Wing Cheong Lau

Orcid: 0000-0003-1179-7855

Affiliations:
  • Chinese University of Hong Kong


According to our database1, Wing Cheong Lau authored at least 118 papers between 1992 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimal Resource Efficiency with Fairness in Heterogeneous GPU Clusters.
CoRR, 2024

Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Cloud Configuration Optimization for Recurring Batch-Processing Applications.
IEEE Trans. Parallel Distributed Syst., May, 2023

GTEA: Inductive Representation Learning on Temporal Interaction Graphs via Temporal Edge Aggregation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

PROS-C: Accelerating Random Orthogonal Search for Global Optimization Using Crossover.
Proceedings of the Machine Learning, Optimization, and Data Science, 2023

PERT-GNN: Latency Prediction for Microservice-based Cloud-Native Applications via Graph Neural Networks.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Violin: Virtual Overbridge Linking for Enhancing Semi-supervised Learning on Graphs with Limited Labels.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Multi Resource Scheduling with Task Cloning in Heterogeneous Clusters.
Proceedings of the 51st International Conference on Parallel Processing, 2022

Online Resource Optimization for Elastic Stream Processing with Regret Guarantee.
Proceedings of the 51st International Conference on Parallel Processing, 2022

GraphAdaMix: Enhancing Node Representations with Graph Adaptive Mixtures.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

CoCoS: Enhancing Semi-supervised Learning on Graphs with Unlabeled Data via Contrastive Context Sharing.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Missing Data Recovery in Large Power Systems Using Network Embedding.
IEEE Trans. Smart Grid, 2021

Optimal Job Scheduling With Resource Packing for Heterogeneous Servers.
IEEE/ACM Trans. Netw., 2021

Scalable Detection of Promotional Website Defacements in Black Hat SEO Campaigns.
Proceedings of the 30th USENIX Security Symposium, 2021

An Empirical Study on Mobile Payment Credential Leaks and Their Exploits.
Proceedings of the Security and Privacy in Communication Networks, 2021

Graph Representation Learning with Adaptive Mixtures.
Proceedings of the 2021 International Conference on Data Mining, 2021

Temporal Graph Representation Learning for Detecting Anomalies in E-payment Systems.
Proceedings of the 2021 International Conference on Data Mining, 2021

Breaking and Fixing Third-Party Payment Service for Mobile Apps.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Online Resource Allocation With Machine Variability: A Bandit Perspective.
IEEE/ACM Trans. Netw., 2020

GTEA: Representation Learning for Temporal Interaction Graphs via Edge Aggregation.
CoRR, 2020

Application-Oriented Free Data in Cellular Networks.
IEEE Access, 2020

Combinatorial Multi-Armed Bandits with Concave Rewards and Fairness Constraints.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Accordia: Adaptive Cloud Configuration Optimization for Recurring Data-Intensive Applications.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Online Job Scheduling with Redundancy and Opportunistic Checkpointing: A Speedup-Function-Based Analysis.
IEEE Trans. Parallel Distributed Syst., 2019

Identifying Illicit Accounts in Large Scale E-payment Networks - A Graph Representation Learning Approach.
CoRR, 2019

Revisiting SRPT for Job Scheduling in Computing Clusters.
Proceedings of the Queueing Theory and Network Applications, 2019

Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Online Job Scheduling with Resource Packing on a Cluster of Heterogeneous Servers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Pricing the Volume-Based Data Services in Cellular Wireless Markets.
IEEE Trans. Netw. Serv. Manag., 2018

Robust and Fast Decoding of High-Capacity Color QR Codes for Mobile Applications.
IEEE Trans. Image Process., 2018

Temporal Modeling of Information Diffusion using MASEP: Multi-Actor Self-Exciting Processes.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.
Proceedings of the 27th USENIX Security Symposium, 2018

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Mitigating Service Variability in MapReduce Clusters via Task Cloning: A Competitive Analysis.
IEEE Trans. Parallel Distributed Syst., 2017

Optimization for Speculative Execution in Big Data Processing Clusters.
IEEE Trans. Parallel Distributed Syst., 2017

Selective Free Data Access to Cellular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysis.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Volume-based pricing with guaranteed data rate.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Predicting Retweet Behavior in Online Social Networks Based on Locally Available Information.
Proceedings of the Social Informatics - 8th International Conference, 2016

Towards robust color recovery for high-capacity color QR codes.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Accelerating graph mining algorithms via uniform random edge sampling.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Channel-Oblivious Counting Algorithms for Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Optimization for speculative execution in a MapReduce-like cluster.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

DPCP: A protocol for optimal pull coordination in decentralized social networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Task-Cloning Algorithms in a MapReduce Cluster with Competitive Performance Bounds.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

AuthPaper: Protecting paper-based documents and credentials using Authenticated 2D barcodes.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Solving Large Graph Problems in MapReduce-Like Frameworks via Optimized Parameter Configuration.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Graph Property Preservation under Community-Based Sampling.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
SNSAPI: A Cross-Platform Middleware for Rapid Deployment of Decentralized Social Networks.
CoRR, 2014

Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection.
CoRR, 2014

Demo: AuthPaper - protecting paper-based documents/credentials using authenticated 2D barcodes.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Scalable and robust community detection via Proximity-based Cut and Merge.
Proceedings of the IEEE International Conference on Communications, 2014

Community classification in decentralized social networks using local topological information.
Proceedings of the IEEE Global Communications Conference, 2014

Application impersonation: problems of OAuth and API design in online social networks.
Proceedings of the second ACM conference on Online social networks, 2014

Speculative Execution for a Single Job in a MapReduce-Like System.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
FRASA: Feedback Retransmission Approximation for the Stability Region of Finite-User Slotted ALOHA.
IEEE Trans. Inf. Theory, 2013

A Survey and Taxonomy of Graph Sampling.
CoRR, 2013

PIXS: programmable intelligence for cross-platform socialization.
Proceedings of the 5th ACM workshop on Hot topics in planet-scale measurement, 2013

Social relationship classification based on interaction data from smartphones.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Resource optimization for speculative execution in a MapReduce Cluster.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Community classification on Decentralized Social Networks based on 2-hop neighbourhood information.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Design and evaluation of RFID counting algorithms under time-correlated channels.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Performance analysis of an adaptive, energy-efficient MAC protocol for wireless sensor networks.
J. Parallel Distributed Comput., 2012

Localized Algorithm of Community Detection on Large-Scale Decentralized Social Networks
CoRR, 2012

VECADS: Vehicular Context-Aware Downstream Scheduling for Drive-Thru Internet.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

2011
Analytical Models and Performance Evaluation of Drive-thru Internet Systems.
IEEE J. Sel. Areas Commun., 2011

Enhancing distributed traffic monitoring via traffic digest splitting.
Comput. Networks, 2011

RFID tag counting over lossy wireless channels.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Hitchbot - Delivering Malicious URLs via Social Hitch-Hiking.
Proceedings of the Global Communications Conference, 2011

2010
Partial Interference and Its Performance Impact on Wireless Multiple Access Networks.
EURASIP J. Wirel. Commun. Netw., 2010

RFID Counting over Unreliable Radio Channels - the Capture-Recapture Approach.
Proceedings of IEEE International Conference on Communications, 2010

Detecting Anomalous Web Browsing via Diffusion Wavelets.
Proceedings of IEEE International Conference on Communications, 2010

Session Reliability and Capacity Allocation in Dynamic Spectrum Access Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Identifying RFID tag categories in linear time.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

Modeling resource sharing for a road-side access point supporting drive-thru internet.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

Opportunistic Routing with Directional Antennas in Wireless Mesh Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Fast RFID Counting under Unreliable Radio Channels.
Proceedings of IEEE International Conference on Communications, 2009

2008
An Empirical Study on the Capacity and Performance of 3G Networks.
IEEE Trans. Mob. Comput., 2008

An Analysis of Opportunistic Routing in Wireless Mesh Network.
Proceedings of IEEE International Conference on Communications, 2008

Link Restoration in Cognitive Radio Networks.
Proceedings of IEEE International Conference on Communications, 2008

Empirical Performance of IPv6 vs. IPv4 under a Dual-Stack Environment.
Proceedings of IEEE International Conference on Communications, 2008

Performance Modeling of Epidemic Routing with Heterogeneous Node Types.
Proceedings of IEEE International Conference on Communications, 2008

Impact of Handoff Control Messages on VoIP over Wireless LAN System Capacity.
Proceedings of the European Wireless 2008, 2008

2007
An Energy-Efficient and Receiver-Driven MAC Protocol for Wireless Sensor Networks.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Forwarding and Replication Strategies for DTN with Resource Constraints.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Stability of Finite-User Slotted ALOHA Under Partial Interference in Wireless Mesh Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

An Empirical Study on 3G Network Capacity and Performance.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Anonymous Tracking Using RFID Tags.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

CAPEL: A Packet Discard Policy for Real-Time Traffic Over Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2007

Characterizing and Exploiting Partial Interference in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2007

DATALITE: a distributed architecture for traffic analysis via light-weight traffic digest.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks.
IEEE Trans. Dependable Secur. Comput., 2006

ALPi: A DDoS Defense System for High-Speed Networks.
IEEE J. Sel. Areas Commun., 2006

Performance Evaluation of Differentiated Services Mechanisms Over Wireless Sensor Networks.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

2005
Adaptive sleeping and awakening protocol (ASAP) for energy efficient adhoc sensor networks.
Proceedings of IEEE International Conference on Communications, 2005

2004
Efficient Packet Scheduling Using Channel Adaptive Fair Queueing in Distributed Mobile Computing Systems.
Mob. Networks Appl., 2004

Channel adaptive fair queueing for scheduling integrated voice and data services in multicode CDMA systems.
Comput. Commun., 2004

PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Transient performance of PacketScore for blocking DDoS attacks.
Proceedings of IEEE International Conference on Communications, 2004

2003
Managed virtual private LAN services.
Bell Labs Tech. J., 2003

On channel-adaptive fair multiple access control.
Proceedings of IEEE International Conference on Communications, 2003

2002
Channel capacity fair queueing in wireless networks: issues and a new algorithm.
Proceedings of the IEEE International Conference on Communications, 2002

Inter-domain router placement and traffic engineering.
Proceedings of the IEEE International Conference on Communications, 2002

Analysis of UMTS radio link control.
Proceedings of the Global Telecommunications Conference, 2002

2001
A measurement-based congestion alarm for self-similar traffic.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Sojourn-time analysis on nodal congestion in broadband networks.
Comput. Networks, 2000

1999
A unified ABR flow control approach for multiple-stage ingress/egress-queueing ATM switches.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
QoS routing and performance in packet networks: A visual simulation platform and case study.
Bell Labs Tech. J., 1998

Designing IP networks with performance guarantees.
Bell Labs Tech. J., 1998

1997
Statistical multiplexing and buffer sharing in multimedia high-speed networks a frequency-domain perspective.
IEEE/ACM Trans. Netw., 1997

Traffic distortion and inter-source cross-correlation in high-speed integrated networks.
Comput. Networks ISDN Syst., 1997

1996
Sojourn-Time Analysis on Nodal Congestion in Broadband Networks and Its Impact on QoS Specifications.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

1993
Traffic Analysis in Large-Scale High-Speed Integrated Networks: Validation of Nodal Decomposition Approach.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993

1992
An Object-Oriented Class Library for Scalable Parallel Heuristic Search.
Proceedings of the ECOOP '92, European Conference on Object-Oriented Programming, Utrecht, The Netherlands, June 29, 1992


  Loading...