Xiaobo Ma
Orcid: 0000-0002-0934-5035
According to our database1,
Xiaobo Ma
authored at least 68 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Eliminating the impacts of traffic volume variation on before and after studies: a causal inference approach.
J. Intell. Transp. Syst., November, 2024
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures.
IEEE/ACM Trans. Netw., June, 2024
IEEE/ACM Trans. Netw., April, 2024
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Uncertainty-Aware Crime Prediction With Spatial Temporal Multivariate Graph Neural Networks.
CoRR, 2024
Large Language Models for Mobility in Transportation Systems: A Survey on Forecasting Tasks.
CoRR, 2024
TrafficGPT: Breaking the Token Barrier for Efficient Long Traffic Analysis and Generation.
CoRR, 2024
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization.
Proceedings of the IEEE INFOCOM 2024, 2024
2023
IEEE Trans. Syst. Man Cybern. Syst., April, 2023
Knowl. Based Syst., March, 2023
CoRR, 2023
On-ramp and Off-ramp Traffic Flows Estimation Based on A Data-driven Transfer Learning Framework.
CoRR, 2023
Comput. Secur., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
IEEE Trans. Software Eng., 2022
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.
IEEE/ACM Trans. Netw., 2022
Overlay-Based Android Malware Detection at Market Scales: Systematically Adapting to the New Technological Landscape.
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Instrum. Meas., 2022
Integration of Sentinel-1A, ALOS-2 and GF-1 Datasets for Identifying Landslides in the Three Parallel Rivers Region, China.
Remote. Sens., 2022
Discussion on InSAR Identification Effectivity of Potential Landslides and Factors That Influence the Effectivity.
Remote. Sens., 2022
CAAI Trans. Intell. Technol., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers.
IEEE Commun. Mag., 2021
Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting Attacks.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Future Gener. Comput. Syst., 2020
A Potential Game Approach to Multiple UAVs 3D Placement in Iot Communication Networks.
Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP), 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
RSS-Based Localization Using Bayesian Hierarchical Model with Spatially Correlated Shadow Fading.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
An Uncertainty-Based Traffic Training Approach to Efficiently Identifying Encrypted Proxies.
Proceedings of the 12th International Conference on Advanced Infocomm Technology, 2020
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020
2019
A Quantitative and Comparative Study of Network-Level Efficiency for Cloud Storage Services.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2019
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019
Int. J. Softw. Eng. Knowl. Eng., 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Secur. Commun. Networks, 2018
IEEE Intell. Syst., 2018
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
Inf. Sci., 2017
CoRR, 2017
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Satellite Remote Sensing-Based In-Season Diagnosis of Rice Nitrogen Status in Northeast China.
Remote. Sens., 2015
J. Netw. Comput. Appl., 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
2013
CoRR, 2013
Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013
2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2010
Proceedings of IEEE International Conference on Communications, 2010