Chunming Wu

Orcid: 0000-0001-7958-9687

Affiliations:
  • Zhejiang University, College of Computer Science and Technology, Hangzhou, Zhejiang, China


According to our database1, Chunming Wu authored at least 158 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Resource-Efficient and High- Performance Program Deployment in Programmable Networks.
IEEE/ACM Trans. Netw., October, 2024

Resource-Efficient and Timely Packet Header Vector (PHV) Encoding on Programmable Switches.
IEEE/ACM Trans. Netw., October, 2024

Toward Full-Coverage and Low-Overhead Profiling of Network-Stack Latency.
IEEE/ACM Trans. Netw., October, 2024

NetDP: In-Network Differential Privacy for Large-Scale Data Processing.
IEEE Trans. Green Commun. Netw., September, 2024

Hermes: Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program Deployment.
IEEE/ACM Trans. Netw., August, 2024

Resilient Sensor Data Dissemination to Mitigate Link Faults in IoT Networks With Long-Haul Optical Wires for Power Transmission Grids.
IEEE Internet Things J., May, 2024

ABOI: AWGR-Based Optical Interconnects for Single-Wavelength and Multi-Wavelength.
IEEE/ACM Trans. Netw., April, 2024

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems.
Expert Syst. Appl., March, 2024

Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions.
IEEE/ACM Trans. Netw., February, 2024

US-Byte: An Efficient Communication Framework for Scheduling Unequal-Sized Tensor Blocks in Distributed Deep Learning.
IEEE Trans. Parallel Distributed Syst., January, 2024

AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service.
IEEE Trans. Inf. Forensics Secur., 2024

rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN.
IEEE Trans. Inf. Forensics Secur., 2024

G-Fuzz: A Directed Fuzzing Framework for gVisor.
IEEE Trans. Dependable Secur. Comput., 2024

Terra: Low-latency and reliable event collection in network measurement.
J. Netw. Comput. Appl., 2024

Efficient service reconfiguration with partial virtual network function migration.
Comput. Networks, 2024

P4Rex: Accelerating regular expression matching with programmable switches.
Comput. Networks, 2024

Eagle: Toward Scalable and Near-Optimal Network-Wide Sketch Deployment in Network Measurement.
Proceedings of the ACM SIGCOMM 2024 Conference, 2024

TupleRadar: Accelerating Tuple Space Search in Packet Classification by Learned Index.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

Accelerating Sketch-based End-Host Traffic Measurement with Automatic DPU Offloading.
Proceedings of the IEEE INFOCOM 2024, 2024

OpenINT: Dynamic In-band Network Telemetry with Lightweight Deployment and Flexible Planning.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Code classification with graph neural networks: Have you ever struggled to make it work?
Expert Syst. Appl., December, 2023

OF-WFBP: A near-optimal communication mechanism for tensor fusion in distributed deep learning.
Parallel Comput., November, 2023

Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett., September, 2023

Eliminating Control Plane Overload via Measurement Task Placement.
IEEE/ACM Trans. Netw., August, 2023

Toward Low-Latency and Accurate State Synchronization for Programmable Networks.
IEEE/ACM Trans. Netw., June, 2023

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023

Combination Attacks and Defenses on SDN Topology Discovery.
IEEE/ACM Trans. Netw., April, 2023

Performance Tuning via Lean Measurements for Acceleration of Network Functions Virtualization.
IEEE/ACM Trans. Netw., February, 2023

Multilevel Graph Matching Networks for Deep Graph Similarity Learning.
IEEE Trans. Neural Networks Learn. Syst., February, 2023

Stalker Attacks: Imperceptibly Dropping Sketch Measurement Accuracy on Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2023

Mangling Rules Generation With Density-Based Clustering for Password Guessing.
IEEE Trans. Dependable Secur. Comput., 2023

Automatic Performance-Optimal Offloading of Network Functions on Programmable Switches.
IEEE Trans. Cloud Comput., 2023

Empowering DDoS Attack Mitigation with Programmable Switches.
IEEE Netw., 2023

Empowering Network Security With Programmable Switches: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

An Attention-Based Deep Generative Model for Anomaly Detection in Industrial Control Systems.
Proceedings of the 19th International Conference on Web Information Systems and Technologies, 2023

RFT: Toward Highly Reliable Flow Data Transmission in Network Measurement.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Optimizing Program Deployment with libopl in Programmable Networks.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

AMF: Efficient Browser Interprocess Communication Fuzzing.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

DTRadar: Accelerating Search Process of Decision Trees in Packet Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

P4CTM: Compressed Traffic Pattern Matching Based on Programmable Data Plane.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Melody: Toward Resource-Efficient Packet Header Vector Encoding on Programmable Switches.
Proceedings of the IEEE INFOCOM 2023, 2023

Excalibur: A Scalable and Low-Cost Traffic Testing Framework for Evaluating DDoS Defense Solutions.
Proceedings of the IEEE INFOCOM 2023, 2023

Generating Routes Less Fragile to Improve Disruption-Resilient Transport Protocol for Phasor Data in Optical IoT Networks of Power Transmission Grids.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

MiCuts: Combing Bit-Based Cutting and Splitting for Efficient Packet Classification.
Proceedings of the IEEE International Conference on Communications, 2023

Traffic-Aware Fast Reroute Mechanism Exploiting Disjoint Subpaths for Named Data Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Halia: Toward Full-Coverage Network Function Offloading in the Data Plane.
Proceedings of the IEEE International Conference on Communications, 2023

MINT: Empowering Multiple Flow Definition Query for Network-Wide Measurement.
Proceedings of the IEEE International Conference on Communications, 2023

SDSSE: A Self-Driven RPC Load Balancing Method in Datacenter.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Aigis: Full-Coverage And Low-Overhead Mitigating Against Amplified Reflection DDoS Attacks.
Proceedings of the IEEE Global Communications Conference, 2023

Fast Proactive Re-Route with Detours on Joint Paths in Named-Data Networks for Communications of Smart Electric Power Transmission Grids.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Self-Supervised Interest Transfer Network via Prototypical Contrastive Learning for Recommendation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Intrinsic Security: A Robust Framework for Cloud-Native Network Slicing via a Proactive Defense Paradigm.
IEEE Wirel. Commun., 2022

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.
IEEE Trans. Cybern., 2022

GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities.
Comput. Networks, 2022

Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks.
Sci. China Inf. Sci., 2022

DRTP: A Disruption Resilient Hop-by-Hop Transport Protocol for Synchrophasors Measurement in Electric Transmission Grids.
IEEE Access, 2022

FROD: An Efficient Framework for Optimizing Decision Trees in Packet Classification.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Libra: A Stateful Layer-4 Load Balancer with Fair Load Distribution.
Proceedings of the IEEE International Performance, 2022

DeepThrottle: Deep Reinforcement Learning for Router Throttling to Defend Against DDoS Attack in SDN.
Proceedings of the IEEE International Performance, 2022

Escala: Timely Elastic Scaling of Control Channels in Network Measurement.
Proceedings of the IEEE INFOCOM 2022, 2022

MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Torp: Full-Coverage and Low-Overhead Profiling of Host-Side Latency.
Proceedings of the IEEE INFOCOM 2022, 2022

SketchGuide: Reconfiguring Sketch-based Measurement on Programmable Switches.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Toward Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program Deployment.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

KVLB: An In-network Key-Value Load Balancer using Multi-Valued Hash.
Proceedings of the IEEE Global Communications Conference, 2022

TableGuard: A Novel Security Mechanism Against Flow Table Overflow Attacks in SDN.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing.
IEEE Trans. Netw. Serv. Manag., 2021

Deep Graph Matching and Searching for Semantic Code Retrieval.
ACM Trans. Knowl. Discov. Data, 2021

A Practical Black-Box Attack on Source Code Authorship Identification Classifiers.
IEEE Trans. Inf. Forensics Secur., 2021

Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2021

Machine learning based malicious payload identification in software-defined networking.
J. Netw. Comput. Appl., 2021

Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks.
IEEE Commun. Lett., 2021

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021

STEP: Spatial-Temporal Network Security Event Prediction.
CoRR, 2021

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

LightNF: Simplifying Network Function Offloading in Programmable Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Flow Anomaly Telemetry Driven by Programmable Data Plane.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Intelligent DDoS Detection in Botnet Combined with Packet-Level Features under SDN.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

MTP: Avoiding Control Plane Overload with Measurement Task Placement.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Adversarial examples detection through the sensitivity in space mappings.
IET Comput. Vis., 2020

Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

Hierarchical Graph Matching Networks for Deep Graph Similarity Learning.
CoRR, 2020

Multi-variant network address hopping to defend stealthy crossfire attack.
Sci. China Inf. Sci., 2020

ASA: Adversary Situation Awareness via Heterogeneous Graph Convolutional Networks.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Analyzing and Detecting Adversarial Spam on a Large-scale Online APP Review System.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN).
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems.
Proceedings of the IEEE Latin-American Conference on Communications, 2020

Detecting Anomalies in Encrypted Traffic via Deep Dictionary Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

FastScale: Fast Scaling Out of Network Functions.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

SPEED: Resource-Efficient and High-Performance Deployment for Data Plane Programs.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

ApproSync: Approximate State Synchronization for Programmable Networks.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

TPDD: A Two-Phase DDoS Detection System in Software-Defined Networking.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

AFTM: An Adaptive Flow Table Management Scheme for OpenFlow Switches.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

SRA: Switch Resource Aggregation for Application Offloading in Programmable Networks.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Reliable Communication in Transmission Grids based on Nondisjoint Path Aggregation Using Software-Defined Networking.
IEEE Trans. Ind. Informatics, 2019

Distributed mobility management with ID/locator split network-based for future 5G networks.
Telecommun. Syst., 2019

基于禁忌遗传优化的离线静态虚拟网映射算法 (Offline Static Virtual Network Mapping Algorithm Based on Tabu Search Genetic Optimization).
计算机科学, 2019

V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing.
CoRR, 2019

P4SC: A High Performance and Flexible Framework for Service Function Chain.
IEEE Access, 2019

FdGars: Fraudster Detection via Graph Convolutional Networks in Online App Review System.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

A Decentralized Multi-ruling Arbiter for Cyberspace Mimicry Defense.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

Research on Executive Control Strategy of Mimic Web Defense Gateway.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

A Deep ConvNet-Based Countermeasure to Mitigate Link Flooding Attacks Using Software-Defined Networks.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

An Unsupervised Framework for Anomaly Detection in a Water Treatment System.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Research on executive control strategy of mimic web defense gateway.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Think That Attackers Think: Using First-Order Theory of Mind in Intrusion Response System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Enhanced Cyber-Physical Security through Deep Learning Techniques.
Proceedings of the Cyber-Physical Systems PhD Workshop 2019, an event held within the CPS Summer School "Designing Cyber-Physical Systems, 2019

2018
SDN-RDCD: A Real-Time and Reliable Method for Detecting Compromised SDN Devices.
IEEE/ACM Trans. Netw., 2018

Easy Path Programming: Elevate Abstraction Level for Network Functions.
IEEE/ACM Trans. Netw., 2018

虚拟网映射问题的计算复杂性分析 (Computational Complexity Analysis of Virtual Network Mapping Problem).
计算机科学, 2018

PAME: Evolutionary membrane computing for virtual network embedding.
J. Parallel Distributed Comput., 2018

Generating stable biometric keys for flexible cloud computing authentication using finger vein.
Inf. Sci., 2018

AsIDPS: Auto-Scaling Intrusion Detection and Prevention System for Cloud.
Proceedings of the 25th International Conference on Telecommunications, 2018

Guarding the Perimeter of Cloud-Based Enterprise Networks: An Intelligent SDN Firewall.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
SDN-LIRU: A Lossless and Seamless Method for SDN Inter-Domain Route Updates.
IEEE/ACM Trans. Netw., 2017

H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Proceedings of the Security and Privacy in Communication Networks, 2017

HSTS Measurement and an Enhanced Stripping Attack Against HTTPS.
Proceedings of the Security and Privacy in Communication Networks, 2017

PBUF: Sharing Buffer to Mitigate Flooding Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Fraud Detection via Coding Nominal Attributes.
Proceedings of the 2nd International Conference on Multimedia Systems and Signal Processing, 2017

2016
Traffic matrix estimation: A neural network approach with extended input and expectation maximization iteration.
J. Netw. Comput. Appl., 2016

A multipath resource updating approach for distributed controllers in software-defined network.
Sci. China Inf. Sci., 2016

Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems Workshops, 2016

Engineering traffic uncertainty in the OpenFlow data plane.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
虚拟网映射竞争算法设计与分析 (Design and Analysis of Virtual Network Mapping Competitive Algorithms).
计算机科学, 2015

A mixture language model for the classification of Chinese online reviews.
Int. J. Inf. Commun. Technol., 2015

Evolving defense mechanism for future network security.
IEEE Commun. Mag., 2015

Improving QoS in SDN with lossless multi-domain reconfigurations.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Embedding Algorithm for Virtualizing Content-Centric Networks in a Shared Substrate.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Wikipedia Based Approach for Clustering Keyword of Reviews.
J. Softw., 2014

An Approach for Crowd Density and Crowd Size Estimation.
J. Softw., 2014

A New Method For Text Location in News Video Based on Ant Colony Algorithm.
J. Comput., 2014

How Effective Are the Prevailing Attack-Defense Models for Cybersecurity Anyway?
IEEE Intell. Syst., 2014

A secure routing model based on distance vector routing algorithm.
Sci. China Inf. Sci., 2014

Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay.
Sci. China Inf. Sci., 2014

Virtual network mapping for multi-domain data plane in Software-Defined Networks.
Proceedings of the 4th International Conference on Wireless Communications, 2014

AdaFlow: Adaptive Control to Improve Availability of OpenFlow Forwarding for Burst Quantity of Flows.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Prototype for customized multicast services in software defined networks.
Proceedings of the 22nd International Conference on Software, 2014

Lossless reconfiguration protocol for multi-domain data plane in software-defined networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Programming network via Distributed Control in Software-Defined Networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Shot Boundary Detection Method for News Video.
J. Comput., 2013

Towards a Hierarchical Global Naming Framework in Network Virtualization.
KSII Trans. Internet Inf. Syst., 2013

Multicast virtual network mapping for supporting multiple description coding-based video applications.
Comput. Networks, 2013

An efficient virtual network embedding algorithm with delay constraints.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

2012
An Efficient Name Resolving Mechanism for Inter-domain Policy in Content-Centric Networks.
J. Networks, 2012

Scalable Virtual Network Mapping Algorithm for Internet-Scale Networks.
IEICE Trans. Commun., 2012

Robust dynamic bandwidth allocation method for virtual networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
On the design of green reconfigurable router toward energy efficient internet.
IEEE Commun. Mag., 2011

A two-layer traffic clustering framework for network virtualization.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

Avoiding the evolved node B buffer overflow by using advertisement window control.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

2010
BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Mapping Multicast Service-Oriented Virtual Networks with Delay and Delay Variation Constraints.
Proceedings of the Global Communications Conference, 2010


  Loading...