- Optimization and Search Problems
- Advanced Wireless Network Optimization
- Caching and Content Delivery
- Distributed and Parallel Computing Systems
- Peer-to-Peer Network Technologies
- Cloud Computing and Resource Management
- Complexity and Algorithms in Graphs
- Distributed systems and fault tolerance
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Network Traffic and Congestion Control
- Green IT and Sustainability
- Image and Video Quality Assessment
- Multimedia Communication and Technology
- Scheduling and Optimization Algorithms
- Real-Time Systems Scheduling
- Software-Defined Networks and 5G
- Advanced Bandit Algorithms Research
- IoT and Edge/Fog Computing
- Cooperative Communication and Network Coding
- Parallel Computing and Optimization Techniques
- Mobile Ad Hoc Networks
- Augmented Reality Applications
- Spam and Phishing Detection
- Internet Traffic Analysis and Secure E-voting
George Mason University
2013-2024
University of Shanghai for Science and Technology
2022
Michigan State University
2021
Anhui Polytechnic University
2021
Fujian Tobacco Industry Limited Liability Company (China)
2015
University of Minnesota
2015
In-Q-Tel
2008
University of North Texas
2008
Columbia University
2007
We introduce a cloud-enabled defense mechanism for Internet services against network and computational Distributed Denial-of-Service (DDoS) attacks. Our approach performs selective server replication intelligent client re-assignment, turning victim servers into moving targets attack isolation. novel system architecture that leverages "shuffling" to compute the optimal re-assignment strategy clients on attacked servers, effectively separating benign from even sophisticated adversaries...
An important issue in IP-based QoS networks is the effective management of packets at router level. Specifically, if arriving cannot all be stored a buffer, or have deadlines by which they must delivered, needs to identify that should dropped. In recent work, Kesselman et al. [6] propose model, called buffer with bounded delay, can thought as an online scheduling problem on single machine: arrive network switch and are size B. Each packet has positive weight deadline, representing value...
Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities thus they able choose when launch attacks wisely maximize damage. An unpredictable configuration can significantly lift bar for attackers conduct successful attacks. Recent years, moving target defense (MTD) has been advocated this purpose. MTD mechanism aims introduce dynamics through changing its continuously over time, which we call adaptations. Though...
As the Internet becomes more mature, there is a realization that improving performance of routers has potential to substantially improve in general. Currently, most forward packets First-In-First-Out (FIFO) order. However, diversity applications supported by modern IP-based networks resulted unpredictable packet flows, and heterogeneous network traffic. Thus, it becoming reasonable consider differentiating between different types packets, perhaps allowing specify deadline which must be...
With the ever-increasing P2P Internet traffic, recently much attention has been paid to topology mismatch between overlay and underlying network due large amount of cross-ISP traffic. Mainly focusing on BitTorrent-like file sharing systems, several recent studies have demonstrated how efficiently bridge by leveraging existing infrastructure, such as CDN services or developing new application-ISP interfaces, P4P. However, so far traffic locality in live streaming systems not well studied. In...
Receiving Internet streaming services on various mobile devices is getting more and popular. To understand better support delivery to devices, a number of studies have been conducted. However, existing mainly focused the client side resource consumption quality. So far, little known about server side, which key for providing successful services. In this work, we set investigate service at side. For purpose, collected one-month log (with 212 TB delivered video traffic) from top provider...
Model-based testing creates tests from abstract models of the software. These are often described as graphs, and test requirements defined sub paths in graphs. As a step toward creating concrete tests, complete (test) that include through graph generated. Each path is then transformed into test. If we can generate fewer shorter paths, cost be reduced. The minimum problem finding satisfy all with cost. This paper presents new algorithms to solve problem, data an empirical comparison. adapt...
Internet streaming applications are becoming increasingly popular on mobile devices. However, receiving services devices is often constrained by their limited battery power supply. Various techniques have been proposed to save consumption devices, mainly focusing how much data transmit and transmit.
Receiving Internet streaming services on various mobile devices is getting increasingly popular, and cloud platforms have also been gradually employed for delivering to devices. While a number of studies conducted at the client side understand characterize delivery, little known about server side, particularly recent cloud-based delivery. In this work, we aim investigate service side. For purpose, collected 4-month server-side log (with 1,002 TB delivered video traffic) from top provider...
Social Virtual Reality (VR) is regarded as one of the most popular VR applications since it transcends geographical barriers, allowing users to interact in simulated environments for various purposes. Despite its promising prospects, there a growing concern about harassment issue due immersive nature social compared other online environments. Existing protections against are highly limited terms practical effectiveness. The deficiency studies toward understanding and preventing further...
This article concerns an online packet scheduling problem that arises as a natural model for buffer management at network router. Packets arrive router integer time steps, and are buffered upon arrival. have non-negative weights deadlines (weakly) increasing in their arrival times. In each step, most one can be sent. The objective is to maximize the sum of packets sent by deadlines. main results include optimal (ϕ := (1 + √ 5)/2 ≈ 1.618)-competitive deterministic algorithm, (4/3...
P2P streaming applications are very popular on the Internet today. However, a mobile device in not only needs to continuously receive data from other peers for its playback, but also exchange control information (e.g., buffermaps and file chunk requests) with neighboring upload downloaded them. These lead excessive battery power consumption device.
The pervasive usage of mobile devices and wireless networking support have enabled more Internet stream- ing services to all kinds heterogeneous devices. However, streaming are challenged by the inherently limited on-device resources, device heterogeneity, bulk amount data.
Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by end-users, little known about the upper bounds achievable performance with available resources so that different designs could compare against. On other hand, current practice shown increasing demand server capacities in P2P-assisted systems order maintain high-quality end-users. Both and call for a design can optimally utilize peer resources. In paper, we first present new design, aiming...
IOT (Internet of Things) is a highly information-oriented technology which can achieve real-time status Information things by sensing devices. manages, coordinate and control through linking these devices communications network, dealing with intelligently. Design MES (Manufacturing Execution System) based on implements monitoring throughout the manufacturing process comprehensive management enterprises to implement "integrated control" truly. It significant perfect function, compensate lack MES.
The Internet has witnessed rapidly increasing streaming traffic to various mobile devices. In this paper, we find that for the popular iOS based devices, accessing services typically involves about 10% - 70% unnecessary redundant traffic. Such a practice not only overutilizes and wastes resources on server side network (cellular or Internet), but also consumes additional battery power users' devices leads possible monetary cost. To alleviate such situation without changing iOS, design...
Traditional Collaborative Filtering has been one of the most widely used recommender systems, unfortunately it suffers from cold-start and data sparsity problems. With development social networks, more recommendation systems are trying to generate eligible through excavating users' potential preferences using their relationships. Almost all employ only positive inter-user relations such as friendship or trust information. However, incorporating negative in not investigated thoroughly...