Defending against flooding-based distributed denial-of-service attacks: a tutorial RKC Chang IEEE communications magazine 40 (10), 42-51, 2002 | 825 | 2002 |
Measuring the quality of experience of HTTP video streaming RKP Mok, EWW Chan, RKC Chang 12th IFIP/IEEE international symposium on integrated network management (IM …, 2011 | 659 | 2011 |
QDASH: a QoE-aware DASH system RKP Mok, X Luo, EWW Chan, RKC Chang Proceedings of the 3rd multimedia systems conference, 11-22, 2012 | 486 | 2012 |
On a new class of pulsing denial-of-service attacks and the defense. X Luo, RKC Chang NDSS, 2005 | 269 | 2005 |
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci NDSS 11, 2011 | 229 | 2011 |
Inferring the QoE of HTTP video streaming from user-viewing activities RKP Mok, EWW Chan, X Luo, RKC Chang Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011 | 202 | 2011 |
TCP covert timing channels: Design and detection X Luo, EWW Chan, RKC Chang 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 104 | 2008 |
Inbound traffic engineering for multihomed ASs using AS path prepending RKC Chang, M Lo IEEE network 19 (2), 18-25, 2005 | 61 | 2005 |
Cloak: A ten-fold way for reliable covert communications X Luo, EWW Chan, RKC Chang Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 60 | 2007 |
Engineering of a global defense infrastructure for DDoS attacks KKK Wan, RKC Chang Proceedings 10th IEEE International Conference on Networks (ICON 2002 …, 2002 | 59 | 2002 |
Anomaly detection of network traffic based on wavelet packet J Gao, G Hu, X Yao, RKC Chang 2006 Asia-Pacific Conference on Communications, 1-5, 2006 | 58 | 2006 |
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring. X Luo, EWW Chan, RKC Chang USENIX Annual Technical Conference, 2009 | 57 | 2009 |
Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks Y Tang, X Luo, Q Hui, RKC Chang IEEE transactions on information forensics and security 9 (3), 339-353, 2013 | 56 | 2013 |
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals X Luo, EWW Chan, RKC Chang EURASIP Journal on Advances in Signal Processing 2009, 1-13, 2009 | 55 | 2009 |
Centralized PSM: an AP-centric power saving mode for 802.11 infrastructure networks Y Xie, X Luo, RKC Chang 2009 IEEE Sarnoff Symposium, 1-5, 2009 | 49 | 2009 |
Teaching computer networking with the help of personal computer networks RKC Chang Proceedings of the 9th annual SIGCSE conference on Innovation and technology …, 2004 | 47 | 2004 |
Exposing invisible timing-based traffic watermarks with BACKLIT X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 46 | 2011 |
On the accuracy of smartphone-based mobile network measurement W Li, RKP Mok, D Wu, RKC Chang 2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015 | 45 | 2015 |
Detecting low-quality workers in QoE crowdtesting: A worker behavior-based approach RKP Mok, RKC Chang, W Li IEEE Transactions on Multimedia 19 (3), 530-543, 2016 | 40 | 2016 |
Posterior fossa syndrome in children following tumor resection: Knowledge update N Gadgil, D Hansen, J Barry, R Chang, S Lam Surgical neurology international 7 (Suppl 6), S179, 2016 | 40 | 2016 |