BibTeX records: George Kesidis

download as .bib file

@inproceedings{DBLP:conf/aaai/LiWHGK24,
  author       = {Xi Li and
                  Songhe Wang and
                  Ruiquan Huang and
                  Mahanth Gowda and
                  George Kesidis},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {Temporal-Distributed Backdoor Attack against Video Based Action Recognition},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {3199--3207},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i4.28104},
  doi          = {10.1609/AAAI.V38I4.28104},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/LiWHGK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-16492,
  author       = {Aakash Sharma and
                  Vivek M. Bhasi and
                  Sonali Singh and
                  George Kesidis and
                  Mahmut T. Kandemir and
                  Chita R. Das},
  title        = {{GPU} Cluster Scheduling for Network-Sensitive Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2401.16492},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.16492},
  doi          = {10.48550/ARXIV.2401.16492},
  eprinttype    = {arXiv},
  eprint       = {2401.16492},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-16492.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-02034,
  author       = {Xi Li and
                  Hang Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {Universal Post-Training Reverse-Engineering Defense Against Backdoors
                  in Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2402.02034},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.02034},
  doi          = {10.48550/ARXIV.2402.02034},
  eprinttype    = {arXiv},
  eprint       = {2402.02034},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-02034.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangMK23,
  author       = {Hang Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {Anomaly detection of adversarial examples using class-conditional
                  generative adversarial networks},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102956},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102956},
  doi          = {10.1016/J.COSE.2022.102956},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/questa/KesidisKZ23,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {Age of information using Markov-renewal methods},
  journal      = {Queueing Syst. Theory Appl.},
  volume       = {103},
  number       = {1-2},
  pages        = {95--130},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11134-022-09852-w},
  doi          = {10.1007/S11134-022-09852-W},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/questa/KesidisKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WangKDRECXMK23,
  author       = {Hang Wang and
                  Sahar Karami and
                  Ousmane Dia and
                  Hippolyt Ritter and
                  Ehsan Emamjomeh{-}Zadeh and
                  Jiahui Chen and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation
                  Learning},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing
                  {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICASSP49357.2023.10097244},
  doi          = {10.1109/ICASSP49357.2023.10097244},
  timestamp    = {Sun, 05 Nov 2023 16:51:21 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/WangKDRECXMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/SharmaBSJGMKKD23,
  author       = {Aakash Sharma and
                  Vivek M. Bhasi and
                  Sonali Singh and
                  Rishabh Jain and
                  Jashwant Raj Gunasekaran and
                  Subrata Mitra and
                  Mahmut Taylan Kandemir and
                  George Kesidis and
                  Chita R. Das},
  title        = {Stash: {A} Comprehensive Stall-Centric Characterization of Public
                  Cloud VMs for Distributed Deep Learning},
  booktitle    = {43rd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2023, Hong Kong, July 18-21, 2023},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDCS57875.2023.00023},
  doi          = {10.1109/ICDCS57875.2023.00023},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/SharmaBSJGMKKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/AlfaresK23,
  author       = {Nader Alfares and
                  George Kesidis},
  title        = {Container Sizing for Microservices with Dynamic Workload by Online
                  Optimization},
  booktitle    = {Proceedings of the 9th International Workshop on Container Technologies
                  and Container Clouds, WoC 2023, Bologna, Italy, December 11-15, 2023},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3631311.3632399},
  doi          = {10.1145/3631311.3632399},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/AlfaresK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/LiMXK23,
  author       = {Xi Li and
                  David J. Miller and
                  Zhen Xiang and
                  George Kesidis},
  editor       = {Danilo Comminiello and
                  Michele Scarpiniti},
  title        = {A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on
                  Classifiers},
  booktitle    = {33rd {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2023, Rome, Italy, September 17-20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MLSP55844.2023.10286008},
  doi          = {10.1109/MLSP55844.2023.10286008},
  timestamp    = {Mon, 06 Nov 2023 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/mlsp/LiMXK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-04617,
  author       = {Hang Wang and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Improved Activation Clipping for Universal Backdoor Mitigation and
                  Test-Time Detection},
  journal      = {CoRR},
  volume       = {abs/2308.04617},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.04617},
  doi          = {10.48550/ARXIV.2308.04617},
  eprinttype    = {arXiv},
  eprint       = {2308.04617},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-04617.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-09850,
  author       = {Xi Li and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Backdoor Mitigation by Correcting the Distribution of Neural Activations},
  journal      = {CoRR},
  volume       = {abs/2308.09850},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.09850},
  doi          = {10.48550/ARXIV.2308.09850},
  eprinttype    = {arXiv},
  eprint       = {2308.09850},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-09850.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-11070,
  author       = {Xi Li and
                  Songhe Wang and
                  Ruiquan Huang and
                  Mahanth Gowda and
                  George Kesidis},
  title        = {Temporal-Distributed Backdoor Attack Against Video Based Action Recognition},
  journal      = {CoRR},
  volume       = {abs/2308.11070},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.11070},
  doi          = {10.48550/ARXIV.2308.11070},
  eprinttype    = {arXiv},
  eprint       = {2308.11070},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-11070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-16827,
  author       = {Hang Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {Post-Training Overfitting Mitigation in {DNN} Classifiers},
  journal      = {CoRR},
  volume       = {abs/2309.16827},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.16827},
  doi          = {10.48550/ARXIV.2309.16827},
  eprinttype    = {arXiv},
  eprint       = {2309.16827},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-16827.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/questa/KesidisKZ22,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {In search of the least age of information},
  journal      = {Queueing Syst. Theory Appl.},
  volume       = {100},
  number       = {3-4},
  pages        = {465--467},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11134-022-09833-z},
  doi          = {10.1007/S11134-022-09833-Z},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/questa/KesidisKZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/XiangMK22,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Detection of Backdoors in Trained Classifiers Without Access to the
                  Training Set},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {33},
  number       = {3},
  pages        = {1177--1191},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNNLS.2020.3041202},
  doi          = {10.1109/TNNLS.2020.3041202},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/XiangMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/SonMGJKKU22,
  author       = {Myungjun Son and
                  Shruti Mohanty and
                  Jashwant Raj Gunasekaran and
                  Aman Jain and
                  Mahmut Taylan Kandemir and
                  George Kesidis and
                  Bhuvan Urgaonkar},
  title        = {Splice: An Automated Framework for Cost-and Performance-Aware Blending
                  of Cloud Services},
  booktitle    = {22nd {IEEE} International Symposium on Cluster, Cloud and Internet
                  Computing, CCGrid 2022, Taormina, Italy, May 16-19, 2022},
  pages        = {119--128},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCGrid54584.2022.00021},
  doi          = {10.1109/CCGRID54584.2022.00021},
  timestamp    = {Mon, 25 Jul 2022 16:20:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgrid/SonMGJKKU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/XiangMCLK22,
  author       = {Zhen Xiang and
                  David J. Miller and
                  Siheng Chen and
                  Xi Li and
                  George Kesidis},
  title        = {Detecting Backdoor Attacks against Point Cloud Classifiers},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022},
  pages        = {3159--3163},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICASSP43922.2022.9747194},
  doi          = {10.1109/ICASSP43922.2022.9747194},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/XiangMCLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LiXMK22,
  author       = {Xi Li and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural
                  Networks},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022},
  pages        = {3333--3337},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICASSP43922.2022.9746573},
  doi          = {10.1109/ICASSP43922.2022.9746573},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/LiXMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/XiangMK22,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack
                  Scenarios},
  booktitle    = {The Tenth International Conference on Learning Representations, {ICLR}
                  2022, Virtual Event, April 25-29, 2022},
  publisher    = {OpenReview.net},
  year         = {2022},
  url          = {https://openreview.net/forum?id=MSgB8D4Hy51},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/XiangMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/ChoiUKK22,
  author       = {Wonil Choi and
                  Bhuvan Urgaonkar and
                  Mahmut Taylan Kandemir and
                  George Kesidis},
  editor       = {Paolo Bellavista and
                  Kaiwen Zhang and
                  Abdelouahed Gherbi and
                  Saurabh Bagchi and
                  Marta Pati{\~{n}}o and
                  Giuseppe Di Modica and
                  Julien Gascon{-}Samson},
  title        = {Multi-resource fair allocation for consolidated flash-based caching
                  systems},
  booktitle    = {Middleware '22: 23rd International Middleware Conference, Quebec,
                  QC, Canada, November 7 - 11, 2022},
  pages        = {202--215},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528535.3565245},
  doi          = {10.1145/3528535.3565245},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/middleware/ChoiUKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08474,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack
                  Scenarios},
  journal      = {CoRR},
  volume       = {abs/2201.08474},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08474},
  eprinttype    = {arXiv},
  eprint       = {2201.08474},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-06900,
  author       = {Hang Wang and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Universal Post-Training Backdoor Detection},
  journal      = {CoRR},
  volume       = {abs/2205.06900},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.06900},
  doi          = {10.48550/ARXIV.2205.06900},
  eprinttype    = {arXiv},
  eprint       = {2205.06900},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-06900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-04594,
  author       = {Nader Alfares and
                  Ata F. Baarzi and
                  George Kesidis and
                  Aman Jain},
  title        = {IaaS Procurement by Simulated Annealing},
  journal      = {CoRR},
  volume       = {abs/2207.04594},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.04594},
  doi          = {10.48550/ARXIV.2207.04594},
  eprinttype    = {arXiv},
  eprint       = {2207.04594},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-04594.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-14344,
  author       = {Aakash Sharma and
                  Vivek M. Bhasi and
                  Sonali Singh and
                  Rishabh Jain and
                  Jashwant Raj Gunasekaran and
                  Subrata Mitra and
                  Mahmut Taylan Kandemir and
                  George Kesidis and
                  Chita R. Das},
  title        = {Analysis of Distributed Deep Learning in the Cloud},
  journal      = {CoRR},
  volume       = {abs/2208.14344},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.14344},
  doi          = {10.48550/ARXIV.2208.14344},
  eprinttype    = {arXiv},
  eprint       = {2208.14344},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-14344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-10272,
  author       = {Hang Wang and
                  Sahar Karami and
                  Ousmane Dia and
                  H. Ritter and
                  Ehsan Emamjomeh{-}Zadeh and
                  Jiahui Chen and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Training set cleansing of backdoor poisoning by self-supervised representation
                  learning},
  journal      = {CoRR},
  volume       = {abs/2210.10272},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.10272},
  doi          = {10.48550/ARXIV.2210.10272},
  eprinttype    = {arXiv},
  eprint       = {2210.10272},
  timestamp    = {Sun, 05 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-10272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiangMK21,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Reverse engineering imperceptible backdoor attacks on deep neural
                  networks for detection and training set cleansing},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102280},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102280},
  doi          = {10.1016/J.COSE.2021.102280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiangMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neco/XiangMWK21,
  author       = {Zhen Xiang and
                  David J. Miller and
                  Hang Wang and
                  George Kesidis},
  title        = {Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without
                  Access to the Training Set},
  journal      = {Neural Comput.},
  volume       = {33},
  number       = {5},
  pages        = {1329--1371},
  year         = {2021},
  url          = {https://doi.org/10.1162/neco\_a\_01376},
  doi          = {10.1162/NECO\_A\_01376},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neco/XiangMWK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/SharmaDKD21,
  author       = {Aakash Sharma and
                  Saravanan Dhakshinamurthy and
                  George Kesidis and
                  Chita R. Das},
  editor       = {Laurent Lef{\`{e}}vre and
                  Stacy Patterson and
                  Young Choon Lee and
                  Haiying Shen and
                  Shashikant Ilager and
                  Mohammad Goudarzi and
                  Adel Nadjaran Toosi and
                  Rajkumar Buyya},
  title        = {{CASH:} {A} Credit Aware Scheduling for Public Cloud Platforms},
  booktitle    = {21st {IEEE/ACM} International Symposium on Cluster, Cloud and Internet
                  Computing, CCGrid 2021, Melbourne, Australia, May 10-13, 2021},
  pages        = {227--236},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CCGrid51090.2021.00032},
  doi          = {10.1109/CCGRID51090.2021.00032},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgrid/SharmaDKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/BaarziK21,
  author       = {Ataollah Fatahi Baarzi and
                  George Kesidis},
  editor       = {Carlo Curino and
                  Georgia Koutrika and
                  Ravi Netravali},
  title        = {{SHOWAR:} Right-Sizing And Efficient Scheduling of Microservices},
  booktitle    = {SoCC '21: {ACM} Symposium on Cloud Computing, Seattle, WA, USA, November
                  1 - 4, 2021},
  pages        = {427--441},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3472883.3486999},
  doi          = {10.1145/3472883.3486999},
  timestamp    = {Sun, 31 Oct 2021 09:45:45 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/BaarziK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/BaarziKJS21,
  author       = {Ataollah Fatahi Baarzi and
                  George Kesidis and
                  Carlee Joe{-}Wong and
                  Mohammad Shahrad},
  editor       = {Carlo Curino and
                  Georgia Koutrika and
                  Ravi Netravali},
  title        = {On Merits and Viability of Multi-Cloud Serverless},
  booktitle    = {SoCC '21: {ACM} Symposium on Cloud Computing, Seattle, WA, USA, November
                  1 - 4, 2021},
  pages        = {600--608},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3472883.3487002},
  doi          = {10.1145/3472883.3487002},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/BaarziKJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/Xiang0K21,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {L-Red: Efficient Post-Training Detection of Imperceptible Backdoor
                  Attacks Without Access to the Training Set},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021},
  pages        = {3745--3749},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICASSP39728.2021.9414562},
  doi          = {10.1109/ICASSP39728.2021.9414562},
  timestamp    = {Thu, 08 Jul 2021 17:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/Xiang0K21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/Xiang0CLK21,
  author       = {Zhen Xiang and
                  David J. Miller and
                  Siheng Chen and
                  Xi Li and
                  George Kesidis},
  title        = {A Backdoor Attack against 3D Point Cloud Classifiers},
  booktitle    = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2021, Montreal, QC, Canada, October 10-17, 2021},
  pages        = {7577--7587},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCV48922.2021.00750},
  doi          = {10.1109/ICCV48922.2021.00750},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/Xiang0CLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-05808,
  author       = {Zhen Xiang and
                  David J. Miller and
                  Siheng Chen and
                  Xi Li and
                  George Kesidis},
  title        = {A Backdoor Attack against 3D Point Cloud Classifiers},
  journal      = {CoRR},
  volume       = {abs/2104.05808},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.05808},
  eprinttype    = {arXiv},
  eprint       = {2104.05808},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-05808.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08050,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {Age of information without service preemption},
  journal      = {CoRR},
  volume       = {abs/2104.08050},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08050},
  eprinttype    = {arXiv},
  eprint       = {2104.08050},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-11393,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {Age of information distribution under dynamic service preemption},
  journal      = {CoRR},
  volume       = {abs/2104.11393},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.11393},
  eprinttype    = {arXiv},
  eprint       = {2104.11393},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-11393.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-10101,
  author       = {Hang Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {Anomaly Detection of Test-Time Evasion Attacks using Class-conditional
                  Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/2105.10101},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.10101},
  eprinttype    = {arXiv},
  eprint       = {2105.10101},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-10101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13530,
  author       = {Xi Li and
                  David J. Miller and
                  Zhen Xiang and
                  George Kesidis},
  title        = {A {BIC} based Mixture Model Defense against Data Poisoning Attacks
                  on Classifiers},
  journal      = {CoRR},
  volume       = {abs/2105.13530},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13530},
  eprinttype    = {arXiv},
  eprint       = {2105.13530},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08473,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {Age of Information for Small Buffer Systems},
  journal      = {CoRR},
  volume       = {abs/2106.08473},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08473},
  eprinttype    = {arXiv},
  eprint       = {2106.08473},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08473.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-13124,
  author       = {Xi Li and
                  George Kesidis and
                  David J. Miller and
                  Maxime Bergeron and
                  Ryan Ferguson and
                  Vladimir Lucic},
  title        = {Robust and Active Learning for Deep Neural Network Regression},
  journal      = {CoRR},
  volume       = {abs/2107.13124},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.13124},
  eprinttype    = {arXiv},
  eprint       = {2107.13124},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-13124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02381,
  author       = {Xi Li and
                  George Kesidis and
                  David J. Miller and
                  Vladimir Lucic},
  title        = {Backdoor Attack and Defense for Deep Regression},
  journal      = {CoRR},
  volume       = {abs/2109.02381},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02381},
  eprinttype    = {arXiv},
  eprint       = {2109.02381},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-10354,
  author       = {Zhen Xiang and
                  David J. Miller and
                  Siheng Chen and
                  Xi Li and
                  George Kesidis},
  title        = {Detecting Backdoor Attacks Against Point Cloud Classifiers},
  journal      = {CoRR},
  volume       = {abs/2110.10354},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.10354},
  eprinttype    = {arXiv},
  eprint       = {2110.10354},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-10354.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-03350,
  author       = {Xi Li and
                  Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural
                  Networks},
  journal      = {CoRR},
  volume       = {abs/2112.03350},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.03350},
  eprinttype    = {arXiv},
  eprint       = {2112.03350},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-03350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/LiuJKALSMXKODS20,
  author       = {Weiqiang Liu and
                  Maximilian John and
                  Andreas Karrenbauer and
                  Adam Allerhand and
                  Fabrizio Lombardi and
                  Michael Shulte and
                  David J. Miller and
                  Zhen Xiang and
                  George Kesidis and
                  Antti Oulasvirta and
                  Niraj Ramesh Dayama and
                  Morteza Shiripour},
  title        = {Scanning the Issue},
  journal      = {Proc. {IEEE}},
  volume       = {108},
  number       = {3},
  pages        = {400--401},
  year         = {2020},
  url          = {https://doi.org/10.1109/JPROC.2020.2975522},
  doi          = {10.1109/JPROC.2020.2975522},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pieee/LiuJKALSMXKODS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/MillerXK20,
  author       = {David J. Miller and
                  Zhen Xiang and
                  George Kesidis},
  title        = {Adversarial Learning Targeting Deep Neural Network Classification:
                  {A} Comprehensive Review of Defenses Against Attacks},
  journal      = {Proc. {IEEE}},
  volume       = {108},
  number       = {3},
  pages        = {402--433},
  year         = {2020},
  url          = {https://doi.org/10.1109/JPROC.2020.2970615},
  doi          = {10.1109/JPROC.2020.2970615},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/MillerXK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/questa/KesidisKZ20,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {The distribution of age-of-information performance measures for message
                  processing systems},
  journal      = {Queueing Syst. Theory Appl.},
  volume       = {95},
  number       = {3},
  pages        = {203--250},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11134-020-09655-x},
  doi          = {10.1007/S11134-020-09655-X},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/questa/KesidisKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/KesidisK20,
  author       = {George Kesidis and
                  Takis Konstantopoulos},
  title        = {{TB/GI/1} queues with arrival traffic envelopes},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {48},
  number       = {2},
  pages        = {27--29},
  year         = {2020},
  url          = {https://doi.org/10.1145/3439602.3439613},
  doi          = {10.1145/3439602.3439613},
  timestamp    = {Fri, 04 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/KesidisK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LotfiSK20,
  author       = {Mohammad Hassan Lotfi and
                  Saswati Sarkar and
                  George Kesidis},
  title        = {Is Non-Neutrality Profitable for the Stakeholders of the Internet
                  Market?},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {4},
  pages        = {1435--1448},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2020.2981259},
  doi          = {10.1109/TNET.2020.2981259},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/LotfiSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dddas/LiMXK20,
  author       = {Xi Li and
                  David J. Miller and
                  Zhen Xiang and
                  George Kesidis},
  editor       = {Frederica Darema and
                  Erik Blasch and
                  Sai Ravela and
                  Alex Aved},
  title        = {A Scalable Mixture Model Based Defense Against Data Poisoning Attacks
                  on Classifiers},
  booktitle    = {Dynamic Data Driven Applications Systems - Third International Conference,
                  {DDDAS} 2020, Boston, MA, USA, October 2-4, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12312},
  pages        = {262--273},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61725-7\_31},
  doi          = {10.1007/978-3-030-61725-7\_31},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dddas/LiMXK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/BaarziKFS20,
  author       = {Ataollah Fatahi Baarzi and
                  George Kesidis and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Lorenzo Cavallaro and
                  Andrea Lanzi},
  title        = {Microservices made attack-resilient using unsupervised service fissioning},
  booktitle    = {Proceedings of the 13th European Workshop on Systems Security, EuroSec@EuroSys
                  2020, Heraklion, Greece, April 27, 2020},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3380786.3391395},
  doi          = {10.1145/3380786.3391395},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/BaarziKFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/XiangMK20,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Revealing Backdoors, Post-Training, in {DNN} Classifiers via Novel
                  Inference on Optimized Perturbations Inducing Group Misclassification},
  booktitle    = {2020 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2020, Barcelona, Spain, May 4-8, 2020},
  pages        = {3827--3831},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICASSP40776.2020.9054581},
  doi          = {10.1109/ICASSP40776.2020.9054581},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/XiangMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/ShanKJUKL20,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Aman Jain and
                  Bhuvan Urgaonkar and
                  Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris},
  title        = {Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Cloud},
  booktitle    = {Proceedings of the 6th International Workshop on Container Technologies
                  and Container Clouds, WOC@Middleware 2020, Delft, The Netherlands,
                  December 07-11, 2020},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3429885.3429962},
  doi          = {10.1145/3429885.3429962},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/ShanKJUKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/JainBKUAK20,
  author       = {Aman Jain and
                  Ata F. Baarzi and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Nader Alfares and
                  Mahmut T. Kandemir},
  editor       = {Dilma Da Silva and
                  R{\"{u}}diger Kapitza},
  title        = {SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and
                  IaaS},
  booktitle    = {Middleware '20: 21st International Middleware Conference, Delft, The
                  Netherlands, December 7-11, 2020},
  pages        = {236--250},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3423211.3425695},
  doi          = {10.1145/3423211.3425695},
  timestamp    = {Tue, 15 Dec 2020 14:01:23 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/JainBKUAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/Xiang0WK20,
  author       = {Zhen Xiang and
                  David J. Miller and
                  Hang Wang and
                  George Kesidis},
  title        = {Revealing Perceptible Backdoors in DNNs, Without the Training Set,
                  via the Maximum Achievable Misclassification Fraction Statistic},
  booktitle    = {30th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2020, Espoo, Finland, September 21-24, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/MLSP49062.2020.9231861},
  doi          = {10.1109/MLSP49062.2020.9231861},
  timestamp    = {Mon, 26 Oct 2020 17:35:16 +0100},
  biburl       = {https://dblp.org/rec/conf/mlsp/Xiang0WK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-04561,
  author       = {Aakash Sharma and
                  Saravanan Dhakshinamurthy and
                  George Kesidis and
                  Chita R. Das},
  title        = {{CASH:} {A} Credit Aware Scheduling for Public Cloud Platforms},
  journal      = {CoRR},
  volume       = {abs/2009.04561},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.04561},
  eprinttype    = {arXiv},
  eprint       = {2009.04561},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-04561.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-07489,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural
                  Networks for Detection and Training Set Cleansing},
  journal      = {CoRR},
  volume       = {abs/2010.07489},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.07489},
  eprinttype    = {arXiv},
  eprint       = {2010.07489},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-07489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-09987,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {{L-RED:} Efficient Post-Training Detection of Imperceptible Backdoor
                  Attacks without Access to the Training Set},
  journal      = {CoRR},
  volume       = {abs/2010.09987},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.09987},
  eprinttype    = {arXiv},
  eprint       = {2010.09987},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-09987.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/LeivadeasKIL19,
  author       = {Aris Leivadeas and
                  George Kesidis and
                  Mohamed Ibnkahla and
                  Ioannis Lambadaris},
  title        = {{VNF} Placement Optimization at the Edge and Cloud \({}^{\mbox{{\textdagger}}}\)},
  journal      = {Future Internet},
  volume       = {11},
  number       = {3},
  pages        = {69},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11030069},
  doi          = {10.3390/FI11030069},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/LeivadeasKIL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeenl/Khamse-AshariLK19,
  author       = {Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers},
  journal      = {{IEEE} Netw. Lett.},
  volume       = {1},
  number       = {1},
  pages        = {34--37},
  year         = {2019},
  url          = {https://doi.org/10.1109/lnet.2019.2893532},
  doi          = {10.1109/LNET.2019.2893532},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeenl/Khamse-AshariLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neco/MillerWK19,
  author       = {David J. Miller and
                  Yujia Wang and
                  George Kesidis},
  title        = {When Not to Classify: Anomaly Detection of Attacks {(ADA)} on {DNN}
                  Classifiers at Test Time},
  journal      = {Neural Comput.},
  volume       = {31},
  number       = {8},
  pages        = {1624--1670},
  year         = {2019},
  url          = {https://doi.org/10.1162/neco\_a\_01209},
  doi          = {10.1162/NECO\_A\_01209},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neco/MillerWK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/GunasekaranTKUK19,
  author       = {Jashwant Raj Gunasekaran and
                  Prashanth Thinakaran and
                  Mahmut Taylan Kandemir and
                  Bhuvan Urgaonkar and
                  George Kesidis and
                  Chita R. Das},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {Spock: Exploiting Serverless Functions for {SLO} and Cost Aware Resource
                  Procurement in Public Cloud},
  booktitle    = {12th {IEEE} International Conference on Cloud Computing, {CLOUD} 2019,
                  Milan, Italy, July 8-13, 2019},
  pages        = {199--208},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CLOUD.2019.00043},
  doi          = {10.1109/CLOUD.2019.00043},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/GunasekaranTKUK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/JainBAKUK19,
  author       = {Aman Jain and
                  Ata F. Baarzi and
                  Nader Alfares and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Mahmut T. Kandemir},
  title        = {SpIitServe: Efficiently Splitting Complex Workloads Across FaaS and
                  IaaS},
  booktitle    = {Proceedings of the {ACM} Symposium on Cloud Computing, SoCC 2019,
                  Santa Cruz, CA, USA, November 20-23, 2019},
  pages        = {487},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357223.3366027},
  doi          = {10.1145/3357223.3366027},
  timestamp    = {Tue, 19 May 2020 13:51:06 +0200},
  biburl       = {https://dblp.org/rec/conf/cloud/JainBAKUK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/Wang0K19,
  author       = {Yujia Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {When Not to Classify: Detection of Reverse Engineering Attacks on
                  {DNN} Image Classifiers},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019},
  pages        = {8063--8066},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICASSP.2019.8682578},
  doi          = {10.1109/ICASSP.2019.8682578},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/Wang0K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/Kesidis19,
  author       = {George Kesidis},
  title        = {Overbooking Lambda Functions in the Cloud},
  booktitle    = {Proceedings of the 5th International Workshop on Container Technologies
                  and Container Clouds, WOC@Middleware 2019, Davis, CA, USA, December
                  09-13, 2019},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3366615.3368351},
  doi          = {10.1145/3366615.3368351},
  timestamp    = {Tue, 12 Nov 2019 12:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/Kesidis19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/Xiang0K19,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural
                  Network Classifiers And {A} Novel Defense},
  booktitle    = {29th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MLSP.2019.8918908},
  doi          = {10.1109/MLSP.2019.8918908},
  timestamp    = {Thu, 12 Dec 2019 12:15:35 +0100},
  biburl       = {https://dblp.org/rec/conf/mlsp/Xiang0K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-09842,
  author       = {George Kesidis},
  title        = {Temporal Overbooking of Lambda Functions in the Cloud},
  journal      = {CoRR},
  volume       = {abs/1901.09842},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.09842},
  eprinttype    = {arXiv},
  eprint       = {1901.09842},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-09842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-05924,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Michael A. Zazanis},
  title        = {The distribution of age-of-information performance measures for message
                  processing systems},
  journal      = {CoRR},
  volume       = {abs/1904.05924},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.05924},
  eprinttype    = {arXiv},
  eprint       = {1904.05924},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-05924.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-06292,
  author       = {David J. Miller and
                  Zhen Xiang and
                  George Kesidis},
  title        = {Adversarial Learning in Statistical Classification: {A} Comprehensive
                  Review of Defenses Against Attacks},
  journal      = {CoRR},
  volume       = {abs/1904.06292},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.06292},
  eprinttype    = {arXiv},
  eprint       = {1904.06292},
  timestamp    = {Fri, 26 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-06292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-07641,
  author       = {George Kesidis and
                  Bhuvan Urgaonkar and
                  Mahmut T. Kandemir and
                  Takis Konstantopoulos},
  title        = {A caching system with object sharing},
  journal      = {CoRR},
  volume       = {abs/1905.07641},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.07641},
  eprinttype    = {arXiv},
  eprint       = {1905.07641},
  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-07641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-10498,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Revealing Backdoors, Post-Training, in {DNN} Classifiers via Novel
                  Inference on Optimized Perturbations Inducing Group Misclassification},
  journal      = {CoRR},
  volume       = {abs/1908.10498},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.10498},
  eprinttype    = {arXiv},
  eprint       = {1908.10498},
  timestamp    = {Fri, 30 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-10498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-08032,
  author       = {George Kesidis and
                  David J. Miller},
  title        = {Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz
                  Margin p-Values for Deep Neural Network Classifiers},
  journal      = {CoRR},
  volume       = {abs/1910.08032},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.08032},
  eprinttype    = {arXiv},
  eprint       = {1910.08032},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-08032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-07970,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Revealing Perceptible Backdoors, without the Training Set, via the
                  Maximum Achievable Misclassification Fraction Statistic},
  journal      = {CoRR},
  volume       = {abs/1911.07970},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.07970},
  eprinttype    = {arXiv},
  eprint       = {1911.07970},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-07970.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/Khamse-AshariKL18,
  author       = {Jalal Khamse{-}Ashari and
                  George Kesidis and
                  Ioannis Lambadaris and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {Constrained max-min fair scheduling of variable-length packet-flows
                  to multiple servers},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {73},
  number       = {3-4},
  pages        = {219--237},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12243-017-0599-y},
  doi          = {10.1007/S12243-017-0599-Y},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/Khamse-AshariKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LinLKV18,
  author       = {Ying{-}Dar Lin and
                  Yuan{-}Cheng Lai and
                  George Kesidis and
                  Athanasios V. Vasilakos},
  title        = {Guest Editorial Special Issue on Traffic Forensics: Systems, Tools,
                  and Experimentations},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {1},
  pages        = {7--9},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2017.2783458},
  doi          = {10.1109/JSYST.2017.2783458},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LinLKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taas/WangUKGCB18,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  George Kesidis and
                  Aayush Gupta and
                  Lydia Y. Chen and
                  Robert Birke},
  title        = {Effective Capacity Modulation as an Explicit Control Knob for Public
                  Cloud Profitability},
  journal      = {{ACM} Trans. Auton. Adapt. Syst.},
  volume       = {13},
  number       = {1},
  pages        = {2:1--2:25},
  year         = {2018},
  url          = {https://doi.org/10.1145/3139291},
  doi          = {10.1145/3139291},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taas/WangUKGCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/Khamse-AshariLK18,
  author       = {Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous
                  Servers},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {29},
  number       = {12},
  pages        = {2686--2699},
  year         = {2018},
  url          = {https://doi.org/10.1109/TPDS.2018.2841915},
  doi          = {10.1109/TPDS.2018.2841915},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/Khamse-AshariLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/FleckSKNSK18,
  author       = {Daniel Fleck and
                  Angelos Stavrou and
                  George Kesidis and
                  Neda Nasiriani and
                  Yuquan Shan and
                  Takis Konstantopoulos},
  title        = {Moving-Target Defense Against Botnet Reconnaissance and an Adversarial
                  Coupon-Collection Model},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625162},
  doi          = {10.1109/DESEC.2018.8625162},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/FleckSKNSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eenergy/NasirianiKW18,
  author       = {Neda Nasiriani and
                  George Kesidis and
                  Di Wang},
  editor       = {Hartmut Schmeck and
                  Veit Hagenmeyer},
  title        = {Public Cloud Differential Pricing Design Under Provider and Tenants
                  Joint Demand Response},
  booktitle    = {Proceedings of the Ninth International Conference on Future Energy
                  Systems, e-Energy 2018, Karlsruhe, Germany, June 12-15, 2018},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3208903.3208938},
  doi          = {10.1145/3208903.3208938},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eenergy/NasirianiKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/Khamse-AshariLK18,
  author       = {Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for
                  Self-Organizing Servers},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8647675},
  doi          = {10.1109/GLOCOM.2018.8647675},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/Khamse-AshariLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/NasirianiK18,
  author       = {Neda Nasiriani and
                  George Kesidis},
  title        = {Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk
                  and Degradation Model},
  booktitle    = {2018 International Conference on Computing, Networking and Communications,
                  {ICNC} 2018, Maui, HI, USA, March 5-8, 2018},
  pages        = {58--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCNC.2018.8390416},
  doi          = {10.1109/ICCNC.2018.8390416},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/NasirianiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/Kesidis18,
  author       = {George Kesidis},
  title        = {Stationary Distribution of a Generalized {LRU-MRU} Content Cache},
  booktitle    = {2018 International Conference on Computing, Networking and Communications,
                  {ICNC} 2018, Maui, HI, USA, March 5-8, 2018},
  pages        = {676--681},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCNC.2018.8390281},
  doi          = {10.1109/ICCNC.2018.8390281},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/Kesidis18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/KesidisSFSK18,
  author       = {George Kesidis and
                  Yuquan Shan and
                  Daniel Fleck and
                  Angelos Stavrou and
                  Takis Konstantopoulos},
  title        = {An adversarial coupon-collector model of asynchronous moving-target
                  defense against botnet reconnaissance\({}^{\mbox{*}}\)},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {61--67},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659359},
  doi          = {10.1109/MALWARE.2018.8659359},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/KesidisSFSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/KesidisSJUKL18,
  author       = {George Kesidis and
                  Yuquan Shan and
                  Aman Jain and
                  Bhuvan Urgaonkar and
                  Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris},
  title        = {Scheduling Distributed Resources in Heterogeneous Private Clouds},
  booktitle    = {26th {IEEE} International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems, {MASCOTS} 2018, Milwaukee,
                  WI, USA, September 25-28, 2018},
  pages        = {102--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/MASCOTS.2018.00018},
  doi          = {10.1109/MASCOTS.2018.00018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/KesidisSJUKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/0001KQ18,
  author       = {David J. Miller and
                  George Kesidis and
                  Zhicong Qiu},
  title        = {Unsupervised Parsimonious Cluster-Based Anomaly Detection {(PCAD)}},
  booktitle    = {28th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2018, Aalborg, Denmark, September 17-20, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MLSP.2018.8517014},
  doi          = {10.1109/MLSP.2018.8517014},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/0001KQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/0001WK18,
  author       = {David J. Miller and
                  Yujia Wang and
                  George Kesidis},
  title        = {Anomaly Detection of Attacks (Ada) on {DNN} Classifiers at Test Time},
  booktitle    = {28th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2018, Aalborg, Denmark, September 17-20, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MLSP.2018.8517069},
  doi          = {10.1109/MLSP.2018.8517069},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mlsp/0001WK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/LeivadeasFLKLI18,
  author       = {Aris Leivadeas and
                  Matthias Falkner and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Chung{-}Horng Lung and
                  Mohamed Ibnkahla},
  title        = {Considerations for a Successful Network Service Chain Deployment},
  booktitle    = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft
                  2018, Montreal, QC, Canada, June 25-29, 2018},
  pages        = {288--292},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NETSOFT.2018.8459934},
  doi          = {10.1109/NETSOFT.2018.8459934},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/LeivadeasFLKLI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/LeivadeasFLIK18,
  author       = {Aris Leivadeas and
                  Matthias Falkner and
                  Ioannis Lambadaris and
                  Mohamed Ibnkahla and
                  George Kesidis},
  title        = {Balancing Delay and Cost in Virtual Network Function Placement and
                  Chaining},
  booktitle    = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft
                  2018, Montreal, QC, Canada, June 25-29, 2018},
  pages        = {433--440},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NETSOFT.2018.8459956},
  doi          = {10.1109/NETSOFT.2018.8459956},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/LeivadeasFLIK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-00922,
  author       = {Yuquan Shan and
                  Aman Jain and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris},
  title        = {Online Scheduling of Spark Workloads with Mesos using Different Fair
                  Allocation Algorithms},
  journal      = {CoRR},
  volume       = {abs/1803.00922},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.00922},
  eprinttype    = {arXiv},
  eprint       = {1803.00922},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-00922.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-00443,
  author       = {George Kesidis},
  title        = {Average age of coupon type and related average age of information},
  journal      = {CoRR},
  volume       = {abs/1808.00443},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.00443},
  eprinttype    = {arXiv},
  eprint       = {1808.00443},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-00443.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00988,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  J{\"{o}}rg Schad and
                  Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris},
  title        = {Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public
                  Cloud},
  journal      = {CoRR},
  volume       = {abs/1810.00988},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00988},
  eprinttype    = {arXiv},
  eprint       = {1810.00988},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-00121,
  author       = {David J. Miller and
                  Xinyi Hu and
                  Zhen Xiang and
                  George Kesidis},
  title        = {A Mixture Model Based Defense for Data Poisoning Attacks Against Naive
                  Bayes Spam Filters},
  journal      = {CoRR},
  volume       = {abs/1811.00121},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.00121},
  eprinttype    = {arXiv},
  eprint       = {1811.00121},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-00121.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-02658,
  author       = {Yujia Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {When Not to Classify: Detection of Reverse Engineering Attacks on
                  {DNN} Image Classifiers},
  journal      = {CoRR},
  volume       = {abs/1811.02658},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.02658},
  eprinttype    = {arXiv},
  eprint       = {1811.02658},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-02658.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeivadeasFLK17,
  author       = {Aris Leivadeas and
                  Matthias Falkner and
                  Ioannis Lambadaris and
                  George Kesidis},
  title        = {Optimal virtualized network function allocation for an {SDN} enabled
                  cloud},
  journal      = {Comput. Stand. Interfaces},
  volume       = {54},
  pages        = {266--278},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2017.01.001},
  doi          = {10.1016/J.CSI.2017.01.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LeivadeasFLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pomacs/WangUNK17,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Neda Nasiriani and
                  George Kesidis},
  title        = {Using Burstable Instances in the Public Cloud: Why, When and How?},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {1},
  number       = {1},
  pages        = {11:1--11:28},
  year         = {2017},
  url          = {https://doi.org/10.1145/3084448},
  doi          = {10.1145/3084448},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/WangUNK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/QiuMK17,
  author       = {Zhicong Qiu and
                  David J. Miller and
                  George Kesidis},
  title        = {A Maximum Entropy Framework for Semisupervised and Active Learning
                  With Unknown and Label-Scarce Classes},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {28},
  number       = {4},
  pages        = {917--933},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNNLS.2016.2514401},
  doi          = {10.1109/TNNLS.2016.2514401},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/QiuMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/LeivadeasKFL17,
  author       = {Aris Leivadeas and
                  George Kesidis and
                  Matthias Falkner and
                  Ioannis Lambadaris},
  title        = {A Graph Partitioning Game Theoretical Approach for the {VNF} Service
                  Chaining Problem},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {14},
  number       = {4},
  pages        = {890--903},
  year         = {2017},
  url          = {https://doi.org/10.1109/TNSM.2017.2732699},
  doi          = {10.1109/TNSM.2017.2732699},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/LeivadeasKFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/ShanPK017,
  author       = {Yuquan Shan and
                  Chiara Lo Prete and
                  George Kesidis and
                  David J. Miller},
  title        = {A simulation framework for uneconomic virtual bidding in day-ahead
                  electricity markets},
  booktitle    = {2017 American Control Conference, {ACC} 2017, Seattle, WA, USA, May
                  24-26, 2017},
  pages        = {2705--2712},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ACC.2017.7963361},
  doi          = {10.23919/ACC.2017.7963361},
  timestamp    = {Fri, 03 Dec 2021 13:04:31 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/ShanPK017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShanKF17,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck},
  editor       = {Bhavani Thuraisingham and
                  Ghassan Karame and
                  Angelos Stavrou},
  title        = {Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver
                  Systems},
  booktitle    = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS
                  2017, Dallas, TX, USA, November 3, 2017},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140649.3140650},
  doi          = {10.1145/3140649.3140650},
  timestamp    = {Thu, 12 Oct 2023 12:32:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShanKF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/HuKB17,
  author       = {Xinyi Hu and
                  George Kesidis and
                  Seung Jun Baek},
  title        = {Regulating wireless access costs for not vertically integrated content
                  providers},
  booktitle    = {13th International Conference on Network and Service Management, {CNSM}
                  2017, Tokyo, Japan, November 26-30, 2017},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.23919/CNSM.2017.8255995},
  doi          = {10.23919/CNSM.2017.8255995},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/HuKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/WangUGKL17,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Aayush Gupta and
                  George Kesidis and
                  Qianlin Liang},
  editor       = {Gustavo Alonso and
                  Ricardo Bianchini and
                  Marko Vukolic},
  title        = {Exploiting Spot and Burstable Instances for Improving the Cost-efficacy
                  of In-Memory Caches on the Public Cloud},
  booktitle    = {Proceedings of the Twelfth European Conference on Computer Systems,
                  EuroSys 2017, Belgrade, Serbia, April 23-26, 2017},
  pages        = {620--634},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064176.3064220},
  doi          = {10.1145/3064176.3064220},
  timestamp    = {Tue, 06 Nov 2018 16:58:31 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosys/WangUGKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/Qiu0K17,
  author       = {Zhicong Qiu and
                  David J. Miller and
                  George Kesidis},
  title        = {Flow based botnet detection through semi-supervised active learning},
  booktitle    = {2017 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017},
  pages        = {2387--2391},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICASSP.2017.7952584},
  doi          = {10.1109/ICASSP.2017.7952584},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/Qiu0K17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Khamse-AshariLK17,
  author       = {Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {Per-Server Dominant-Share Fairness {(PS-DSF):} {A} multi-resource
                  fair allocation mechanism for heterogeneous servers},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996727},
  doi          = {10.1109/ICC.2017.7996727},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Khamse-AshariLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Khamse-AshariKL17,
  author       = {Jalal Khamse{-}Ashari and
                  George Kesidis and
                  Ioannis Lambadaris and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {Efficient and fair scheduling of placement constrained threads on
                  heterogeneous multi-processors},
  booktitle    = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Atlanta, GA, USA, May 1-4, 2017},
  pages        = {48--53},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFCOMW.2017.8116351},
  doi          = {10.1109/INFCOMW.2017.8116351},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Khamse-AshariKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KesidisNSUL17,
  author       = {George Kesidis and
                  Neda Nasiriani and
                  Yuquan Shan and
                  Bhuvan Urgaonkar and
                  Ioannis Lambadaris},
  title        = {Multicommodity games in public-cloud markets considering subadditive
                  resource demands},
  booktitle    = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Atlanta, GA, USA, May 1-4, 2017},
  pages        = {654--658},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFCOMW.2017.8116454},
  doi          = {10.1109/INFCOMW.2017.8116454},
  timestamp    = {Thu, 30 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/KesidisNSUL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ShanKFS17,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Preliminary study of fission defenses against low-volume DoS attacks
                  on proxied multiserver systems},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {67--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323958},
  doi          = {10.1109/MALWARE.2017.8323958},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/ShanKFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/NasirianiKW17,
  author       = {Neda Nasiriani and
                  George Kesidis and
                  Di Wang},
  title        = {Optimal Peak Shaving Using Batteries at Datacenters: Characterizing
                  the Risks and Benefits},
  booktitle    = {25th {IEEE} International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems, {MASCOTS} 2017, Banff,
                  AB, Canada, September 20-22, 2017},
  pages        = {164--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MASCOTS.2017.27},
  doi          = {10.1109/MASCOTS.2017.27},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mascots/NasirianiKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/KesidisSNU17,
  author       = {George Kesidis and
                  Uday V. Shanbhag and
                  Neda Nasiriani and
                  Bhuvan Urgaonkar},
  title        = {Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand
                  Response},
  booktitle    = {25th {IEEE} International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems, {MASCOTS} 2017, Banff,
                  AB, Canada, September 20-22, 2017},
  pages        = {244--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MASCOTS.2017.24},
  doi          = {10.1109/MASCOTS.2017.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/KesidisSNU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/MillerHQK17,
  author       = {David J. Miller and
                  Xinyi Hu and
                  Zhicong Qiu and
                  George Kesidis},
  editor       = {Naonori Ueda and
                  Shinji Watanabe and
                  Tomoko Matsui and
                  Jen{-}Tzung Chien and
                  Jan Larsen},
  title        = {Adversarial learning: {A} critical review and active learning study},
  booktitle    = {27th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2017, Tokyo, Japan, September 25-28, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MLSP.2017.8168163},
  doi          = {10.1109/MLSP.2017.8168163},
  timestamp    = {Tue, 30 Jun 2020 10:25:30 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/MillerHQK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/WangUNK17,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Neda Nasiriani and
                  George Kesidis},
  editor       = {Bruce E. Hajek and
                  Sewoong Oh and
                  Augustin Chaintreau and
                  Leana Golubchik and
                  Zhi{-}Li Zhang},
  title        = {Using Burstable Instances in the Public Cloud: Why, When and How?},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference
                  on Measurement and Modeling of Computer Systems, Urbana-Champaign,
                  IL, USA, June 05 - 09, 2017},
  pages        = {56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078505.3078591},
  doi          = {10.1145/3078505.3078591},
  timestamp    = {Fri, 30 Jul 2021 16:13:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/WangUNK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kesidis17,
  author       = {George Kesidis},
  title        = {Markovian models of Internet Caches including Closed-Form Stationary
                  Distributions},
  journal      = {CoRR},
  volume       = {abs/1704.04849},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.04849},
  eprinttype    = {arXiv},
  eprint       = {1704.04849},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kesidis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShanKFS17,
  author       = {Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS
                  Attacks on Proxied Multiserver Systems},
  journal      = {CoRR},
  volume       = {abs/1704.06794},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.06794},
  eprinttype    = {arXiv},
  eprint       = {1704.06794},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShanKFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KesidisSWUKL17,
  author       = {George Kesidis and
                  Yuquan Shan and
                  Yujia Wang and
                  Bhuvan Urgaonkar and
                  Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris},
  title        = {Efficient max-min and proportional fair constrained multiresource
                  scheduling},
  journal      = {CoRR},
  volume       = {abs/1705.06102},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.06102},
  eprinttype    = {arXiv},
  eprint       = {1705.06102},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KesidisSWUKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MillerHQK17,
  author       = {David J. Miller and
                  Xinyi Hu and
                  Zhicong Qiu and
                  George Kesidis},
  title        = {Adversarial Learning: {A} Critical Review and Active Learning Study},
  journal      = {CoRR},
  volume       = {abs/1705.09823},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.09823},
  eprinttype    = {arXiv},
  eprint       = {1705.09823},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MillerHQK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-08961,
  author       = {Mohammad Hassan Lotfi and
                  Saswati Sarkar and
                  George Kesidis},
  title        = {Is Non-Neutrality Profitable for the Stakeholders of the Internet
                  Market? - Part {II}},
  journal      = {CoRR},
  volume       = {abs/1711.08961},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.08961},
  eprinttype    = {arXiv},
  eprint       = {1711.08961},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-08961.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-01102,
  author       = {Neda Nasiriani and
                  Yuquan Shan and
                  George Kesidis and
                  Daniel Fleck and
                  Angelos Stavrou},
  title        = {Changing proxy-server identities as a proactive moving-target defense
                  against reconnaissance for DDoS attacks},
  journal      = {CoRR},
  volume       = {abs/1712.01102},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.01102},
  eprinttype    = {arXiv},
  eprint       = {1712.01102},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-01102.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-06646,
  author       = {David J. Miller and
                  Yujia Wang and
                  George Kesidis},
  title        = {When Not to Classify: Anomaly Detection of Attacks {(ADA)} on {DNN}
                  Classifiers at Test Time},
  journal      = {CoRR},
  volume       = {abs/1712.06646},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.06646},
  eprinttype    = {arXiv},
  eprint       = {1712.06646},
  timestamp    = {Wed, 18 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-06646.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-10114,
  author       = {Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous
                  Servers},
  journal      = {CoRR},
  volume       = {abs/1712.10114},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.10114},
  eprinttype    = {arXiv},
  eprint       = {1712.10114},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-10114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/ShanPKM16,
  author       = {Yuquan Shan and
                  Chiara Lo Prete and
                  George Kesidis and
                  David J. Miller},
  title        = {A simulation framework for uneconomic virtual bidding in day-ahead
                  electricity markets: Short talk},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {44},
  number       = {3},
  pages        = {30},
  year         = {2016},
  url          = {https://doi.org/10.1145/3040230.3040238},
  doi          = {10.1145/3040230.3040238},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/ShanPKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tompecs/NasirianiWKUCB16,
  author       = {Neda Nasiriani and
                  Cheng Wang and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Lydia Y. Chen and
                  Robert Birke},
  title        = {On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants},
  journal      = {{ACM} Trans. Model. Perform. Evaluation Comput. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {3:1--3:28},
  year         = {2016},
  url          = {https://doi.org/10.1145/2970815},
  doi          = {10.1145/2970815},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tompecs/NasirianiWKUCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/ShahVK16,
  author       = {Virag Shah and
                  Gustavo de Veciana and
                  George Kesidis},
  title        = {A Stable Approach for Routing Queries in Unstructured {P2P} Networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {5},
  pages        = {3136--3147},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2015.2509967},
  doi          = {10.1109/TNET.2015.2509967},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/ShahVK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/LeivadeasFLK16,
  author       = {Aris Leivadeas and
                  Matthias Falkner and
                  Ioannis Lambadaris and
                  George Kesidis},
  title        = {Dynamic traffic steering of multi-tenant virtualized network functions
                  in {SDN} enabled data centers},
  booktitle    = {21st {IEEE} International Workshop on Computer Aided Modelling and
                  Design of Communication Links and Networks, {CAMAD} 2016, Toronto,
                  ON, Canada, October 23-25, 2016},
  pages        = {65--70},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CAMAD.2016.7790332},
  doi          = {10.1109/CAMAD.2016.7790332},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/LeivadeasFLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/FalknerLLK16,
  author       = {Matthias Falkner and
                  Aris Leivadeas and
                  Ioannis Lambadaris and
                  George Kesidis},
  title        = {Performance analysis of virtualized network functions on virtualized
                  systems architectures},
  booktitle    = {21st {IEEE} International Workshop on Computer Aided Modelling and
                  Design of Communication Links and Networks, {CAMAD} 2016, Toronto,
                  ON, Canada, October 23-25, 2016},
  pages        = {71--76},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CAMAD.2016.7790333},
  doi          = {10.1109/CAMAD.2016.7790333},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/camad/FalknerLLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/HuSKSDF16,
  author       = {Xinyi Hu and
                  Yuquan Shan and
                  George Kesidis and
                  Saswati Sarkar and
                  Ravi Dhar and
                  Serge Fdida},
  title        = {Multiperiod subscription pricing for cellular wireless entrants},
  booktitle    = {2016 Annual Conference on Information Science and Systems, {CISS}
                  2016, Princeton, NJ, USA, March 16-18, 2016},
  pages        = {326--330},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISS.2016.7460523},
  doi          = {10.1109/CISS.2016.7460523},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciss/HuSKSDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/Khamse-AshariKL16,
  author       = {Jalal Khamse{-}Ashari and
                  George Kesidis and
                  Ioannis Lambadaris and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {Max-min Fair scheduling of variable-length packet-flows to multiple
                  servers by deficit round-robin},
  booktitle    = {2016 Annual Conference on Information Science and Systems, {CISS}
                  2016, Princeton, NJ, USA, March 16-18, 2016},
  pages        = {390--395},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISS.2016.7460534},
  doi          = {10.1109/CISS.2016.7460534},
  timestamp    = {Fri, 04 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/Khamse-AshariKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/LotfiSK16,
  author       = {Mohammad Hassan Lotfi and
                  Saswati Sarkar and
                  George Kesidis},
  title        = {Migration to a non-neutral internet: Economics modeling and analysis
                  of impact},
  booktitle    = {2016 Annual Conference on Information Science and Systems, {CISS}
                  2016, Princeton, NJ, USA, March 16-18, 2016},
  pages        = {511--516},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISS.2016.7460555},
  doi          = {10.1109/CISS.2016.7460555},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/LotfiSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RameshanBNVUKSC16,
  author       = {Navaneeth Rameshan and
                  Robert Birke and
                  Leandro Navarro and
                  Vladimir Vlassov and
                  Bhuvan Urgaonkar and
                  George Kesidis and
                  Martin L. Schmatz and
                  Lydia Y. Chen},
  title        = {Profiling Memory Vulnerability of Big-Data Applications},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2016, Toulouse, France, June
                  28 - July 1, 2016},
  pages        = {258--261},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN-W.2016.58},
  doi          = {10.1109/DSN-W.2016.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/RameshanBNVUKSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HeLKBWJK16,
  author       = {Jianping He and
                  Bin Liu and
                  Deguang Kong and
                  Xuan Bao and
                  Na Wang and
                  Hongxia Jin and
                  George Kesidis},
  title        = {{PUPPIES:} Transformation-Supported Personalized Privacy Preserving
                  Partial Image Sharing},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {359--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.40},
  doi          = {10.1109/DSN.2016.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HeLKBWJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/Khamse-AshariKL16,
  author       = {Jalal Khamse{-}Ashari and
                  George Kesidis and
                  Ioannis Lambadaris and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {Constrained Max-Min Fair Scheduling of Variable-Length Packet-Flows
                  to Multiple Servers},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841686},
  doi          = {10.1109/GLOCOM.2016.7841686},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/Khamse-AshariKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LeivadeasFLK16,
  author       = {Aris Leivadeas and
                  Matthias Falkner and
                  Ioannis Lambadaris and
                  George Kesidis},
  title        = {Resource Management and Orchestration for a Dynamic Service Chain
                  Steering Model},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7842225},
  doi          = {10.1109/GLOCOM.2016.7842225},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LeivadeasFLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ShanK16,
  author       = {Yuquan Shan and
                  George Kesidis},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Optimal Power Flow with Random Wind Resources},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {2426--2434},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.303},
  doi          = {10.1109/HICSS.2016.303},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ShanK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotcloud/KesidisUNW16,
  author       = {George Kesidis and
                  Bhuvan Urgaonkar and
                  Neda Nasiriani and
                  Cheng Wang},
  editor       = {Austin Clements and
                  Tyson Condie},
  title        = {Neutrality in Future Public Clouds: Implications and Challenges},
  booktitle    = {8th {USENIX} Workshop on Hot Topics in Cloud Computing, HotCloud 2016,
                  Denver, CO, USA, June 20-21, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/hotcloud16/workshop-program/presentation/kesidis},
  timestamp    = {Tue, 09 Feb 2021 08:31:40 +0100},
  biburl       = {https://dblp.org/rec/conf/hotcloud/KesidisUNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/WangUGCBK16,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Aayush Gupta and
                  Lydia Y. Chen and
                  Robert Birke and
                  George Kesidis},
  editor       = {Samuel Kounev and
                  Holger Giese and
                  Jie Liu},
  title        = {Effective Capacity Modulation as an Explicit Control Knob for Public
                  Cloud Profitability},
  booktitle    = {2016 {IEEE} International Conference on Autonomic Computing, {ICAC}
                  2016, Wuerzburg, Germany, July 17-22, 2016},
  pages        = {95--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICAC.2016.10},
  doi          = {10.1109/ICAC.2016.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icac/WangUGCBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/LeivadeasFLK16,
  author       = {Aris Leivadeas and
                  Matthias Falkner and
                  Ioannis Lambadaris and
                  George Kesidis},
  title        = {Dynamic virtualized network function allocation in a multi-cloud environment},
  booktitle    = {23rd International Conference on Telecommunications, {ICT} 2016, Thessaloniki,
                  Greece, May 16-18, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICT.2016.7500394},
  doi          = {10.1109/ICT.2016.7500394},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/LeivadeasFLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/CoposLRKCK16,
  author       = {Bogdan Copos and
                  Karl N. Levitt and
                  Jeff Rowe and
                  Parisa Kianmajd and
                  Chen{-}Nee Chuah and
                  George Kesidis},
  editor       = {Muthu Ramachandran and
                  Gary B. Wills and
                  Robert John Walters and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Victor Chang},
  title        = {Security and Privacy for Emerging Smart Community Infrastructures},
  booktitle    = {Proceedings of the International Conference on Internet of Things
                  and Big Data, IoTBD 2016, Rome, Italy, April 23-25, 2016},
  pages        = {148--155},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005929901480155},
  doi          = {10.5220/0005929901480155},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/CoposLRKCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/Kesidis0Q16,
  author       = {George Kesidis and
                  David J. Miller and
                  Zhicong Qiu},
  editor       = {Jerry Brand and
                  Matthew C. Valenti and
                  Akinwale Akinpelu and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {IP-level fast re-routing for robustness to mass failure events using
                  a hybrid bandwidth and reliability cost metric},
  booktitle    = {2016 {IEEE} Military Communications Conference, {MILCOM} 2016, Baltimore,
                  MD, USA, November 1-3, 2016},
  pages        = {812--816},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MILCOM.2016.7795429},
  doi          = {10.1109/MILCOM.2016.7795429},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/Kesidis0Q16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Khamse-AshariLK16,
  author       = {Jalal Khamse{-}Ashari and
                  Ioannis Lambadaris and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Yiqiang Q. Zhao},
  title        = {Per-Server Dominant-Share Fairness {(PS-DSF):} {A} Multi-Resource
                  Fair Allocation Mechanism for Heterogeneous Servers},
  journal      = {CoRR},
  volume       = {abs/1611.00404},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.00404},
  eprinttype    = {arXiv},
  eprint       = {1611.00404},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Khamse-AshariLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LotfiSK16,
  author       = {Mohammad Hassan Lotfi and
                  Saswati Sarkar and
                  George Kesidis},
  title        = {Is Non-Neutrality Profitable for the Stakeholders of the Internet
                  Market?},
  journal      = {CoRR},
  volume       = {abs/1611.10191},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.10191},
  eprinttype    = {arXiv},
  eprint       = {1611.10191},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LotfiSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/ShanRK0SRL15,
  author       = {Yuquan Shan and
                  Jayaram Raghuram and
                  George Kesidis and
                  David J. Miller and
                  Anna Scaglione and
                  Jeff Rowe and
                  Karl N. Levitt},
  title        = {Generation bidding game with potentially false attestation of flexible
                  demand},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2015},
  pages        = {29},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13634-015-0212-3},
  doi          = {10.1186/S13634-015-0212-3},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/ShanRK0SRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/KurveG0K15,
  author       = {Aditya Kurve and
                  Christopher Griffin and
                  David J. Miller and
                  George Kesidis},
  title        = {Optimizing cluster formation in super-peer networks via local incentive
                  design},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {1--21},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-013-0206-6},
  doi          = {10.1007/S12083-013-0206-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/KurveG0K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/KesidisSUL15,
  author       = {George Kesidis and
                  Yuquan Shan and
                  Bhuvan Urgaonkar and
                  J{\"{o}}rg Liebeherr},
  title        = {Network calculus for parallel processing},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {43},
  number       = {2},
  pages        = {48--50},
  year         = {2015},
  url          = {https://doi.org/10.1145/2825236.2825256},
  doi          = {10.1145/2825236.2825256},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/KesidisSUL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/Kurve0K15,
  author       = {Aditya Kurve and
                  David J. Miller and
                  George Kesidis},
  title        = {Multicategory Crowdsourcing Accounting for Variable Task Difficulty,
                  Worker Skill, and Worker Intention},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {27},
  number       = {3},
  pages        = {794--809},
  year         = {2015},
  url          = {https://doi.org/10.1109/TKDE.2014.2327026},
  doi          = {10.1109/TKDE.2014.2327026},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/Kurve0K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/JinKSKY15,
  author       = {Youngmi Jin and
                  George Kesidis and
                  Jinwoo Shin and
                  Fatih Kocak and
                  Yung Yi},
  title        = {Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server
                  and Peer-to-Peer Caching Systems},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {23},
  number       = {6},
  pages        = {1818--1831},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNET.2014.2347035},
  doi          = {10.1109/TNET.2014.2347035},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/JinKSKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eenergy/WangNKUWCGB15,
  author       = {Cheng Wang and
                  Neda Nasiriani and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Qian Wang and
                  Lydia Y. Chen and
                  Aayush Gupta and
                  Robert Birke},
  editor       = {Shivkumar Kalyanaraman and
                  Deva P. Seetharam and
                  Rajeev Shorey and
                  Sarvapali D. Ramchurn and
                  Mani Srivastava},
  title        = {Recouping Energy Costs From Cloud Tenants: Tenant Demand Response
                  Aware Pricing Design},
  booktitle    = {Proceedings of the 2015 {ACM} Sixth International Conference on Future
                  Energy Systems, e-Energy 2015, Bangalore, India, July 14-17, 2015},
  pages        = {141--150},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2768510.2768541},
  doi          = {10.1145/2768510.2768541},
  timestamp    = {Fri, 08 Jul 2022 23:03:27 +0200},
  biburl       = {https://dblp.org/rec/conf/eenergy/WangNKUWCGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/HeLBJK15,
  author       = {Jianping He and
                  Bin Liu and
                  Xuan Bao and
                  Hongxia Jin and
                  George Kesidis},
  title        = {On Privacy Preserving Partial Image Sharing},
  booktitle    = {35th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2015, Columbus, OH, USA, June 29 - July 2, 2015},
  pages        = {758--759},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICDCS.2015.95},
  doi          = {10.1109/ICDCS.2015.95},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/HeLBJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KesidisMGF15,
  author       = {George Kesidis and
                  Douglas Mercer and
                  Christopher Griffin and
                  Serge Fdida},
  title        = {Roaming charges for customers of cellular-wireless entrant providers},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7442433},
  doi          = {10.1109/INFCOMW.2015.7442433},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/KesidisMGF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/NasirianiWKUCB15,
  author       = {Neda Nasiriani and
                  Cheng Wang and
                  George Kesidis and
                  Bhuvan Urgaonkar and
                  Lydia Y. Chen and
                  Robert Birke},
  title        = {On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants},
  booktitle    = {23rd {IEEE} International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems, {MASCOTS} 2015, Atlanta,
                  GA, USA, October 5-7, 2015},
  pages        = {51--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MASCOTS.2015.23},
  doi          = {10.1109/MASCOTS.2015.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/NasirianiWKUCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/Qiu0K15,
  author       = {Zhicong Qiu and
                  David J. Miller and
                  George Kesidis},
  editor       = {Deniz Erdogmus and
                  Murat Ak{\c{c}}akaya and
                  Suleyman Serdar Kozat and
                  Jan Larsen},
  title        = {Detecting clusters of anomalies on low-dimensional feature subsets
                  with application to network traffic flow data},
  booktitle    = {25th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2015, Boston, MA, USA, September 17-20, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MLSP.2015.7324326},
  doi          = {10.1109/MLSP.2015.7324326},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/Qiu0K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Qiu0K15,
  author       = {Zhicong Qiu and
                  David J. Miller and
                  George Kesidis},
  title        = {Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets
                  with Application to Network Traffic Flow Data},
  journal      = {CoRR},
  volume       = {abs/1511.01047},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.01047},
  eprinttype    = {arXiv},
  eprint       = {1511.01047},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Qiu0K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/DaoudKL14,
  author       = {Ashraf Al Daoud and
                  George Kesidis and
                  J{\"{o}}rg Liebeherr},
  title        = {Zero-Determinant Strategies: {A} Game-Theoretic Approach for Sharing
                  Licensed Spectrum Bands},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {32},
  number       = {11},
  pages        = {2297--2308},
  year         = {2014},
  url          = {https://doi.org/10.1109/JSAC.2014.141126},
  doi          = {10.1109/JSAC.2014.141126},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/DaoudKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/DaoudKL14,
  author       = {Ashraf Al Daoud and
                  George Kesidis and
                  J{\"{o}}rg Liebeherr},
  title        = {A Game of Uncoordinated Sharing of Private Spectrum Commons},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {42},
  number       = {3},
  pages        = {42},
  year         = {2014},
  url          = {https://doi.org/10.1145/2695533.2695550},
  doi          = {10.1145/2695533.2695550},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/DaoudKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/LotfiKS14,
  author       = {Mohammad Hassan Lotfi and
                  George Kesidis and
                  Saswati Sarkar},
  title        = {Network NonNeutrality on the Internet: Content Provision Under a Subscription
                  Revenue Model},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {42},
  number       = {3},
  pages        = {44},
  year         = {2014},
  url          = {https://doi.org/10.1145/2695533.2695552},
  doi          = {10.1145/2695533.2695552},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/LotfiKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/Raghuram0K14,
  author       = {Jayaram Raghuram and
                  David J. Miller and
                  George Kesidis},
  title        = {Instance-Level Constraint-Based Semisupervised Learning With Imposed
                  Space-Partitioning},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {25},
  number       = {8},
  pages        = {1520--1537},
  year         = {2014},
  url          = {https://doi.org/10.1109/TNNLS.2013.2294459},
  doi          = {10.1109/TNNLS.2013.2294459},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/Raghuram0K14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/AlizadehSGK14,
  author       = {Mahnoosh Alizadeh and
                  Anna Scaglione and
                  Andrea J. Goldsmith and
                  George Kesidis},
  title        = {Capturing aggregate flexibility in Demand Response},
  booktitle    = {53rd {IEEE} Conference on Decision and Control, {CDC} 2014, Los Angeles,
                  CA, USA, December 15-17, 2014},
  pages        = {6439--6445},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CDC.2014.7040399},
  doi          = {10.1109/CDC.2014.7040399},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/AlizadehSGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/GriffinK14,
  author       = {Christopher Griffin and
                  George Kesidis},
  title        = {Behavior in a shared resource game with cooperative, greedy, and vigilante
                  players},
  booktitle    = {48th Annual Conference on Information Sciences and Systems, {CISS}
                  2014, Princeton, NJ, USA, March 19-21, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISS.2014.6814129},
  doi          = {10.1109/CISS.2014.6814129},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciss/GriffinK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/Kocak0K14,
  author       = {Fatih Kocak and
                  David J. Miller and
                  George Kesidis},
  title        = {Detecting anomalous latent classes in a batch of network traffic flows},
  booktitle    = {48th Annual Conference on Information Sciences and Systems, {CISS}
                  2014, Princeton, NJ, USA, March 19-21, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CISS.2014.6814181},
  doi          = {10.1109/CISS.2014.6814181},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/Kocak0K14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/feedback/RaghuramKGL0RS14,
  author       = {Jayaram Raghuram and
                  George Kesidis and
                  Christopher Griffin and
                  Karl N. Levitt and
                  David J. Miller and
                  Jeff Rowe and
                  Anna Scaglione},
  editor       = {Jie Liu and
                  Sharad Singhal and
                  Bhuvan Urgaonkar},
  title        = {A Bidding Game for Generators in the Presence of Flexible Demand},
  booktitle    = {9th International Workshop on Feedback Computing, Philadelphia, PA,
                  USA, June 17, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/feedbackcomputing14/workshop-program/presentation/raghuram},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/feedback/RaghuramKGL0RS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotcloud/WangUKSW14,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  George Kesidis and
                  Uday V. Shanbhag and
                  Qian Wang},
  editor       = {Michael A. Kozuch and
                  Minlan Yu},
  title        = {A Case for Virtualizing the Electric Utility in Cloud Data Centers},
  booktitle    = {6th {USENIX} Workshop on Hot Topics in Cloud Computing, HotCloud '14,
                  Philadelphia, PA, USA, June 17-18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/hotcloud14/workshop-program/presentation/wang},
  timestamp    = {Tue, 09 Feb 2021 08:31:38 +0100},
  biburl       = {https://dblp.org/rec/conf/hotcloud/WangUKSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Kesidis14,
  author       = {George Kesidis},
  title        = {A simple two-sided market model with side-payments and {ISP} service
                  classes},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {595--597},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849298},
  doi          = {10.1109/INFCOMW.2014.6849298},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Kesidis14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/LotfiKS14,
  author       = {Mohammad Hassan Lotfi and
                  George Kesidis and
                  Saswati Sarkar},
  title        = {Market-based power allocation for a differentially priced {FDMA} system},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1011--1015},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6874985},
  doi          = {10.1109/ISIT.2014.6874985},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/LotfiKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/WangUWK14,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Qian Wang and
                  George Kesidis},
  title        = {A Hierarchical Demand Response Framework for Data Center Power Cost
                  Optimization under Real-World Electricity Pricing},
  booktitle    = {{IEEE} 22nd International Symposium on Modelling, Analysis {\&}
                  Simulation of Computer and Telecommunication Systems, {MASCOTS} 2014,
                  Paris, France, September 9-11, 2014},
  pages        = {305--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MASCOTS.2014.45},
  doi          = {10.1109/MASCOTS.2014.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/WangUWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netcoop/KesidisP14,
  author       = {George Kesidis and
                  Guodong Pang},
  title        = {Tit-for-tat capacity allocation for distributed delay management in
                  peer-to-peer networks},
  booktitle    = {7th International Conference on NETwork Games, COntrol and OPtimization,
                  NetGCoop 2014, Trento, Italy, October 29-31, 2014},
  pages        = {70--74},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7943431/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netcoop/KesidisP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DaoudKL14,
  author       = {Ashraf Al Daoud and
                  George Kesidis and
                  J{\"{o}}rg Liebeherr},
  title        = {An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using
                  Zero-Determinant Strategies},
  journal      = {CoRR},
  volume       = {abs/1401.3373},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.3373},
  eprinttype    = {arXiv},
  eprint       = {1401.3373},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DaoudKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KesidisP14,
  author       = {George Kesidis and
                  Guodong Pang},
  title        = {Golden-rule capacity allocation for distributed delay management in
                  peer-to-peer networks},
  journal      = {CoRR},
  volume       = {abs/1402.0214},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.0214},
  eprinttype    = {arXiv},
  eprint       = {1402.0214},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KesidisP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LotfiKS14,
  author       = {Mohammad Hassan Lotfi and
                  George Kesidis and
                  Saswati Sarkar},
  title        = {Market-Based Power Allocation for a Differentially Priced {FDMA} System},
  journal      = {CoRR},
  volume       = {abs/1402.3225},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.3225},
  eprinttype    = {arXiv},
  eprint       = {1402.3225},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LotfiKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LotfiKS14a,
  author       = {Mohammad Hassan Lotfi and
                  George Kesidis and
                  Saswati Sarkar},
  title        = {Network Non-Neutrality on the Internet: Content Provision Under a
                  Subscription Revenue Model},
  journal      = {CoRR},
  volume       = {abs/1404.1782},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1782},
  eprinttype    = {arXiv},
  eprint       = {1404.1782},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LotfiKS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlizadehSGK14,
  author       = {Mahnoosh Alizadeh and
                  Anna Scaglione and
                  Andrea Goldsmith and
                  George Kesidis},
  title        = {Capturing Aggregate Flexibility in Demand Response},
  journal      = {CoRR},
  volume       = {abs/1404.1955},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1955},
  eprinttype    = {arXiv},
  eprint       = {1404.1955},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlizadehSGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlizadehSAKL14,
  author       = {Mahnoosh Alizadeh and
                  Anna Scaglione and
                  Andy Applebaum and
                  George Kesidis and
                  Karl N. Levitt},
  title        = {Scalable and Anonymous Modeling of Large Populations of Flexible Appliances},
  journal      = {CoRR},
  volume       = {abs/1404.1958},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.1958},
  eprinttype    = {arXiv},
  eprint       = {1404.1958},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlizadehSAKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShanRKGL0RS14,
  author       = {Yuquan Shan and
                  Jayaram Raghuram and
                  George Kesidis and
                  Christopher Griffin and
                  Karl N. Levitt and
                  David J. Miller and
                  Jeff Rowe and
                  Anna Scaglione},
  title        = {Generation bidding game with flexible demand},
  journal      = {CoRR},
  volume       = {abs/1408.6689},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.6689},
  eprinttype    = {arXiv},
  eprint       = {1408.6689},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShanRKGL0RS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KesidisUSKL14,
  author       = {George Kesidis and
                  Bhuvan Urgaonkar and
                  Yuquan Shan and
                  S. Kamarava and
                  J{\"{o}}rg Liebeherr},
  title        = {Network calculus for parallel processing},
  journal      = {CoRR},
  volume       = {abs/1409.0820},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.0820},
  eprinttype    = {arXiv},
  eprint       = {1409.0820},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KesidisUSKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KesidisMGF14,
  author       = {George Kesidis and
                  Douglas Mercer and
                  Christopher Griffin and
                  Serge Fdida},
  title        = {Roaming charges for customers of cellular-wireless entrant and incumbent
                  providers},
  journal      = {CoRR},
  volume       = {abs/1409.6281},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.6281},
  eprinttype    = {arXiv},
  eprint       = {1409.6281},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KesidisMGF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/casm/KurveKK13,
  author       = {Aditya Kurve and
                  Khashayar Kotobi and
                  George Kesidis},
  title        = {An agent-based framework for performance modeling of an optimistic
                  parallel discrete event simulator},
  journal      = {Complex Adapt. Syst. Model.},
  volume       = {1},
  pages        = {12},
  year         = {2013},
  url          = {https://doi.org/10.1186/2194-3206-1-12},
  doi          = {10.1186/2194-3206-1-12},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/casm/KurveKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/AntoniadisFGJK13,
  author       = {Panayotis Antoniadis and
                  Serge Fdida and
                  Christopher Griffin and
                  Youngmi Jin and
                  George Kesidis},
  title        = {Distributed medium access control with conditionally altruistic users},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2013},
  pages        = {202},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-1499-2013-202},
  doi          = {10.1186/1687-1499-2013-202},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/AntoniadisFGJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/UrgaonkarKSW13,
  author       = {Bhuvan Urgaonkar and
                  George Kesidis and
                  Uday V. Shanbhag and
                  Cheng Wang},
  title        = {Pricing of service in clouds: optimal response and strategic interactions},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {41},
  number       = {3},
  pages        = {28--30},
  year         = {2013},
  url          = {https://doi.org/10.1145/2567529.2567538},
  doi          = {10.1145/2567529.2567538},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/UrgaonkarKSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/AltmanBCKRW13,
  author       = {Eitan Altman and
                  Pierre Bernhard and
                  St{\'{e}}phane Caron and
                  George Kesidis and
                  Julio Rojas{-}Mora and
                  Sulan Wong},
  title        = {A model of network neutrality with usage-based prices},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {601--609},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9504-6},
  doi          = {10.1007/S11235-011-9504-6},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/AltmanBCKRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/JinKJ13,
  author       = {Youngmi Jin and
                  George Kesidis and
                  Ju Wook Jang},
  title        = {Diffusion Dynamics of Network Technologies With Bounded Rational Users:
                  Aspiration-Based Learning},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {21},
  number       = {1},
  pages        = {28--40},
  year         = {2013},
  url          = {https://doi.org/10.1109/TNET.2012.2189891},
  doi          = {10.1109/TNET.2012.2189891},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/JinKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/AlizadehKS13,
  author       = {Mahnoosh Alizadeh and
                  George Kesidis and
                  Anna Scaglione},
  editor       = {Michael B. Matthews},
  title        = {Clustering consumption in queues: {A} scalable model for electric
                  vehicle scheduling},
  booktitle    = {2013 Asilomar Conference on Signals, Systems and Computers, Pacific
                  Grove, CA, USA, November 3-6, 2013},
  pages        = {374--378},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ACSSC.2013.6810299},
  doi          = {10.1109/ACSSC.2013.6810299},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/AlizadehKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Kurve0K13,
  author       = {Aditya Kurve and
                  David J. Miller and
                  George Kesidis},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled
                  and Adversarial Workers},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {140--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_9},
  doi          = {10.1007/978-3-319-02786-9\_9},
  timestamp    = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Kurve0K13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JinYKKS13,
  author       = {Youngmi Jin and
                  Yung Yi and
                  George Kesidis and
                  Fatih Kocak and
                  Jinwoo Shin},
  title        = {Hybrid client-server and peer-to-peer caching systems with selfish
                  peers},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {1744--1752},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566972},
  doi          = {10.1109/INFCOM.2013.6566972},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JinYKKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/LuPK13,
  author       = {Hongyuan Lu and
                  Guodong Pang and
                  George Kesidis},
  title        = {Automated scheduling of deferrable {PEV/PHEV} load by power-profile
                  unevenness},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {235--240},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6687963},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6687963},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/LuPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AlizadehSK13,
  author       = {Mahnoosh Alizadeh and
                  Anna Scaglione and
                  George Kesidis},
  title        = {Scalable model predictive control of demand for ancillary services},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {684--689},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6688038},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6688038},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AlizadehSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/KocakKPF13,
  author       = {Fatih Kocak and
                  George Kesidis and
                  Tuan{-}Minh Pham and
                  Serge Fdida},
  title        = {The Effect of Caching on a Model of Content and Access Provider Revenues
                  in Information-centric Networks},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {45--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.13},
  doi          = {10.1109/SOCIALCOM.2013.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/KocakKPF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/He0K13,
  author       = {Jianping He and
                  David J. Miller and
                  George Kesidis},
  title        = {Latent Interest-Group Discovery and Management by Peer-to-Peer Online
                  Social Networks},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {162--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.31},
  doi          = {10.1109/SOCIALCOM.2013.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/He0K13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/WangUWKS13,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Qian Wang and
                  George Kesidis and
                  Anand Sivasubramaniam},
  title        = {Data Center Power Cost Optimization via Workload Modulation},
  booktitle    = {{IEEE/ACM} 6th International Conference on Utility and Cloud Computing,
                  {UCC} 2013, Dresden, Germany, December 9-12, 2013},
  pages        = {260--263},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/UCC.2013.52},
  doi          = {10.1109/UCC.2013.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucc/WangUWKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-1942,
  author       = {Fatih Kocak and
                  George Kesidis and
                  Tuan{-}Minh Pham and
                  Serge Fdida},
  title        = {The effect of caching on a model of content and access provider revenues
                  in information-centric networks},
  journal      = {CoRR},
  volume       = {abs/1304.1942},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.1942},
  eprinttype    = {arXiv},
  eprint       = {1304.1942},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-1942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-6753,
  author       = {Mahnoosh Alizadeh and
                  George Kesidis and
                  Anna Scaglione},
  title        = {Clustering Consumption in Queues: {A} Scalable Model for Electric
                  Vehicle Scheduling},
  journal      = {CoRR},
  volume       = {abs/1304.6753},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.6753},
  eprinttype    = {arXiv},
  eprint       = {1304.6753},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-6753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GriffinK13,
  author       = {Christopher Griffin and
                  George Kesidis},
  title        = {Good Behavior in a Communications System with Cooperative, Greedy,
                  and Vigilante Players},
  journal      = {CoRR},
  volume       = {abs/1306.3127},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.3127},
  eprinttype    = {arXiv},
  eprint       = {1306.3127},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GriffinK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GriffinKAF13,
  author       = {Christopher Griffin and
                  George Kesidis and
                  Panayotis Antoniadis and
                  Serge Fdida},
  title        = {Modeling and Control of Rare Segments in BitTorrent with Epidemic
                  Dynamics},
  journal      = {CoRR},
  volume       = {abs/1306.3160},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.3160},
  eprinttype    = {arXiv},
  eprint       = {1306.3160},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GriffinKAF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Kurve0K13,
  author       = {Aditya Kurve and
                  David J. Miller and
                  George Kesidis},
  title        = {Multicategory Crowdsourcing Accounting for Plurality in Worker Skill
                  and Intention, Task Difficulty, and Task Heterogeneity},
  journal      = {CoRR},
  volume       = {abs/1307.7332},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.7332},
  eprinttype    = {arXiv},
  eprint       = {1307.7332},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Kurve0K13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangUWKS13,
  author       = {Cheng Wang and
                  Bhuvan Urgaonkar and
                  Qian Wang and
                  George Kesidis and
                  Anand Sivasubramaniam},
  title        = {Data Center Cost Optimization Via Workload Modulation Under Real-World
                  Electricity Pricing},
  journal      = {CoRR},
  volume       = {abs/1308.0585},
  year         = {2013},
  url          = {http://arxiv.org/abs/1308.0585},
  eprinttype    = {arXiv},
  eprint       = {1308.0585},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangUWKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/JinKJ12,
  author       = {Youngmi Jin and
                  George Kesidis and
                  Ju Wook Jang},
  title        = {A Channel Aware {MAC} Protocol in an {ALOHA} Network with Selfish
                  Users},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {30},
  number       = {1},
  pages        = {128--137},
  year         = {2012},
  url          = {https://doi.org/10.1109/JSAC.2012.120112},
  doi          = {10.1109/JSAC.2012.120112},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/JinKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neco/MillerRKC12,
  author       = {David J. Miller and
                  Jayaram Raghuram and
                  George Kesidis and
                  Christopher M. Collins},
  title        = {Improved Generative Semisupervised Learning Based on Finely Grained
                  Component-Conditional Class Labeling},
  journal      = {Neural Comput.},
  volume       = {24},
  number       = {7},
  pages        = {1926--1966},
  year         = {2012},
  url          = {https://doi.org/10.1162/NECO\_a\_00284},
  doi          = {10.1162/NECO\_A\_00284},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/neco/MillerRKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhocnets/AntoniadisFGJK12,
  author       = {Panayotis Antoniadis and
                  Serge Fdida and
                  Christopher Griffin and
                  Youngmi Jin and
                  George Kesidis},
  editor       = {Jun Zheng and
                  Nathalie Mitton and
                  Jun Li and
                  Pascal Lorenz},
  title        = {Distributed Medium Access Control with Dynamic Altruism},
  booktitle    = {Ad Hoc Networks - 4th International {ICST} Conference, {ADHOCNETS}
                  2012, Paris, France, October 16-17, 2012, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {111},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36958-2\_3},
  doi          = {10.1007/978-3-642-36958-2\_3},
  timestamp    = {Tue, 21 Mar 2023 21:01:39 +0100},
  biburl       = {https://dblp.org/rec/conf/adhocnets/AntoniadisFGJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/KurvePKV12,
  author       = {Aditya Kurve and
                  Guodong Pang and
                  George Kesidis and
                  Gustavo de Veciana},
  title        = {Decentralized capacity reallocation for a loss network},
  booktitle    = {46th Annual Conference on Information Sciences and Systems, {CISS}
                  2012, Princeton, NJ, USA, March 21-23, 2012},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISS.2012.6310748},
  doi          = {10.1109/CISS.2012.6310748},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/KurvePKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/RaghuramMK12,
  author       = {Jayaram Raghuram and
                  David J. Miller and
                  George Kesidis},
  title        = {Semisupervised domain adaptation for mixture model based classifiers},
  booktitle    = {46th Annual Conference on Information Sciences and Systems, {CISS}
                  2012, Princeton, NJ, USA, March 21-23, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CISS.2012.6310708},
  doi          = {10.1109/CISS.2012.6310708},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/RaghuramMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/KesidisJ12,
  author       = {George Kesidis and
                  Youngmi Jin},
  editor       = {Vikram Krishnamurthy and
                  Qing Zhao and
                  Minyi Huang and
                  Yonggang Wen},
  title        = {Stochastic Loss Aversion for Random Medium Access},
  booktitle    = {Game Theory for Networks - Third International {ICST} Conference,
                  GameNets 2012, Vancouver, BC, Canada, May 24-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {105},
  pages        = {236--247},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35582-0\_18},
  doi          = {10.1007/978-3-642-35582-0\_18},
  timestamp    = {Tue, 30 Jun 2020 12:26:15 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/KesidisJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KesidisK12,
  author       = {George Kesidis and
                  Aditya Kurve},
  title        = {A study of unsupervised adaptive crowdsourcing},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {1438--1442},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364014},
  doi          = {10.1109/ICC.2012.6364014},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KesidisK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Kesidis12,
  author       = {George Kesidis},
  title        = {Side-payment profitability under convex demand-response modeling congestion-sensitive
                  applications},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {2785--2789},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364113},
  doi          = {10.1109/ICC.2012.6364113},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Kesidis12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/PangKK12,
  author       = {Guodong Pang and
                  George Kesidis and
                  Takis Konstantopoulos},
  title        = {Avoiding overages by deferred aggregate demand for {PEV} charging
                  on the smart grid},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {3322--3327},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6363650},
  doi          = {10.1109/ICC.2012.6363650},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/PangKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShahVK12,
  author       = {Virag Shah and
                  Gustavo de Veciana and
                  George Kesidis},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {Learning to route queries in unstructured {P2P} networks: Achieving
                  throughput optimality subject to query resolution constraints},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2327--2335},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195620},
  doi          = {10.1109/INFCOM.2012.6195620},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShahVK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/0001KK12,
  author       = {David J. Miller and
                  Fatih Kocak and
                  George Kesidis},
  title        = {Sequential anomaly detection in a batch with growing number of tests:
                  Application to network intrusion detection},
  booktitle    = {{IEEE} International Workshop on Machine Learning for Signal Processing,
                  {MLSP} 2012, Santander, Spain, September 23-26, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MLSP.2012.6349793},
  doi          = {10.1109/MLSP.2012.6349793},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/0001KK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2011,
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31909-9},
  doi          = {10.1007/978-3-642-31909-9},
  isbn         = {978-3-642-31908-2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-1776,
  author       = {George Kesidis and
                  Youngmi Jin},
  title        = {Stochastic Loss Aversion for Random Medium Access},
  journal      = {CoRR},
  volume       = {abs/1201.1776},
  year         = {2012},
  url          = {http://arxiv.org/abs/1201.1776},
  eprinttype    = {arXiv},
  eprint       = {1201.1776},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-1776.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-4847,
  author       = {Panayotis Antoniadis and
                  Serge Fdida and
                  Christopher Griffin and
                  Youngmi Jin and
                  George Kesidis},
  title        = {{CSMA} Local Area Networking under Dynamic Altruism},
  journal      = {CoRR},
  volume       = {abs/1204.4847},
  year         = {2012},
  url          = {http://arxiv.org/abs/1204.4847},
  eprinttype    = {arXiv},
  eprint       = {1204.4847},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1204-4847.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CarlK11,
  author       = {Glenn Carl and
                  George Kesidis},
  title        = {Modeling a policy-capable path-vector routing protocol using Jacobi
                  iteration over a path algebra},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {10},
  pages        = {2361--2379},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.03.013},
  doi          = {10.1016/J.COMNET.2011.03.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CarlK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ZouKM11,
  author       = {Guixi Zou and
                  George Kesidis and
                  David J. Miller},
  title        = {A Flow Classifier with Tamper-Resistant Features and an Evaluation
                  of Its Portability to New Domains},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {29},
  number       = {7},
  pages        = {1449--1460},
  year         = {2011},
  url          = {https://doi.org/10.1109/JSAC.2011.110810},
  doi          = {10.1109/JSAC.2011.110810},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ZouKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/camad/KurveGK11,
  author       = {Aditya Kurve and
                  Christopher Griffin and
                  George Kesidis},
  title        = {Iterative partitioning scheme for distributed simulation of dynamic
                  networks},
  booktitle    = {16th {IEEE} International Workshop on Computer Aided Modeling and
                  Design of Communication Links and Networks, {CAMAD} 2011, Kyoto, Japan,
                  June 10-11, 2011},
  pages        = {92--96},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CAMAD.2011.5941125},
  doi          = {10.1109/CAMAD.2011.5941125},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/camad/KurveGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GriffinKAF11,
  author       = {Christopher Griffin and
                  George Kesidis and
                  Panayotis Antoniadis and
                  Serge Fdida},
  title        = {An Epidemic Model of Bit Torrent with Control},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5962823},
  doi          = {10.1109/ICC.2011.5962823},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/GriffinKAF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KurveK11,
  author       = {Aditya Kurve and
                  George Kesidis},
  title        = {Sybil Detection via Distributed Sparse Cut Monitoring},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5963402},
  doi          = {10.1109/ICC.2011.5963402},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KurveK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/teletraffic/KurveGK11,
  author       = {Aditya Kurve and
                  C. Griffin and
                  George Kesidis},
  editor       = {Piet Van Mieghem and
                  Udo R. Krieger and
                  Yi Qian and
                  Kurt Tutschku},
  title        = {A graph partitioning game for distributed simulation of networks},
  booktitle    = {Proceedings of the 2011 International Workshop on Modeling, Analysis,
                  and Control of Complex Networks, Cnet@ITC 2011, San Francisco, California,
                  USA, 9 September 2011},
  pages        = {9--16},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/doi/10.5555/2043527.2043529},
  doi          = {10.5555/2043527.2043529},
  timestamp    = {Wed, 04 May 2022 13:02:13 +0200},
  biburl       = {https://dblp.org/rec/conf/teletraffic/KurveGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CelikRK011,
  author       = {Z. Berkay Celik and
                  Jayaram Raghuram and
                  George Kesidis and
                  David J. Miller},
  editor       = {Sean Peisert and
                  Stephen Schwab},
  title        = {Salting Public Traces with Attack Traffic to Test Flow Classifiers},
  booktitle    = {4th Workshop on Cyber Security Experimentation and Test, {CSET} '11,
                  San Francisco, CA, USA, August 8, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/cset11/salting-public-traces-attack-traffic-test-flow-classifiers},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CelikRK011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Kesidis11,
  author       = {George Kesidis},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Denial-of-Service Detection},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {323--328},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_266},
  doi          = {10.1007/978-1-4419-5906-5\_266},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Kesidis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-1779,
  author       = {George Kesidis},
  title        = {Side-payment profitability and interacting eyeball ISPs under convex
                  demand-response modeling congestion-sensitive applications},
  journal      = {CoRR},
  volume       = {abs/1110.1779},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.1779},
  eprinttype    = {arXiv},
  eprint       = {1110.1779},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-1779.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-1781,
  author       = {George Kesidis and
                  Aditya Kurve},
  title        = {A Study of Unsupervised Adaptive Crowdsourcing},
  journal      = {CoRR},
  volume       = {abs/1110.1781},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.1781},
  eprinttype    = {arXiv},
  eprint       = {1110.1781},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-1781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2010Kesidis,
  author       = {George Kesidis},
  title        = {An Introduction to Models of Online Peer-to-Peer Social Networking},
  series       = {Synthesis Lectures on Communication Networks},
  publisher    = {Morgan {\&} Claypool Publishers},
  year         = {2010},
  url          = {https://doi.org/10.2200/S00313ED1V01Y201011CNT008},
  doi          = {10.2200/S00313ED1V01Y201011CNT008},
  isbn         = {978-3-031-79997-6},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/synthesis/2010Kesidis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoiLLK10,
  author       = {Yoon{-}Ho Choi and
                  Lunquan Li and
                  Peng Liu and
                  George Kesidis},
  title        = {Worm virulence estimation for the containment of local worm outbreak},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {104--123},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.002},
  doi          = {10.1016/J.COSE.2009.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiLLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JhiLLGJK10,
  author       = {Yoon{-}chan Jhi and
                  Peng Liu and
                  Lunquan Li and
                  Qijun Gu and
                  Jiwu Jing and
                  George Kesidis},
  title        = {{PWC:} a proactive worm containment solution for enterprise networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {4},
  pages        = {334--354},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.112},
  doi          = {10.1002/SEC.112},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/AksuMKY10,
  author       = {Yaman Aksu and
                  David J. Miller and
                  George Kesidis and
                  Qing X. Yang},
  title        = {Margin-maximizing feature elimination methods for linear and nonlinear
                  kernel-based discriminant functions},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {21},
  number       = {5},
  pages        = {701--717},
  year         = {2010},
  url          = {https://doi.org/10.1109/TNN.2010.2041069},
  doi          = {10.1109/TNN.2010.2041069},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/AksuMKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/KesidisJAA10,
  author       = {George Kesidis and
                  Youngmi Jin and
                  Amar Prakash Azad and
                  Eitan Altman},
  title        = {Stable Nash equilibria of {ALOHA} medium access games under symmetric,
                  socially altruistic behavior},
  booktitle    = {Proceedings of the 49th {IEEE} Conference on Decision and Control,
                  {CDC} 2010, December 15-17, 2010, Atlanta, Georgia, {USA}},
  pages        = {1071--1075},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CDC.2010.5717121},
  doi          = {10.1109/CDC.2010.5717121},
  timestamp    = {Fri, 04 Mar 2022 13:28:01 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/KesidisJAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/TangpongK10,
  author       = {Athichart Tangpong and
                  George Kesidis},
  title        = {File-sharing costs and quality-of-service},
  booktitle    = {44th Annual Conference on Information Sciences and Systems, {CISS}
                  2010, Princeton, NJ, USA, 17-19 March 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CISS.2010.5464800},
  doi          = {10.1109/CISS.2010.5464800},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/TangpongK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/CaronKA10,
  author       = {St{\'{e}}phane Caron and
                  George Kesidis and
                  Eitan Altman},
  editor       = {Bob Briscoe and
                  Peter Steenkiste},
  title        = {Application neutrality and a paradox of side payments},
  booktitle    = {Proceedings of the Re-Architecting the Internet Workshop, ReARCH@CoNEXT
                  2010, Philadelphia, Pennsylvania, USA, November 30, 2010},
  pages        = {9:1--9:6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1921233.1921245},
  doi          = {10.1145/1921233.1921245},
  timestamp    = {Thu, 09 Dec 2021 09:56:21 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/CaronKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etm/AltmanBCKRW10,
  author       = {Eitan Altman and
                  Pierre Bernhard and
                  St{\'{e}}phane Caron and
                  George Kesidis and
                  Julio Rojas{-}Mora and
                  Sulan Wong},
  editor       = {Burkhard Stiller and
                  Tobias Ho{\ss}feld and
                  George D. Stamoulis},
  title        = {A Study of Non-neutral Networks with Usage-Based Prices},
  booktitle    = {Incentives, Overlays, and Economic Traffic Control, Third International
                  Workshop, {ETM} 2010, Amsterdam, The Netherlands, September 6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6236},
  pages        = {76--84},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15485-0\_8},
  doi          = {10.1007/978-3-642-15485-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/etm/AltmanBCKRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/MillerLKC10,
  author       = {David J. Miller and
                  Chu{-}Fang Lin and
                  George Kesidis and
                  Christopher M. Collins},
  editor       = {Sorin Draghici and
                  Taghi M. Khoshgoftaar and
                  Vasile Palade and
                  Witold Pedrycz and
                  M. Arif Wani and
                  Xingquan Zhu},
  title        = {Improved Fine-Grained Component-Conditional Class Labeling with Active
                  Learning},
  booktitle    = {The Ninth International Conference on Machine Learning and Applications,
                  {ICMLA} 2010, Washington, DC, USA, 12-14 December 2010},
  pages        = {3--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICMLA.2010.8},
  doi          = {10.1109/ICMLA.2010.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmla/MillerLKC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Kesidis10,
  author       = {George Kesidis},
  editor       = {Yoshiaki Kiriha and
                  Lisandro Zambenedetti Granville and
                  Deep Medhi and
                  Toshio Tonouchi and
                  Myung{-}Sup Kim},
  title        = {Congestion control alternatives for residential broadband access},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2010,
                  19-23 April 2010, Osaka, Japan},
  pages        = {874--877},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/NOMS.2010.5488352},
  doi          = {10.1109/NOMS.2010.5488352},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Kesidis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-5324,
  author       = {George Kesidis and
                  Youngmi Jin and
                  Amar Prakash Azad and
                  Eitan Altman},
  title        = {Stable Nash equilibria of medium access games under symmetric, socially
                  altruistic behavior},
  journal      = {CoRR},
  volume       = {abs/1003.5324},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.5324},
  eprinttype    = {arXiv},
  eprint       = {1003.5324},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-5324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-3894,
  author       = {Eitan Altman and
                  Pierre Bernhard and
                  St{\'{e}}phane Caron and
                  George Kesidis and
                  Julio Rojas{-}Mora and
                  Sulan Wong},
  title        = {A Study of Non-Neutral Networks with Usage-based Prices},
  journal      = {CoRR},
  volume       = {abs/1006.3894},
  year         = {2010},
  url          = {http://arxiv.org/abs/1006.3894},
  eprinttype    = {arXiv},
  eprint       = {1006.3894},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1006-3894.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1008-2267,
  author       = {Eitan Altman and
                  St{\'{e}}phane Caron and
                  George Kesidis},
  title        = {Application Neutrality and a Paradox of Side Payments},
  journal      = {CoRR},
  volume       = {abs/1008.2267},
  year         = {2010},
  url          = {http://arxiv.org/abs/1008.2267},
  eprinttype    = {arXiv},
  eprint       = {1008.2267},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1008-2267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/KesidisTG09,
  author       = {George Kesidis and
                  Athichart Tangpong and
                  Christopher Griffin},
  title        = {A sybil-proof referral system based on multiplicative reputation chains},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {13},
  number       = {11},
  pages        = {862--864},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCOMM.2009.091400},
  doi          = {10.1109/LCOMM.2009.091400},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/KesidisTG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/0002NK09,
  author       = {Arnab Das and
                  Azin Neishaboori and
                  George Kesidis},
  editor       = {Tamer Basar and
                  Hitay {\"{O}}zbay},
  title        = {Wireless mesh networking games},
  booktitle    = {1st International Conference on Game Theory for Networks, {GAMENETS}
                  2009, Istanbul, Turkey, May 13-15, 2009},
  pages        = {565--574},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GAMENETS.2009.5137446},
  doi          = {10.1109/GAMENETS.2009.5137446},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/0002NK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/TangpongK09,
  author       = {Athichart Tangpong and
                  George Kesidis},
  editor       = {Tamer Basar and
                  Hitay {\"{O}}zbay},
  title        = {A simple reputation model for BitTorrent-like incentives},
  booktitle    = {1st International Conference on Game Theory for Networks, {GAMENETS}
                  2009, Istanbul, Turkey, May 13-15, 2009},
  pages        = {603--610},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GAMENETS.2009.5137450},
  doi          = {10.1109/GAMENETS.2009.5137450},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/TangpongK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/NamPKDS09,
  author       = {Gunwoo Nam and
                  Pushkar Patankar and
                  George Kesidis and
                  Chita R. Das and
                  Cetin Seren},
  title        = {Mass Purging of Stale {TCP} Flows in Per-Flow Monitoring Systems},
  booktitle    = {Proceedings of the 18th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2009, San Francisco, California, USA,
                  August 3-6, 2009},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICCCN.2009.5235390},
  doi          = {10.1109/ICCCN.2009.5235390},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/NamPKDS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/TangpongKHH09,
  author       = {Athichart Tangpong and
                  George Kesidis and
                  Hung{-}Yuan Hsu and
                  Ali R. Hurson},
  title        = {Robust Sybil Detection for MANETs},
  booktitle    = {Proceedings of the 18th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2009, San Francisco, California, USA,
                  August 3-6, 2009},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICCCN.2009.5235387},
  doi          = {10.1109/ICCCN.2009.5235387},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/TangpongKHH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/NamPLSKD09,
  author       = {Gunwoo Nam and
                  Pushkar Patankar and
                  Seung{-}Hwan Lim and
                  Bikash Sharma and
                  George Kesidis and
                  Chita R. Das},
  title        = {Clock-like Flow Replacement Schemes for Resilient Flow Monitoring},
  booktitle    = {29th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {129--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDCS.2009.53},
  doi          = {10.1109/ICDCS.2009.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/NamPLSKD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/teletraffic/PatankarNKKD09,
  author       = {Pushkar Patankar and
                  Gunwoo Nam and
                  George Kesidis and
                  Takis Konstantopoulos and
                  Chita R. Das},
  title        = {Peer-to-peer unstructured anycasting using correlated swarms},
  booktitle    = {21st International Teletraffic Congress, {ITC} 2009, Paris, France,
                  September 15-17, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/document/5300270/},
  timestamp    = {Sat, 12 Nov 2022 12:58:30 +0100},
  biburl       = {https://dblp.org/rec/conf/teletraffic/PatankarNKKD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-1597,
  author       = {George Kesidis},
  title        = {A quantum computer network},
  journal      = {CoRR},
  volume       = {abs/0908.1597},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.1597},
  eprinttype    = {arXiv},
  eprint       = {0908.1597},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-1597.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NeishabooriK08,
  author       = {Azin Neishaboori and
                  George Kesidis},
  title        = {Wireless mesh networks based on {CDMA}},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {8},
  pages        = {1513--1528},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2008.01.020},
  doi          = {10.1016/J.COMCOM.2008.01.020},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NeishabooriK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/MillerZK08,
  author       = {David J. Miller and
                  Yanxin Zhang and
                  George Kesidis},
  title        = {Decision Aggregation in Distributed Classification by a Transductive
                  Extension of Maximum Entropy/Improved Iterative Scaling},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2008},
  year         = {2008},
  url          = {https://doi.org/10.1155/2008/674974},
  doi          = {10.1155/2008/674974},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/MillerZK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/YiDKD08,
  author       = {Sungwon Yi and
                  Xidong Deng and
                  George Kesidis and
                  Chita R. Das},
  title        = {A dynamic quarantine scheme for controlling unresponsive {TCP} sessions},
  journal      = {Telecommun. Syst.},
  volume       = {37},
  number       = {4},
  pages        = {169--189},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11235-008-9104-2},
  doi          = {10.1007/S11235-008-9104-2},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/YiDKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomacs/KesidisHJJV08,
  author       = {George Kesidis and
                  Ihab Hamadeh and
                  Youngmi Jin and
                  Soranun Jiwasurat and
                  Milan Vojnovic},
  title        = {A model of the spread of randomly scanning Internet worms that saturate
                  access links},
  journal      = {{ACM} Trans. Model. Comput. Simul.},
  volume       = {18},
  number       = {2},
  pages        = {6:1--6:14},
  year         = {2008},
  url          = {https://doi.org/10.1145/1346325.1346327},
  doi          = {10.1145/1346325.1346327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomacs/KesidisHJJV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomacs/CarlK08,
  author       = {Glenn Carl and
                  George Kesidis},
  title        = {Large-scale testing of the Internet's Border Gateway Protocol {(BGP)}
                  via topological scale-down},
  journal      = {{ACM} Trans. Model. Comput. Simul.},
  volume       = {18},
  number       = {3},
  pages        = {11:1--11:30},
  year         = {2008},
  url          = {https://doi.org/10.1145/1371574.1371577},
  doi          = {10.1145/1371574.1371577},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomacs/CarlK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/YiKGDKD08,
  author       = {Sungwon Yi and
                  Martin Kappes and
                  Sachin Garg and
                  Xidong Deng and
                  George Kesidis and
                  Chita R. Das},
  title        = {Proxy-RED: an {AQM} scheme for wireless local area networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {421--434},
  year         = {2008},
  url          = {https://doi.org/10.1002/wcm.460},
  doi          = {10.1002/WCM.460},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/YiKGDKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/KesidisDV08,
  author       = {George Kesidis and
                  A. Das and
                  Gustavo de Veciana},
  title        = {On flat-rate and usage-based pricing for tiered commodity internet
                  services},
  booktitle    = {42nd Annual Conference on Information Sciences and Systems, {CISS}
                  2008, Princeton, NJ, USA, 19-21 March 2008},
  pages        = {304--308},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CISS.2008.4558540},
  doi          = {10.1109/CISS.2008.4558540},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/KesidisDV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiLK08,
  author       = {Lunquan Li and
                  Peng Liu and
                  George Kesidis},
  title        = {Threshold Smart Walk for the Containment of Local Worm Outbreak},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {2124--2128},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.409},
  doi          = {10.1109/GLOCOM.2008.ECP.409},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LiLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/MillerZK08,
  author       = {David J. Miller and
                  Yanxin Zhang and
                  George Kesidis},
  title        = {A transductive extension of maximum entropy/iterative scaling for
                  decision aggregation in distributed classification},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2008, March 30 - April 4, 2008, Caesars
                  Palace, Las Vegas, Nevada, {USA}},
  pages        = {1865--1868},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICASSP.2008.4517997},
  doi          = {10.1109/ICASSP.2008.4517997},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/MillerZK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/PatankarNKD08,
  author       = {Pushkar Patankar and
                  Gunwoo Nam and
                  George Kesidis and
                  Chita R. Das},
  title        = {Exploring Anti-Spam Models in Large Scale VoIP Systems},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.2008.71},
  doi          = {10.1109/ICDCS.2008.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/PatankarNKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/NeishabooriK08,
  author       = {Azin Neishaboori and
                  George Kesidis},
  title        = {SINR-sensitive routing in wireless 802.11 mesh networks},
  booktitle    = {{IEEE} 5th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2008, 29 September - 2 October 2008, Atlanta, Georgia, {USA}},
  pages        = {623--628},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MAHSS.2008.4660103},
  doi          = {10.1109/MAHSS.2008.4660103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/NeishabooriK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netcoop/KesidisKS08,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Perla Sousi},
  editor       = {Eitan Altman and
                  Augustin Chaintreau},
  title        = {A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like
                  Peer-to-Peer File-Sharing Networks},
  booktitle    = {Network Control and Optimization, Second Euro-NF Workshop, {NET-COOP}
                  2008, Paris, France, September 8-10, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5425},
  pages        = {26--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00393-6\_4},
  doi          = {10.1007/978-3-642-00393-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/netcoop/KesidisKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/JinK07,
  author       = {Youngmi Jin and
                  George Kesidis},
  title        = {Distributed Contention Window Control for Selfish Users in {IEEE}
                  802.11 Wireless LANs},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {25},
  number       = {6},
  pages        = {1113--1123},
  year         = {2007},
  url          = {https://doi.org/10.1109/JSAC.2007.070806},
  doi          = {10.1109/JSAC.2007.070806},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/JinK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadnets/0002KP07,
  author       = {Arnab Das and
                  George Kesidis and
                  Venkat Pothamsetty},
  title        = {Assessing discreet packet-dropping attacks using nearest-neighbor
                  and path-vector attribution},
  booktitle    = {Fourth International Conference on Broadband Communications, Networks
                  and Systems, {(BROADNETS} 2007), 10-14 September 2007, Raleigh, North-Carolina,
                  {USA}},
  pages        = {444--448},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/BROADNETS.2007.4550467},
  doi          = {10.1109/BROADNETS.2007.4550467},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/broadnets/0002KP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/KesidisKS07,
  author       = {George Kesidis and
                  Takis Konstantopoulos and
                  Perla Sousi},
  title        = {Modeling file-sharing with BitTorrent-like incentives},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April
                  15-20, 2007},
  pages        = {1333--1336},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICASSP.2007.367324},
  doi          = {10.1109/ICASSP.2007.367324},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/KesidisKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KesidisN07,
  author       = {George Kesidis and
                  Azin Neishaboori},
  title        = {Distributed Power Control in Multihop Ad Hoc {CDMA} Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {96--101},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.25},
  doi          = {10.1109/ICC.2007.25},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KesidisN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/JeonK07,
  author       = {Paul Barom Jeon and
                  George Kesidis},
  title        = {GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc
                  Networks},
  booktitle    = {Sixth International Conference on Networking {(ICN} 2007), 22-28 April
                  2007, Sainte-Luce, Martinique, France},
  pages        = {10},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICN.2007.43},
  doi          = {10.1109/ICN.2007.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icn/JeonK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/YiKOJKD07,
  author       = {Sungwon Yi and
                  Byoung{-}Koo Kim and
                  Jintae Oh and
                  Jongsoo Jang and
                  George Kesidis and
                  Chita R. Das},
  editor       = {Yookun Cho and
                  Roger L. Wainwright and
                  Hisham Haddad and
                  Sung Y. Shin and
                  Yong Wan Koo},
  title        = {Memory-efficient content filtering hardware for high-speed intrusion
                  detection systems},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC),
                  Seoul, Korea, March 11-15, 2007},
  pages        = {264--269},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1244002.1244068},
  doi          = {10.1145/1244002.1244068},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/YiKOJKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JhiLLGJK07,
  author       = {Yoon{-}chan Jhi and
                  Peng Liu and
                  Lunquan Li and
                  Qijun Gu and
                  Jiwu Jing and
                  George Kesidis},
  title        = {{PWC:} {A} proactive worm containment solution for enterprise networks},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {433--442},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550364},
  doi          = {10.1109/SECCOM.2007.4550364},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/JhiLLGJK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Li0JK07,
  author       = {Lunquan Li and
                  Peng Liu and
                  Yoon{-}chan Jhi and
                  George Kesidis},
  editor       = {Terry V. Benzel and
                  George Kesidis},
  title        = {Evaluation of Collaborative Worm Containments on {DETER} Testbed},
  booktitle    = {{DETER} Community Workshop on Cyber Security Experimentation and Test
                  2007, Boston, Ma, USA, August 6-7, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/deter-2007/evaluation-collaborative-worm-containments-deter-testbed},
  timestamp    = {Mon, 01 Feb 2021 08:43:10 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Li0JK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2007deter,
  editor       = {Terry V. Benzel and
                  George Kesidis},
  title        = {{DETER} Community Workshop on Cyber Security Experimentation and Test
                  2007, Boston, Ma, USA, August 6-7, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/deter2007},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/2007deter.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HamadehK06,
  author       = {Ihab Hamadeh and
                  George Kesidis},
  title        = {A taxonomy of internet traceback},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {54--61},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010823},
  doi          = {10.1504/IJSN.2006.010823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HamadehK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/CarlKBR06,
  author       = {Glenn Carl and
                  George Kesidis and
                  Richard R. Brooks and
                  Suresh Rai},
  title        = {Denial-of-Service Attack-Detection Techniques},
  journal      = {{IEEE} Internet Comput.},
  volume       = {10},
  number       = {1},
  pages        = {82--89},
  year         = {2006},
  url          = {https://doi.org/10.1109/MIC.2006.5},
  doi          = {10.1109/MIC.2006.5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/CarlKBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/JinK06,
  author       = {Youngmi Jin and
                  George Kesidis},
  title        = {Charge sensitive and incentive compatible end-to-end window-based
                  control for selfish users},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {5},
  pages        = {952--961},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2006.872876},
  doi          = {10.1109/JSAC.2006.872876},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/JinK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/WangMK06,
  author       = {Jisheng Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {Efficient Mining of the Multidimensional Traffic Cluster Hierarchy
                  for Digesting, Visualization, and Anomaly Identification},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {10},
  pages        = {1929--1941},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2006.877216},
  doi          = {10.1109/JSAC.2006.877216},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/WangMK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/MortazaviK06,
  author       = {B. Mortazavi and
                  George Kesidis},
  title        = {Cumulative Reputation Systems for Peer-to-Peer Content Distribution},
  booktitle    = {40th Annual Conference on Information Sciences and Systems, {CISS}
                  2006, Princeton, NJ, USA, 22-24 March 2006},
  pages        = {1546--1552},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/CISS.2006.286385},
  doi          = {10.1109/CISS.2006.286385},
  timestamp    = {Wed, 10 May 2023 17:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/MortazaviK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/etrics/HamadehK06,
  author       = {Ihab Hamadeh and
                  George Kesidis},
  editor       = {G{\"{u}}nter M{\"{u}}ller},
  title        = {Toward a Framework for Forensic Analysis of Scanning Worms},
  booktitle    = {Emerging Trends in Information and Communication Security, International
                  Conference, {ETRICS} 2006, Freiburg, Germany, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3995},
  pages        = {282--297},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11766155\_20},
  doi          = {10.1007/11766155\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/etrics/HamadehK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KesidisJMK06,
  author       = {George Kesidis and
                  Youngmi Jin and
                  B. Mortazavi and
                  T. Konstopoulos},
  title        = {An Epidemiological Model for File-Sharing with BitTorrent-like Incentives:
                  The Case of a Fixed Peer Population},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.430},
  doi          = {10.1109/GLOCOM.2006.430},
  timestamp    = {Fri, 21 Feb 2020 18:38:36 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/KesidisJMK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RaoK06,
  author       = {Rajesh N. Rao and
                  George Kesidis},
  title        = {On the Relation Between Capacity and Number of Sinks in an Sensor
                  Network},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.510},
  doi          = {10.1109/GLOCOM.2006.510},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/RaoK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/NeishabooriK06,
  author       = {Azin Neishaboori and
                  George Kesidis},
  title        = {Routing and Uplink-Downlink Scheduling in Ad Hoc {CDMA} Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {926--931},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.254826},
  doi          = {10.1109/ICC.2006.254826},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/NeishabooriK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WangHK006,
  author       = {Jisheng Wang and
                  Ihab Hamadeh and
                  George Kesidis and
                  David J. Miller},
  title        = {Polymorphic worm detection and defense: system design, experimental
                  methodology, and data resources},
  booktitle    = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense,
                  {LSAD} '06, Pisa, Italy, September 11-15, 2006},
  pages        = {169--176},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1162666.1162676},
  doi          = {10.1145/1162666.1162676},
  timestamp    = {Thu, 03 Feb 2022 15:46:18 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WangHK006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/LiLK06,
  author       = {Lunquan Li and
                  Peng Liu and
                  George Kesidis},
  editor       = {William Yurcik and
                  Stefan Axelsson and
                  Kiran Lakkaraju and
                  Soon Tee Teoh},
  title        = {Visual toolkit for network security experiment specification and data
                  analysis},
  booktitle    = {3rd International Workshop on Visualization for Computer Security,
                  VizSEC 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179576.1179579},
  doi          = {10.1145/1179576.1179579},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/LiLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/CarlPKM06,
  author       = {Glenn Carl and
                  Shashi Phoha and
                  George Kesidis and
                  Bharat B. Madan},
  editor       = {L. Felipe Perrone and
                  Barry Lawson and
                  Jason Liu and
                  Frederick P. Wieland},
  title        = {Path preserving scale down for validation of internet inter-domain
                  routing protocols},
  booktitle    = {Proceedings of the Winter Simulation Conference {WSC} 2006, Monterey,
                  California, USA, December 3-6, 2006},
  pages        = {2210--2218},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/WSC.2006.323023},
  doi          = {10.1109/WSC.2006.323023},
  timestamp    = {Mon, 29 Apr 2024 16:19:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/CarlPKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/JinK05,
  author       = {Youngmi Jin and
                  George Kesidis},
  title        = {Dynamics of usage-priced communication networks: the case of a single
                  bottleneck resource},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {13},
  number       = {5},
  pages        = {1041--1053},
  year         = {2005},
  url          = {https://doi.org/10.1109/TNET.2005.857120},
  doi          = {10.1109/TNET.2005.857120},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/JinK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/JiwasuratKM05,
  author       = {Soranun Jiwasurat and
                  George Kesidis and
                  David J. Miller},
  title        = {Hierarchical shaped deficit round-robin scheduling},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM}
                  '05, St. Louis, Missouri, USA, 28 November - 2 December 2005},
  pages        = {6},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/GLOCOM.2005.1577729},
  doi          = {10.1109/GLOCOM.2005.1577729},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/JiwasuratKM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LockwoodKH05,
  author       = {John W. Lockwood and
                  George Kesidis and
                  Changcheng Huang},
  title        = {Advances for networks {\&} internet},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2005. {GLOBECOM}
                  '05, St. Louis, Missouri, USA, 28 November - 2 December 2005},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/GLOCOM.2005.1577031},
  doi          = {10.1109/GLOCOM.2005.1577031},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LockwoodKH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pads/HamadehHKP05,
  author       = {Ihab Hamadeh and
                  Jason Hart and
                  George Kesidis and
                  Venkat Pothamsetty},
  title        = {A Preliminary Simulation of the Effect of Scanning Worm Activity on
                  Multicast},
  booktitle    = {19th Workshop on Parallel and Distributed Simulation, {PADS} 20055,
                  Monterey, CA, USA, June 1-3, 2005},
  pages        = {191--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PADS.2005.2},
  doi          = {10.1109/PADS.2005.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pads/HamadehHKP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pe-wasun/JeonK05,
  author       = {Paul Barom Jeon and
                  George Kesidis},
  editor       = {Mohamed Ould{-}Khaoua and
                  Mineo Takai},
  title        = {Pheromone-aided robust multipath and multipriority routing in wireless
                  MANETs},
  booktitle    = {Proceedings of the 2nd {ACM} International Workshop on Performance
                  Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, {PE-WASUN}
                  2005, Montreal, Quebec, Canada, October 10-13, 2005},
  pages        = {106--113},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1089803.1089974},
  doi          = {10.1145/1089803.1089974},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pe-wasun/JeonK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qosip/KesidisHJ05,
  author       = {George Kesidis and
                  Ihab Hamadeh and
                  Soranun Jiwasurat},
  editor       = {Marco Ajmone Marsan and
                  Giuseppe Bianchi and
                  Marco Listanti and
                  Michela Meo},
  title        = {Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating
                  Internet Worms},
  booktitle    = {Quality of Service in Multiservice {IP} Networks, Third International
                  Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3375},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30573-6\_8},
  doi          = {10.1007/978-3-540-30573-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/qosip/KesidisHJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04,
  author       = {Ruzena Bajcsy and
                  Terry Benzel and
                  Matt Bishop and
                  Robert Braden and
                  Carla E. Brodley and
                  Sonia Fahmy and
                  Sally Floyd and
                  Wes Hardaker and
                  Anthony D. Joseph and
                  George Kesidis and
                  Karl N. Levitt and
                  Robert Lindell and
                  Peng Liu and
                  David J. Miller and
                  Russ Mundy and
                  Clifford Neuman and
                  Ron Ostrenga and
                  Vern Paxson and
                  Phillip A. Porras and
                  Catherine Rosenberg and
                  J. Doug Tygar and
                  Shankar Sastry and
                  Daniel F. Sterne and
                  Shyhtsun Felix Wu},
  title        = {Cyber defense technology networking and evaluation},
  journal      = {Commun. {ACM}},
  volume       = {47},
  number       = {3},
  pages        = {58--61},
  year         = {2004},
  url          = {https://doi.org/10.1145/971617.971646},
  doi          = {10.1145/971617.971646},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BajcsyBBBBFFHJKLLLMMNOPPRTSSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuCKD04,
  author       = {Hao Zhu and
                  Guohong Cao and
                  George Kesidis and
                  Chita R. Das},
  title        = {An adaptive power-conserving service discipline for bluetooth {(APCB)}
                  wireless networks},
  journal      = {Comput. Commun.},
  volume       = {27},
  number       = {9},
  pages        = {828--839},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comcom.2004.01.027},
  doi          = {10.1016/J.COMCOM.2004.01.027},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuCKD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/JiwasuratK04,
  author       = {Soranun Jiwasurat and
                  George Kesidis},
  title        = {A Class of Shaped Deficit Round-Robin {(SDRR)} Schedulers},
  journal      = {Telecommun. Syst.},
  volume       = {25},
  number       = {3-4},
  pages        = {173--191},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:TELS.0000014780.33289.ad},
  doi          = {10.1023/B:TELS.0000014780.33289.AD},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/JiwasuratK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/RaoK04,
  author       = {Rajesh N. Rao and
                  George Kesidis},
  title        = {Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc
                  Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {225--232},
  year         = {2004},
  url          = {https://doi.org/10.1109/TMC.2004.26},
  doi          = {10.1109/TMC.2004.26},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/RaoK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciit/DengYKD04,
  author       = {Xidong Deng and
                  Sungwon Yi and
                  George Kesidis and
                  Chita R. Das},
  editor       = {M. H. Hamza},
  title        = {{RL-RED:} {A} flowcontrol mechanism for 802.11-basedwireless ad hoc
                  networks},
  booktitle    = {{IASTED} International Conference on Communications, Internet, and
                  Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin
                  Islands, {USA}},
  pages        = {369--374},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Thu, 05 Jul 2018 07:27:58 +0200},
  biburl       = {https://dblp.org/rec/conf/ciit/DengYKD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciit/JinK04,
  author       = {Youngmi Jin and
                  George Kesidis},
  editor       = {M. H. Hamza},
  title        = {{TCP} windowcontrol in a priced network},
  booktitle    = {{IASTED} International Conference on Communications, Internet, and
                  Information Technology, November 22 - 24, 2004, St. Thomas, {US} Virgin
                  Islands, {USA}},
  pages        = {596--600},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Thu, 25 Jan 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciit/JinK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JiZMK04,
  author       = {Xiang Ji and
                  Hongyuan Zha and
                  John J. Metzner and
                  George Kesidis},
  title        = {Dynamic cluster structure for object detection and tracking in wireless
                  ad-hoc sensor networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2004, Paris, France, 20-24 June 2004},
  pages        = {3807--3811},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICC.2004.1313265},
  doi          = {10.1109/ICC.2004.1313265},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/JiZMK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worm/WeaverHKP04,
  author       = {Nicholas Weaver and
                  Ihab Hamadeh and
                  George Kesidis and
                  Vern Paxson},
  editor       = {Vern Paxson},
  title        = {Preliminary results using scale-down to explore worm dynamics},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Rapid Malcode, {WORM} 2004,
                  Washington, DC, USA, October 29, 2004},
  pages        = {65--72},
  publisher    = {{ACM} Press},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029618.1029628},
  doi          = {10.1145/1029618.1029628},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/WeaverHKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/YiDKD03,
  author       = {Sungwon Yi and
                  Xidong Deng and
                  George Kesidis and
                  Chita R. Das},
  title        = {HaTCh: a two-level caching scheme for estimating the number of active
                  flows},
  booktitle    = {42nd {IEEE} Conference on Decision and Control, {CDC} 2003, Maui,
                  Hawaii, USA, December 9-12, 2003},
  pages        = {2829--2834},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CDC.2003.1273054},
  doi          = {10.1109/CDC.2003.1273054},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdc/YiDKD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DengYKD03,
  author       = {Xidong Deng and
                  Sungwon Yi and
                  George Kesidis and
                  Chita R. Das},
  title        = {A control theoretic approach for designing adaptive {AQM} schemes},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {2947--2951},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258774},
  doi          = {10.1109/GLOCOM.2003.1258774},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DengYKD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RaoK03,
  author       = {Rajesh N. Rao and
                  George Kesidis},
  title        = {Detecting malicious packet dropping using statistically regular traffic
                  patterns in multihop wireless networks that are not bandwidth limited},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {2957--2961},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258776},
  doi          = {10.1109/GLOCOM.2003.1258776},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RaoK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JinK03,
  author       = {Youngmi Jin and
                  George Kesidis},
  title        = {Nash equilibria of a generic networking game with applications to
                  circuit-switched networks},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2003, The 22nd Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, San Franciso,
                  CA, USA, March 30 - April 3, 2003},
  pages        = {1242--1249},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/INFCOM.2003.1208960},
  doi          = {10.1109/INFCOM.2003.1208960},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/JinK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/JinK02,
  author       = {Youngmi Jin and
                  George Kesidis},
  title        = {Equilibria of a noncooperative game for heterogeneous users of an
                  {ALOHA} network},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {6},
  number       = {7},
  pages        = {282--284},
  year         = {2002},
  url          = {https://doi.org/10.1109/LCOMM.2002.801326},
  doi          = {10.1109/LCOMM.2002.801326},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/JinK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YiDKD02,
  author       = {Sungwon Yi and
                  Xidong Deng and
                  George Kesidis and
                  Chita R. Das},
  title        = {Providing fairness in DiffServ architecture},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2002. {GLOBECOM}
                  '02, Taipei, Taiwan, 17-21 November, 2002},
  pages        = {1435--1439},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/GLOCOM.2002.1188435},
  doi          = {10.1109/GLOCOM.2002.1188435},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YiDKD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DengYKD02,
  author       = {Xidong Deng and
                  Sungwon Yi and
                  George Kesidis and
                  Chita R. Das},
  title        = {Stabilized virtual buffer {(SVB)} - an active queue management scheme
                  for Internet quality-of-service},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2002. {GLOBECOM}
                  '02, Taipei, Taiwan, 17-21 November, 2002},
  pages        = {1628--1632},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/GLOCOM.2002.1188473},
  doi          = {10.1109/GLOCOM.2002.1188473},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DengYKD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuCKD02,
  author       = {Hao Zhu and
                  Guohong Cao and
                  George Kesidis and
                  Chita R. Das},
  title        = {An adaptive power-conserving service discipline for Bluetooth},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2002, April
                  28 - May 2, 2002, New York City, NY, {USA}},
  pages        = {303--307},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICC.2002.996865},
  doi          = {10.1109/ICC.2002.996865},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuCKD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/NinanKD02,
  author       = {Bobby M. Ninan and
                  George Kesidis and
                  Michael Devetsikiotis},
  title        = {A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched
                  Optical Networks},
  booktitle    = {10th International Workshop on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems {(MASCOTS} 2002), 11-16
                  October 2002, Fort Worth, Texas, {USA}},
  pages        = {257},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/MASCOT.2002.1167085},
  doi          = {10.1109/MASCOT.2002.1167085},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/NinanKD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/KesidisT01,
  author       = {George Kesidis and
                  Leandros Tassiulas},
  editor       = {Pascal Lorenz},
  title        = {General Connection Blocking Bounds and an Implication of Billing for
                  Provisioned Label-Switched Routes in an {MPLS} Internet Cloud},
  booktitle    = {Networking - {ICN} 2001, First International Conference, Colmar, France,
                  July 9-13, 2001 Proceedings, Part 2},
  series       = {Lecture Notes in Computer Science},
  volume       = {2094},
  pages        = {339--347},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47734-9\_34},
  doi          = {10.1007/3-540-47734-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/KesidisT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/KesidisK00,
  author       = {George Kesidis and
                  Takis Konstantopoulos},
  title        = {Worst-case performance of a buffer with independent shaped arrival
                  processes},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {4},
  number       = {1},
  pages        = {26--28},
  year         = {2000},
  url          = {https://doi.org/10.1109/4234.823539},
  doi          = {10.1109/4234.823539},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/KesidisK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/KesidisCT00,
  author       = {George Kesidis and
                  Kaushik Chakraborty and
                  Leandros Tassiulas},
  title        = {Traffic shaping for a loss system},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {4},
  number       = {12},
  pages        = {417--419},
  year         = {2000},
  url          = {https://doi.org/10.1109/4234.898726},
  doi          = {10.1109/4234.898726},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/KesidisCT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/KesidisK00,
  author       = {George Kesidis and
                  Takis Konstantopoulos},
  title        = {Extremal shape-controlled traffic patterns in high-speed networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {48},
  number       = {5},
  pages        = {813--819},
  year         = {2000},
  url          = {https://doi.org/10.1109/26.843194},
  doi          = {10.1109/26.843194},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/KesidisK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/HungMK98,
  author       = {Anthony Hung and
                  Marie{-}Jos{\'{e}} Montpetit and
                  George Kesidis},
  title        = {{ATM} via satellite: {A} framework and implementation},
  journal      = {Wirel. Networks},
  volume       = {4},
  number       = {2},
  pages        = {141--153},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1019191619926},
  doi          = {10.1023/A:1019191619926},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/HungMK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/HungKM98,
  author       = {Anthony Hung and
                  George Kesidis and
                  Nick McKeown},
  title        = {{ATM} input-buffered switches with the guaranteed-rate property},
  booktitle    = {Proceedings of the Third {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece},
  pages        = {331--335},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISCC.1998.702542},
  doi          = {10.1109/ISCC.1998.702542},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/HungKM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/MontpetitK97,
  author       = {Marie{-}Jos{\'{e}} Montpetit and
                  George Kesidis},
  title        = {Broadband via Satellite},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {35},
  number       = {7},
  pages        = {28},
  year         = {1997},
  url          = {https://doi.org/10.1109/MCOM.1997.601739},
  doi          = {10.1109/MCOM.1997.601739},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/MontpetitK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KesidisM97,
  author       = {George Kesidis and
                  Nick McKeown},
  title        = {Output-Buffer {ATM} Packet Switching for Integrated-Services Communication
                  Networks},
  booktitle    = {1997 {IEEE} International Conference on Communications: Towards the
                  Knowledge Millennium, {ICC} 1997, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada, June 8-12, 1997},
  pages        = {1684--1688},
  publisher    = {{IEEE}},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICC.1997.595074},
  doi          = {10.1109/ICC.1997.595074},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KesidisM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/VecianaK96,
  author       = {Gustavo de Veciana and
                  George Kesidis},
  title        = {Bandwidth allocation for multiple qualities of service using generalized
                  processor sharing},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {42},
  number       = {1},
  pages        = {268--272},
  year         = {1996},
  url          = {https://doi.org/10.1109/18.481801},
  doi          = {10.1109/18.481801},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/VecianaK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/HungK96,
  author       = {Anthony Hung and
                  George Kesidis},
  title        = {Bandwidth scheduling for wide-area {ATM} networks using virtual finishing
                  times},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {4},
  number       = {1},
  pages        = {49--54},
  year         = {1996},
  url          = {https://doi.org/10.1109/90.503761},
  doi          = {10.1109/90.503761},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/HungK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/VecianaKW95,
  author       = {Gustavo de Veciana and
                  George Kesidis and
                  Jean C. Walrand},
  title        = {Resource Management in Wide-Area {ATM} Networks Using Effective Bandwiths},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {13},
  number       = {6},
  pages        = {1081--1090},
  year         = {1995},
  url          = {https://doi.org/10.1109/49.400663},
  doi          = {10.1109/49.400663},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/VecianaKW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/CourcoubetisKRWW95,
  author       = {Costas Courcoubetis and
                  George Kesidis and
                  Ad Ridder and
                  Jean C. Walrand and
                  Richard R. Weber},
  title        = {Admission control and routing in {ATM} networks using inferences from
                  measured buffer occupancy},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {43},
  number       = {2/3/4},
  pages        = {1778--1784},
  year         = {1995},
  url          = {https://doi.org/10.1109/26.380228},
  doi          = {10.1109/26.380228},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/CourcoubetisKRWW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/Kesidis95,
  author       = {George Kesidis},
  title        = {Analog optimization with Wong's stochastic neural network},
  journal      = {{IEEE} Trans. Neural Networks},
  volume       = {6},
  number       = {1},
  pages        = {258--260},
  year         = {1995},
  url          = {https://doi.org/10.1109/72.363429},
  doi          = {10.1109/72.363429},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/Kesidis95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/Kesidis94,
  author       = {George Kesidis},
  editor       = {Vijay K. Madisetti and
                  Erol Gelenbe and
                  Jean C. Walrand},
  title        = {Modeling to Obtain the Effective Bandwidth of a Traffic Source in
                  an {ATM} Network},
  booktitle    = {{MASCOTS} '94, Proceedings of the Second International Workshop on
                  Modeling, Analysis, and Simulation On Computer and Telecommunication
                  Systems, January 31 - February 2, 1994, Durham, North Carolina, {USA}},
  pages        = {318--322},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/MASCOT.1994.284405},
  doi          = {10.1109/MASCOT.1994.284405},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/Kesidis94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KesidisW93,
  author       = {George Kesidis and
                  Jean C. Walrand},
  title        = {Relative entropy between Markov transition rate matrices},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {39},
  number       = {3},
  pages        = {1056--1057},
  year         = {1993},
  url          = {https://doi.org/10.1109/18.256516},
  doi          = {10.1109/18.256516},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KesidisW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomacs/KesidisW93,
  author       = {George Kesidis and
                  Jean C. Walrand},
  title        = {Quick Simulation of {ATM} Buffers with On-Off Multiclass Markov Fluid
                  Sources},
  journal      = {{ACM} Trans. Model. Comput. Simul.},
  volume       = {3},
  number       = {3},
  pages        = {269--276},
  year         = {1993},
  url          = {https://doi.org/10.1145/174153.174162},
  doi          = {10.1145/174153.174162},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomacs/KesidisW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/KesidisWC93,
  author       = {George Kesidis and
                  Jean C. Walrand and
                  Cheng{-}Shang Chang},
  title        = {Effective bandwidths for multiclass Markov fluids and other {ATM}
                  sources},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {1},
  number       = {4},
  pages        = {424--428},
  year         = {1993},
  url          = {https://doi.org/10.1109/90.251894},
  doi          = {10.1109/90.251894},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/KesidisWC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/KesidisW93,
  author       = {George Kesidis and
                  Jean C. Walrand},
  editor       = {Herbert D. Schwetman and
                  Jean C. Walrand and
                  Kallol Kumar Bagchi and
                  Doug DeGroot},
  title        = {A Review of Quick Simulation Methods for Queues},
  booktitle    = {{MASCOTS} '93, Proceedings of the International Workshop on Modeling,
                  Analysis, and Simulation On Computer and Telecommunication Systems,
                  January 17-20, 1993, La Jolla, San Diego, CA, {USA}},
  pages        = {17--21},
  publisher    = {The Society for Computer Simulation},
  year         = {1993},
  timestamp    = {Mon, 29 Apr 2002 14:15:18 +0200},
  biburl       = {https://dblp.org/rec/conf/mascots/KesidisW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WalrandK91,
  author       = {Jean C. Walrand and
                  George Kesidis},
  title        = {Review of 'Large Deviation Techniques in Decision, Simulation, and
                  Estimation' (Bucklew, J.A.; 1990)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {37},
  number       = {5},
  pages        = {1493},
  year         = {1991},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WalrandK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics