5G in the wild: performance, power, and QoE implications.
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021
Adversarially Robust 3D Point Cloud Recognition Using Self-Supervisions.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
EMP: edge-assisted multi-vehicle perception.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021
Livelyzer: analyzing the first-mile ingest performance of live video streaming.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021
Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
On Adversarial Robustness of 3D Point Cloud Classification under Adaptive Attacks.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021
2020
On the Adversarial Robustness of 3D Point Cloud Classification.
CoRR, 2020
Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control.
CoRR, 2020
Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Proceedings of the 29th USENIX Security Symposium, 2020
What you see is what you get: measure ABR video streaming QoE via on-device screen recording.
Proceedings of the 30th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2020
MPBond: efficient network-level collaboration among personal mobile devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020
Automatic Feature Isolation in Network Protocol Software Implementations.
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020
CSI: inferring mobile ABR video adaptation behavior under HTTPS and QUIC.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020
2019
Understanding the Networking Performance of Wear OS.
Proc. ACM Meas. Anal. Comput. Syst., 2019
Towards Automated Safety Vetting of PLC Code in Real-World Plants.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
ADD: Application and Data-Driven Controller Design.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019
Leveraging Context-Triggered Measurements to Characterize LTE Handover Performance.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019
Poster: Experimental Evaluation of TCP Congestion Control over 60GHz WLAN.
Proceedings of the 11th on Wireless of the Students, 2019
Poster: Characterizing Performance and Power for mmWave 5G on Commodity Smartphones.
Proceedings of the 11th on Wireless of the Students, 2019
MP-H2: A Client-only Multipath Solution for HTTP/2.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
PerfProbe: a systematic, cross-layer performance diagnosis framework for mobile platforms.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019
A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
Egret: simplifying traffic management for physical and virtual network functions.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Production as a Service: A Digital Manufacturing Framework for Optimizing Utilization.
IEEE Trans Autom. Sci. Eng., 2018
Dragon: Scalable, Flexible, and Efficient Traffic Engineering in Software Defined ISP Networks.
IEEE J. Sel. Areas Commun., 2018
SoftBox: A Customizable, Low-Latency, and Scalable 5G Core Network Architecture.
IEEE J. Sel. Areas Commun., 2018
CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Pausing and Resuming Network Flows using Programmable Buffers.
Proceedings of the Symposium on SDN Research, 2018
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
QoE Inference and Improvement Without End-Host Control.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
RENEW: Programmable and Observable Massive MIMO Networks.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018
2017
Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms.
IEEE Robotics Autom. Lett., 2017
Push or Request: An Investigation of HTTP/2 Server Push for Improving Mobile Performance.
Proceedings of the 26th International Conference on World Wide Web, 2017
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Demo: DEMS: DEcoupled Multipath Scheduler for Accelerating Multipath Transport.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Accelerating Multipath Transport Through Balanced Subflow Completion.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Towards secure and safe appified automated vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017
Dissecting VOD services for cellular: performance, root causes and best practices.
Proceedings of the 2017 Internet Measurement Conference, 2017
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
An Initial Investigation of Protocol Customization.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Production as a service: A centralized framework for small batch manufacturing.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
2016
Diagnosing Mobile Apps' Quality of Experience: Challenges and Promising Directions.
IEEE Internet Comput., 2016
MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks.
Proceedings of the Symposium on SDN Research, 2016
QoE Inference Without Application Control.
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
An in-depth understanding of multipath TCP on mobile devices: measurement and system design.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016
Understanding On-device Bufferbloat for Cellular Upload.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016
The Misuse of Android Unix Domain Sockets and Security Implications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015
The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015
Tango: Accelerating Mobile Applications through Flip-Flop Replication.
GetMobile Mob. Comput. Commun., 2015
suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure.
GetMobile Mob. Comput. Commun., 2015
Poster: Context-Triggered Mobile Network Measurement.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Demo: Mobilyzer: Mobile Network Measurement Made Easy.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Mobilyzer: An Open Platform for Controllable Mobile Network Measurements.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Accelerating Mobile Applications through Flip-Flop Replication.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015
Automatic generation of mobile app signatures from traffic observations.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015
WACCO and LOKO: Strong Consistency at Global Scale.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015
2014
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones.
IEEE Internet Comput., 2014
Performance Analysis of Location Profile Routing.
CoRR, 2014
MCNet: Crowdsourcing wireless performance measurements through the eyes of mobile devices.
IEEE Commun. Mag., 2014
MobilityFirst: a mobility-centric and trustworthy internet architecture.
Comput. Commun. Rev., 2014
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
FLOWR: a self-learning system for classifying mobileapplication traffic.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014
Diagnosing Path Inflation of Mobile Client Traffic.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014
Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET).
Proceedings of the 14th International Conference on New Interfaces for Musical Expression, 2014
Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
Understanding RRC state dynamics through client measurements with mobilyzer.
Proceedings of the 6th annual workshop on Wireless of the students, 2014
Discovering fine-grained RRC state dynamics and performance impacts in cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014
SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014
2013
An in-depth study of LTE: effect of network protocol and application behavior on performance.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
How to Reduce Smartphone Traffic Volume by 30%?
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013
PROTEUS: network performance forecast for real-time, interactive mobile applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Panappticon: Event-based tracing to measure mobile application and platform performance.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2013
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Periodic transfers in mobile applications: network-wide origin, impact, and optimization.
Proceedings of the 21st World Wide Web Conference 2012, 2012
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
COMET: Code Offload by Migrating Execution Transparently.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Web caching on smartphones: ideal vs. reality.
Proceedings of the 10th International Conference on Mobile Systems, 2012
A close examination of performance and power characteristics of 4G LTE networks.
Proceedings of the 10th International Conference on Mobile Systems, 2012
Screen-off traffic characterization and optimization in 3G/4G networks.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
Toward Software-Defined Cellular Networks.
Proceedings of the European Workshop on Software Defined Networking, 2012
ADEL: an automatic detector of energy leaks for smartphone applications.
Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, 2012
Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Can deterministic replay be an enabling tool for mobile computing?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Cellular data network infrastructure characterization and implication on mobile content placement.
Proceedings of the SIGMETRICS 2011, 2011
An untold story of middleboxes in cellular networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011
Internet Censorship in China: Where Does the Filtering Occur?
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011
AccuLoc: practical localization of performance measurements in 3G networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011
Demo: mobile application resource optimizer (ARO).
Proceedings of the 9th International Conference on Mobile Systems, 2011
Profiling resource usage for mobile applications: a cross-layer approach.
Proceedings of the 9th International Conference on Mobile Systems, 2011
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices.
Proceedings of the sixth international workshop on MobiArch, MobiArch '11, Bethesda, 2011
Contrail: Enabling Decentralized Social Networks on Smartphones.
Proceedings of the Middleware 2011, 2011
Identifying diverse usage behaviors of smartphone apps.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011
2010
iSPY: Detecting IP Prefix Hijacking on My Own.
IEEE/ACM Trans. Netw., 2010
DECOR: DEClarative network management and OpeRation.
Comput. Commun. Rev., 2010
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
A case for unsupervised-learning-based spam filtering.
Proceedings of the SIGMETRICS 2010, 2010
On Network-level Clusters for Spam Detection.
Proceedings of the Network and Distributed System Security Symposium, 2010
On the Safety of Enterprise Policy Deployment.
Proceedings of the Network and Distributed System Security Symposium, 2010
Anatomizing application performance differences on smartphones.
Proceedings of the 8th International Conference on Mobile Systems, 2010
Cache contention and application performance prediction for multi-core systems.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2010
Characterizing radio resource allocation for 3G networks.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010
Location, location, location!: modeling data proximity in the cloud.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010
Performance and power modeling in a multi-programmed multi-core environment.
Proceedings of the 47th Design Automation Conference, 2010
Declarative configuration management for complex and dynamic networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010
Accurate online power estimation and automatic battery behavior based power model generation for smartphones.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010
2009
ShadowNet: A Platform for Rapid and Safe Network Evolution.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Botnet spam campaigns can be long lasting: evidence, implications, and analysis.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009
DECOR: DEClaritive network management and OpeRation.
Proceedings of the ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow, 2009
Ensemble: Community-Based Anomaly Detection for Popular Applications.
Proceedings of the Security and Privacy in Communication Networks, 2009
Detecting traffic differentiation in backbone ISPs with NetPolice.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
TCP revisited: a fresh look at TCP in the wild.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009
HC-BGP: A light-weight and flexible scheme for securing prefix ownership.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
PACMAN: a platform for automated and controlled network operations and configuration management.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009
2008
A Measurement Study of Internet Delay Asymmetry.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008
Effective Diagnosis of Routing Disruptions from End Systems.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008
Peeking into Spammer Behavior from a Unique Vantage Point.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Wide-Area IP Network Mobility.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Accurate Real-time Identification of IP Prefix Hijacking.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Understanding network delay changes caused by routing events.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007
Towards automated network management: network operations using dynamic views.
Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, 2007
Automated Classification and Analysis of Internet Malware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing.
Proceedings of the Network and Distributed System Security Symposium, 2007
MIDAS: An Impact Scale for DDoS attacks.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007
A Framework for Measuring and Predicting the Impact of Routing Changes.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
On the impact of route monitor selection.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007
A Firewall for Routers: Protecting against Routing Misbehavior.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
Characterizing Dark DNS Behavior.
Proceedings of the Detection of Intrusions and Malware, 2007
Practical defenses against BGP prefix hijacking.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007
Internet routing resilience to failures: analysis and implications.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007
2006
Internet-scale malware mitigation: combining intelligence of the control and data plane.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006
Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies.
Proceedings of the 2006 USENIX Annual Technical Conference, 2006
A measurement study on the impact of routing events on end-to-end internet path performance.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006
Analyzing large DDoS attacks using multiple data sources.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006
On the impact of research network based testbeds on wide-area experiments.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006
Differentiated BGP Update Processing for Improved Routing Convergence.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
Guest editorial - Interdomain routing and the border gateway protocol.
IEEE Netw., 2005
On AS-level path inference.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005
HLP: a next generation inter-domain routing protocol.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005
Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005
Enriching Intrusion Alerts Through Multi-Host Causality.
Proceedings of the Network and Distributed System Security Symposium, 2005
A measurement study of Internet bottlenecks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005
An Empirical Approach to Modeling Inter-AS Traffic Matrices.
Proceedings of the 5th Internet Measurement Conference, 2005
2004
Toward understanding distributed blackhole placement.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004
Combining routing and traffic data for detection of IP forwarding anomalies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004
IP forwarding anomalies and improving their detection using multiple data sources.
Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, 2004
Locating internet bottlenecks: algorithms, measurements, and implications.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Locating internet routing instabilities.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004
Scalable and Accurate Identification of AS-level Forwarding Paths.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
BorderGuard: detecting cold potatoes from peers.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004
2003
Efficient and robust streaming provisioning in VPNs.
Proceedings of the Twelfth International World Wide Web Conference, 2003
Towards an accurate AS-level traceroute tool.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003
2002
Achieving service portability using self-adaptive data paths.
IEEE Commun. Mag., 2002
A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002
Route flap damping exacerbates internet routing convergence.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002
The SAHARA Model for Service Composition across Multiple Providers.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Pervasive Computing, 2002
2001
The Ninja architecture for robust Internet-scale systems and services.
,
,
,
,
,
,
,
,
,
,
,
,
,
Comput. Networks, 2001
Network support for mobile multimedia using a self-adaptive distributed proxy.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001
2000
ICEBERG: an Internet core network architecture for integrated communications.
,
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Wirel. Commun., 2000