BibTeX records: Rocky K. C. Chang

download as .bib file

@inproceedings{DBLP:conf/dsn/WuGDC21,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Robert H. Deng and
                  Rocky K. C. Chang},
  title        = {When Program Analysis Meets Bytecode Search: Targeted and Efficient
                  Inter-procedural Analysis of Modern Android Apps in BackDroid},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {543--554},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00063},
  doi          = {10.1109/DSN48987.2021.00063},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WuGDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11527,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Robert H. Deng and
                  Rocky K. C. Chang},
  title        = {When Program Analysis Meets Bytecode Search: Targeted and Efficient
                  Inter-procedural Analysis of Modern Android Apps in BackDroid},
  journal      = {CoRR},
  volume       = {abs/2005.11527},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11527},
  eprinttype    = {arXiv},
  eprint       = {2005.11527},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11527.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhangLWJCGWM19,
  author       = {Shiwei Zhang and
                  Weichao Li and
                  Daoyuan Wu and
                  Bo Jin and
                  Rocky K. C. Chang and
                  Debin Gao and
                  Yi Wang and
                  Ricky K. P. Mok},
  title        = {An empirical study of mobile network behavior and application performance
                  in the wild},
  booktitle    = {Proceedings of the International Symposium on Quality of Service,
                  IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3326285.3329039},
  doi          = {10.1145/3326285.3329039},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZhangLWJCGWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WuGCHCD19,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Rocky K. C. Chang and
                  En He and
                  Eric K. T. Cheng and
                  Robert H. Deng},
  title        = {Understanding Open Ports in Android Applications: Discovery, Diagnosis,
                  and Security Assessment},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/understanding-open-ports-in-android-applications-discovery-diagnosis-and-security-assessment/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WuGCHCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhouCGFZ18,
  author       = {Peng Zhou and
                  Rocky K. C. Chang and
                  Xiaojing Gu and
                  Minrui Fei and
                  Jianying Zhou},
  title        = {Magic Train: Design of Measurement Methods against Bandwidth Inflation
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {98--111},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2015.2509984},
  doi          = {10.1109/TDSC.2015.2509984},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhouCGFZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiWCM18,
  author       = {Weichao Li and
                  Daoyuan Wu and
                  Rocky K. C. Chang and
                  Ricky K. P. Mok},
  title        = {Toward Accurate Network Delay Measurement on Android Phones},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {717--732},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMC.2017.2737990},
  doi          = {10.1109/TMC.2017.2737990},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LiWCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsys/LeeC18,
  author       = {Steven W. K. Lee and
                  Rocky K. C. Chang},
  editor       = {Pablo C{\'{e}}sar and
                  Michael Zink and
                  Niall Murray},
  title        = {Enhancing the experience of multiplayer shooter games via advanced
                  lag compensation},
  booktitle    = {Proceedings of the 9th {ACM} Multimedia Systems Conference, MMSys
                  2018, Amsterdam, The Netherlands, June 12-15, 2018},
  pages        = {284--293},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3204949.3204971},
  doi          = {10.1145/3204949.3204971},
  timestamp    = {Wed, 21 Nov 2018 12:44:02 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsys/LeeC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/MokCL17,
  author       = {Ricky K. P. Mok and
                  Rocky K. C. Chang and
                  Weichao Li},
  title        = {Detecting Low-Quality Workers in QoE Crowdtesting: {A} Worker Behavior-Based
                  Approach},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {19},
  number       = {3},
  pages        = {530--543},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMM.2016.2619901},
  doi          = {10.1109/TMM.2016.2619901},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/MokCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/LeeC17,
  author       = {Steven W. K. Lee and
                  Rocky K. C. Chang},
  title        = {On "shot around a corner" in first-person shooter games},
  booktitle    = {15th Annual Workshop on Network and Systems Support for Games, NetGames
                  2017, Taipei, Taiwan, June 22-23, 2017},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/NetGames.2017.7991545},
  doi          = {10.1109/NETGAMES.2017.7991545},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/LeeC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/WuCLCG17,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang and
                  Weichao Li and
                  Eric K. T. Cheng and
                  Debin Gao},
  editor       = {Dilma Da Silva and
                  Bryan Ford},
  title        = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance},
  booktitle    = {Proceedings of the 2017 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017},
  pages        = {445--457},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/wu},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/WuCLCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuCLCG17,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang and
                  Weichao Li and
                  Eric K. T. Cheng and
                  Debin Gao},
  title        = {MopEye: Opportunistic Monitoring of Per-app Mobile Network Performance},
  journal      = {CoRR},
  volume       = {abs/1703.07551},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.07551},
  eprinttype    = {arXiv},
  eprint       = {1703.07551},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuCLCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouGC16,
  author       = {Peng Zhou and
                  Xiaojing Gu and
                  Rocky K. C. Chang},
  title        = {Harvesting File Download Exploits in the Web: {A} Hacker's View},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {4},
  pages        = {522--540},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv072},
  doi          = {10.1093/COMJNL/BXV072},
  timestamp    = {Fri, 03 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouGC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/MokLC16,
  author       = {Ricky K. P. Mok and
                  Weichao Li and
                  Rocky K. C. Chang},
  title        = {IRate: Initial Video Bitrate Selection System for {HTTP} Streaming},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {34},
  number       = {6},
  pages        = {1914--1928},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSAC.2016.2559078},
  doi          = {10.1109/JSAC.2016.2559078},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/MokLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/LiWCM16,
  author       = {Weichao Li and
                  Daoyuan Wu and
                  Rocky K. C. Chang and
                  Ricky K. P. Mok},
  editor       = {Athina Markopoulou and
                  Michalis Faloutsos and
                  Vyas Sekar and
                  Dejan Kostic},
  title        = {Demystifying and Puncturing the Inflated Delay in Smartphone-based
                  WiFi Network Measurement},
  booktitle    = {Proceedings of the 12th International on Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA,
                  December 12-15, 2016},
  pages        = {497--504},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2999572.2999595},
  doi          = {10.1145/2999572.2999595},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/LiWCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChangSV16,
  author       = {Rocky K. C. Chang and
                  Hulya Seferoglu and
                  Laurent Vanbever},
  editor       = {Athina Markopoulou and
                  Michalis Faloutsos and
                  Vyas Sekar and
                  Dejan Kostic},
  title        = {{ACM} CoNEXT 2016 Student Workshop},
  booktitle    = {Proceedings of the 12th International on Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2016, Irvine, California, USA,
                  December 12-15, 2016},
  pages        = {507--508},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2999572.3004861},
  doi          = {10.1145/2999572.3004861},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ChangSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/MembreyVC16,
  author       = {Peter Membrey and
                  Darryl Veitch and
                  Rocky K. C. Chang},
  editor       = {Phillipa Gill and
                  John S. Heidemann and
                  John W. Byers and
                  Ramesh Govindan},
  title        = {Time to Measure the Pi},
  booktitle    = {Proceedings of the 2016 {ACM} on Internet Measurement Conference,
                  {IMC} 2016, Santa Monica, CA, USA, November 14-16, 2016},
  pages        = {327--334},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2987476},
  timestamp    = {Tue, 06 Nov 2018 11:07:19 +0100},
  biburl       = {https://dblp.org/rec/conf/imc/MembreyVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLCG16,
  author       = {Daoyuan Wu and
                  Weichao Li and
                  Rocky K. C. Chang and
                  Debin Gao},
  title        = {MopEye: Monitoring Per-app Network Performance with Zero Measurement
                  Traffic},
  journal      = {CoRR},
  volume       = {abs/1610.01282},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.01282},
  eprinttype    = {arXiv},
  eprint       = {1610.01282},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LiMWC15,
  author       = {Weichao Li and
                  Ricky K. P. Mok and
                  Daoyuan Wu and
                  Rocky K. C. Chang},
  title        = {On the accuracy of smartphone-based mobile network measurement},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {370--378},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218402},
  doi          = {10.1109/INFOCOM.2015.7218402},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/LiMWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/MokLC15,
  author       = {Ricky K. P. Mok and
                  Weichao Li and
                  Rocky K. C. Chang},
  title        = {Detecting low-quality crowdtesting workers},
  booktitle    = {23rd {IEEE} International Symposium on Quality of Service, IWQoS 2015,
                  Portland, OR, USA, June 15-16, 2015},
  pages        = {201--206},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IWQoS.2015.7404734},
  doi          = {10.1109/IWQOS.2015.7404734},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/MokLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/LeeC15,
  author       = {Wai{-}Kiu Lee and
                  Rocky K. C. Chang},
  title        = {Evaluation of lag-related configurations in first-person shooter games},
  booktitle    = {2015 International Workshop on Network and Systems Support for Games,
                  NetGames 2015, Zagreb, Croatia, December 3-4, 2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NetGames.2015.7382997},
  doi          = {10.1109/NETGAMES.2015.7382997},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/netgames/LeeC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/MokLC15,
  author       = {Ricky K. P. Mok and
                  Weichao Li and
                  Rocky K. C. Chang},
  editor       = {Jelena Mirkovic and
                  Yong Liu},
  title        = {Improving the Packet Send-Time Accuracy in Embedded Devices},
  booktitle    = {Passive and Active Measurement - 16th International Conference, {PAM}
                  2015, New York, NY, USA, March 19-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8995},
  pages        = {332--344},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15509-8\_25},
  doi          = {10.1007/978-3-319-15509-8\_25},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/MokLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuC15,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang},
  title        = {Indirect File Leaks in Mobile Applications},
  journal      = {CoRR},
  volume       = {abs/1511.00104},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.00104},
  eprinttype    = {arXiv},
  eprint       = {1511.00104},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLHC14,
  author       = {Yajuan Tang and
                  Xiapu Luo and
                  Qing Hui and
                  Rocky K. C. Chang},
  title        = {Modeling the Vulnerability of Feedback-Control Based Internet Services
                  to Low-Rate DoS Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {3},
  pages        = {339--353},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2291970},
  doi          = {10.1109/TIFS.2013.2291970},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLHC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WuC14,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Analyzing Android Browser Apps for file: // Vulnerabilities},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {345--363},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_20},
  doi          = {10.1007/978-3-319-13257-0\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/MokLC14,
  author       = {Ricky K. P. Mok and
                  Weichao Li and
                  Rocky K. C. Chang},
  editor       = {Fabi{\'{a}}n E. Bustamante and
                  Y. Charlie Hu and
                  Arvind Krishnamurthy and
                  Sylvia Ratnasamy},
  title        = {A user behavior based cheat detection mechanism for crowdtesting},
  booktitle    = {{ACM} {SIGCOMM} 2014 Conference, SIGCOMM'14, Chicago, IL, USA, August
                  17-22, 2014},
  pages        = {123--124},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2619239.2631447},
  doi          = {10.1145/2619239.2631447},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/MokLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuC14,
  author       = {Daoyuan Wu and
                  Rocky K. C. Chang},
  title        = {Analyzing Android Browser Apps for file: // Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1404.4553},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.4553},
  eprinttype    = {arXiv},
  eprint       = {1404.4553},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WuLC14,
  author       = {Daoyuan Wu and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  title        = {A Sink-driven Approach to Detecting Exposed Component Vulnerabilities
                  in Android Apps},
  journal      = {CoRR},
  volume       = {abs/1405.6282},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.6282},
  eprinttype    = {arXiv},
  eprint       = {1405.6282},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WuLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhouLCC13,
  author       = {Peng Zhou and
                  Xiapu Luo and
                  Ang Chen and
                  Rocky K. C. Chang},
  title        = {SGor: Trust graph based onion routing},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {17},
  pages        = {3522--3544},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2013.08.005},
  doi          = {10.1016/J.COMNET.2013.08.005},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZhouLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouLC13,
  author       = {Peng Zhou and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  title        = {Inference attacks against trust-based onion routing: Trust degree
                  to the rescue},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {431--446},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.09.007},
  doi          = {10.1016/J.COSE.2013.09.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouLC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LiuLCS13,
  author       = {Yujing Liu and
                  Xiapu Luo and
                  Rocky K. C. Chang and
                  Jinshu Su},
  title        = {Characterizing Inter-Domain Rerouting by Betweenness Centrality after
                  Disruptive Events},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {31},
  number       = {6},
  pages        = {1147--1157},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSAC.2013.130616},
  doi          = {10.1109/JSAC.2013.130616},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LiuLCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ChenCLFC13,
  author       = {Ang Chen and
                  Edmond W. W. Chan and
                  Xiapu Luo and
                  Waiting W. T. Fok and
                  Rocky K. C. Chang},
  editor       = {Filip De Turck and
                  Yixin Diao and
                  Choong Seon Hong and
                  Deep Medhi and
                  Ramin Sadre},
  title        = {An efficient approach to multi-level route analytics},
  booktitle    = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
                  {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages        = {101--108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6572975/},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/ChenCLFC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/FokLMLLCC13,
  author       = {Waiting W. T. Fok and
                  Xiapu Luo and
                  Ricky K. P. Mok and
                  Weichao Li and
                  Yujing Liu and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Filip De Turck and
                  Yixin Diao and
                  Choong Seon Hong and
                  Deep Medhi and
                  Ramin Sadre},
  title        = {MonoScope: Automating network faults diagnosis based on active measurements},
  booktitle    = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
                  {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages        = {210--217},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6572988/},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/FokLMLLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LiMCF13,
  author       = {Weichao Li and
                  Ricky K. P. Mok and
                  Rocky K. C. Chang and
                  Waiting W. T. Fok},
  editor       = {Konstantina Papagiannaki and
                  P. Krishna Gummadi and
                  Craig Partridge},
  title        = {Appraising the delay accuracy in browser-based network measurement},
  booktitle    = {Proceedings of the 2013 Internet Measurement Conference, {IMC} 2013,
                  Barcelona, Spain, October 23-25, 2013},
  pages        = {361--368},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2504730.2504760},
  doi          = {10.1145/2504730.2504760},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/LiMCF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/XueMC13,
  author       = {Lei Xue and
                  Ricky K. P. Mok and
                  Rocky K. C. Chang},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {OMware: an open measurement ware for stable residential broadband
                  measurement},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {497--498},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2491702},
  doi          = {10.1145/2486001.2491702},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/XueMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pam/2013,
  editor       = {Matthew Roughan and
                  Rocky K. C. Chang},
  title        = {Passive and Active Measurement - 14th International Conference, {PAM}
                  2013, Hong Kong, China, March 18-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7799},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36516-4},
  doi          = {10.1007/978-3-642-36516-4},
  isbn         = {978-3-642-36515-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuoCZC12,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Peng Zhou and
                  Rocky K. C. Chang},
  title        = {Robust Network Covert Communications Based on {TCP} and Enumerative
                  Combinatorics},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {890--902},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.64},
  doi          = {10.1109/TDSC.2012.64},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuoCZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LiuSC12,
  author       = {Yujing Liu and
                  Jinshu Su and
                  Rocky K. C. Chang},
  title        = {{LDC:} Detecting {BGP} Prefix Hijacking by Load Distribution Change},
  booktitle    = {26th {IEEE} International Parallel and Distributed Processing Symposium
                  Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25,
                  2012},
  pages        = {1197--1203},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IPDPSW.2012.147},
  doi          = {10.1109/IPDPSW.2012.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LiuSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsys/MokLCC12,
  author       = {Ricky K. P. Mok and
                  Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Mark Claypool and
                  Carsten Griwodz},
  title        = {{QDASH:} a QoE-aware {DASH} system},
  booktitle    = {Proceedings of the Third Annual {ACM} {SIGMM} Conference on Multimedia
                  Systems, MMSys 2012, Chapel Hill, NC, USA, February 22-24, 2012},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2155555.2155558},
  doi          = {10.1145/2155555.2155558},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsys/MokLCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/LiuLCS12,
  author       = {Yujing Liu and
                  Xiapu Luo and
                  Rocky K. C. Chang and
                  Jinshu Su},
  editor       = {Robert Bestak and
                  Lukas Kencl and
                  Li Erran Li and
                  Joerg Widmer and
                  Hao Yin},
  title        = {Characterizing Inter-domain Rerouting after Japan Earthquake},
  booktitle    = {{NETWORKING} 2012 - 11th International {IFIP} {TC} 6 Networking Conference,
                  Prague, Czech Republic, May 21-25, 2012, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7290},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30054-7\_10},
  doi          = {10.1007/978-3-642-30054-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/LiuLCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhouLC12,
  author       = {Peng Zhou and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {More Anonymity through Trust Degree in Trust-Based Onion Routing},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_17},
  doi          = {10.1007/978-3-642-36883-7\_17},
  timestamp    = {Fri, 03 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhouLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LuoZZPLC11,
  author       = {Xiapu Luo and
                  Peng Zhou and
                  Junjie Zhang and
                  Roberto Perdisci and
                  Wenke Lee and
                  Rocky K. C. Chang},
  editor       = {Robert H'obbes' Zakon and
                  John P. McDermott and
                  Michael E. Locasto},
  title        = {Exposing invisible timing-based traffic watermarks with {BACKLIT}},
  booktitle    = {Twenty-Seventh Annual Computer Security Applications Conference, {ACSAC}
                  2011, Orlando, FL, USA, 5-9 December 2011},
  pages        = {197--206},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2076732.2076760},
  doi          = {10.1145/2076732.2076760},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LuoZZPLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChenCLC11,
  author       = {Ang Chen and
                  Edmond W. W. Chan and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {Hyun{-}chul Kim and
                  Dimitrios Koutsonikolas and
                  Costin Raiciu},
  title        = {An integrative multi-level analysis of internet path changes},
  booktitle    = {Proceedings of The {ACM} CoNEXT Student Workshop, CoNEXT '11 Student,
                  Tokyo, Japan, December 6-9, 2011},
  pages        = {4:1--4:2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2079327.2079331},
  doi          = {10.1145/2079327.2079331},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ChenCLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChanCLMLC11,
  author       = {Edmond W. W. Chan and
                  Ang Chen and
                  Xiapu Luo and
                  Ricky K. P. Mok and
                  Weichao Li and
                  Rocky K. C. Chang},
  editor       = {Kenjiro Cho and
                  Mark Crovella},
  title        = {{TRIO:} measuring asymmetric capacity with three minimum round-trip
                  times},
  booktitle    = {Proceedings of the 2011 Conference on Emerging Networking Experiments
                  and Technologies, Co-NEXT '11, Tokyo, Japan, December 6-9, 2011},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2079296.2079311},
  doi          = {10.1145/2079296.2079311},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ChanCLMLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LuoZCCL11,
  author       = {Xiapu Luo and
                  Peng Zhou and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang and
                  Wenke Lee},
  title        = {A combinatorial approach to network covert communications with applications
                  in Web Leaks},
  booktitle    = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011},
  pages        = {474--485},
  publisher    = {{IEEE} Compute Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSN.2011.5958260},
  doi          = {10.1109/DSN.2011.5958260},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LuoZCCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/MokCC11,
  author       = {Ricky K. P. Mok and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {Measuring the quality of experience of {HTTP} video streaming},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {485--492},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990550},
  doi          = {10.1109/INM.2011.5990550},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/MokCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/LiFCLC11,
  author       = {Weichao Li and
                  Waiting W. T. Fok and
                  Edmond W. W. Chan and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {Planetopus: {A} system for facilitating collaborative network monitoring},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {911--924},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990499},
  doi          = {10.1109/INM.2011.5990499},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/LiFCLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuoZCLCP11,
  author       = {Xiapu Luo and
                  Peng Zhou and
                  Edmond W. W. Chan and
                  Wenke Lee and
                  Rocky K. C. Chang and
                  Roberto Perdisci},
  title        = {{HTTPOS:} Sealing Information Leaks with Browser-side Obfuscation
                  of Encrypted Flows},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/httpos-sealing-information-leaks-with-browser-side-obfuscation-of-encrypted-flows},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LuoZCLCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/ChanLFLC11,
  author       = {Edmond W. W. Chan and
                  Xiapu Luo and
                  Waiting W. T. Fok and
                  Weichao Li and
                  Rocky K. C. Chang},
  editor       = {Neil Spring and
                  George F. Riley},
  title        = {Non-cooperative Diagnosis of Submarine Cable Faults},
  booktitle    = {Passive and Active Measurement - 12th International Conference, {PAM}
                  2011, Atlanta, GA, USA, March 20-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6579},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19260-9\_23},
  doi          = {10.1007/978-3-642-19260-9\_23},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/ChanLFLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/MokCLC11,
  author       = {Ricky K. P. Mok and
                  Edmond W. W. Chan and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {Nina Taft and
                  David Wetherall},
  title        = {Inferring the QoE of {HTTP} video streaming from user-viewing activities},
  booktitle    = {Proceedings of the first {ACM} {SIGCOMM} workshop on Measurements
                  up the stack, W-MUST@SIGCOMM 2011, Toronto, Ontario, Canada, August
                  19, 2011},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2018602.2018611},
  doi          = {10.1145/2018602.2018611},
  timestamp    = {Tue, 06 Nov 2018 11:07:11 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/MokCLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-5794,
  author       = {Peng Zhou and
                  Xiapu Luo and
                  Ang Chen and
                  Rocky K. C. Chang},
  title        = {STor: Social Network based Anonymous Communication in Tor},
  journal      = {CoRR},
  volume       = {abs/1110.5794},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.5794},
  eprinttype    = {arXiv},
  eprint       = {1110.5794},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-5794.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ChangFLCL10,
  author       = {Rocky K. C. Chang and
                  Waiting W. T. Fok and
                  Weichao Li and
                  Edmond W. W. Chan and
                  Xiapu Luo},
  title        = {Neighbor-Cooperative Measurement of Network Path Quality},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684138},
  doi          = {10.1109/GLOCOM.2010.5684138},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ChangFLCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/ChanLLFC10,
  author       = {Edmond W. W. Chan and
                  Xiapu Luo and
                  Weichao Li and
                  Waiting W. T. Fok and
                  Rocky K. C. Chang},
  editor       = {Mark Allman},
  title        = {Measurement of loss pairs in network paths},
  booktitle    = {Proceedings of the 10th {ACM} {SIGCOMM} Internet Measurement Conference,
                  {IMC} 2010, Melbourne, Australia - November 1-3, 2010},
  pages        = {88--101},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1879141.1879154},
  doi          = {10.1145/1879141.1879154},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/ChanLLFC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/HuangCH09,
  author       = {Chin{-}Tser Huang and
                  Rocky K. C. Chang and
                  Polly Huang},
  title        = {Signal Processing Applications in Network Intrusion Detection Systems},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/527689},
  doi          = {10.1155/2009/527689},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/HuangCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/LuoCC09,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  title        = {Detecting Pulsing Denial-of-Service Attacks with Nondeterministic
                  Attack Intervals},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/256821},
  doi          = {10.1155/2009/256821},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/LuoCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChanLC09a,
  author       = {Edmond W. W. Chan and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {Matthew Caesar and
                  Polly Huang and
                  Luigi Iannone},
  title        = {Reliable asymmetric path capacity measurement},
  booktitle    = {Proceedings of the 5th international student workshop on Emerging
                  networking experiments and technologies, Co-Next Student Workshop
                  '09, Rome, Italy, December 1, 2009},
  pages        = {55--56},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1658997.1659027},
  doi          = {10.1145/1658997.1659027},
  timestamp    = {Wed, 19 May 2021 08:28:09 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/ChanLC09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ChanLC09,
  author       = {Edmond W. W. Chan and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {J{\"{o}}rg Liebeherr and
                  Giorgio Ventre and
                  Ernst W. Biersack and
                  Srinivasan Keshav},
  title        = {A minimum-delay-difference method for mitigating cross-traffic impact
                  on capacity measurement},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Emerging Networking Experiments
                  and Technology, CoNEXT 2009, Rome, Italy, December 1-4, 2009},
  pages        = {205--216},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1658939.1658963},
  doi          = {10.1145/1658939.1658963},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ChanLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LuoCC09,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  title        = {{CLACK:} {A} Network Covert Channel Based on Partial Acknowledgment
                  Encoding},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198826},
  doi          = {10.1109/ICC.2009.5198826},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LuoCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/TangLHC09,
  author       = {Yajuan Tang and
                  Xiapu Luo and
                  Qing Hui and
                  Rocky K. C. Chang},
  title        = {On generalized low-rate denial-of-quality attack against Internet
                  services},
  booktitle    = {17th International Workshop on Quality of Service, IWQoS 2009, Charleston,
                  South Carolina, USA, 13-15 July 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IWQoS.2009.5201419},
  doi          = {10.1109/IWQOS.2009.5201419},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/TangLHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LuoCC09,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Geoffrey M. Voelker and
                  Alec Wolman},
  title        = {Design and Implementation of {TCP} Data Probes for Reliable and Metric-Rich
                  Network Path Monitoring},
  booktitle    = {Proceedings of the 2009 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2009, San Diego, CA, USA, June 14-19, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/usenix-09/design-and-implementation-tcp-data-probes-reliable-and-metric-rich-network-path},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/LuoCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LuoCC08,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  title        = {{TCP} covert timing channels: Design and detection},
  booktitle    = {The 38th Annual {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2008, June 24-27, 2008, Anchorage, Alaska,
                  USA, Proceedings},
  pages        = {420--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/DSN.2008.4630112},
  doi          = {10.1109/DSN.2008.4630112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LuoCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/WangCLC07,
  author       = {Jessie Hui Wang and
                  Dah{-}Ming Chiu and
                  John C. S. Lui and
                  Rocky K. C. Chang},
  title        = {Inter-AS Inbound Traffic Engineering via {ASPP}},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {4},
  number       = {1},
  pages        = {62--70},
  year         = {2007},
  url          = {https://doi.org/10.1109/TNSM.2007.030106},
  doi          = {10.1109/TNSM.2007.030106},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/WangCLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LuoCC07,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Cloak: {A} Ten-Fold Way for Reliable Covert Communications},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_19},
  doi          = {10.1007/978-3-540-74835-9\_19},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LuoCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/expcs/LoCC07,
  author       = {Samantha Lo and
                  Rocky K. C. Chang and
                  Lorenzo Colitti},
  title        = {An active approach to measuring routing dynamics induced by autonomous
                  systems},
  booktitle    = {Proceedings of the Workshop on Experimental Computer Science, Part
                  of {ACM} FCRC, San Diego, CA, USA, 13-14 June 2007},
  pages        = {20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1281700.1281720},
  doi          = {10.1145/1281700.1281720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/expcs/LoCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/TangLC07,
  author       = {Yajuan Tang and
                  Xiapu Luo and
                  Rocky K. C. Chang},
  editor       = {Eric Goetz and
                  Sujeet Shenoi},
  title        = {Protecting Internet Services from Low-Rate DoS Attacks},
  booktitle    = {Critical Infrastructure Protection, Post-Proceedings of the First
                  Annual {IFIP} Working Group 11.10 International Conference on Critical
                  Infrastructure Protection, Dartmouth College, Hanover, New Hampshire,
                  USA, March 19-21, 2007},
  series       = {{IFIP}},
  volume       = {253},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-75462-8\_18},
  doi          = {10.1007/978-0-387-75462-8\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/TangLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LuoCC07,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Crafting Web Counters into Covert Channels},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {337--348},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_29},
  doi          = {10.1007/978-0-387-72367-9\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LuoCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/XieC06,
  author       = {Yi Xie and
                  Rocky K. C. Chang},
  title        = {Optimizing Energy Efficiency in Polling-Based Wireless Networks with
                  Stability Constraints},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.820},
  doi          = {10.1109/GLOCOM.2006.820},
  timestamp    = {Fri, 21 Feb 2020 18:38:36 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/XieC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/LuoCC06,
  author       = {Xiapu Luo and
                  Edmond W. W. Chan and
                  Rocky K. C. Chang},
  editor       = {Joseph L. Hellerstein and
                  Burkhard Stiller},
  title        = {Vanguard: {A} New Detection Scheme for a Class of TCP-targeted Denial-of-Service
                  Attacks},
  booktitle    = {Management of Integrated End-to-End Communications and Services, 10th
                  {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006,
                  Vancouver, Canada, April 3-7, 2006. Proceedings},
  pages        = {507--518},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/NOMS.2006.1687579},
  doi          = {10.1109/NOMS.2006.1687579},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/LuoCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/XieC06,
  author       = {Yi Xie and
                  Rocky K. C. Chang},
  editor       = {Luciano Lenzini and
                  Rene L. Cruz},
  title        = {Stability-constrained optimization for energy efficiency in polling-based
                  wireless networks},
  booktitle    = {Proceedings of the 1st International Conference on Performance Evaluation
                  Methodolgies and Tools, {VALUETOOLS} 2006, Pisa, Italy, October 11-13,
                  2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {180},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1190095.1190124},
  doi          = {10.1145/1190095.1190124},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/valuetools/XieC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/valuetools/LamCX06,
  author       = {Sum Lam and
                  Rocky K. C. Chang and
                  Yi Xie},
  editor       = {Luciano Lenzini and
                  Rene L. Cruz},
  title        = {Relative stability analysis of multiple queues},
  booktitle    = {Proceedings of the 1st International Conference on Performance Evaluation
                  Methodolgies and Tools, {VALUETOOLS} 2006, Pisa, Italy, October 11-13,
                  2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {180},
  pages        = {65},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1190095.1190178},
  doi          = {10.1145/1190095.1190178},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/valuetools/LamCX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChangL05,
  author       = {Rocky K. C. Chang and
                  Michael Lo},
  title        = {Inbound traffic engineering for multihomed ASs using {AS} path prepending},
  journal      = {{IEEE} Netw.},
  volume       = {19},
  number       = {2},
  pages        = {18--25},
  year         = {2005},
  url          = {https://doi.org/10.1109/MNET.2005.1407694},
  doi          = {10.1109/MNET.2005.1407694},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChangL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LuoC05,
  author       = {Xiapu Luo and
                  Rocky K. C. Chang},
  title        = {Optimizing the Pulsing Denial-of-Service Attacks},
  booktitle    = {2005 International Conference on Dependable Systems and Networks {(DSN}
                  2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings},
  pages        = {582--591},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/DSN.2005.75},
  doi          = {10.1109/DSN.2005.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LuoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/LuoC05,
  author       = {Xiapu Luo and
                  Rocky K. C. Chang},
  title        = {Novel Approaches to End-to-End Packet Reordering Measurement},
  booktitle    = {Proceedings of the 5th Internet Measurement Conference, {IMC} 2005,
                  Berkeley, California, USA, October 19-21, 2005},
  pages        = {227--238},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {http://www.usenix.org/events/imc05/tech/luo.html},
  timestamp    = {Mon, 08 Jul 2019 07:25:34 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/LuoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/HuC05,
  author       = {Guangmin Hu and
                  Rocky K. C. Chang},
  title        = {Forwarding State Scalability-Aware Multicast Routing},
  booktitle    = {Proceedings of the 10th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2005), 27-30 June 2005, Murcia, Cartagena, Spain},
  pages        = {395--400},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCC.2005.73},
  doi          = {10.1109/ISCC.2005.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/HuC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/LuoCC05,
  author       = {Xiapu Luo and
                  Rocky K. C. Chang and
                  Edmond W. W. Chan},
  title        = {Performance Analysis of {TCP/AQM} Under Denial-of-Service Attacks},
  booktitle    = {13th International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems {(MASCOTS} 2005), 27-29
                  September 2005, Atlanta, GA, {USA}},
  pages        = {97--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MASCOTS.2005.50},
  doi          = {10.1109/MASCOTS.2005.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/LuoCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LuoC05,
  author       = {Xiapu Luo and
                  Rocky K. C. Chang},
  title        = {On a New Class of Pulsing Denial-of-Service Attacks and the Defense},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/new-class-pulsing-denial-service-attacks-and-defense/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LuoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/ChanC04,
  author       = {Hang T. Chan and
                  Rocky K. C. Chang},
  title        = {Strifeshadow Fantasy: a massive multi-player online game},
  booktitle    = {1st {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2004, Las Vegas, NV, USA, January 5-8, 2004},
  pages        = {557--562},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CCNC.2004.1286922},
  doi          = {10.1109/CCNC.2004.1286922},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/ChanC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/Chang04,
  author       = {Rocky K. C. Chang},
  editor       = {Roger D. Boyle and
                  Martyn Clark and
                  Amruth N. Kumar},
  title        = {Teaching computer networking with the help of personal computer networks},
  booktitle    = {Proceedings of the 9th Annual {SIGCSE} Conference on Innovation and
                  Technology in Computer Science Education, ITiCSE 2004, Leeds, UK,
                  June 28-30, 2004},
  pages        = {208--212},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1007996.1008052},
  doi          = {10.1145/1007996.1008052},
  timestamp    = {Wed, 10 Mar 2021 13:17:16 +0100},
  biburl       = {https://dblp.org/rec/conf/iticse/Chang04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/ChangL04,
  author       = {Rocky K. C. Chang and
                  Michael Lo},
  title        = {Inbound traffic engineering for multi-homed ASes using {AS} path prepending},
  booktitle    = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP}
                  Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea,
                  19-23 April 2004, Proceedings},
  pages        = {89--102},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/NOMS.2004.1317645},
  doi          = {10.1109/NOMS.2004.1317645},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/ChangL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/LamC03,
  author       = {Sum Lam and
                  Rocky K. C. Chang},
  title        = {Per-queue stability analysis of a dynamic quota sharing scheme for
                  wireless networks},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {31},
  number       = {2},
  pages        = {20--22},
  year         = {2003},
  url          = {https://doi.org/10.1145/959143.959156},
  doi          = {10.1145/959143.959156},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/LamC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/Chang03,
  author       = {Rocky K. C. Chang},
  editor       = {Irwin King and
                  Tam{\'{a}}s M{\'{a}}ray},
  title        = {A Multicast-On-Large-Demand Approach to the Flash Crowd Problem},
  booktitle    = {Proceedings of the Twelfth International World Wide Web Conference
                  - Posters, {WWW} 2003, Budapest, Hungary, May 20-24, 2003},
  year         = {2003},
  url          = {http://www2003.org/cdrom/papers/poster/p270/P270-Chang.html},
  timestamp    = {Wed, 17 Jul 2013 16:59:51 +0200},
  biburl       = {https://dblp.org/rec/conf/www/Chang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Chang02,
  author       = {Rocky K. C. Chang},
  title        = {Defending against flooding-based distributed denial-of-service attacks:
                  a tutorial},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {40},
  number       = {10},
  pages        = {42--51},
  year         = {2002},
  url          = {https://doi.org/10.1109/MCOM.2002.1039856},
  doi          = {10.1109/MCOM.2002.1039856},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/Chang02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SiuC02,
  author       = {Fai Siu and
                  Rocky K. C. Chang},
  title        = {Effectiveness of optimal node assignments in wavelength division multiplexing
                  networks with fixed regular virtual topologies},
  journal      = {Comput. Networks},
  volume       = {38},
  number       = {1},
  pages        = {61--74},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1389-1286(01)00240-7},
  doi          = {10.1016/S1389-1286(01)00240-7},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SiuC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/WanC02,
  author       = {Kalman K. K. Wan and
                  Rocky K. C. Chang},
  title        = {Engineering of a global defense infrastructure for DDoS attacks},
  booktitle    = {Proceedings 10th {IEEE} International Conference on Networks: Towards
                  Network Superiority, {ICON} 2002, Singapore, August 27-30, 2002},
  pages        = {419--427},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICON.2002.1033348},
  doi          = {10.1109/ICON.2002.1033348},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icon/WanC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ChangF02,
  author       = {Rocky K. C. Chang and
                  King P. Fung},
  title        = {Transport layer proxy for stateful {UDP} packet filtering},
  booktitle    = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2002), 1-4 July 2002, Taormina, Italy},
  pages        = {595--600},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ISCC.2002.1021735},
  doi          = {10.1109/ISCC.2002.1021735},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/ChangF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/ChangW01,
  author       = {Rocky K. C. Chang and
                  Hong Y. Wang},
  title        = {Routing Properties of a Recursive Interconnection Network},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {61},
  number       = {6},
  pages        = {838--849},
  year         = {2001},
  url          = {https://doi.org/10.1006/jpdc.2001.1729},
  doi          = {10.1006/JPDC.2001.1729},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/ChangW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmetrics/LamC01,
  author       = {Sum Lam and
                  Rocky K. C. Chang},
  title        = {Stability comparison in single-server-multiple-queue systems},
  journal      = {{SIGMETRICS} Perform. Evaluation Rev.},
  volume       = {29},
  number       = {3},
  pages        = {32--34},
  year         = {2001},
  url          = {https://doi.org/10.1145/507553.507567},
  doi          = {10.1145/507553.507567},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmetrics/LamC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/ChangL01a,
  author       = {Rocky K. C. Chang and
                  Sum Lam},
  title        = {Per-queue stability analysis of a random access system},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {46},
  number       = {9},
  pages        = {1466--1470},
  year         = {2001},
  url          = {https://doi.org/10.1109/9.948479},
  doi          = {10.1109/9.948479},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/ChangL01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/TsangC01,
  author       = {EsteUa C. M. Tsang and
                  Rocky K. C. Chang},
  title        = {A simulation study on the throughput fairness of {TCP} Vegas},
  booktitle    = {Proceedings 9th {IEEE} International Conference on Networks, {ICON}
                  2001, Bangkok, Thailand, October 10-11, 2001},
  pages        = {469--474},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICON.2001.962387},
  doi          = {10.1109/ICON.2001.962387},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/TsangC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/FungC00,
  author       = {King P. Fung and
                  Rocky K. C. Chang},
  title        = {A Transport-Level Proxy for Secure Multimedia Streams},
  journal      = {{IEEE} Internet Comput.},
  volume       = {4},
  number       = {6},
  pages        = {57--67},
  year         = {2000},
  url          = {https://doi.org/10.1109/4236.895017},
  doi          = {10.1109/4236.895017},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/FungC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/ChangL00,
  author       = {Rocky K. C. Chang and
                  Sum Lam},
  title        = {A novel approach to queue stability analysis of polling models},
  journal      = {Perform. Evaluation},
  volume       = {40},
  number       = {1-3},
  pages        = {27--46},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0166-5316(99)00068-1},
  doi          = {10.1016/S0166-5316(99)00068-1},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/ChangL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/ChangC00,
  author       = {Rocky K. C. Chang and
                  Ho Y. Chan},
  title        = {A throughput deadlock-free {TCP} for high-speed Internet},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 2000:
                  Networking Trends and Challenges in the New Millennium, {ICON} 2000,
                  Singapore, September 5-8, 2000},
  pages        = {87--92},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICON.2000.875773},
  doi          = {10.1109/ICON.2000.875773},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/ChangC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ChengC00,
  author       = {Filli Y. Y. Cheng and
                  Rocky K. C. Chang},
  title        = {A Tree Switching Protocol for Multicast State Reduction},
  booktitle    = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2000), 4-6 July 2000, Antibes, France},
  pages        = {672--677},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISCC.2000.860716},
  doi          = {10.1109/ISCC.2000.860716},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/ChengC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/SiuC98,
  author       = {Fai Siu and
                  Rocky K. C. Chang},
  editor       = {Peng{-}Jun Wan and
                  Ding{-}Zhu Du and
                  Panos M. Pardalos},
  title        = {Optimal node assignment in reconfigurable {WDM} lightwave networks
                  with regular virtual topologies},
  booktitle    = {Multichannel Optical Networks: Theory and Practice, Proceedings of
                  a {DIMACS} Workshop, March 16-19, 1998},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {46},
  pages        = {205--226},
  publisher    = {{DIMACS/AMS}},
  year         = {1998},
  url          = {https://doi.org/10.1090/dimacs/046/15},
  doi          = {10.1090/DIMACS/046/15},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/SiuC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SiuC98,
  author       = {Fai Siu and
                  Rocky K. C. Chang},
  title        = {Optimal node assignment in reconfigurable {WDM} lightwave networks
                  with regular virtual topologies},
  booktitle    = {Proceedings of the Third {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece},
  pages        = {375--379},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISCC.1998.702550},
  doi          = {10.1109/ISCC.1998.702550},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SiuC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/SiuC98a,
  author       = {Fai Siu and
                  Rocky K. C. Chang},
  title        = {Improving the performance of reconfigurable {WDM} lightwave networks
                  with deflection routing via node reassignment},
  booktitle    = {Proceedings of the Third {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece},
  pages        = {385--389},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISCC.1998.702552},
  doi          = {10.1109/ISCC.1998.702552},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/SiuC98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/WongC98,
  author       = {Simon C. Wong and
                  Rocky K. C. Chang},
  title        = {An optimal end-to-end bypass configuration algorithm for self-heating
                  VP-based {ATM} networks},
  booktitle    = {Proceedings of the Third {IEEE} Symposium on Computers and Communications
                  {(ISCC} 1998), June 30 - July 2, 1998, Athens, Greece},
  pages        = {627--631},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ISCC.1998.702611},
  doi          = {10.1109/ISCC.1998.702611},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/WongC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}