Fei Li

ORCID: 0000-0001-8016-8716
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optimization and Search Problems
  • Advanced Wireless Network Optimization
  • Caching and Content Delivery
  • Distributed and Parallel Computing Systems
  • Peer-to-Peer Network Technologies
  • Cloud Computing and Resource Management
  • Complexity and Algorithms in Graphs
  • Distributed systems and fault tolerance
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Network Traffic and Congestion Control
  • Green IT and Sustainability
  • Image and Video Quality Assessment
  • Multimedia Communication and Technology
  • Scheduling and Optimization Algorithms
  • Real-Time Systems Scheduling
  • Software-Defined Networks and 5G
  • Advanced Bandit Algorithms Research
  • IoT and Edge/Fog Computing
  • Cooperative Communication and Network Coding
  • Parallel Computing and Optimization Techniques
  • Mobile Ad Hoc Networks
  • Augmented Reality Applications
  • Spam and Phishing Detection
  • Internet Traffic Analysis and Secure E-voting

George Mason University
2013-2024

University of Shanghai for Science and Technology
2022

Michigan State University
2021

Anhui Polytechnic University
2021

Fujian Tobacco Industry Limited Liability Company (China)
2015

University of Minnesota
2015

In-Q-Tel
2008

University of North Texas
2008

Columbia University
2007

We introduce a cloud-enabled defense mechanism for Internet services against network and computational Distributed Denial-of-Service (DDoS) attacks. Our approach performs selective server replication intelligent client re-assignment, turning victim servers into moving targets attack isolation. novel system architecture that leverages "shuffling" to compute the optimal re-assignment strategy clients on attacked servers, effectively separating benign from even sophisticated adversaries...

10.1109/dsn.2014.35 article EN 2014-06-01

An important issue in IP-based QoS networks is the effective management of packets at router level. Specifically, if arriving cannot all be stored a buffer, or have deadlines by which they must delivered, needs to identify that should dropped. In recent work, Kesselman et al. [6] propose model, called buffer with bounded delay, can thought as an online scheduling problem on single machine: arrive network switch and are size B. Each packet has positive weight deadline, representing value...

10.5555/1070432.1070544 article EN Symposium on Discrete Algorithms 2005-01-23

Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities thus they able choose when launch attacks wisely maximize damage. An unpredictable configuration can significantly lift bar for attackers conduct successful attacks. Recent years, moving target defense (MTD) has been advocated this purpose. MTD mechanism aims introduce dynamics through changing its continuously over time, which we call adaptations. Though...

10.1145/2995272.2995281 article EN 2016-10-24

As the Internet becomes more mature, there is a realization that improving performance of routers has potential to substantially improve in general. Currently, most forward packets First-In-First-Out (FIFO) order. However, diversity applications supported by modern IP-based networks resulted unpredictable packet flows, and heterogeneous network traffic. Thus, it becoming reasonable consider differentiating between different types packets, perhaps allowing specify deadline which must be...

10.5555/1283383.1283405 article EN Symposium on Discrete Algorithms 2007-01-07

With the ever-increasing P2P Internet traffic, recently much attention has been paid to topology mismatch between overlay and underlying network due large amount of cross-ISP traffic. Mainly focusing on BitTorrent-like file sharing systems, several recent studies have demonstrated how efficiently bridge by leveraging existing infrastructure, such as CDN services or developing new application-ISP interfaces, P4P. However, so far traffic locality in live streaming systems not well studied. In...

10.1109/icdcs.2009.50 article EN 2009-06-01

Receiving Internet streaming services on various mobile devices is getting more and popular. To understand better support delivery to devices, a number of studies have been conducted. However, existing mainly focused the client side resource consumption quality. So far, little known about server side, which key for providing successful services. In this work, we set investigate service at side. For purpose, collected one-month log (with 212 TB delivered video traffic) from top provider...

10.1109/infcom.2012.6195496 article EN 2012-03-01

Model-based testing creates tests from abstract models of the software. These are often described as graphs, and test requirements defined sub paths in graphs. As a step toward creating concrete tests, complete (test) that include through graph generated. Each path is then transformed into test. If we can generate fewer shorter paths, cost be reduced. The minimum problem finding satisfy all with cost. This paper presents new algorithms to solve problem, data an empirical comparison. adapt...

10.1109/icst.2012.108 article EN 2012-04-01

Internet streaming applications are becoming increasingly popular on mobile devices. However, receiving services devices is often constrained by their limited battery power supply. Various techniques have been proposed to save consumption devices, mainly focusing how much data transmit and transmit.

10.1145/2072298.2072360 article EN Proceedings of the 30th ACM International Conference on Multimedia 2011-11-28

Receiving Internet streaming services on various mobile devices is getting increasingly popular, and cloud platforms have also been gradually employed for delivering to devices. While a number of studies conducted at the client side understand characterize delivery, little known about server side, particularly recent cloud-based delivery. In this work, we aim investigate service side. For purpose, collected 4-month server-side log (with 1,002 TB delivered video traffic) from top provider...

10.1109/tpds.2012.324 article EN IEEE Transactions on Parallel and Distributed Systems 2012-12-28

Social Virtual Reality (VR) is regarded as one of the most popular VR applications since it transcends geographical barriers, allowing users to interact in simulated environments for various purposes. Despite its promising prospects, there a growing concern about harassment issue due immersive nature social compared other online environments. Existing protections against are highly limited terms practical effectiveness. The deficiency studies toward understanding and preventing further...

10.1109/vr58804.2024.00033 article EN 2024-03-16

This article concerns an online packet scheduling problem that arises as a natural model for buffer management at network router. Packets arrive router integer time steps, and are buffered upon arrival. have non-negative weights deadlines (weakly) increasing in their arrival times. In each step, most one can be sent. The objective is to maximize the sum of packets sent by deadlines. main results include optimal (ϕ := (1 + √ 5)/2 ≈ 1.618)-competitive deterministic algorithm, (4/3...

10.1145/2390176.2390181 article EN ACM Transactions on Algorithms 2012-12-01

P2P streaming applications are very popular on the Internet today. However, a mobile device in not only needs to continuously receive data from other peers for its playback, but also exchange control information (e.g., buffermaps and file chunk requests) with neighboring upload downloaded them. These lead excessive battery power consumption device.

10.1145/2072298.2072325 article EN Proceedings of the 30th ACM International Conference on Multimedia 2011-11-28

The pervasive usage of mobile devices and wireless networking support have enabled more Internet stream- ing services to all kinds heterogeneous devices. However, streaming are challenged by the inherently limited on-device resources, device heterogeneity, bulk amount data.

10.1145/1989240.1989250 article EN 2011-06-01

Though plenty of research has been conducted to improve Internet P2P streaming quality perceived by end-users, little known about the upper bounds achievable performance with available resources so that different designs could compare against. On other hand, current practice shown increasing demand server capacities in P2P-assisted systems order maintain high-quality end-users. Both and call for a design can optimally utilize peer resources. In paper, we first present new design, aiming...

10.1109/icdcs.2009.22 article EN 2009-06-01

IOT (Internet of Things) is a highly information-oriented technology which can achieve real-time status Information things by sensing devices. manages, coordinate and control through linking these devices communications network, dealing with intelligently. Design MES (Manufacturing Execution System) based on implements monitoring throughout the manufacturing process comprehensive management enterprises to implement "integrated control" truly. It significant perfect function, compensate lack MES.

10.1109/cyber.2015.7288019 article EN 2015-06-01

The Internet has witnessed rapidly increasing streaming traffic to various mobile devices. In this paper, we find that for the popular iOS based devices, accessing services typically involves about 10% - 70% unnecessary redundant traffic. Such a practice not only overutilizes and wastes resources on server side network (cellular or Internet), but also consumes additional battery power users' devices leads possible monetary cost. To alleviate such situation without changing iOS, design...

10.1109/infcom.2013.6566773 article EN 2013-04-01

Traditional Collaborative Filtering has been one of the most widely used recommender systems, unfortunately it suffers from cold-start and data sparsity problems. With development social networks, more recommendation systems are trying to generate eligible through excavating users' potential preferences using their relationships. Almost all employ only positive inter-user relations such as friendship or trust information. However, incorporating negative in not investigated thoroughly...

10.1109/enic.2015.17 article EN 2015-09-01
Coming Soon ...