Carol J. Fung
Orcid: 0000-0001-5726-4371Affiliations:
- Concordia University, Montréal, Canada
- Virginia Commonwealth University, Richmond, Computer Science Department
- University of Manitoba, Winnipeg, Department of Computer Science
According to our database1,
Carol J. Fung
authored at least 118 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
A Privacy-Preserving Surveillance Video Sharing Scheme: Storage, Authentication, and Joint Retrieval.
J. Netw. Syst. Manag., March, 2025
2024
IEEE Trans. Knowl. Data Eng., December, 2024
IEEE Trans. Computers, July, 2024
RL-Planner: Reinforcement Learning-Enabled Efficient Path Planning in Multi-UAV MEC Systems.
IEEE Trans. Netw. Serv. Manag., June, 2024
FDLoRA: Personalized Federated Learning of Large Language Model via Dual LoRA Tuning.
CoRR, 2024
Deep Learning-Assisted Security and Privacy Provisioning in the Internet of Medical Things Systems: A Survey on Recent Advances.
IEEE Access, 2024
Proceedings of the IEEE International Conference on Software Analysis, 2024
QUICwand: A Machine Learning Optimization-Based Hybrid Defense Approach Against QUIC Flooding Attacks.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024
A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
QUICPro: Integrating Deep Reinforcement Learning to Defend against QUIC Handshake Flooding Attacks.
Proceedings of the 2024 Applied Networking Research Workshop, 2024
2023
IEEE Trans. Computers, September, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
Proceedings of the 2023 IEEE Virtual Conference on Communications (VCC), 2023
Proceedings of the NOMS 2023, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Optimization of Witness Selection for Ensuring the Integrity of Data in a Blockchain-Assisted Health-IoT System.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023
An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks.
Proceedings of the 19th International Conference on Network and Service Management, 2023
2022
REVAL: Recommend Which Variables to Log With Pretrained Model and Graph Neural Network.
IEEE Trans. Netw. Serv. Manag., December, 2022
Guest Editors Introduction: Special Section on Recent Advances in Network Security Management.
IEEE Trans. Netw. Serv. Manag., 2022
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
Proceedings of the 6th Cyber Security in Networking Conference, 2022
Proceedings of the 6th Cyber Security in Networking Conference, 2022
Proceedings of the 18th International Conference on Network and Service Management, 2022
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Guest Editors' Introduction: Special Issue on Latest Developments for Security Management of Networks and Services.
IEEE Trans. Netw. Serv. Manag., 2021
An analysis of Twitter users' long term political view migration using cross-account data mining.
Online Soc. Networks Media, 2021
Proceedings of the IEEE International Smart Cities Conference, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
IEEE Trans. Netw. Serv. Manag., 2020
IEEE Trans. Netw. Serv. Manag., 2020
Guest Editorial: Special Section on Cybersecurity Techniques for Managing Networked Systems.
IEEE Trans. Netw. Serv. Manag., 2020
IEEE Access, 2020
Proceedings of the NOMS 2020, 2020
Proceedings of the NOMS 2020, 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
Proceedings of the 16th International Conference on Network and Service Management, 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Anomaly Detection Models Based on Context-Aware Sequential Long Short-Term Memory Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Int. J. Netw. Manag., 2018
IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things.
IEEE Access, 2018
A scalable and flexible DDoS mitigation system using network function virtualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 14th International Conference on Network and Service Management, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Android resource usage risk assessment using hidden Markov model and online learning.
Comput. Secur., 2017
PSOM: Periodic Self-Organizing Maps for unsupervised anomaly detection in periodic time series.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
Android malicious application detection using support vector machine and active learning.
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
2016
Android fine-grained permission control system with real-time expert recommendations.
Pervasive Mob. Comput., 2016
An incentive-compatible and trust-aware multi-provider path computation element (PCE).
Comput. Networks, 2016
FACID: A trust-based collaborative decision framework for intrusion detection networks.
Ad Hoc Networks, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 12th International Conference on Network and Service Management, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
J. Internet Serv. Inf. Secur., 2015
J. Internet Serv. Inf. Secur., 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Dude, ask the experts!: Android resource access permission recommendation with RecDroid.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
VGuard: A distributed denial of service attack mitigation method using network function virtualization.
Proceedings of the 11th International Conference on Network and Service Management, 2015
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015
Proceedings of The 7th Asian Conference on Machine Learning, 2015
2014
RevMatch: An efficient and robust decision model for collaborative malware detection.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
RecDroid: a resource access permission control portal and recommendation service for smartphone users.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014
Quality of interaction among path computation elements for trust-aware inter-provider cooperation.
Proceedings of the IEEE International Conference on Communications, 2014
2013
PhD thesis, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
CRC Press, ISBN: 978-1-466-56412-1, 2013
2012
Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks.
IEEE Trans. Netw. Serv. Manag., 2012
IEEE J. Sel. Areas Commun., 2012
2011
Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks.
IEEE Trans. Netw. Serv. Manag., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection.
J. Netw. Syst. Manag., 2011
Proceedings of the 7th International Conference on Network and Service Management, 2011
A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
2009
Proceedings of the Integrated Network Management, 2009
A game-theoretical approach to incentive design in collaborative intrusion detection networks.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
2008
Lifetime Estimation of Large IEEE 802.15.4 Compliant Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Modeling, 2008
Proceedings of the Managing Large-Scale Service Deployment, 2008
2007
The impact of master-slave bridge access mode on the performance of multi-cluster 802.15.4 network.
Comput. Networks, 2007
2006
Faster Lanes, Longer Lifetimes: Activity Management in Interconnected 802.15.4 Sensor Clusters.
Mob. Networks Appl., 2006
Interconnecting 802.15.4 Clusters in Master-slave Mode Using Guaranteed Time Slots and Acknowledged Transfers: Queueing Theoretic Analysis.
J. Interconnect. Networks, 2006
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006