selected scholarly activity
-
chapters
- Preventing Text Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key. Lecture Notes in Computer Science. 612-626. 2023
- Delay Management in Wireless Ad Hoc Networks. 311-331. 2009
- Security in Wireless Ad Hoc Networks. 391-425. 2009
-
conferences
- Utility-Preserving Face Anonymization via Differentially Private Feature Operations. IEEE Infocom. Proceedings. 2279-2288. 2024
- Revisit Linear Transformation for Image Privacy in Machine Learning. 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). 156-162. 2023
- Rethinking Label Refurbishment: Model Robustness under Label Noise. Proceedings of the 37th AAAI Conference on Artificial Intelligence, AAAI 2023. 15000-15008. 2023
- An Ensemble Model for Combating Label Noise. Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining. 608-617. 2022
- Noise Attention Learning: Enhancing Noise Robustness by Gradient Scaling. Advances in Neural Information Processing Systems. 2022
- SELC: Self-Ensemble Label Correction Improves Learning with Noisy Labels. IJCAI International Joint Conference on Artificial Intelligence. 3278-3284. 2022
- MixNN: Combating Noisy Labels in Deep Learning by Mixing with Nearest Neighbors. 2021 IEEE International Conference on Big Data (Big Data). 847-856. 2021
- CryptoEyes: Privacy Preserving Classification over Encrypted Images. IEEE Infocom. Proceedings. 2021
- VideoLoc: Video-based Indoor Localization with Text Information. IEEE Infocom. Proceedings. 2021
- Tag Pollution Detection in Web Videos via Cross-Modal Relevance Estimation. 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS). 2020
- Few-Shot Learning of Video Action Recognition Only Based on Video Contents. 2020 IEEE Winter Conference on Applications of Computer Vision (WACV). 584-593. 2020
- VidAnomaly: LSTM-Autoencoder-Based Adversarial Learning for One-Class Video Classification With Multiple Dynamic Images. 2019 IEEE International Conference on Big Data (Big Data). 2881-2890. 2019
- Dynamic Partition Forest: An Efficient and Distributed Indexing Scheme for Similarity Search based on Hashing. 2018 IEEE International Conference on Big Data (Big Data). 1059-1064. 2018
- DVD: Constructing a Discriminative Video Descriptor by Convolving Frame Features. 2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM). 2018
- Random Draw Forest: A Salient Index for Similarity Search Over Multimedia Data. 2018 IEEE Fourth International Conference on Multimedia Big Data (BigMM). 2018
- Naxos: A Named Data Networking Consensus Protocol. 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). 986-991. 2018
- Towards Update-Efficient and Parallel-Friendly Content-Based Indexing Scheme in Cloud Computing. International Journal of Semantic Computing. 191-213. 2018
- Privacy aware web services in the cloud. 2017 IEEE Conference on Communications and Network Security (CNS). 458-466. 2017
- A RST-based stateful data analytics within spark. 2017 IEEE 16th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC). 394-399. 2017
- Boosting The Benefits of Hybrid SDN. Distributed Computing Systems. 2165-2170. 2017
- Enhancing the effectiveness of traffic engineering in hybrid SDN. 2013 National Conference on Communications, NCC 2013. 2017
- A Content-Based Indexing Scheme for Large-Scale Unstructured Data. 2017 IEEE Third International Conference on Multimedia Big Data (BigMM). 205-212. 2017
- Consistent replication protocol for Named Data Networking. Proceedings - International Conference on Network Protocols, ICNP. 2016
- Redactor: Reconcile network control with declarative control programs In SDN. Proceedings - International Conference on Network Protocols, ICNP. 2016
- An Empirical Study of the Textual Content of Online Videos. International Journal of Semantic Computing. 323-346. 2016
- Achieving Consistent SDN Control With Declarative Applications. Proceedings of the 2016 ACM SIGCOMM Conference. 585-586. 2016
- An Empirical Study of the Textual Content of Online Videos. 2016 IEEE Second International Conference on Multimedia Big Data (BigMM). 287-294. 2016
- CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud. IEEE Infocom. Proceedings. 2016
- Cupid: Congestion-free consistent data plane update in software defined networks. IEEE Infocom. Proceedings. 2016
- SafeCam: Analyzing intersection-related driver behaviors using multi-sensor smartphones. 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 2016
- Network intrusion detection and prevention middlebox management in SDN. IEEE International Performance, Computing and Communications Conference, Proceedings. 2015
- ScalaSEM: Scalable validation of SDN design with deployable code. IEEE International Performance, Computing and Communications Conference, Proceedings. 2015
- Marlin: Taming the big streaming data in large scale video similarity search. 2015 IEEE International Conference on Big Data (Big Data). 1755-1764. 2015
- Cloud-assisted distributed private data sharing. Proceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics. 202-211. 2015
- I know what you did on your smartphone: Inferring app usage over encrypted data traffic. 2015 IEEE Conference on Communications and Network Security (CNS). 433-441. 2015
- PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing. Proceedings of the International Conference on Parallel Processing Workshops. 111-119. 2015
- A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation. 2015 3rd International Conference on Future Internet of Things and Cloud. 145-149. 2015
- Deco: False data detection and correction framework for participatory sensing. 2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS). 213-218. 2015
- M2SDN: Achieving multipath and multihoming in data centers with software defined networking. 2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS). 11-20. 2015
- SmartEye: Real-time and efficient cloud image sharing for disaster environments. IEEE Infocom. Proceedings. 2015
- (MSDN)-S-2: Achieving Multipath and Multihoming in Data Centers with Software Defined Networking. 2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS). 11-20. 2015
- NetMaster: Taming Energy Devourers on Smartphones. Proceedings of the International Conference on Parallel Processing Workshops. 301-310. 2014
- Generic Composite Counting in RFID Systems. Distributed Computing Systems. 597-606. 2014
- Necklace: An efficient cuckoo hashing scheme for cloud storage services. IEEE International Workshop on Quality of Service, IWQoS. 153-158. 2014
- Detecting collusive cheating in online shopping systems through characteristics of social networks. IEEE Infocom. Proceedings. 311-316. 2014
- Towards adaptive continuous scanning in large-scale RFID systems. IEEE Infocom. Proceedings. 486-494. 2014
- An efficient sampling method for characterizing points of interests on maps. Proceedings - International Conference on Data Engineering. 1012-1023. 2014
- WiLoVe: A WiFi-coverage based Location Verification System in LBS. Procedia Computer Science. 484-491. 2014
- Why application errors drain battery easily?. Proceedings of the Workshop on Power-Aware Computing and Systems. 1-5. 2013
- Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers. Distributed Computing Systems. 416-424. 2012
- Data perturbation with state-dependent noise for participatory sensing. IEEE Infocom. Proceedings. 2246-2254. 2012
- Enhancing privacy in participatory sensing applications with multidimensional data. 2012 IEEE International Conference on Pervasive Computing and Communications. 144-152. 2012
- HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay design. IEEE Infocom. Proceedings. 1233-1241. 2012
- Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks. 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. 691-696. 2011
- Inferring users' online activities through traffic analysis. Proceedings of the fourth ACM conference on Wireless network security. 59-69. 2011
- Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping. Distributed Computing Systems. 593-602. 2011
- End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach. Distributed Computing Systems. 47-56. 2011
- A Reservation-based Smart Parking System. 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 690-695. 2011
- KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. IEEE Infocom. Proceedings. 2024-2032. 2011
- Anycast routing in mobile opportunistic networks. Proceedings - International Symposium on Computers and Communications. 599-604. 2010
- Message propagation in ad-hoc-based proximity mobile social networks. 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). 141-146. 2010
- Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability. Distributed Computing Systems. 2010
- ChainFarm: A novel authentication protocol for high-rate any source probabilistic broadcast. 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. 264-273. 2009
- GreenCloud. Proceedings of the 6th international conference industry session on Autonomic computing and communications industry session. 29-38. 2009
- A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation. Distributed Computing Systems. 14-+. 2009
- Challenges Towards Elastic Power Management in Internet Data Centers. Distributed Computing Systems. 65-+. 2009
- Optimizing File Retrieval in Delay-Tolerant Content Distribution Community. Distributed Computing Systems. 308-+. 2009
- ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic Broadcast. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009). 435-444. 2009
- CORPS: Event-driven mobility model for first responders in incident scene. MILCOM 2008 - 2008 IEEE Military Communications Conference. 743-+. 2008
- iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks. MILCOM 2008 - 2008 IEEE Military Communications Conference. 4071-+. 2008
- A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. Distributed Computing Systems. 489-494. 2008
- Incident Scene Mobility Analysis. 2008 IEEE Conference on Technologies for Homeland Security. 257-+. 2008
- DoS-resistant broadcast authentication protocol with low end-to-end delay. IEEE Infocom. Proceedings. 1-6. 2008
- Energy-aware server provisioning and load dispatching for connection-intensive internet services. 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008. 337-350. 2008
- Requirements and System Architecture Design Consideration for First Responder Systems. 2007 IEEE Conference on Technologies for Homeland Security. 39-+. 2007
- Active Queue Management design using discrete-event control. Proceedings of the IEEE Conference on Decision and Control. 3407-+. 2007
- Active queue management design using discrete-event control. Proceedings of the IEEE Conference on Decision and Control. 3806-3811. 2007
- PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks. IEEE Infocom. Proceedings. 2045-+. 2007
- SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07). 201-+. 2007
- Experimental Validation of Middleware-based QoS Control in 802.11 Wireless Networks. 2006 3rd International Conference on Broadband Communications, Networks and Systems. 608-+. 2006
- An integrated solution to delay and security support in wireless networks. IEEE Wireless Communications and Networking Conference, WCNC. 2211-2215. 2006
- Impact of Upper Layer Adaptation on End-to-end Delay Management in Wireless Ad Hoc Networks. Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS. 59-+. 2006
- Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cellphone Network Paradigm. Proceedings - Real-Time Systems Symposium. 3-14. 2005
- A feedback control scheme for resource allocation in wireless multi-hop ad hoc networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. 432-439. 2005
- Optimal QoS sampling frequency assignment for real-time wireless sensor networks. Proceedings - Real-Time Systems Symposium. 308-319. 2003
- Framework of decision support system for quality-oriented management. Proceedings of the IEEE International Conference on Intelligent Processing Systems, ICIPS. 1551-1555. 1998
-
journal articles
- CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network. Computer Journal. 66:1295-1309. 2023
- Generation of Coherent Multi-Sentence Texts with a Coherence Mechanism. Computer Speech and Language. 78:101457-101457. 2023
- Preventing Image Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key. Procedia Computer Science. 225:2723-2732. 2023
- Effective and Efficient Content Redundancy Detection of Web Videos. IEEE Transactions on Big Data. 7:187-198. 2021
- A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism. IEEE Access. 8:122709-122721. 2020
- A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning. CMES - Computer Modeling in Engineering and Sciences. 120:1-23. 2019
- A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN. IEEE Access. 7:83286-83296. 2019
- Dynamic Optimal Countermeasure Selection for Intrusion Response System. IEEE Transactions on Dependable and Secure Computing. 15:755-770. 2018
- A Fine-Grained Stateful Data Analytics Method Based on Resilient State Table. International Journal of Software Science and Computational Intelligence. 10:66-79. 2018
- PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing. IEEE Transactions on Mobile Computing. 16:2588-2598. 2017
- Compressive sensing based data quality improvement for crowd-sensing applications. Journal of Network and Computer Applications. 77:123-134. 2017
- Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems. IEEE/ACM Transactions on Networking. 24:3314-3325. 2016
- Guest Editorial: Special Issue on Cyber-Physical Systems and Services. IEEE Transactions on Services Computing. 9:172-173. 2016
- A novel information cascade model in online social networks. Physica A: Statistical Mechanics and its Applications. 444:297-310. 2016
- Efficiently Estimating Statistics of Points of Interests on Maps. IEEE Transactions on Knowledge and Data Engineering. 28:425-438. 2016
- End-to-end delay analysis for networked systems. Frontiers of Information Technology and Electronic Engineering. 16:732-743. 2015
- Rumor Identification in Microblogging Systems Based on Users’ Behavior. IEEE Transactions on Computational Social Systems. 2:99-108. 2015
- Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial]. IEEE Wireless Communications. 22:8-9. 2015
- Design and Implementation of Holistic Scheduling and Efficient Storage for FlexRay. IEEE Transactions on Parallel and Distributed Systems. 25:2529-2539. 2014
- Delay analysis in practical wireless network coding. Wireless Communications and Mobile Computing. 14:497-515. 2014
- A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare. IEEE Internet Computing. 18:10-15. 2014
- Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing. IEEE Transactions on Wireless Communications. 13:86-98. 2014
- Application and analysis of multidimensional negative surveys in participatory sensing applications. Pervasive and Mobile Computing. 9:372-391. 2013
- PDA. ACM transactions on sensor networks. 8:1-22. 2011
- Location Cheating: A Security Challenge to Location-Based Social Network Services. Distributed Computing Systems. abs/1102.4135:740-749. 2011
- EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts. Ad-Hoc and Sensor Wireless Networks. 11:93-110. 2011
- SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks. IEEE Transactions on Information Forensics and Security. 4:140-150. 2009
- McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems. International Journal of Computers, Communications and Control. 3:395-395. 2008
- End-to-end delay control of multimedia applications over multihop wireless links. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP). 5:1-20. 2008
- ORTEGA: An Efficient and Flexible Online Fault Tolerance Architecture for Real-Time Control Systems. IEEE Transactions on Industrial Informatics. 4:213-224. 2008
- Alert propagation in mobile ad hoc networks. Mobile Computing and Communications Review. 12:23-25. 2008
- MobileAds. ACM SIGBED Review. 5:1-2. 2008
- A scalable public key management scheme in wireless ad hoc networks. Mobile Computing and Communications Review. 11:69-70. 2007
- Optimal real-time sampling rate assignment for wireless sensor networks. ACM transactions on sensor networks. 2:263-295. 2006
- Generalized loop-back recovery in optical mesh networks. IEEE/ACM Transactions on Networking. 10:153-164. 2002
- Optimization models and simulation in acoustic warfare. Tsinghua Science and Technology. 39:72-75. 1999
- Framework of decision support system for quality-oriented production management. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS. 4:7-11. 1998