Z. Morley Mao

Orcid: 0000-0002-9844-2055

Affiliations:
  • University of Michigan, Ann Arbor, USA


According to our database1, Z. Morley Mao authored at least 236 papers between 2000 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to Internet security and performance".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FATH: Authentication-based Test-time Defense against Indirect Prompt Injection Attacks.
CoRR, 2024

Cocoon: Robust Multi-Modal Perception with Uncertainty-Aware Sensor Fusion.
CoRR, 2024

AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs.
CoRR, 2024

Compute Or Load KV Cache? Why Not Both?
CoRR, 2024

Safeguard is a Double-edged Sword: Denial-of-service Attack on Large Language Models.
CoRR, 2024

Eagle: Efficient Training-Free Router for Multi-LLM Inference.
CoRR, 2024

AutoSpec: Automated Generation of Neural Network Specifications.
CoRR, 2024

Adaptive Skeleton Graph Decoding.
CoRR, 2024

QUIC is not Quick Enough over Fast Internet.
Proceedings of the ACM on Web Conference 2024, 2024

The Case for Boosting Mobile Application QoE via Smart Band Switching in 5G/xG Networks.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

State Consistent Edge-enhanced Perception for Connected and Automated Vehicles.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures.
Proceedings of the 33rd USENIX Security Symposium, 2024

Boosting Collaborative Vehicular Perception on the Edge with Vehicle-to-Vehicle Communication.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024

Vulcan: Automatic Query Planning for Live ML Analytics.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

OASIS: Collaborative Neural-Enhanced Mobile Video Streaming.
Proceedings of the 15th ACM Multimedia Systems Conference, 2024

CloudEval-YAML: A Practical Benchmark for Cloud Configuration Generation.
Proceedings of the Seventh Annual Conference on Machine Learning and Systems, 2024

CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation.
Proceedings of the Computer Vision - ECCV 2024, 2024

Stealthy Data Fabrication in Collaborative Vehicular Perception.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024

2023
Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration.
IEEE Trans. Intell. Transp. Syst., September, 2023

Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion.
Trans. Mach. Learn. Res., 2023

You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Robust Real-time Multi-vehicle Collaboration on Asynchronous Sensors.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

VPA: Fully Test-Time Visual Prompt Adaptation.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Detecting Data Spoofing in Connected Vehicle based Intelligent Traffic Signal Control using Infrastructure-Side Sensors and Traffic Invariants.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023

Poster: QUIC is not Quick Enough over Fast Internet.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

A Critical Revisit of Adversarial Robustness in 3D Point Cloud Recognition with Diffusion-Driven Purification.
Proceedings of the International Conference on Machine Learning, 2023

LEO Satellite vs. Cellular Networks: Exploring the Potential for Synergistic Integration.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023

ADoPT: LiDAR Spoofing Attack Detection Based on Point-Level Temporal Consistency.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022
On the Cybersecurity of Traffic Signal Control System With Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition.
CoRR, 2022

A Cooperative Perception Environment for Traffic Operations and Control.
CoRR, 2022

Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions.
CoRR, 2022

Toward an Automated Learning Control Architecture for Cyber-Physical Manufacturing Systems.
IEEE Access, 2022

Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles.
Proceedings of the 31st USENIX Security Symposium, 2022

Vivisecting mobility management in 5G cellular networks.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022

Adversarial Unlearning of Backdoors via Implicit Hypergradient.
Proceedings of the Tenth International Conference on Learning Representations, 2022

A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness.
Proceedings of the Computer Vision - ECCV 2022, 2022

On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Robust Trajectory Prediction against Adversarial Attacks.
Proceedings of the Conference on Robot Learning, 2022

Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines.
CoRR, 2021

SkyCore: moving core to the edge for untethered and reliable UAV-based LTE networks.
Commun. ACM, 2021

Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

A variegated look at 5G in the wild: performance, power, and QoE implications.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

Adversarially Robust 3D Point Cloud Recognition Using Self-Supervisions.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

EMP: edge-assisted multi-vehicle perception.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Livelyzer: analyzing the first-mile ingest performance of live video streaming.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021

Sensor Adversarial Traits: Analyzing Robustness of 3D Object Detection Sensor Fusion Models.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

On Adversarial Robustness of 3D Point Cloud Classification under Adaptive Attacks.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
On the Adversarial Robustness of 3D Point Cloud Classification.
CoRR, 2020

Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control.
CoRR, 2020

Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures.
Proceedings of the 29th USENIX Security Symposium, 2020

What you see is what you get: measure ABR video streaming QoE via on-device screen recording.
Proceedings of the 30th ACM Workshop on Network and Operating Systems Support for Digital Audio and Video, 2020

MPBond: efficient network-level collaboration among personal mobile devices.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Automatic Feature Isolation in Network Protocol Software Implementations.
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020

CSI: inferring mobile ABR video adaptation behavior under HTTPS and QUIC.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

2019
Understanding the Networking Performance of Wear OS.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Towards Automated Safety Vetting of PLC Code in Real-World Plants.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

ADD: Application and Data-Driven Controller Design.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019

Leveraging Context-Triggered Measurements to Characterize LTE Handover Performance.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Poster: Experimental Evaluation of TCP Congestion Control over 60GHz WLAN.
Proceedings of the 11th on Wireless of the Students, 2019

Poster: Characterizing Performance and Power for mmWave 5G on Commodity Smartphones.
Proceedings of the 11th on Wireless of the Students, 2019

MP-H2: A Client-only Multipath Solution for HTTP/2.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

PerfProbe: a systematic, cross-layer performance diagnosis framework for mobile platforms.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

Egret: simplifying traffic management for physical and virtual network functions.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Production as a Service: A Digital Manufacturing Framework for Optimizing Utilization.
IEEE Trans Autom. Sci. Eng., 2018

Dragon: Scalable, Flexible, and Efficient Traffic Engineering in Software Defined ISP Networks.
IEEE J. Sel. Areas Commun., 2018

SoftBox: A Customizable, Low-Latency, and Scalable 5G Core Network Architecture.
IEEE J. Sel. Areas Commun., 2018

CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Pausing and Resuming Network Flows using Programmable Buffers.
Proceedings of the Symposium on SDN Research, 2018

Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

QoE Inference and Improvement Without End-Host Control.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

RENEW: Programmable and Observable Massive MIMO Networks.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms.
IEEE Robotics Autom. Lett., 2017

Push or Request: An Investigation of HTTP/2 Server Push for Improving Mobile Performance.
Proceedings of the 26th International Conference on World Wide Web, 2017

ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Demo: DEMS: DEcoupled Multipath Scheduler for Accelerating Multipath Transport.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Accelerating Multipath Transport Through Balanced Subflow Completion.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Towards secure and safe appified automated vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

Dissecting VOD services for cellular: performance, root causes and best practices.
Proceedings of the 2017 Internet Measurement Conference, 2017

Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

An Initial Investigation of Protocol Customization.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Production as a service: A centralized framework for small batch manufacturing.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Diagnosing Mobile Apps' Quality of Experience: Challenges and Promising Directions.
IEEE Internet Comput., 2016

MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks.
Proceedings of the Symposium on SDN Research, 2016

QoE Inference Without Application Control.
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016

Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

An in-depth understanding of multipath TCP on mobile devices: measurement and system design.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Understanding On-device Bufferbloat for Cellular Upload.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

The Misuse of Android Unix Domain Sockets and Security Implications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
ACM Trans. Internet Techn., 2015

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
IEEE Trans. Mob. Comput., 2015

Tango: Accelerating Mobile Applications through Flip-Flop Replication.
GetMobile Mob. Comput. Commun., 2015

suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure.
GetMobile Mob. Comput. Commun., 2015

Poster: Context-Triggered Mobile Network Measurement.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Demo: Mobilyzer: Mobile Network Measurement Made Easy.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Mobilyzer: An Open Platform for Controllable Mobile Network Measurements.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Accelerating Mobile Applications through Flip-Flop Replication.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Automatic generation of mobile app signatures from traffic observations.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

WACCO and LOKO: Strong Consistency at Global Scale.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture.
Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systems, 2015

2014
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones.
IEEE Internet Comput., 2014

Performance Analysis of Location Profile Routing.
CoRR, 2014

MCNet: Crowdsourcing wireless performance measurements through the eyes of mobile devices.
IEEE Commun. Mag., 2014

MobilityFirst: a mobility-centric and trustworthy internet architecture.
Comput. Commun. Rev., 2014

Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

FLOWR: a self-learning system for classifying mobileapplication traffic.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Diagnosing Path Inflation of Mobile Client Traffic.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks.
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

SoftMoW: A Dynamic and Scalable Software Defined Architecture for Cellular WANs.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET).
Proceedings of the 14th International Conference on New Interfaces for Musical Expression, 2014

Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Understanding RRC state dynamics through client measurements with mobilyzer.
Proceedings of the 6th annual workshop on Wireless of the students, 2014

Discovering fine-grained RRC state dynamics and performance impacts in cellular networks.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis.
Proceedings of the 2014 Internet Measurement Conference, 2014

SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

2013
An in-depth study of LTE: effect of network protocol and application behavior on performance.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

How to Reduce Smartphone Traffic Volume by 30%?
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

PROTEUS: network performance forecast for real-time, interactive mobile applications.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Panappticon: Event-based tracing to measure mobile application and platform performance.
Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, 2013

AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Periodic transfers in mobile applications: network-wide origin, impact, and optimization.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

COMET: Code Offload by Migrating Execution Transparently.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Web caching on smartphones: ideal vs. reality.
Proceedings of the 10th International Conference on Mobile Systems, 2012

A close examination of performance and power characteristics of 4G LTE networks.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Screen-off traffic characterization and optimization in 3G/4G networks.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Toward Software-Defined Cellular Networks.
Proceedings of the European Workshop on Software Defined Networking, 2012

ADEL: an automatic detector of energy leaks for smartphone applications.
Proceedings of the 10th International Conference on Hardware/Software Codesign and System Synthesis, 2012

Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Collaborative TCP sequence number inference attack: how to crack sequence number under a second.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Can deterministic replay be an enabling tool for mobile computing?
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Cellular data network infrastructure characterization and implication on mobile content placement.
Proceedings of the SIGMETRICS 2011, 2011

An untold story of middleboxes in cellular networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

Internet Censorship in China: Where Does the Filtering Occur?
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011

KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations.
Proceedings of the USENIX Workshop on Hot Topics in Management of Internet, 2011

AccuLoc: practical localization of performance measurements in 3G networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Demo: mobile application resource optimizer (ARO).
Proceedings of the 9th International Conference on Mobile Systems, 2011

Profiling resource usage for mobile applications: a cross-layer approach.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Using predictable mobility patterns to support scalable and secure MANETs of handheld devices.
Proceedings of the sixth international workshop on MobiArch, MobiArch '11, Bethesda, 2011

Contrail: Enabling Decentralized Social Networks on Smartphones.
Proceedings of the Middleware 2011, 2011

Identifying diverse usage behaviors of smartphone apps.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
iSPY: Detecting IP Prefix Hijacking on My Own.
IEEE/ACM Trans. Netw., 2010

DECOR: DEClarative network management and OpeRation.
Comput. Commun. Rev., 2010

Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

A case for unsupervised-learning-based spam filtering.
Proceedings of the SIGMETRICS 2010, 2010

On Network-level Clusters for Spam Detection.
Proceedings of the Network and Distributed System Security Symposium, 2010

On the Safety of Enterprise Policy Deployment.
Proceedings of the Network and Distributed System Security Symposium, 2010

Anatomizing application performance differences on smartphones.
Proceedings of the 8th International Conference on Mobile Systems, 2010

Cache contention and application performance prediction for multi-core systems.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2010

Characterizing radio resource allocation for 3G networks.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Location, location, location!: modeling data proximity in the cloud.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

Performance and power modeling in a multi-programmed multi-core environment.
Proceedings of the 47th Design Automation Conference, 2010

Declarative configuration management for complex and dynamic networks.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Accurate online power estimation and automatic battery behavior based power model generation for smartphones.
Proceedings of the 8th International Conference on Hardware/Software Codesign and System Synthesis, 2010

2009
ShadowNet: A Platform for Rapid and Safe Network Evolution.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009

Botnet spam campaigns can be long lasting: evidence, implications, and analysis.
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems, 2009

DECOR: DEClaritive network management and OpeRation.
Proceedings of the ACM SIGCOMM 2009 Workshop on Programmable Routers for Extensible Services of Tomorrow, 2009

Ensemble: Community-Based Anomaly Detection for Popular Applications.
Proceedings of the Security and Privacy in Communication Networks, 2009

Detecting traffic differentiation in backbone ISPs with NetPolice.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

TCP revisited: a fresh look at TCP in the wild.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

HC-BGP: A light-weight and flexible scheme for securing prefix ownership.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

PACMAN: a platform for automated and controlled network operations and configuration management.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
A Measurement Study of Internet Delay Asymmetry.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions.
Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, 2008

Effective Diagnosis of Routing Disruptions from End Systems.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Peeking into Spammer Behavior from a Unique Vantage Point.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Wide-Area IP Network Mobility.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Accurate Real-time Identification of IP Prefix Hijacking.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Understanding network delay changes caused by routing events.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

Towards automated network management: network operations using dynamic views.
Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, 2007

Automated Classification and Analysis of Internet Malware.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing.
Proceedings of the Network and Distributed System Security Symposium, 2007

MIDAS: An Impact Scale for DDoS attacks.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

A Framework for Measuring and Predicting the Impact of Routing Changes.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

On the impact of route monitor selection.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

A Firewall for Routers: Protecting against Routing Misbehavior.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Characterizing Dark DNS Behavior.
Proceedings of the Detection of Intrusions and Malware, 2007

Practical defenses against BGP prefix hijacking.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

Internet routing resilience to failures: analysis and implications.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

2006
Internet-scale malware mitigation: combining intelligence of the control and data plane.
Proceedings of the 2006 ACM Workshop on Rapid Malcode, 2006

Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies.
Proceedings of the 2006 USENIX Annual Technical Conference, 2006

A measurement study on the impact of routing events on end-to-end internet path performance.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Analyzing large DDoS attacks using multiple data sources.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006

On the impact of research network based testbeds on wide-area experiments.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Differentiated BGP Update Processing for Improved Routing Convergence.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
Guest editorial - Interdomain routing and the border gateway protocol.
IEEE Netw., 2005

On AS-level path inference.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

HLP: a next generation inter-domain routing protocol.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

Enriching Intrusion Alerts Through Multi-Host Causality.
Proceedings of the Network and Distributed System Security Symposium, 2005

A measurement study of Internet bottlenecks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

An Empirical Approach to Modeling Inter-AS Traffic Matrices.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
Toward understanding distributed blackhole placement.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Combining routing and traffic data for detection of IP forwarding anomalies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

IP forwarding anomalies and improving their detection using multiple data sources.
Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting, 2004

Locating internet bottlenecks: algorithms, measurements, and implications.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Locating internet routing instabilities.
Proceedings of the ACM SIGCOMM 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 30, 2004

Scalable and Accurate Identification of AS-level Forwarding Paths.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

BorderGuard: detecting cold potatoes from peers.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Efficient and robust streaming provisioning in VPNs.
Proceedings of the Twelfth International World Wide Web Conference, 2003

Towards an accurate AS-level traceroute tool.
Proceedings of the ACM SIGCOMM 2003 Conference on Applications, 2003

BGP beacons.
Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference, 2003

2002
Achieving service portability using self-adaptive data paths.
IEEE Commun. Mag., 2002

A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002

Route flap damping exacerbates internet routing convergence.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002


2001
The Ninja architecture for robust Internet-scale systems and services.
Comput. Networks, 2001

Network support for mobile multimedia using a self-adaptive distributed proxy.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2001

2000
ICEBERG: an Internet core network architecture for integrated communications.
IEEE Wirel. Commun., 2000


  Loading...