Rocky K. C. Chang
Orcid: 0000-0002-2648-5814Affiliations:
- Hong Kong Polytechnic University
According to our database1,
Rocky K. C. Chang
authored at least 91 papers
between 1998 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2019
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019
2018
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 9th ACM Multimedia Systems Conference, 2018
2017
IEEE Trans. Multim., 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the 15th Annual Workshop on Network and Systems Support for Games, 2017
2016
IEEE J. Sel. Areas Commun., 2016
CoRR, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement.
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
Proceedings of the 12th International on Conference on emerging Networking EXperiments and Technologies, 2016
2015
Proceedings of the Passive and Active Measurement - 16th International Conference, 2015
Proceedings of the 2015 International Workshop on Network and Systems Support for Games, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks.
IEEE Trans. Inf. Forensics Secur., 2014
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the Information Security - 17th International Conference, 2014
2013
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE J. Sel. Areas Commun., 2013
Comput. Secur., 2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the NETWORKING 2012, 2012
Proceedings of the Third Annual ACM SIGMM Conference on Multimedia Systems, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
2011
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of The ACM CoNEXT Student Workshop, 2011
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the Global Communications Conference, 2010
2009
EURASIP J. Adv. Signal Process., 2009
EURASIP J. Adv. Signal Process., 2009
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009
2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Critical Infrastructure Protection, 2007
Proceedings of the Workshop on Experimental Computer Science, 2007
Proceedings of the Computer Security, 2007
2006
Stability-constrained optimization for energy efficiency in polling-based wireless networks.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006
Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
IEEE Netw., 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the 13th International Symposium on Modeling, 2005
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
Proceedings of the 5th Internet Measurement Conference, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the 9th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2004
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004
2003
Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks.
SIGMETRICS Perform. Evaluation Rev., 2003
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003
2002
Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies.
Comput. Networks, 2002
IEEE Commun. Mag., 2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002
2001
IEEE Trans. Autom. Control., 2001
SIGMETRICS Perform. Evaluation Rev., 2001
J. Parallel Distributed Comput., 2001
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001
2000
Perform. Evaluation, 2000
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000
1998
An optimal end-to-end bypass configuration algorithm for self-heating VP-based ATM networks.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
Improving the performance of reconfigurable WDM lightwave networks with deflection routing via node reassignment.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998
Optimal node assignment in reconfigurable WDM lightwave networks with regular virtual topologies.
Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30, 1998