Haining Wang

Orcid: 0000-0002-4174-3009

Affiliations:
  • Virginia Tech, Department of Electrical and Computer Engineering, Arlington, VA, USA
  • Virginia Tech, Department of Electrical and Computer Engineering, Blacksburg, VA, USA
  • University of Delaware, Department of Electrical and Computer Engineering, Newark, DE, USA (2014 - 2019)
  • College of William and Mary, Department of Computer Science, Williamsburg, VA, USA (2003 - 2014)
  • University of Michigan, Ann Arbor, MI, USA (PhD 2003)


According to our database1, Haining Wang authored at least 242 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing Your Airspace: Detection of Drones Trespassing Protected Areas.
Sensors, April, 2024

Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms.
IEEE Internet Things J., April, 2024

OPTILOD: Optimal Beacon Placement for High-Accuracy Indoor Localization of Drones.
Sensors, March, 2024

Fingerprinting Industrial IoT devices based on multi-branch neural network.
Expert Syst. Appl., March, 2024

PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports.
IEEE Trans. Dependable Secur. Comput., 2024

Understanding images of surveillance devices in the wild.
Knowl. Based Syst., 2024

A multiview clustering framework for detecting deceptive reviews.
J. Comput. Secur., 2024

ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer.
CoRR, 2024

Partner in Crime: Boosting Targeted Poisoning Attacks against Federated Learning.
CoRR, 2024

Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models.
CoRR, 2024

TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves.
CoRR, 2024

Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency.
CoRR, 2024

AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale.
CoRR, 2024

HoneyGPT: Breaking the Trilemma in Terminal Honeypots with Large Language Model.
CoRR, 2024

A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems.
CoRR, 2024

OSS Malicious Package Analysis in the Wild.
CoRR, 2024

All in one: Improving GPS accuracy and security via crowdsourcing.
Comput. Networks, 2024

Intelligent Handover Management Enabled by O-RAN and Deep Reinforcement Learning.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method.
Proceedings of the Information Security - 27th International Conference, 2024

An Exploration of Fuzzing for Discovering Use-After-Free Vulnerabilities.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

5G-WAVE: A Core Network Framework with Decentralized Authorization for Network Slices.
Proceedings of the IEEE INFOCOM 2024, 2024

Silent Observers Make a Difference: A Large-scale Analysis of Transparent Proxies on the Internet.
Proceedings of the IEEE INFOCOM 2024, 2024

Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

Towards Shielding 5G Control Plane Functions.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Poster: Acoustic Side-Channel Attack on Robot Vacuums.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
OFDRA: Optimal Femtocell Deployment for Accurate Indoor Positioning of RIS-Mounted AVs.
IEEE J. Sel. Areas Commun., December, 2023

iDROP: Robust Localization for Indoor Navigation of Drones With Optimized Beacon Placement.
IEEE Internet Things J., August, 2023

PILOT: High-Precision Indoor Localization for Autonomous Drones.
IEEE Trans. Veh. Technol., May, 2023

DevTag: A Benchmark for Fingerprinting IoT Devices.
IEEE Internet Things J., April, 2023

A First Look at 5G Core Deployments on Public Cloud: Performance Evaluation of Control and User Planes.
CoRR, 2023

An Internet-wide Penetration Study on NAT Boxes via TCP/IP Side Channel.
CoRR, 2023

Wi-Five: Optimal Placement of Wi-Fi Routers in 5G Networks for Indoor Drone Navigation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

EGO-6: Enhancing Geofencing Security Systems with Optimal Deployment of 6G TRPs.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Wi-Six: Precise Positioning in the Metaverse via Optimal Wi-Fi Router Deployment in 6G Networks.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Securing 5G OpenRAN with a Scalable Authorization Framework for xApps.
Proceedings of the IEEE INFOCOM 2023, 2023

Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding Account Recovery in the Wild and its Security Implications.
IEEE Trans. Dependable Secur. Comput., 2022

Investigating Security Vulnerabilities in a Hot Data Center with Reduced Cooling Redundancy.
IEEE Trans. Dependable Secur. Comput., 2022

Understanding the Security Implication of Aborting Virtual Machine Live Migration.
IEEE Trans. Cloud Comput., 2022

Shining a light on dark places: A comprehensive analysis of open proxy ecosystem.
Comput. Networks, 2022

An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022

Scaling Network Slices with a 5G Testbed: A Resource Consumption Study.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

RAIL: Robust Acoustic Indoor Localization for Drones.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

Exploring the Unchartered Space of Container Registry Typosquatting.
Proceedings of the 31st USENIX Security Symposium, 2022

An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

BinProv: Binary Code Provenance Identification without Disassembly.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

SPIN: Sensor Placement for Indoor Navigation of Drones.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

GPS Spoofing Detection by Leveraging 5G Positioning Capabilities.
Proceedings of the IEEE Latin-American Conference on Communications, 2022

Network-Slice-as-a-Service Deployment Cost Assessment in an End-to-End 5G Testbed.
Proceedings of the IEEE Global Communications Conference, 2022

Torpedo: A Fuzzing Framework for Discovering Adversarial Container Workloads.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Ready Raider One: Exploring the Misuse of Cloud Gaming Services.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks.
IEEE/ACM Trans. Netw., 2021

A Study on the Security Implications of Information Leakages in Container Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds.
IEEE Trans. Cloud Comput., 2021

Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements.
Proc. ACM Meas. Anal. Comput. Syst., 2021

User input enrichment via sensing devices.
Comput. Networks, 2021

An Investigation of Identity-Account Inconsistency in Single Sign-On.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Understanding the Impact of Encrypted DNS on Internet Censorship.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage.
Proceedings of the 30th USENIX Security Symposium, 2021

A Comprehensive Measurement-based Investigation of DNS Hijacking.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

DNSonChain: Delegating Privacy-Preserved DNS Resolution to Blockchain.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

UTrack: Enterprise User Tracking Based on OS-Level Audit Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

An Exploration of ARM System-Level Cache and GPU Side Channels.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Understanding the Manipulation on Recommender Systems through Web Injection.
IEEE Trans. Inf. Forensics Secur., 2020

Under the Concealing Surface: Detecting and Understanding Live Webcams in the Wild.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Towards IP-based Geolocation via Fine-grained and Stable Webcam Landmarks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Review Trade: Everything Is Free in Incentivized Review Groups.
Proceedings of the Security and Privacy in Communication Networks, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
A Machine Learning Based Approach for Mobile App Rating Manipulation Detection.
EAI Endorsed Trans. Security Safety, 2019

BluePass: A Mobile Device Assisted Password Manager.
EAI Endorsed Trans. Security Safety, 2019

Towards passive analysis of anycast in global routing: unintended impact of remote peering.
Comput. Commun. Rev., 2019

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Unveil the Hidden Presence: Characterizing the Backend Interface of Content Delivery Networks.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

An investigation on information leakage of DNS over TLS.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

Casino royale: a deep exploration of illegal online gambling.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Towards Transparent Debugging.
IEEE Trans. Dependable Secur. Comput., 2018

Understanding the Usage of Industrial Control System Devices on the Internet.
IEEE Internet Things J., 2018

End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 27th USENIX Security Symposium, 2018

Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Privacy Risk Assessment on Email Tracking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Discovery of Internet of Thing devices based on rules.
Proceedings of the IEEE INFOCOM 2018, 2018

Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Email as a Master Key: Analyzing Account Recovery in the Wild.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace.
Proceedings of the Computer Security, 2018

Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Bot or Human? A Behavior-Based Online Bot Detection System.
Proceedings of the From Database to Cyber Security, 2018

2017
An Empirical Investigation of Ecommerce-Reputation-Escalation-as-a-Service.
ACM Trans. Web, 2017

Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending.
IEEE Trans. Inf. Forensics Secur., 2017

Personal Information in Passwords and Its Security Implications.
IEEE Trans. Inf. Forensics Secur., 2017

Analysis of Targeted Mouse Movements for Gender Classification.
EAI Endorsed Trans. Security Safety, 2017

Exploring Domain Name Based Features on the Effectiveness of DNS Caching.
Comput. Commun. Rev., 2017

Why "Some" Like It Hot Too: Thermal Attack on Data Centers.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

BluePass: A Secure Hand-Free Password Manager.
Proceedings of the Security and Privacy in Communication Networks, 2017

Automatically Discovering Surveillance Devices in the Cyberspace.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Location Privacy Breach: Apps Are Watching You in Background.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

E-Android: A New Energy Profiling Tool for Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A measurement study on Amazon wishlist and its privacy exposure.
Proceedings of the IEEE International Conference on Communications, 2017

Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Arbitrating Traffic Contention for Power Saving with Multiple PSM Clients.
IEEE Trans. Wirel. Commun., 2016

Throughput Assurance for Multiple Body Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2016

An Efficient User Verification System Using Angle-Based Mouse Movement Biometrics.
ACM Trans. Inf. Syst. Secur., 2016

Profiling Online Social Behaviors for Compromised Account Detection.
IEEE Trans. Inf. Forensics Secur., 2016

Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

A Behavioral Biometrics Based Approach to Online Gender Classification.
Proceedings of the Security and Privacy in Communication Networks, 2016

SERF: optimization of socially sourced images using psychovisual enhancements.
Proceedings of the 7th International Conference on Multimedia Systems, 2016

A study of personal information in human-chosen passwords and its security implications.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

GUIDE: Graphical user interface fingerprints physical devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

ASCEND: A search engine for online industrial control devices.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Characterizing industrial control system devices on the Internet.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

On Energy Security of Smartphones.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud.
IEEE/ACM Trans. Netw., 2015

PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency.
IEEE Trans. Computers, 2015

E-commerce Reputation Manipulation: The Emergence of Reputation-Escalation-as-a-Service.
Proceedings of the 24th International Conference on World Wide Web, 2015

A Measurement Study on Co-residence Threat inside the Cloud.
Proceedings of the 24th USENIX Security Symposium, 2015

PmDroid: Permission Supervision for Android Advertising.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Kernel Data Attack Is a Realistic Security Threat.
Proceedings of the Security and Privacy in Communication Networks, 2015

Defeating Kernel Driver Purifier.
Proceedings of the Security and Privacy in Communication Networks, 2015

Privacy Risk Assessment on Online Photos.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Hyperprobe: Towards Virtual Machine Extrospection.
Proceedings of the 29th Large Installation System Administration Conference, 2015

On the DNS Deployment of Modern Web Services.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

TrustLogin: Securing Password-Login on Commodity Operating Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

Exploiting Eye Tracking for Smartphone Authentication.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing.
IEEE Internet Things J., 2014

Gemini: An Emergency Line of Defense against Phishing Attacks.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

GridMap: Enhanced Security in Cued-Recall Graphical Passwords.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Power Attack: An Increasing Threat to Data Centers.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

What scale of audience a campaign can reach in what price on Twitter?
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

You Are How You Touch: User Verification on Smartphones via Tapping Behaviors.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

A Framework to Secure Peripherals at Runtime.
Proceedings of the Computer Security - ESORICS 2014, 2014

Click Fraud Detection on the Advertiser Side.
Proceedings of the Computer Security - ESORICS 2014, 2014

Detecting Malicious Javascript in PDF through Document Instrumentation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Activity Spoofing and Its Defense in Android Smartphones.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A measurement study of insecure javascript practices on the web.
ACM Trans. Web, 2013

Automating Cloud Network Optimization and Evolution.
IEEE J. Sel. Areas Commun., 2013

Blog or block: Detecting blog bots through behavioral biometrics.
Comput. Networks, 2013

Unveiling Privacy Setting Breaches in Online Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

Security implications of memory deduplication in a virtualized environment.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Evasive bots masquerading as human beings on the web.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Precise, Scalable, and Online Request Tracing for Multitier Services of Black Boxes.
IEEE Trans. Parallel Distributed Syst., 2012

On Energy Security of Server Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
IEEE Trans. Dependable Secur. Comput., 2012

Secure instant messaging in enterprise-like networks.
Comput. Networks, 2012

Surviving a search engine overload.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

A Voice Spam Filter to Clean Subscribers' Mailbox.
Proceedings of the Security and Privacy in Communication Networks, 2012

m.Site: Efficient Content Adaptation for Mobile Devices.
Proceedings of the Middleware 2012, 2012

NetDEO: Automating network design, evolution, and optimization.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Enhancing cache robustness for content-centric networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

PowerTracer: tracing requests in multi-tier services to diagnose energy inefficiency.
Proceedings of the 9th International Conference on Autonomic Computing, 2012

Understanding performance implications of nested file systems in a virtualized environment.
Proceedings of the 10th USENIX conference on File and Storage Technologies, 2012

A covert channel construction in a virtualized environment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Detecting Social Spam Campaigns on Twitter.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
An Effective Memory Optimization for Virtual Machine-Based Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Design and Implementation of a Fast Dynamic Packet Filter.
IEEE/ACM Trans. Netw., 2011

Humans and Bots in Internet Chat: Measurement, Analysis, and Automated Classification.
IEEE/ACM Trans. Netw., 2011

An Entropy-Based Approach to Detecting Covert Timing Channels.
IEEE Trans. Dependable Secur. Comput., 2011

Special Issue: Securing Distributed Networks and Systems.
Concurr. Comput. Pract. Exp., 2011

An investigation of hotlinking and its countermeasures.
Comput. Commun., 2011

Energy Attack on Server Systems.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

BodyT2: Throughput and time delay performance assurance for heterogeneous BSNs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

An efficient user verification system via mouse movements.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
BogusBiter: A transparent protection against phishing attacks.
ACM Trans. Internet Techn., 2010

Security in next generation wireless networks.
Secur. Commun. Networks, 2010

Keychain-Based Signatures for Securing BGP.
IEEE J. Sel. Areas Commun., 2010

PowerTracer: Tracing requests in multi-tier services to save cluster power consumption
CoRR, 2010

An automatic HTTP cookie management system.
Comput. Networks, 2010

An effective feedback-driven approach for energy saving in battery powered systems.
Proceedings of the 18th International Workshop on Quality of Service, 2010

A Collaboration-based Autonomous Reputation System for Email Services.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Tracking Skype VoIP Calls Over The Internet.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Mimimorphism: a new approach to binary code obfuscation.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Profit-aware overload protection in E-commerce Web sites.
J. Netw. Comput. Appl., 2009

Characterizing insecure javascript practices on the web.
Proceedings of the 18th International Conference on World Wide Web, 2009

RCB: A Simple and Practical Framework for Real-time Collaborative Browsing.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Secure Passwords Through Enhanced Hashing.
Proceedings of the 23rd Large Installation System Administration Conference, 2009

Online detection of network traffic anomalies using behavioral distance.
Proceedings of the 17th International Workshop on Quality of Service, 2009

SessionMagnifier: a simple approach to secure and convenient kiosk browsing.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Efficient resource management on template-based web servers.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Battle of Botcraft: fighting bots in online games with human observational proofs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Detecting VoIP Floods Using the Hellinger Distance.
IEEE Trans. Parallel Distributed Syst., 2008

Thwarting E-mail Spam Laundering.
ACM Trans. Inf. Syst. Secur., 2008

Measurement and Classification of Humans and Bots in Internet Chat.
Proceedings of the 17th USENIX Security Symposium, 2008

Model-Based Covert Timing Channels: Automated Modeling and Evasion.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Swift: A Fast Dynamic Packet Filter.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Anti-Phishing in Offense and Defense.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Building an application-aware IPsec policy system.
IEEE/ACM Trans. Netw., 2007

Defense against spoofed IP traffic using hop-count filtering.
IEEE/ACM Trans. Netw., 2007

Maintaining Strong Cache Consistency for the Domain Name System.
IEEE Trans. Knowl. Data Eng., 2007

Cooperative Relay Service in a Wireless LAN.
IEEE J. Sel. Areas Commun., 2007

Profit-aware Admission Control for Overload Protection in E-commerce Web Sites.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Securing BGP through Keychain-based Signatures.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

Automatic Cookie Usage Setting with CookiePicker.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Detecting covert timing channels: an entropy-based approach.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Identifying Low-ProfileWeb Server's IP Fingerprint.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Fast Detection of Denial-of-Service Attacks on IP Telephony.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

DNScup: Strong Cache Consistency Protocol for DNS.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

VoIP Intrusion Detection Through Interacting Protocol State Machines.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

An effective defense against email spam laundering.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
IP Easy-pass: a light-weight network-edge resource access control.
IEEE/ACM Trans. Netw., 2005

A study on object tracking quality under probabilistic coverage in sensor networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Segment-Based Proxy Caching for Internet Streaming Media Delivery.
IEEE Multim., 2005

Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

SCOPE: scalable consistency maintenance in structured P2P systems.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2004
Change-Point Monitoring for the Detection of DoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2004

Robust TCP congestion recovery.
J. High Speed Networks, 2004

IP Easy-pass: Edge Resource Access Control.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

2003
Countering distributed denial of service attacks.
PhD thesis, 2003

Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks.
IEEE Trans. Parallel Distributed Syst., 2003

Statistical Characterization for Per-hop QoS.
Proceedings of the Quality of Service, 2003

Hop-count filtering: an effective defense against spoofed DDoS traffic.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Layer-4 Service Differentiation and Resource Isolation.
Proceedings of the 8th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2002), 2002

Detecting SYN Flooding Attacks.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

SYN-dog: Sniffing SYN Flooding Sources.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Adaptive-weighted packet scheduling for premium service.
Proceedings of the IEEE International Conference on Communications, 2001

2000
A Simple Refinement of Slow-Start of TCP Congestion Control.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1999
Scalability Evaluation of Multi-Protocol Over ATM (MPOA).
Proceedings of the Proceedings IEEE INFOCOM '99, 1999


  Loading...