Keith W. Ross

Orcid: 0000-0003-2556-805X

Affiliations:
  • New York University Tandon School of Engineering, New York City, USA


According to our database1, Keith W. Ross authored at least 177 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Prevalence of Neural Collapse in Neural Multivariate Regression.
CoRR, 2024

Cross Entropy versus Label Smoothing: A Neural Collapse Perspective.
CoRR, 2024

Pre-training with Synthetic Data Helps Offline Reinforcement Learning.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

2022
On the Convergence of Monte Carlo UCB for Random-Length Episodic MDPs.
CoRR, 2022

VRL3: A Data-Driven Framework for Visual Deep Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

On the Convergence of the Monte Carlo Exploring Starts Algorithm for Reinforcement Learning.
Proceedings of the Tenth International Conference on Learning Representations, 2022

2021
Aggressive Q-Learning with Ensembles: Achieving Both High Sample Efficiency and High Asymptotic Performance.
CoRR, 2021

On-Policy Deep Reinforcement Learning for the Average-Reward Criterion.
Proceedings of the 38th International Conference on Machine Learning, 2021

Randomized Ensembled Double Q-Learning: Learning Fast Without a Model.
Proceedings of the 9th International Conference on Learning Representations, 2021

2020
First Order Optimization in Policy Space for Constrained Deep Reinforcement Learning.
CoRR, 2020

On the Convergence of the Monte Carlo Exploring Starts Algorithm for Reinforcement Learning.
CoRR, 2020

BAIL: Best-Action Imitation Learning for Batch Deep Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

First Order Constrained Optimization in Policy Space.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Striving for Simplicity and Performance in Off-Policy DRL: Output Normalization and Non-Uniform Sampling.
Proceedings of the 37th International Conference on Machine Learning, 2020

2019
BAIL: Best-Action Imitation Learning for Batch Deep Reinforcement Learning.
CoRR, 2019

Towards Simplicity in Deep Reinforcement Learning: Streamlined Off-Policy Learning.
CoRR, 2019

Boosting Soft Actor-Critic: Emphasizing Recent Experience without Forgetting the Past.
CoRR, 2019

Supervised Policy Update for Deep Reinforcement Learning.
Proceedings of the 7th International Conference on Learning Representations, 2019

Sensing the Chinese Diaspora: How Mobile Apps Can Provide Insights Into Global Migration Flows.
Proceedings of the 2019 International Conference on Data Mining Workshops, 2019

2018
Efficient Entropy for Policy Gradient with Multidimensional Action Space.
CoRR, 2018

Supervised Policy Update.
CoRR, 2018

Sensing the Chinese Diaspora: How Mobile Apps Can Provide Insights into Global Migration Flows.
CoRR, 2018

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Efficient Entropy For Policy Gradient with Multi-Dimensional Action Space.
Proceedings of the 6th International Conference on Learning Representations, 2018

2017
Taking the Pulse of US College Campuses with Location-Based Anonymous Mobile Apps.
ACM Trans. Intell. Syst. Technol., 2017

Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study.
Peer-to-Peer Netw. Appl., 2017

User Anonymity on Twitter.
IEEE Secur. Priv., 2017

Mining Anonymity: Identifying Sensitive Accounts on Twitter.
CoRR, 2017

2016
Thwarting location privacy protection in location-based social discovery services.
Secur. Commun. Networks, 2016

The Right to be Forgotten in the Media: A Data-Driven Study.
Proc. Priv. Enhancing Technol., 2016

You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Finding Sensitive Accounts on Twitter: An Automated Approach Based on Follower Anonymity.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

2015
Children Seen But Not Heard: When Parents Compromise Children's Online Privacy.
Proceedings of the 24th International Conference on World Wide Web, 2015

Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

I know where you are: Thwarting privacy protection in location-based social discovery services.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

You Can Yak But You Can't Hide.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
I Know What You're Buying: Privacy Breaches on eBay.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Keynote speakers: Big data science and social networks - Accelerating insights and building value.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

"On the internet, nobody knows you're a dog": a twitter case study of anonymity in social networks.
Proceedings of the second ACM conference on Online social networks, 2014

Estimating heights from photo collections: a data-driven approach.
Proceedings of the second ACM conference on Online social networks, 2014

Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
Topology Mapping and Geolocating for China's Internet.
IEEE Trans. Parallel Distributed Syst., 2013

Capacity analysis of peer-to-peer adaptive streaming.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Mechanism design for dynamic P2P streaming.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

Profiling high-school students with facebook: how online privacy laws can actually increase minors' risk.
Proceedings of the 2013 Internet Measurement Conference, 2013

2012
Facebook users have become much more private: A large-scale study.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Xunlei: Peer-Assisted Download Acceleration on a Massive Scale.
Proceedings of the Passive and Active Measurement - 13th International Conference, 2012

Peer-assisted distribution of User Generated Content.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

Profiting from filesharing: A measurement study of economic incentives in cyberlockers.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

China's Internet: Topology mapping and geolocating.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Estimating age privacy leakage in online social networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Unraveling the BitTorrent Ecosystem.
IEEE Trans. Parallel Distributed Syst., 2011

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy
CoRR, 2011

Inflight Modifications of Content: Who Are the Culprits?
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Estimating the performance of hypothetical cloud service deployments: A measurement-based approach.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Broadcast yourself: understanding YouTube uploaders.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

A Measurement Study of Attacks on BitTorrent Seeds.
Proceedings of IEEE International Conference on Communications, 2011

What's in a Name: A Study of Names, Gender Inference, and Gender Behavior in Facebook.
Proceedings of the Database Systems for Adanced Applications, 2011

Pangolin: speeding up concurrent messaging for cloud-based social gaming.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
Modeling and Analysis of Multichannel P2P Live Video Systems.
IEEE/ACM Trans. Netw., 2010

Video Pollution on the Web.
First Monday, 2010

Redesigning multi-channel P2P live video systems with View-Upload Decoupling.
Comput. Networks, 2010

A DNS Reflection Method for Global Traffic Management.
Proceedings of the 2010 USENIX Annual Technical Conference, 2010

Measuring and Evaluating TCP Splitting for Cloud Services.
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010

On the Privacy of Peer-Assisted Distribution of Security Patches.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Understanding Peer Exchange in BitTorrent Systems.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Waiting for Anonymity: Understanding Delays in the Tor Overlay.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

BitTorrent Darknets.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

P2P Trading in Social Networks: The Value of Staying Connected.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Understanding and Improving Ratio Incentives in Private Communities.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
Video interactions in online video social networks.
ACM Trans. Multim. Comput. Commun. Appl., 2009

LayerP2P: Using Layered Video Chunks in P2P Live Streaming.
IEEE Trans. Multim., 2009

Measurement and mitigation of BitTorrent leecher attacks.
Comput. Commun., 2009

Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Queuing Network Models for Multi-Channel P2P Live Streaming Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

View-Upload Decoupling: A Redesign of Multi-Channel P2P Video Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Topology Optimization in Multi-tree Based P2P Streaming System.
Proceedings of the ICTAI 2009, 2009

2008
Characterizing Video Responses in Social Networks
CoRR, 2008

IPTV over P2P streaming networks: the mesh-pull approach.
IEEE Commun. Mag., 2008

Understanding hybrid CDN-P2P: why limelight needs its own Red Swoosh.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2008

Understanding video interactions in youtube.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

A measurement study of attacks on BitTorrent leechers.
Proceedings of the 7th international conference on Peer-to-peer systems, 2008

Substream Trading: Towards an open P2P live streaming system.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Identifying video spammers in online social networks.
Proceedings of the AIRWeb 2008, 2008

Computernetzwerke - der Top-Down-Ansatz (4. Aufl.).
Pearson Studium, ISBN: 978-3-8273-7330-4, 2008

2007
A Measurement Study of a Large-Scale P2P IPTV System.
IEEE Trans. Multim., 2007

Advances in Peer-to-Peer Streaming Systems [Guest Editorial].
IEEE J. Sel. Areas Commun., 2007

Inferring Network-Wide Quality in P2P Live Streaming Systems.
IEEE J. Sel. Areas Commun., 2007

Can internet video-on-demand be profitable?
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Peer-Assisted VoD: Making Internet Video Distribution Cheap.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

Stochastic Fluid Theory for P2P Streaming Systems.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Optimizing File Availability in Peer-to-Peer Content Distribution.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

P2P Video Live Streaming with MDC: Providing Incentives for Redistribution.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Discovery of In-Band Streaming Services in Peer-to-Peer Overlays.
Proceedings of the Global Communications Conference, 2007

2006
Caching video objects: layers vs versions?
Multim. Tools Appl., 2006

The FastTrack overlay: A measurement study.
Comput. Networks, 2006

Fluid modeling of pollution proliferation in P2P networks.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Exploiting P2P systems for DDoS attacks.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Adaptive content management in structured P2P communities.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

The Index Poisoning Attack in P2P File Sharing Systems.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

On the Design of Prefetching Strategies in a Peer-Driven Video on-Demand System.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Peer-Assisted File Distribution: The Minimum Distribution Time.
Proceedings of the 1st IEEE Workshop on Hot Topics in Web Systems and Technologies, 2006

2005
Stochastic fluid models for cache clusters.
Perform. Evaluation, 2005

Multiclass P2P networks: Static resource allocation for service differentiation and bandwidth diversity.
Perform. Evaluation, 2005

Comparing the streaming of FGS encoded video at different aggregation levels: frame, GoP, and scene.
Int. J. Commun. Syst., 2005

Structured Peer-to-Peer Networks: Faster, Closer, Smarter.
IEEE Data Eng. Bull., 2005

Pollution in P2P file sharing systems.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Optimal peer selection for P2P downloading and streaming.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Streaming layered encoded video using peers.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Efficient Blacklisting and Pollution-Level Estimation in P2P File-Sharing Systems.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

2004
Two optimal peer selection problems.
SIGMETRICS Perform. Evaluation Rev., 2004

Periodic broadcasting with VBR-encoded video.
Multim. Syst., 2004

Unified Framework for Optimal Video Streaming.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A peer-to-peer video-on-deniand system using multiple description coding and server diversity.
Proceedings of the 2004 International Conference on Image Processing, 2004

Data Indexing in Peer-to-Peer DHT Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Adaptive Streaming of Layer-Encoded Multimedia Presentations.
J. VLSI Signal Process., 2003

Hierarchical Peer-To-Peer Systems.
Parallel Process. Lett., 2003

Asynchronous Voice: A Personal Account.
IEEE Multim., 2003

Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation.
Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P 2003), 2003

Topology-Centric Look-Up Service.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Optimal streaming of layered video: joint scheduling and error concealment.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

Automated Delivery of Web Documents Through a Caching Infrastructure.
Proceedings of the 29th EUROMICRO Conference 2003, 2003

2002
A framework for guaranteeing statistical QoS.
IEEE/ACM Trans. Netw., 2002

Distributing Layered Encoded Video through Caches.
IEEE Trans. Computers, 2002

Interactive video streaming with proxy servers.
Inf. Sci., 2002

Packet multiplexers with adversarial regulated traffic.
Comput. Commun., 2002

Object replication strategies in content distribution networks.
Comput. Commun., 2002

Adaptive rate control for streaming stored rine-grained scalable video.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2002

Implementation of adaptive streaming of stored MPEG-4 FGS video over TCP.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Computernetzwerke - ein Top-Down-Ansatz mit Schwerpunkt Internet.
Pearson Studium, ISBN: 978-3-8273-7150-8, 2002

2001
A Comprehensive Architecture for Continuous Media Email.
IEEE Multim., 2001

Performance evaluation of redirection schemes in content distribution networks.
Comput. Commun., 2001

Computernetze - ein Top-Down-Ansatz mit Schwerpunkt Internet.
Pearson Studium, ISBN: 978-3-8273-7017-4, 2001

Computer networking - a top-down approach featuring the internet.
Addison-Wesley-Longman, ISBN: 978-0-201-47711-5, 2001

2000
Optimal Streaming of Layered Video.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

A Replicated Architecture for the Domain Name System.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Optimal Streaming of Layer-Encoded Multimedia Presentations.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Optimal streaming of synchronized multimedia presentations.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

Guaranteeing Statistical QoS to Regulated Traffic: The Single Node Case.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

Striping for Interactive Video: Is It Worth It?
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
A dynamic programming methodology for managing prerecorded VBR sources in packet-switched networks.
Telecommun. Syst., 1998

High-performance prefetching protocols for VBR prerecorded video.
IEEE Netw., 1998

Improving the WWW: Caching or Multicast?
Comput. Networks, 1998

A Decentralized Prefetching Protocol for VBR Video on Demand.
Proceedings of the Multimedia Applications, Services and Techniques, 1998

1997
Implementation of Monte Carlo Integration for the Analysis of Product-Form Queueing Networks.
Perform. Evaluation, 1997

Call Admission for Prerecorded Sources with Packet Loss.
IEEE J. Sel. Areas Commun., 1997

A Join--the--Shortest--Queue Prefetching Protocol for VBR Video on Demand.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
Video-on-Demand Over ATM: Constant-Rate Transmission and Transport.
IEEE J. Sel. Areas Commun., 1996

1995
Analytic Models for Separable Statistical Multiplexing.
Proceedings of the Data Communications and their Performance, 1995

1994
Asymptotic analysis for closed multiclass queueing networks in critical usage.
Queueing Syst. Theory Appl., 1994

Monte Carlo Summation and Integration Applied to Multiclass Queuing Networks.
J. ACM, 1994

1993
Computing approximate blocking probabilities for large loss networks with state-dependent routing.
IEEE/ACM Trans. Netw., 1993

Asymptotically Optimal Importance Sampling for Product-Form Queuing Networks.
ACM Trans. Model. Comput. Simul., 1993

Fast Algorithms for Generating Discrete Random Variates with Changing Distributions.
ACM Trans. Model. Comput. Simul., 1993

Reduced load approximations for multirate loss networks.
IEEE Trans. Commun., 1993

On Routing in ATM Networks.
Proceedings of the Modelling and Performance Evaluation of ATM Technology, 1993

1992
Variability Sensitive Markov Decision Processes.
Math. Oper. Res., 1992

Performance modeling of heterogeneous data networks.
Ann. Oper. Res., 1992

Performance of FDDI Under Overload.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1991
On Nonblocking Multirate Interconnection Networks.
SIAM J. Comput., 1991

Performance Modeling and Optimization of Networks of Bridged LANs.
Queueing Syst. Theory Appl., 1991

Multichain Markov Decision Processes with a Sample Path Constraint: A Decomposition Approach.
Math. Oper. Res., 1991

Optimal Load Balancing and Scheduling in a Distributed Computer System.
J. ACM, 1991

Performance Modeling and Optimization of Interconnected Ethernets.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

1990
Monotonicity properties for the stochastic knapsack.
IEEE Trans. Inf. Theory, 1990

Algorithms to determine exact blocking probabilities for multirate tree networks.
IEEE Trans. Commun., 1990

Solving product form stochastic networks with Monte Carlo summation.
Proceedings of the 22th Winter Simulation Conference, 1990

1989
Optimal circuit access policies in an ISDN environment: a Markov decision approach.
IEEE Trans. Commun., 1989

The stochastic knapsack problem.
IEEE Trans. Commun., 1989

Markov Decision Processes with Sample Path Constraints: The Communicating Case.
Oper. Res., 1989

Randomized and Past-Dependent Policies for Markov Decision Processes with Multiple Constraints.
Oper. Res., 1989

1987
On the Optimal Control of Two Queues with Server Setup Times and its Analysis.
SIAM J. Comput., 1987

1986
Optimal dynamic routing in Markov queueing networks.
Autom., 1986

Optimal Multiplexing of Heterogeneous Traffic with Hard Constraint.
Proceedings of the 1986 ACM SIGMETRICS joint international conference on Computer performance modelling, 1986


  Loading...