John C. S. Lui

ORCID: 0000-0001-7466-0384
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Advanced Bandit Algorithms Research
  • Complex Network Analysis Techniques
  • Advanced Data Storage Technologies
  • Network Traffic and Congestion Control
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection
  • Auction Theory and Applications
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Optimization and Search Problems
  • Advanced Graph Neural Networks
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • Data Stream Mining Techniques
  • Mobile Ad Hoc Networks
  • Software-Defined Networks and 5G
  • Recommender Systems and Techniques
  • Advanced Queuing Theory Analysis
  • Advanced Malware Detection Techniques
  • Mobile Crowdsensing and Crowdsourcing
  • Advanced Wireless Network Optimization
  • Game Theory and Applications
  • Opinion Dynamics and Social Influence

Chinese University of Hong Kong
2016-2025

Harbin Electric Corporation (China)
2025

University of Wisconsin–Stout
2022

Tsinghua University
2020

Bell (Canada)
2018

University of Kentucky
2018

Purdue University West Lafayette
2018

Osaka University
2018

University of California, Riverside
2018

University of California, Santa Barbara
2018

P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, provide a platform for scalable content distribution, as long there is interest content. P2P-based video-on-demand (P2P-VoD) new challenge technology. Unlike live content, P2P-VoD has less synchrony in users sharing video therefore it much more difficult to alleviate loading at same time maintaining performance. To compensate, small storage...

10.1145/1402946.1403001 article EN ACM SIGCOMM Computer Communication Review 2008-08-17

P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, provide a platform for scalable content distribution, as long there is interest content. P2P-based video-on-demand (P2P-VoD) new challenge technology. Unlike live content, P2P-VoD has less synchrony in users sharing video therefore it much more difficult to alleviate loading at same time maintaining performance. To compensate, small storage...

10.1145/1402958.1403001 article EN 2008-08-17

We can now outsource data backups off-site to third-party cloud storage services so as reduce management costs. However, we must provide security guarantees for the outsourced data, which is maintained by third parties. design and implement FADE, a secure overlay system that achieves fine-grained, policy-based access control file assured deletion. It associates files with policies, assuredly deletes make them unrecoverable anyone upon revocations of policies. To achieve such goals, FADE...

10.1109/tdsc.2012.49 article EN IEEE Transactions on Dependable and Secure Computing 2012-07-03

Smartphones and mobile devices are rapidly becoming indispensable for many users. Unfortunately, they also become fertile grounds hackers to deploy malware. There is an urgent need have a "security analytic & forensic system" which can facilitate analysts examine, dissect, associate correlate large number of applications. An effective system needs address the following questions: How automatically collect manage high volume malware? analyze zero-day suspicious application, compare or it with...

10.1109/trustcom.2013.25 preprint EN 2013-07-01

Mobile edge computing (MEC) and device-to-device (D2D) offloading are two promising paradigms in the industrial Internet of Things (IIoT). In this article, we investigate task co-offloading, where computing-intensive tasks can be offloaded to MEC servers via cellular links or nearby IIoT devices D2D links. This co-offloading delivers small computation delay while avoiding network congestion. However, erratic movements, selfish nature incomplete information bring inherent challenges....

10.1109/tii.2022.3158974 article EN IEEE Transactions on Industrial Informatics 2022-03-15

Ethereum, a blockchain, supports its own cryptocurrency named Ether and smart contracts. Although more than 8M contracts have been deployed on little is known about the characteristics of users, contracts, relationships among them. We conduct first systematic study Ethereum by leveraging graph analysis to characterize three major activities namely money transfer, contract creation, invocation. collect all transaction data, construct graphs from data via analysis, discover new insights....

10.1145/3381036 article EN ACM Transactions on Internet Technology 2020-04-17

In device to (D2D) aided mobile edge computing (MEC) networks, by implementing content caching and D2D links, the server nearby devices can provide task offloading platforms. For parallel tasks, proper decisions on help reduce delay energy consumption. However, what is often ignored in previous works joint optimization of caching. this paper, we aim find optimal strategies, so as minimize The minimization problem formulated a multi-objective problem, concerning both offloading. an integer...

10.1109/tmc.2022.3199876 article EN IEEE Transactions on Mobile Computing 2022-01-01

Vehicular edge computing (VEC) provides an effective task offloading paradigm by pushing cloud resources to the vehicular network edges, e.g., road side units (RSUs). However, overloaded RSUs are likely occur especially in urban aggregation areas, possibly leading greatly compromised performance. Inspired this, this paper explores situation introducing unmanned aerial vehicle (UAV) address VEC overload problem. Specifically, we formulate a novel online UAV-assisted problem minimize delay...

10.1109/tmc.2023.3259394 article EN IEEE Transactions on Mobile Computing 2023-03-20

As mobile shopping has gradually become the mainstream mode, recommendation systems are gaining an increasingly wide adoption. Existing mainly based on explicit and implicit user behaviors. However, these behaviors may not directly indicate users' inner feelings, causing erroneous preference estimation thus leading to inaccurate recommendations. Inspired by our key observation correlation between pupil size we consider using change of when browsing model preferences, so as achieve targeted...

10.1109/jiot.2022.3181607 article EN IEEE Internet of Things Journal 2022-06-09

Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server. The basic mechanism is server under stress to install router throttle selected upstream routers. can be the leaky-bucket rate which forward packets destined Hence, before aggressive converge overwhelm server, participating routers proactively regulate contributing packet rates more moderate levels, thus forestalling impending attack....

10.1109/tnet.2004.842221 article EN IEEE/ACM Transactions on Networking 2005-02-01

Distributed virtual environment (DVE) systems model and simulate the activities of thousands entities interacting in a world over wide area network. Possible applications for DVE are multiplayer video games, military industrial trainings, collaborative engineering. In general, system is composed many servers each server responsible to manage multiple clients who want participate world. Each receives updates from different (such as current position orientation client) then delivers this...

10.1109/71.993202 article EN IEEE Transactions on Parallel and Distributed Systems 2002-03-01

Conventional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Therefore, users can easily obtain information without themselves contributing any or to a P2P community. This leads the well known free-riding problem. Consequently, most of requests are directed towards small number nodes which willing share service, causing "tragedy commons." The aim this paper is in network based on amount services each node has provided Since nodes' prior...

10.1109/tnet.2006.882904 article EN IEEE/ACM Transactions on Networking 2006-10-01

P2P streaming tries to achieve scalability (like file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well understood. In this paper, we describe simple stochastic model that can be used compare different data-driven downloading strategies based on two performance metrics: continuity (probability of continuous playback), startup latency (expected start playback). We first study strategies: rarest greedy. The former well-known...

10.1109/icnp.2007.4375853 article EN 2007-10-01

Recently, there has been a growing interest of using network coding to improve the performance wireless networks, for example, authors proposed practical system called COPE, which demonstrated throughput gain achieved by coding. However, COPE two fundamental limitations: (1) opportunity is crucially dependent on established routes and (2) structure in limited within two-hop region only. The aim this paper overcome these limitations. In particular, we propose DCAR, distributed coding-aware...

10.1109/tmc.2009.160 article EN IEEE Transactions on Mobile Computing 2009-09-01

While the practical coding scheme has been shown to be able improve throughput of wireless networks, there still lacks fundamental understanding on how works under realistic settings, namely, when it operates a physical layer and medium access is controlled by some random methods. In this paper, we provide formal analysis performance such settings. The key measure encoding number, i.e., number packets that can encoded node in each transmission. We an upper bound for general topology, derive...

10.1109/infocom.2008.83 article EN 2008-04-01

Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize profit. Peering based on views and settlements, while expedient, encourage selfish routing strategies discriminatory interconnections. From a more global perspective, such settlements reduce aggregate profits, limit stability of routes, discourage potentially useful peering/connectivity arrangements, thereby unnecessarily balkanizing...

10.1109/tnet.2010.2049205 article EN IEEE/ACM Transactions on Networking 2010-05-26

Mobile operating systems like Android failed to provide sufficient protection on personal data, and privacy leakage becomes a major concern. To understand the security risks leakage, analysts have carry out data-flow analysis. In 2014, upgraded with fundamentally new design known as RunTime (ART) environment in 5.0. ART adopts ahead-of-time compilation strategy replaces previous virtual-machine-based Dalvik. Unfortunately, many analysis TaintDroid were designed for legacy Dalvik environment....

10.1145/2976749.2978343 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Compared with executing Network Functions (NFs) on dedicated hardwares, the recent trend of Function Virtualization (NFV) holds promise for operators to flexibly deploy software-based NFs commodity servers. However, virtual (VNFs) are normally "chained" together provide a specific network service. Thus, an efficient scheme is needed place VNF chains across and effectively schedule requests service instances, which can maximize average resource utilization each node in simultaneously minimize...

10.1109/icdcs.2017.232 article EN 2017-06-01

Modern storage systems use thousands of inexpensive disks to meet the requirement applications. To enhance data availability, some form redundancy is used. For example, conventional RAID-5 provide availability for single disk failure only, while recent advanced coding techniques such as row-diagonal parity (RDP) can with up two failures. reduce probability unavailability, whenever a fails, recovery (or rebuild) will be carried out. We show that scheme RDP code inefficient and suboptimal. In...

10.1145/1811039.1811054 article EN 2010-06-14

Cloud storage is an emerging service model that enables individuals and enterprises to outsource the of data backups remote cloud providers at a low cost. However, clients must enforce security guarantees their outsourced backups. We present Fade Version, secure backup system serves as layer on top today's services. Version follows standard version-controlled design, which eliminates redundant across different versions On this, applies cryptographic protection Specifically, it fine-grained...

10.1109/icppw.2011.17 article EN 2011-09-01

Android, the most popular mobile OS, has around 78% of market share. Due to its popularity, it attracts many malware attacks. In fact, people have discovered 1 million new samples per quarter, and was reported that over 98% these are in fact "derivatives" (or variants) from existing families. this paper, we first show runtime behaviors malware's core functionalities similar within a family. Hence, propose framework combine "runtime behavior" with "static structures" detect variants. We...

10.1109/tifs.2016.2646641 article EN IEEE Transactions on Information Forensics and Security 2016-12-29
Coming Soon ...