Carol J. Fung

Orcid: 0000-0001-5726-4371

Affiliations:
  • Concordia University, Montréal, Canada
  • Virginia Commonwealth University, Richmond, Computer Science Department
  • University of Manitoba, Winnipeg, Department of Computer Science


According to our database1, Carol J. Fung authored at least 118 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval.
J. Netw. Syst. Manag., March, 2025

2024
SpikeLog: Log-Based Anomaly Detection via Potential-Assisted Spiking Neuron Network.
IEEE Trans. Knowl. Data Eng., December, 2024

LogSay: An Efficient Comprehension System for Log Numerical Reasoning.
IEEE Trans. Computers, July, 2024

RL-Planner: Reinforcement Learning-Enabled Efficient Path Planning in Multi-UAV MEC Systems.
IEEE Trans. Netw. Serv. Manag., June, 2024

FDLoRA: Personalized Federated Learning of Large Language Model via Dual LoRA Tuning.
CoRR, 2024

Deep Learning-Assisted Security and Privacy Provisioning in the Internet of Medical Things Systems: A Survey on Recent Advances.
IEEE Access, 2024

Gloss: Guiding Large Language Models to Answer Questions from System Logs.
Proceedings of the IEEE International Conference on Software Analysis, 2024

QUICwand: A Machine Learning Optimization-Based Hybrid Defense Approach Against QUIC Flooding Attacks.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

QUICPro: Integrating Deep Reinforcement Learning to Defend against QUIC Handshake Flooding Attacks.
Proceedings of the 2024 Applied Networking Research Workshop, 2024

2023
Improving Log-Based Anomaly Detection by Pre-Training Hierarchical Transformers.
IEEE Trans. Computers, September, 2023

LogEncoder: Log-Based Contrastive Representation Learning for Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., June, 2023

LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection.
CoRR, 2023

LogQA: Question Answering in Unstructured Logs.
CoRR, 2023

QUICShield: A Rapid Detection Mechanism Against QUIC-Flooding Attacks.
Proceedings of the 2023 IEEE Virtual Conference on Communications (VCC), 2023

A Study on the Conspiracy Theory Propagation Network on Twitter.
Proceedings of the NOMS 2023, 2023

LogGPT: Exploring ChatGPT for Log-Based Anomaly Detection.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Optimization of Witness Selection for Ensuring the Integrity of Data in a Blockchain-Assisted Health-IoT System.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023

An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks.
Proceedings of the 19th International Conference on Network and Service Management, 2023

2022
REVAL: Recommend Which Variables to Log With Pretrained Model and Graph Neural Network.
IEEE Trans. Netw. Serv. Manag., December, 2022

Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag., 2022

Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022

Adanomaly: Adaptive Anomaly Detection for System Logs with Adversarial Learning.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

A Game-Theoretic Model for DDoS Mitigation Strategies with Cloud Services.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

A Survey on the Security Issues of QUIC.
Proceedings of the 6th Cyber Security in Networking Conference, 2022

A Study of User Concerns about Smartphone Privacy.
Proceedings of the 6th Cyber Security in Networking Conference, 2022

Black-box Attacks to Log-based Anomaly Detection.
Proceedings of the 18th International Conference on Network and Service Management, 2022

Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services.
IEEE Trans. Netw. Serv. Manag., 2021

An analysis of Twitter users' long term political view migration using cross-account data mining.
Online Soc. Networks Media, 2021

Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE.
CoRR, 2021

Adaptive Control for Smart Water Distribution Systems.
Proceedings of the IEEE International Smart Cities Conference, 2021

2020
Fine-Grained Cloud Resource Provisioning for Virtual Network Function.
IEEE Trans. Netw. Serv. Manag., 2020

HitAnomaly: Hierarchical Transformers for Anomaly Detection in System Log.
IEEE Trans. Netw. Serv. Manag., 2020

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario.
IEEE Trans. Netw. Serv. Manag., 2020

Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems.
IEEE Trans. Netw. Serv. Manag., 2020

IEEE Access Special Section Editorial: Green Communications on Wireless Networks.
IEEE Access, 2020

Paddy: An Event Log Parsing Approach using Dynamic Dictionary.
Proceedings of the NOMS 2020, 2020

A Privacy-Aware Collaborative DDoS Defence Network.
Proceedings of the NOMS 2020, 2020

A Gated Few-shot Learning Model For Anomaly Detection.
Proceedings of the 2020 International Conference on Information Networking, 2020

Transfer Log-based Anomaly Detection with Pseudo Labels.
Proceedings of the 16th International Conference on Network and Service Management, 2020

An Effective Policy Sharing Mechanism for Smart Home Networks.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
A Requirement-Oriented Design of NFV Topology by Formal Synthesis.
IEEE Trans. Netw. Serv. Manag., 2019

Multi-View Permission Risk Notification for Smartphone System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Advanced security management.
Int. J. Netw. Manag., 2019

A Risk-defined Trust Transitivity Model for Group Decisions in Social Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Distributed Orchestration in Cloud Data Centers.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Anomaly Detection Models Based on Context-Aware Sequential Long Short-Term Memory Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Android User Privacy Preserving Through Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2018

Special issue on security for emerging open networking technologies.
Int. J. Netw. Manag., 2018

IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things.
IEEE Access, 2018

A scalable and flexible DDoS mitigation system using network function virtualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

HoneyV: A virtualized honeynet system based on network softwarization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Elastic Network Service Chain with Fine-Grained Vertical Scaling.
Proceedings of the IEEE Global Communications Conference, 2018

Outlier Detection for Distributed Services using Multi-Frequency Patterns.
Proceedings of the 14th International Conference on Network and Service Management, 2018

2017
A Collaborative DDoS Defence Framework Using Network Function Virtualization.
IEEE Trans. Inf. Forensics Secur., 2017

Android resource usage risk assessment using hidden Markov model and online learning.
Comput. Secur., 2017

PSOM: Periodic Self-Organizing Maps for unsupervised anomaly detection in periodic time series.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

DroidVisor: An Android secure application recommendation system.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Dynamic DDoS Defense Resource Allocation using Network Function Virtualization.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Android malicious application detection using support vector machine and active learning.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Automated synthesis of NFV topology: A security requirement-oriented design.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Arena: Adaptive real-time update anomaly prediction in cloud systems.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Android fine-grained permission control system with real-time expert recommendations.
Pervasive Mob. Comput., 2016

An incentive-compatible and trust-aware multi-provider path computation element (PCE).
Comput. Networks, 2016

FACID: A trust-based collaborative decision framework for intrusion detection networks.
Ad Hoc Networks, 2016

BotTracer: Bot user detection using clustering method in RecDroid.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

A survey on security in network functions virtualization.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Using recurrent neural networks toward black-box system anomaly prediction.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

SpongeNet+: A Two-Layer Bandwidth Allocation Framework for Cloud Datacenter.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Android Permission Recommendation Using Transitive Bayesian Inference Model.
Proceedings of the Computer Security - ESORICS 2016, 2016

VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

CoFence: A collaborative DDoS defence using network function virtualization.
Proceedings of the 12th International Conference on Network and Service Management, 2016

XDroid: An Android permission control using Hidden Markov chain and online learning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Survey of Android Security Threats and Defenses.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model.
J. Internet Serv. Inf. Secur., 2015

Guest Editorial: Special issue on Next Generation Networks and Systems Security.
J. Internet Serv. Inf. Secur., 2015

FlowMon: Detecting Malicious Switches in Software-Defined Networks.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Demo: RecDroid: An Android Resource Access Permission Recommendation System.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

A methodology for root-cause analysis in component based systems.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Dude, ask the experts!: Android resource access permission recommendation with RecDroid.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A game-theoretic model for defending against malicious users in RecDroid.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Enhancing Twitter spam accounts discovery using cross-account pattern mining.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

VGuard: A distributed denial of service attack mitigation method using network function virtualization.
Proceedings of the 11th International Conference on Network and Service Management, 2015

Revisit network anomaly ranking in datacenter network using re-ranking.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

Improving Sybil Detection via Graph Pruning and Regularization Techniques.
Proceedings of The 7th Asian Conference on Machine Learning, 2015

2014
RevMatch: An efficient and robust decision model for collaborative malware detection.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

RecDroid: a resource access permission control portal and recommendation service for smartphone users.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

Quality of interaction among path computation elements for trust-aware inter-provider cooperation.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Design and Management of Collaborative Intrusion Detection Networks.
PhD thesis, 2013

Design and management of collaborative intrusion detection networks.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Intrusion Detection Networks - A Key to Collaborative Security.
CRC Press, ISBN: 978-1-466-56412-1, 2013

2012
Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks.
IEEE Trans. Netw. Serv. Manag., 2012

GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks.
IEEE J. Sel. Areas Commun., 2012

2011
Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks.
IEEE Trans. Netw. Serv. Manag., 2011

Collaborative Intrusion Detection Networks and Insider Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection.
J. Netw. Syst. Manag., 2011

SMURFEN: A system framework for rule sharing collaborative intrusion detection.
Proceedings of the 7th International Conference on Network and Service Management, 2011

A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

Poster: SMURFEN: a rule sharing collaborative intrusion detection network.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Bayesian decision aggregation in collaborative intrusion detection networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks.
Proceedings of IEEE International Conference on Communications, 2010

Effective acquaintance management for Collaborative Intrusion Detection Networks.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Robust and scalable trust management for collaborative intrusion detection.
Proceedings of the Integrated Network Management, 2009

A game-theoretical approach to incentive design in collaborative intrusion detection networks.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

2008
Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Modeling, 2008

Trust Management for Host-Based Collaborative Intrusion Detection.
Proceedings of the Managing Large-Scale Service Deployment, 2008

2007
The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network.
Comput. Networks, 2007

2006
Faster Lanes, Longer Lifetimes: Activity Management in Interconnected 802.15.4 Sensor Clusters.
Mob. Networks Appl., 2006

Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis.
J. Interconnect. Networks, 2006

Network lifetime equalization in interconnected 802.15.4 clusters.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Interconnecting 802.15.4 clusters in slotted CSMA-CA mode.
Proceedings of IEEE International Conference on Communications, 2006

On Node Population in a Multi-Level 802.15.4 Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

On Bridge Residence Times in Master-Slave Connected 802.15.4 Clusters.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006


  Loading...