Kai Bu

Orcid: 0000-0003-1188-801X

Affiliations:
  • Zhejiang University, College of Computer Science and Technology, Hangzhou, China
  • Hong Kong Polytechnic University, Department of Computer Science, Kowloon, Hong Kong (2009 - 2013)
  • Nanjing University of Posts and Telecommunications, China (until 2009)


According to our database1, Kai Bu authored at least 72 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

SwiftParade: Anti-Burst Multipath Validation.
IEEE Trans. Dependable Secur. Comput., 2024

Cora: Accelerating Stateful Network Applications with SmartNICs.
CoRR, 2024

Symphony: Path Validation at Scale.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Hitchhiker: Accelerating ORAM With Dynamic Scheduling.
IEEE Trans. Computers, August, 2023

RuleOut Forwarding Anomalies for SDN.
IEEE/ACM Trans. Netw., February, 2023

Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Adversarial CAPTCHAs.
IEEE Trans. Cybern., 2022

SwiftDir: Secure Cache Coherence without Overprotection.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

unXpec: Breaking Undo-based Safe Speculation.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022

Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021

Securing middlebox policy enforcement in SDN.
Comput. Networks, 2021

2020
Privacy-preserving Network Path Validation.
ACM Trans. Internet Techn., 2020

Atomos: Constant-Size Path Validation Proof.
IEEE Trans. Inf. Forensics Secur., 2020

Atlas: A First Step Toward Multipath Validation.
Comput. Networks, 2020

PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Efficient Polling-Based Information Collection in RFID Systems.
IEEE/ACM Trans. Netw., 2019

Fault Management in Software-Defined Networking: A Survey.
IEEE Commun. Surv. Tutorials, 2019

Falcon: Differential fault localization for SDN control plane.
Comput. Networks, 2019

A lightweight policy enforcement system for resource protection and management in the SDN-based cloud.
Comput. Networks, 2019

Thinking inside the Box: Differential Fault Localization for SDN Control Plane.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths.
IEEE Trans. Inf. Forensics Secur., 2018

What's (Not) Validating Network Paths: A Survey.
CoRR, 2018

Fastlane-ing more flows with less bandwidth for software-Defined networking.
Comput. Networks, 2018

SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

MemCloak: Practical Access Obfuscation for Untrusted Memory.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

High performance and security in cloud computing.
Concurr. Comput. Pract. Exp., 2017

You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID.
IEEE Commun. Surv. Tutorials, 2017

2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016

A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommun. Syst., 2016

Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016

Is every flow on the right track?: Inspect SDN forwarding with RuleScope.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Toward Taming Policy Enforcement for SDN in the RIGHT Way: Or Can We?
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reviving Android Malware with DroidRide: And How Not To.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distributed Syst., 2015

Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2015

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Gotta tell you switches only once: Toward bandwidth-efficient flow setup for SDN.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach.
IEEE/ACM Trans. Netw., 2014

A new differential RAID for high reliable All Flash Array.
IEICE Electron. Express, 2014

Approaching the time lower bound on cloned-tag identification for large RFID systems.
Ad Hoc Networks, 2014

Compiling minimum incremental update for modular SDN languages.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Efficient distributed query processing in large RFID-enabled supply chains.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Reduction of data prevention cost and improvement of reliability in MLC NAND flash storage system.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distributed Syst., 2013

Robust localization against outliers in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2013

Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems.
Concurr. Comput. Pract. Exp., 2013

Secure P2P topology based on a multidimensional DHT space mapping.
Sci. China Inf. Sci., 2013

ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Less is More: Efficient RFID-Based 3D Localization.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013

2012
Efficient Misplaced-Tag Pinpointing in Large RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2012

Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Comput. Commun., 2012

Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Fast cloned-tag identification protocols for large-scale RFID systems.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

An Efficient Flash-Based Remote Sense Image Storage Approach for Fast Access Geographic Information System.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2011
Efficient pinpointing of misplaced tags in large RFID systems.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Efficient Monitoring of Dynamic Tag Populations in RFID Systems.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2009
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

2008
A Method Based on AMHI for DDoS Attacks Detection and Defense.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...