default search action
George Kesidis
Person information
- affiliation: Pennsylvania State University, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c157]Xi Li, Songhe Wang, Ruiquan Huang, Mahanth Gowda, George Kesidis:
Temporal-Distributed Backdoor Attack against Video Based Action Recognition. AAAI 2024: 3199-3207 - [c156]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic. SP 2024: 1994-2012 - [i71]Aakash Sharma, Vivek M. Bhasi, Sonali Singh, George Kesidis, Mahmut T. Kandemir, Chita R. Das:
GPU Cluster Scheduling for Network-Sensitive Deep Learning. CoRR abs/2401.16492 (2024) - [i70]Xi Li, Hang Wang, David J. Miller, George Kesidis:
Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks. CoRR abs/2402.02034 (2024) - [i69]Jayaram Raghuram, George Kesidis, David J. Miller:
On Trojans in Refined Language Models. CoRR abs/2406.07778 (2024) - 2023
- [j78]Hang Wang, David J. Miller, George Kesidis:
Anomaly detection of adversarial examples using class-conditional generative adversarial networks. Comput. Secur. 124: 102956 (2023) - [j77]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of information using Markov-renewal methods. Queueing Syst. Theory Appl. 103(1-2): 95-130 (2023) - [c155]Hang Wang, Sahar Karami, Ousmane Dia, Hippolyt Ritter, Ehsan Emamjomeh-Zadeh, Jiahui Chen, Zhen Xiang, David J. Miller, George Kesidis:
Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning. ICASSP 2023: 1-5 - [c154]Aakash Sharma, Vivek M. Bhasi, Sonali Singh, Rishabh Jain, Jashwant Raj Gunasekaran, Subrata Mitra, Mahmut Taylan Kandemir, George Kesidis, Chita R. Das:
Stash: A Comprehensive Stall-Centric Characterization of Public Cloud VMs for Distributed Deep Learning. ICDCS 2023: 1-12 - [c153]Nader Alfares, George Kesidis:
Container Sizing for Microservices with Dynamic Workload by Online Optimization. WOC@Middleware 2023: 1-6 - [c152]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers. MLSP 2023: 1-6 - [i68]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection. CoRR abs/2308.04617 (2023) - [i67]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Backdoor Mitigation by Correcting the Distribution of Neural Activations. CoRR abs/2308.09850 (2023) - [i66]Xi Li, Songhe Wang, Ruiquan Huang, Mahanth Gowda, George Kesidis:
Temporal-Distributed Backdoor Attack Against Video Based Action Recognition. CoRR abs/2308.11070 (2023) - [i65]Hang Wang, David J. Miller, George Kesidis:
Post-Training Overfitting Mitigation in DNN Classifiers. CoRR abs/2309.16827 (2023) - 2022
- [j76]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
In search of the least age of information. Queueing Syst. Theory Appl. 100(3-4): 465-467 (2022) - [j75]Zhen Xiang, David J. Miller, George Kesidis:
Detection of Backdoors in Trained Classifiers Without Access to the Training Set. IEEE Trans. Neural Networks Learn. Syst. 33(3): 1177-1191 (2022) - [c151]Myungjun Son, Shruti Mohanty, Jashwant Raj Gunasekaran, Aman Jain, Mahmut Taylan Kandemir, George Kesidis, Bhuvan Urgaonkar:
Splice: An Automated Framework for Cost-and Performance-Aware Blending of Cloud Services. CCGRID 2022: 119-128 - [c150]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
Detecting Backdoor Attacks against Point Cloud Classifiers. ICASSP 2022: 3159-3163 - [c149]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks. ICASSP 2022: 3333-3337 - [c148]Zhen Xiang, David J. Miller, George Kesidis:
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios. ICLR 2022 - [c147]Wonil Choi, Bhuvan Urgaonkar, Mahmut Taylan Kandemir, George Kesidis:
Multi-resource fair allocation for consolidated flash-based caching systems. Middleware 2022: 202-215 - [i64]Zhen Xiang, David J. Miller, George Kesidis:
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios. CoRR abs/2201.08474 (2022) - [i63]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
Universal Post-Training Backdoor Detection. CoRR abs/2205.06900 (2022) - [i62]Nader Alfares, Ata F. Baarzi, George Kesidis, Aman Jain:
IaaS Procurement by Simulated Annealing. CoRR abs/2207.04594 (2022) - [i61]Aakash Sharma, Vivek M. Bhasi, Sonali Singh, Rishabh Jain, Jashwant Raj Gunasekaran, Subrata Mitra, Mahmut Taylan Kandemir, George Kesidis, Chita R. Das:
Analysis of Distributed Deep Learning in the Cloud. CoRR abs/2208.14344 (2022) - [i60]Hang Wang, Sahar Karami, Ousmane Dia, H. Ritter, Ehsan Emamjomeh-Zadeh, Jiahui Chen, Zhen Xiang, David J. Miller, George Kesidis:
Training set cleansing of backdoor poisoning by self-supervised representation learning. CoRR abs/2210.10272 (2022) - 2021
- [j74]Zhen Xiang, David J. Miller, George Kesidis:
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing. Comput. Secur. 106: 102280 (2021) - [j73]Zhen Xiang, David J. Miller, Hang Wang, George Kesidis:
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set. Neural Comput. 33(5): 1329-1371 (2021) - [c146]Aakash Sharma, Saravanan Dhakshinamurthy, George Kesidis, Chita R. Das:
CASH: A Credit Aware Scheduling for Public Cloud Platforms. CCGRID 2021: 227-236 - [c145]Ataollah Fatahi Baarzi, George Kesidis:
SHOWAR: Right-Sizing And Efficient Scheduling of Microservices. SoCC 2021: 427-441 - [c144]Ataollah Fatahi Baarzi, George Kesidis, Carlee Joe-Wong, Mohammad Shahrad:
On Merits and Viability of Multi-Cloud Serverless. SoCC 2021: 600-608 - [c143]Zhen Xiang, David J. Miller, George Kesidis:
L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set. ICASSP 2021: 3745-3749 - [c142]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
A Backdoor Attack against 3D Point Cloud Classifiers. ICCV 2021: 7577-7587 - [i59]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
A Backdoor Attack against 3D Point Cloud Classifiers. CoRR abs/2104.05808 (2021) - [i58]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of information without service preemption. CoRR abs/2104.08050 (2021) - [i57]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of information distribution under dynamic service preemption. CoRR abs/2104.11393 (2021) - [i56]Hang Wang, David J. Miller, George Kesidis:
Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks. CoRR abs/2105.10101 (2021) - [i55]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A BIC based Mixture Model Defense against Data Poisoning Attacks on Classifiers. CoRR abs/2105.13530 (2021) - [i54]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
Age of Information for Small Buffer Systems. CoRR abs/2106.08473 (2021) - [i53]Xi Li, George Kesidis, David J. Miller, Maxime Bergeron, Ryan Ferguson, Vladimir Lucic:
Robust and Active Learning for Deep Neural Network Regression. CoRR abs/2107.13124 (2021) - [i52]Xi Li, George Kesidis, David J. Miller, Vladimir Lucic:
Backdoor Attack and Defense for Deep Regression. CoRR abs/2109.02381 (2021) - [i51]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
Detecting Backdoor Attacks Against Point Cloud Classifiers. CoRR abs/2110.10354 (2021) - [i50]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks. CoRR abs/2112.03350 (2021) - 2020
- [j72]Weiqiang Liu, Maximilian John, Andreas Karrenbauer, Adam Allerhand, Fabrizio Lombardi, Michael Shulte, David J. Miller, Zhen Xiang, George Kesidis, Antti Oulasvirta, Niraj Ramesh Dayama, Morteza Shiripour:
Scanning the Issue. Proc. IEEE 108(3): 400-401 (2020) - [j71]David J. Miller, Zhen Xiang, George Kesidis:
Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks. Proc. IEEE 108(3): 402-433 (2020) - [j70]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
The distribution of age-of-information performance measures for message processing systems. Queueing Syst. Theory Appl. 95(3): 203-250 (2020) - [j69]George Kesidis, Takis Konstantopoulos:
TB/GI/1 queues with arrival traffic envelopes. SIGMETRICS Perform. Evaluation Rev. 48(2): 27-29 (2020) - [j68]Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? IEEE/ACM Trans. Netw. 28(4): 1435-1448 (2020) - [c141]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers. DDDAS 2020: 262-273 - [c140]Ataollah Fatahi Baarzi, George Kesidis, Dan Fleck, Angelos Stavrou:
Microservices made attack-resilient using unsupervised service fissioning. EuroSec@EuroSys 2020: 31-36 - [c139]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification. ICASSP 2020: 3827-3831 - [c138]Yuquan Shan, George Kesidis, Aman Jain, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Cloud. WOC@Middleware 2020: 7-12 - [c137]Aman Jain, Ata F. Baarzi, George Kesidis, Bhuvan Urgaonkar, Nader Alfares, Mahmut T. Kandemir:
SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and IaaS. Middleware 2020: 236-250 - [c136]Zhen Xiang, David J. Miller, Hang Wang, George Kesidis:
Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. MLSP 2020: 1-6 - [i49]Aakash Sharma, Saravanan Dhakshinamurthy, George Kesidis, Chita R. Das:
CASH: A Credit Aware Scheduling for Public Cloud Platforms. CoRR abs/2009.04561 (2020) - [i48]Zhen Xiang, David J. Miller, George Kesidis:
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing. CoRR abs/2010.07489 (2020) - [i47]Zhen Xiang, David J. Miller, George Kesidis:
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set. CoRR abs/2010.09987 (2020)
2010 – 2019
- 2019
- [j67]Aris Leivadeas, George Kesidis, Mohamed Ibnkahla, Ioannis Lambadaris:
VNF Placement Optimization at the Edge and Cloud †. Future Internet 11(3): 69 (2019) - [j66]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
A Cost-Aware Fair Allocation Mechanism for Multi-Resource Servers. IEEE Netw. Lett. 1(1): 34-37 (2019) - [j65]David J. Miller, Yujia Wang, George Kesidis:
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. Neural Comput. 31(8): 1624-1670 (2019) - [c135]Jashwant Raj Gunasekaran, Prashanth Thinakaran, Mahmut Taylan Kandemir, Bhuvan Urgaonkar, George Kesidis, Chita R. Das:
Spock: Exploiting Serverless Functions for SLO and Cost Aware Resource Procurement in Public Cloud. CLOUD 2019: 199-208 - [c134]Aman Jain, Ata F. Baarzi, Nader Alfares, George Kesidis, Bhuvan Urgaonkar, Mahmut T. Kandemir:
SpIitServe: Efficiently Splitting Complex Workloads Across FaaS and IaaS. SoCC 2019: 487 - [c133]Yujia Wang, David J. Miller, George Kesidis:
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers. ICASSP 2019: 8063-8066 - [c132]George Kesidis:
Overbooking Lambda Functions in the Cloud. WOC@Middleware 2019: 1-6 - [c131]Zhen Xiang, David J. Miller, George Kesidis:
A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense. MLSP 2019: 1-6 - [i46]George Kesidis:
Temporal Overbooking of Lambda Functions in the Cloud. CoRR abs/1901.09842 (2019) - [i45]George Kesidis, Takis Konstantopoulos, Michael A. Zazanis:
The distribution of age-of-information performance measures for message processing systems. CoRR abs/1904.05924 (2019) - [i44]David J. Miller, Zhen Xiang, George Kesidis:
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks. CoRR abs/1904.06292 (2019) - [i43]George Kesidis, Bhuvan Urgaonkar, Mahmut T. Kandemir, Takis Konstantopoulos:
A caching system with object sharing. CoRR abs/1905.07641 (2019) - [i42]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification. CoRR abs/1908.10498 (2019) - [i41]George Kesidis, David J. Miller:
Notes on Lipschitz Margin, Lipschitz Margin Training, and Lipschitz Margin p-Values for Deep Neural Network Classifiers. CoRR abs/1910.08032 (2019) - [i40]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. CoRR abs/1911.07970 (2019) - 2018
- [j64]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Constrained max-min fair scheduling of variable-length packet-flows to multiple servers. Ann. des Télécommunications 73(3-4): 219-237 (2018) - [j63]Ying-Dar Lin, Yuan-Cheng Lai, George Kesidis, Athanasios V. Vasilakos:
Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations. IEEE Syst. J. 12(1): 7-9 (2018) - [j62]Cheng Wang, Bhuvan Urgaonkar, George Kesidis, Aayush Gupta, Lydia Y. Chen, Robert Birke:
Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability. ACM Trans. Auton. Adapt. Syst. 13(1): 2:1-2:25 (2018) - [j61]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers. IEEE Trans. Parallel Distributed Syst. 29(12): 2686-2699 (2018) - [c130]Daniel Fleck, Angelos Stavrou, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos:
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. DSC 2018: 1-8 - [c129]Neda Nasiriani, George Kesidis, Di Wang:
Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response. e-Energy 2018: 21-32 - [c128]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
A Cost-Efficient and Fair Multi-Resource Allocation Mechanism for Self-Organizing Servers. GLOBECOM 2018: 1-7 - [c127]Neda Nasiriani, George Kesidis:
Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation Model. ICNC 2018: 58-62 - [c126]George Kesidis:
Stationary Distribution of a Generalized LRU-MRU Content Cache. ICNC 2018: 676-681 - [c125]George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos:
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. MALWARE 2018: 61-67 - [c124]George Kesidis, Yuquan Shan, Aman Jain, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Scheduling Distributed Resources in Heterogeneous Private Clouds. MASCOTS 2018: 102-108 - [c123]David J. Miller, George Kesidis, Zhicong Qiu:
Unsupervised Parsimonious Cluster-Based Anomaly Detection (PCAD). MLSP 2018: 1-6 - [c122]David J. Miller, Yujia Wang, George Kesidis:
Anomaly Detection of Attacks (Ada) on DNN Classifiers at Test Time. MLSP 2018: 1-6 - [c121]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis, Chung-Horng Lung, Mohamed Ibnkahla:
Considerations for a Successful Network Service Chain Deployment. NetSoft 2018: 288-292 - [c120]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, Mohamed Ibnkahla, George Kesidis:
Balancing Delay and Cost in Virtual Network Function Placement and Chaining. NetSoft 2018: 433-440 - [i39]Yuquan Shan, Aman Jain, George Kesidis, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms. CoRR abs/1803.00922 (2018) - [i38]George Kesidis:
Average age of coupon type and related average age of information. CoRR abs/1808.00443 (2018) - [i37]Yuquan Shan, George Kesidis, Bhuvan Urgaonkar, Jörg Schad, Jalal Khamse-Ashari, Ioannis Lambadaris:
Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public Cloud. CoRR abs/1810.00988 (2018) - [i36]David J. Miller, Xinyi Hu, Zhen Xiang, George Kesidis:
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters. CoRR abs/1811.00121 (2018) - [i35]Yujia Wang, David J. Miller, George Kesidis:
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers. CoRR abs/1811.02658 (2018) - 2017
- [j60]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis:
Optimal virtualized network function allocation for an SDN enabled cloud. Comput. Stand. Interfaces 54: 266-278 (2017) - [j59]Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis:
Using Burstable Instances in the Public Cloud: Why, When and How? Proc. ACM Meas. Anal. Comput. Syst. 1(1): 11:1-11:28 (2017) - [j58]Zhicong Qiu, David J. Miller, George Kesidis:
A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes. IEEE Trans. Neural Networks Learn. Syst. 28(4): 917-933 (2017) - [j57]Aris Leivadeas, George Kesidis, Matthias Falkner, Ioannis Lambadaris:
A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem. IEEE Trans. Netw. Serv. Manag. 14(4): 890-903 (2017) - [c119]Yuquan Shan, Chiara Lo Prete, George Kesidis, David J. Miller:
A simulation framework for uneconomic virtual bidding in day-ahead electricity markets. ACC 2017: 2705-2712 - [c118]Yuquan Shan, George Kesidis, Daniel Fleck:
Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CCSW 2017: 1-10 - [c117]Xinyi Hu, George Kesidis, Seung Jun Baek:
Regulating wireless access costs for not vertically integrated content providers. CNSM 2017: 1-8 - [c116]Cheng Wang, Bhuvan Urgaonkar, Aayush Gupta, George Kesidis, Qianlin Liang:
Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud. EuroSys 2017: 620-634 - [c115]Zhicong Qiu, David J. Miller, George Kesidis:
Flow based botnet detection through semi-supervised active learning. ICASSP 2017: 2387-2391 - [c114]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Per-Server Dominant-Share Fairness (PS-DSF): A multi-resource fair allocation mechanism for heterogeneous servers. ICC 2017: 1-7 - [c113]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processors. INFOCOM Workshops 2017: 48-53 - [c112]George Kesidis, Neda Nasiriani, Yuquan Shan, Bhuvan Urgaonkar, Ioannis Lambadaris:
Multicommodity games in public-cloud markets considering subadditive resource demands. INFOCOM Workshops 2017: 654-658 - [c111]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. MALWARE 2017: 67-74 - [c110]Neda Nasiriani, George Kesidis, Di Wang:
Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits. MASCOTS 2017: 164-174 - [c109]George Kesidis, Uday V. Shanbhag, Neda Nasiriani, Bhuvan Urgaonkar:
Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response. MASCOTS 2017: 244-254 - [c108]David J. Miller, Xinyi Hu, Zhicong Qiu, George Kesidis:
Adversarial learning: A critical review and active learning study. MLSP 2017: 1-6 - [c107]Cheng Wang, Bhuvan Urgaonkar, Neda Nasiriani, George Kesidis:
Using Burstable Instances in the Public Cloud: Why, When and How? SIGMETRICS (Abstracts) 2017: 56 - [i34]George Kesidis:
Markovian models of Internet Caches including Closed-Form Stationary Distributions. CoRR abs/1704.04849 (2017) - [i33]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CoRR abs/1704.06794 (2017) - [i32]George Kesidis, Yuquan Shan, Yujia Wang, Bhuvan Urgaonkar, Jalal Khamse-Ashari, Ioannis Lambadaris:
Efficient max-min and proportional fair constrained multiresource scheduling. CoRR abs/1705.06102 (2017) - [i31]David J. Miller, Xinyi Hu, Zhicong Qiu, George Kesidis:
Adversarial Learning: A Critical Review and Active Learning Study. CoRR abs/1705.09823 (2017) - [i30]Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part II. CoRR abs/1711.08961 (2017) - [i29]Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017) - [i28]David J. Miller, Yujia Wang, George Kesidis:
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. CoRR abs/1712.06646 (2017) - [i27]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers. CoRR abs/1712.10114 (2017) - 2016
- [j56]Yuquan Shan, Chiara Lo Prete, George Kesidis, David J. Miller:
A simulation framework for uneconomic virtual bidding in day-ahead electricity markets: Short talk. SIGMETRICS Perform. Evaluation Rev. 44(3): 30 (2016) - [j55]Neda Nasiriani, Cheng Wang, George Kesidis, Bhuvan Urgaonkar, Lydia Y. Chen, Robert Birke:
On Fair Attribution of Costs Under Peak-Based Pricing to Cloud Tenants. ACM Trans. Model. Perform. Evaluation Comput. Syst. 2(1): 3:1-3:28 (2016) - [j54]Virag Shah, Gustavo de Veciana, George Kesidis:
A Stable Approach for Routing Queries in Unstructured P2P Networks. IEEE/ACM Trans. Netw. 24(5): 3136-3147 (2016) - [c106]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis:
Dynamic traffic steering of multi-tenant virtualized network functions in SDN enabled data centers. CAMAD 2016: 65-70 - [c105]Matthias Falkner, Aris Leivadeas, Ioannis Lambadaris, George Kesidis:
Performance analysis of virtualized network functions on virtualized systems architectures. CAMAD 2016: 71-76 - [c104]Xinyi Hu, Yuquan Shan, George Kesidis, Saswati Sarkar, Ravi Dhar, Serge Fdida:
Multiperiod subscription pricing for cellular wireless entrants. CISS 2016: 326-330 - [c103]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Max-min Fair scheduling of variable-length packet-flows to multiple servers by deficit round-robin. CISS 2016: 390-395 - [c102]Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Migration to a non-neutral internet: Economics modeling and analysis of impact. CISS 2016: 511-516 - [c101]Navaneeth Rameshan, Robert Birke, Leandro Navarro, Vladimir Vlassov, Bhuvan Urgaonkar, George Kesidis, Martin L. Schmatz, Lydia Y. Chen:
Profiling Memory Vulnerability of Big-Data Applications. DSN Workshops 2016: 258-261 - [c100]Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, George Kesidis:
PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. DSN 2016: 359-370 - [c99]Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Constrained Max-Min Fair Scheduling of Variable-Length Packet-Flows to Multiple Servers. GLOBECOM 2016: 1-6 - [c98]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis:
Resource Management and Orchestration for a Dynamic Service Chain Steering Model. GLOBECOM 2016: 1-6 - [c97]Yuquan Shan, George Kesidis:
Optimal Power Flow with Random Wind Resources. HICSS 2016: 2426-2434 - [c96]George Kesidis, Bhuvan Urgaonkar, Neda Nasiriani, Cheng Wang:
Neutrality in Future Public Clouds: Implications and Challenges. HotCloud 2016 - [c95]Cheng Wang, Bhuvan Urgaonkar, Aayush Gupta, Lydia Y. Chen, Robert Birke, George Kesidis:
Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability. ICAC 2016: 95-104 - [c94]Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris, George Kesidis:
Dynamic virtualized network function allocation in a multi-cloud environment. ICT 2016: 1-5 - [c93]Bogdan Copos, Karl N. Levitt, Jeff Rowe, Parisa Kianmajd, Chen-Nee Chuah, George Kesidis:
Security and Privacy for Emerging Smart Community Infrastructures. IoTBD 2016: 148-155 - [c92]George Kesidis, David J. Miller, Zhicong Qiu:
IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric. MILCOM 2016: 812-816 - [i26]Jalal Khamse-Ashari, Ioannis Lambadaris, George Kesidis, Bhuvan Urgaonkar, Yiqiang Q. Zhao:
Per-Server Dominant-Share Fairness (PS-DSF): A Multi-Resource Fair Allocation Mechanism for Heterogeneous Servers. CoRR abs/1611.00404 (2016) - [i25]Mohammad Hassan Lotfi, Saswati Sarkar, George Kesidis:
Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? CoRR abs/1611.10191 (2016) - 2015
- [j53]Yuquan Shan, Jayaram Raghuram, George Kesidis, David J. Miller, Anna Scaglione, Jeff Rowe, Karl N. Levitt:
Generation bidding game with potentially false attestation of flexible demand. EURASIP J. Adv. Signal Process. 2015: 29 (2015) - [j52]Aditya Kurve, Christopher Griffin, David J. Miller, George Kesidis:
Optimizing cluster formation in super-peer networks via local incentive design. Peer-to-Peer Netw. Appl. 8(1): 1-21 (2015) - [j51]George Kesidis, Yuquan Shan, Bhuvan Urgaonkar, Jörg Liebeherr:
Network calculus for parallel processing. SIGMETRICS Perform. Evaluation Rev. 43(2): 48-50 (2015) - [j50]Aditya Kurve, David J. Miller, George Kesidis:
Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker Intention. IEEE Trans. Knowl. Data Eng. 27(3): 794-809 (2015) - [j49]Youngmi Jin, George Kesidis, Jinwoo Shin, Fatih Kocak, Yung Yi:
Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems. IEEE/ACM Trans. Netw. 23(6): 1818-1831 (2015) - [c91]Cheng Wang, Neda Nasiriani, George Kesidis, Bhuvan Urgaonkar, Qian Wang, Lydia Y. Chen, Aayush Gupta, Robert Birke:
Recouping Energy Costs From Cloud Tenants: Tenant Demand Response Aware Pricing Design. e-Energy 2015: 141-150 - [c90]Jianping He, Bin Liu, Xuan Bao, Hongxia Jin, George Kesidis:
On Privacy Preserving Partial Image Sharing. ICDCS 2015: 758-759 - [c89]George Kesidis, Douglas Mercer, Christopher Griffin, Serge Fdida:
Roaming charges for customers of cellular-wireless entrant providers. INFOCOM Workshops 2015: 1-5 - [c88]Neda Nasiriani, Cheng Wang, George Kesidis, Bhuvan Urgaonkar, Lydia Y. Chen, Robert Birke:
On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants. MASCOTS 2015: 51-60 - [c87]Zhicong Qiu, David J. Miller, George Kesidis:
Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data. MLSP 2015: 1-6 - [i24]Zhicong Qiu, David J. Miller, George Kesidis:
Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data. CoRR abs/1511.01047 (2015) - 2014
- [j48]Ashraf Al Daoud, George Kesidis, Jörg Liebeherr:
Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands. IEEE J. Sel. Areas Commun. 32(11): 2297-2308 (2014) - [j47]Ashraf Al Daoud, George Kesidis, Jörg Liebeherr:
A Game of Uncoordinated Sharing of Private Spectrum Commons. SIGMETRICS Perform. Evaluation Rev. 42(3): 42 (2014) - [j46]Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:
Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model. SIGMETRICS Perform. Evaluation Rev. 42(3): 44 (2014) - [j45]Jayaram Raghuram, David J. Miller, George Kesidis:
Instance-Level Constraint-Based Semisupervised Learning With Imposed Space-Partitioning. IEEE Trans. Neural Networks Learn. Syst. 25(8): 1520-1537 (2014) - [c86]Mahnoosh Alizadeh, Anna Scaglione, Andrea J. Goldsmith, George Kesidis:
Capturing aggregate flexibility in Demand Response. CDC 2014: 6439-6445 - [c85]Christopher Griffin, George Kesidis:
Behavior in a shared resource game with cooperative, greedy, and vigilante players. CISS 2014: 1-6 - [c84]Fatih Kocak, David J. Miller, George Kesidis:
Detecting anomalous latent classes in a batch of network traffic flows. CISS 2014: 1-6 - [c83]Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J. Miller, Jeff Rowe, Anna Scaglione:
A Bidding Game for Generators in the Presence of Flexible Demand. Feedback Computing 2014 - [c82]Cheng Wang, Bhuvan Urgaonkar, George Kesidis, Uday V. Shanbhag, Qian Wang:
A Case for Virtualizing the Electric Utility in Cloud Data Centers. HotCloud 2014 - [c81]George Kesidis:
A simple two-sided market model with side-payments and ISP service classes. INFOCOM Workshops 2014: 595-597 - [c80]Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:
Market-based power allocation for a differentially priced FDMA system. ISIT 2014: 1011-1015 - [c79]Cheng Wang, Bhuvan Urgaonkar, Qian Wang, George Kesidis:
A Hierarchical Demand Response Framework for Data Center Power Cost Optimization under Real-World Electricity Pricing. MASCOTS 2014: 305-314 - [c78]George Kesidis, Guodong Pang:
Tit-for-tat capacity allocation for distributed delay management in peer-to-peer networks. NetGCooP 2014: 70-74 - [i23]Ashraf Al Daoud, George Kesidis, Jörg Liebeherr:
An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies. CoRR abs/1401.3373 (2014) - [i22]George Kesidis, Guodong Pang:
Golden-rule capacity allocation for distributed delay management in peer-to-peer networks. CoRR abs/1402.0214 (2014) - [i21]Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:
Market-Based Power Allocation for a Differentially Priced FDMA System. CoRR abs/1402.3225 (2014) - [i20]Mohammad Hassan Lotfi, George Kesidis, Saswati Sarkar:
Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model. CoRR abs/1404.1782 (2014) - [i19]Mahnoosh Alizadeh, Anna Scaglione, Andrea Goldsmith, George Kesidis:
Capturing Aggregate Flexibility in Demand Response. CoRR abs/1404.1955 (2014) - [i18]Mahnoosh Alizadeh, Anna Scaglione, Andy Applebaum, George Kesidis, Karl N. Levitt:
Scalable and Anonymous Modeling of Large Populations of Flexible Appliances. CoRR abs/1404.1958 (2014) - [i17]Yuquan Shan, Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J. Miller, Jeff Rowe, Anna Scaglione:
Generation bidding game with flexible demand. CoRR abs/1408.6689 (2014) - [i16]George Kesidis, Bhuvan Urgaonkar, Yuquan Shan, S. Kamarava, Jörg Liebeherr:
Network calculus for parallel processing. CoRR abs/1409.0820 (2014) - [i15]George Kesidis, Douglas Mercer, Christopher Griffin, Serge Fdida:
Roaming charges for customers of cellular-wireless entrant and incumbent providers. CoRR abs/1409.6281 (2014) - 2013
- [j44]Aditya Kurve, Khashayar Kotobi, George Kesidis:
An agent-based framework for performance modeling of an optimistic parallel discrete event simulator. Complex Adapt. Syst. Model. 1: 12 (2013) - [j43]Panayotis Antoniadis, Serge Fdida, Christopher Griffin, Youngmi Jin, George Kesidis:
Distributed medium access control with conditionally altruistic users. EURASIP J. Wirel. Commun. Netw. 2013: 202 (2013) - [j42]Bhuvan Urgaonkar, George Kesidis, Uday V. Shanbhag, Cheng Wang:
Pricing of service in clouds: optimal response and strategic interactions. SIGMETRICS Perform. Evaluation Rev. 41(3): 28-30 (2013) - [j41]Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora, Sulan Wong:
A model of network neutrality with usage-based prices. Telecommun. Syst. 52(2): 601-609 (2013) - [j40]Youngmi Jin, George Kesidis, Ju Wook Jang:
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning. IEEE/ACM Trans. Netw. 21(1): 28-40 (2013) - [c77]Mahnoosh Alizadeh, George Kesidis, Anna Scaglione:
Clustering consumption in queues: A scalable model for electric vehicle scheduling. ACSSC 2013: 374-378 - [c76]Aditya Kurve, David J. Miller, George Kesidis:
Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers. GameSec 2013: 140-153 - [c75]Youngmi Jin, Yung Yi, George Kesidis, Fatih Kocak, Jinwoo Shin:
Hybrid client-server and peer-to-peer caching systems with selfish peers. INFOCOM 2013: 1744-1752 - [c74]Hongyuan Lu, Guodong Pang, George Kesidis:
Automated scheduling of deferrable PEV/PHEV load by power-profile unevenness. SmartGridComm 2013: 235-240 - [c73]Mahnoosh Alizadeh, Anna Scaglione, George Kesidis:
Scalable model predictive control of demand for ancillary services. SmartGridComm 2013: 684-689 - [c72]Fatih Kocak, George Kesidis, Tuan-Minh Pham, Serge Fdida:
The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks. SocialCom 2013: 45-50 - [c71]Jianping He, David J. Miller, George Kesidis:
Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks. SocialCom 2013: 162-167 - [c70]Cheng Wang, Bhuvan Urgaonkar, Qian Wang, George Kesidis, Anand Sivasubramaniam:
Data Center Power Cost Optimization via Workload Modulation. UCC 2013: 260-263 - [i14]Fatih Kocak, George Kesidis, Tuan-Minh Pham, Serge Fdida:
The effect of caching on a model of content and access provider revenues in information-centric networks. CoRR abs/1304.1942 (2013) - [i13]Mahnoosh Alizadeh, George Kesidis, Anna Scaglione:
Clustering Consumption in Queues: A Scalable Model for Electric Vehicle Scheduling. CoRR abs/1304.6753 (2013) - [i12]Christopher Griffin, George Kesidis:
Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players. CoRR abs/1306.3127 (2013) - [i11]Christopher Griffin, George Kesidis, Panayotis Antoniadis, Serge Fdida:
Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics. CoRR abs/1306.3160 (2013) - [i10]Aditya Kurve, David J. Miller, George Kesidis:
Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity. CoRR abs/1307.7332 (2013) - [i9]Cheng Wang, Bhuvan Urgaonkar, Qian Wang, George Kesidis, Anand Sivasubramaniam:
Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing. CoRR abs/1308.0585 (2013) - 2012
- [j39]Youngmi Jin, George Kesidis, Ju Wook Jang:
A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users. IEEE J. Sel. Areas Commun. 30(1): 128-137 (2012) - [j38]David J. Miller, Jayaram Raghuram, George Kesidis, Christopher M. Collins:
Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling. Neural Comput. 24(7): 1926-1966 (2012) - [c69]Panayotis Antoniadis, Serge Fdida, Christopher Griffin, Youngmi Jin, George Kesidis:
Distributed Medium Access Control with Dynamic Altruism. ADHOCNETS 2012: 29-42 - [c68]Aditya Kurve, Guodong Pang, George Kesidis, Gustavo de Veciana:
Decentralized capacity reallocation for a loss network. CISS 2012: 1-5 - [c67]Jayaram Raghuram, David J. Miller, George Kesidis:
Semisupervised domain adaptation for mixture model based classifiers. CISS 2012: 1-6 - [c66]George Kesidis, Youngmi Jin:
Stochastic Loss Aversion for Random Medium Access. GAMENETS 2012: 236-247 - [c65]George Kesidis, Aditya Kurve:
A study of unsupervised adaptive crowdsourcing. ICC 2012: 1438-1442 - [c64]George Kesidis:
Side-payment profitability under convex demand-response modeling congestion-sensitive applications. ICC 2012: 2785-2789 - [c63]Guodong Pang, George Kesidis, Takis Konstantopoulos:
Avoiding overages by deferred aggregate demand for PEV charging on the smart grid. ICC 2012: 3322-3327 - [c62]Virag Shah, Gustavo de Veciana, George Kesidis:
Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints. INFOCOM 2012: 2327-2335 - [c61]David J. Miller, Fatih Kocak, George Kesidis:
Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection. MLSP 2012: 1-6 - [e2]Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis:
Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 96, Springer 2012, ISBN 978-3-642-31908-2 [contents] - [i8]George Kesidis, Youngmi Jin:
Stochastic Loss Aversion for Random Medium Access. CoRR abs/1201.1776 (2012) - [i7]Panayotis Antoniadis, Serge Fdida, Christopher Griffin, Youngmi Jin, George Kesidis:
CSMA Local Area Networking under Dynamic Altruism. CoRR abs/1204.4847 (2012) - 2011
- [j37]Glenn Carl, George Kesidis:
Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra. Comput. Networks 55(10): 2361-2379 (2011) - [j36]Guixi Zou, George Kesidis, David J. Miller:
A Flow Classifier with Tamper-Resistant Features and an Evaluation of Its Portability to New Domains. IEEE J. Sel. Areas Commun. 29(7): 1449-1460 (2011) - [c60]Aditya Kurve, Christopher Griffin, George Kesidis:
Iterative partitioning scheme for distributed simulation of dynamic networks. CAMAD 2011: 92-96 - [c59]Christopher Griffin, George Kesidis, Panayotis Antoniadis, Serge Fdida:
An Epidemic Model of Bit Torrent with Control. ICC 2011: 1-6 - [c58]Aditya Kurve, George Kesidis:
Sybil Detection via Distributed Sparse Cut Monitoring. ICC 2011: 1-6 - [c57]Aditya Kurve, C. Griffin, George Kesidis:
A graph partitioning game for distributed simulation of networks. Cnet@ITC 2011: 9-16 - [c56]Z. Berkay Celik, Jayaram Raghuram, George Kesidis, David J. Miller:
Salting Public Traces with Attack Traffic to Test Flow Classifiers. CSET 2011 - [r1]George Kesidis:
Denial-of-Service Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 323-328 - [i6]George Kesidis:
Side-payment profitability and interacting eyeball ISPs under convex demand-response modeling congestion-sensitive applications. CoRR abs/1110.1779 (2011) - [i5]George Kesidis, Aditya Kurve:
A Study of Unsupervised Adaptive Crowdsourcing. CoRR abs/1110.1781 (2011) - 2010
- [b1]George Kesidis:
An Introduction to Models of Online Peer-to-Peer Social Networking. Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers 2010, ISBN 978-3-031-79997-6 - [j35]Yoon-Ho Choi, Lunquan Li, Peng Liu, George Kesidis:
Worm virulence estimation for the containment of local worm outbreak. Comput. Secur. 29(1): 104-123 (2010) - [j34]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: a proactive worm containment solution for enterprise networks. Secur. Commun. Networks 3(4): 334-354 (2010) - [j33]Yaman Aksu, David J. Miller, George Kesidis, Qing X. Yang:
Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions. IEEE Trans. Neural Networks 21(5): 701-717 (2010) - [c55]George Kesidis, Youngmi Jin, Amar Prakash Azad, Eitan Altman:
Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior. CDC 2010: 1071-1075 - [c54]Athichart Tangpong, George Kesidis:
File-sharing costs and quality-of-service. CISS 2010: 1-6 - [c53]Stéphane Caron, George Kesidis, Eitan Altman:
Application neutrality and a paradox of side payments. ReArch@CoNEXT 2010: 9:1-9:6 - [c52]Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora, Sulan Wong:
A Study of Non-neutral Networks with Usage-Based Prices. ETM 2010: 76-84 - [c51]David J. Miller, Chu-Fang Lin, George Kesidis, Christopher M. Collins:
Improved Fine-Grained Component-Conditional Class Labeling with Active Learning. ICMLA 2010: 3-8 - [c50]George Kesidis:
Congestion control alternatives for residential broadband access. NOMS 2010: 874-877 - [i4]George Kesidis, Youngmi Jin, Amar Prakash Azad, Eitan Altman:
Stable Nash equilibria of medium access games under symmetric, socially altruistic behavior. CoRR abs/1003.5324 (2010) - [i3]Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora, Sulan Wong:
A Study of Non-Neutral Networks with Usage-based Prices. CoRR abs/1006.3894 (2010) - [i2]Eitan Altman, Stéphane Caron, George Kesidis:
Application Neutrality and a Paradox of Side Payments. CoRR abs/1008.2267 (2010)
2000 – 2009
- 2009
- [j32]George Kesidis, Athichart Tangpong, Christopher Griffin:
A sybil-proof referral system based on multiplicative reputation chains. IEEE Commun. Lett. 13(11): 862-864 (2009) - [c49]Arnab Das, Azin Neishaboori, George Kesidis:
Wireless mesh networking games. GAMENETS 2009: 565-574 - [c48]Athichart Tangpong, George Kesidis:
A simple reputation model for BitTorrent-like incentives. GAMENETS 2009: 603-610 - [c47]Gunwoo Nam, Pushkar Patankar, George Kesidis, Chita R. Das, Cetin Seren:
Mass Purging of Stale TCP Flows in Per-Flow Monitoring Systems. ICCCN 2009: 1-6 - [c46]Athichart Tangpong, George Kesidis, Hung-Yuan Hsu, Ali R. Hurson:
Robust Sybil Detection for MANETs. ICCCN 2009: 1-6 - [c45]Gunwoo Nam, Pushkar Patankar, Seung-Hwan Lim, Bikash Sharma, George Kesidis, Chita R. Das:
Clock-like Flow Replacement Schemes for Resilient Flow Monitoring. ICDCS 2009: 129-136 - [c44]Pushkar Patankar, Gunwoo Nam, George Kesidis, Takis Konstantopoulos, Chita R. Das:
Peer-to-peer unstructured anycasting using correlated swarms. ITC 2009: 1-8 - [i1]George Kesidis:
A quantum computer network. CoRR abs/0908.1597 (2009) - 2008
- [j31]Azin Neishaboori, George Kesidis:
Wireless mesh networks based on CDMA. Comput. Commun. 31(8): 1513-1528 (2008) - [j30]David J. Miller, Yanxin Zhang, George Kesidis:
Decision Aggregation in Distributed Classification by a Transductive Extension of Maximum Entropy/Improved Iterative Scaling. EURASIP J. Adv. Signal Process. 2008 (2008) - [j29]Sungwon Yi, Xidong Deng, George Kesidis, Chita R. Das:
A dynamic quarantine scheme for controlling unresponsive TCP sessions. Telecommun. Syst. 37(4): 169-189 (2008) - [j28]George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic:
A model of the spread of randomly scanning Internet worms that saturate access links. ACM Trans. Model. Comput. Simul. 18(2): 6:1-6:14 (2008) - [j27]Glenn Carl, George Kesidis:
Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down. ACM Trans. Model. Comput. Simul. 18(3): 11:1-11:30 (2008) - [j26]Sungwon Yi, Martin Kappes, Sachin Garg, Xidong Deng, George Kesidis, Chita R. Das:
Proxy-RED: an AQM scheme for wireless local area networks. Wirel. Commun. Mob. Comput. 8(4): 421-434 (2008) - [c43]George Kesidis, A. Das, Gustavo de Veciana:
On flat-rate and usage-based pricing for tiered commodity internet services. CISS 2008: 304-308 - [c42]Lunquan Li, Peng Liu, George Kesidis:
Threshold Smart Walk for the Containment of Local Worm Outbreak. GLOBECOM 2008: 2124-2128 - [c41]David J. Miller, Yanxin Zhang, George Kesidis:
A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification. ICASSP 2008: 1865-1868 - [c40]Pushkar Patankar, Gunwoo Nam, George Kesidis, Chita R. Das:
Exploring Anti-Spam Models in Large Scale VoIP Systems. ICDCS 2008: 85-92 - [c39]Azin Neishaboori, George Kesidis:
SINR-sensitive routing in wireless 802.11 mesh networks. MASS 2008: 623-628 - [c38]George Kesidis, Takis Konstantopoulos, Perla Sousi:
A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks. NET-COOP 2008: 26-36 - 2007
- [j25]Youngmi Jin, George Kesidis:
Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs. IEEE J. Sel. Areas Commun. 25(6): 1113-1123 (2007) - [c37]Arnab Das, George Kesidis, Venkat Pothamsetty:
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution. BROADNETS 2007: 444-448 - [c36]George Kesidis, Takis Konstantopoulos, Perla Sousi:
Modeling file-sharing with BitTorrent-like incentives. ICASSP (4) 2007: 1333-1336 - [c35]George Kesidis, Azin Neishaboori:
Distributed Power Control in Multihop Ad Hoc CDMA Networks. ICC 2007: 96-101 - [c34]Paul Barom Jeon, George Kesidis:
GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks. ICN 2007: 10 - [c33]Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das:
Memory-efficient content filtering hardware for high-speed intrusion detection systems. SAC 2007: 264-269 - [c32]Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: A proactive worm containment solution for enterprise networks. SecureComm 2007: 433-442 - [c31]Lunquan Li, Peng Liu, Yoon-chan Jhi, George Kesidis:
Evaluation of Collaborative Worm Containments on DETER Testbed. DETER 2007 - [e1]Terry V. Benzel, George Kesidis:
DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007. USENIX Association 2007 [contents] - 2006
- [j24]Ihab Hamadeh, George Kesidis:
A taxonomy of internet traceback. Int. J. Secur. Networks 1(1/2): 54-61 (2006) - [j23]Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai:
Denial-of-Service Attack-Detection Techniques. IEEE Internet Comput. 10(1): 82-89 (2006) - [j22]Youngmi Jin, George Kesidis:
Charge sensitive and incentive compatible end-to-end window-based control for selfish users. IEEE J. Sel. Areas Commun. 24(5): 952-961 (2006) - [j21]Jisheng Wang, David J. Miller, George Kesidis:
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. IEEE J. Sel. Areas Commun. 24(10): 1929-1941 (2006) - [c30]B. Mortazavi, George Kesidis:
Cumulative Reputation Systems for Peer-to-Peer Content Distribution. CISS 2006: 1546-1552 - [c29]Ihab Hamadeh, George Kesidis:
Toward a Framework for Forensic Analysis of Scanning Worms. ETRICS 2006: 282-297 - [c28]George Kesidis, Youngmi Jin, B. Mortazavi, T. Konstopoulos:
An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population. GLOBECOM 2006 - [c27]Rajesh N. Rao, George Kesidis:
On the Relation Between Capacity and Number of Sinks in an Sensor Network. GLOBECOM 2006 - [c26]Azin Neishaboori, George Kesidis:
Routing and Uplink-Downlink Scheduling in Ad Hoc CDMA Networks. ICC 2006: 926-931 - [c25]Jisheng Wang, Ihab Hamadeh, George Kesidis, David J. Miller:
Polymorphic worm detection and defense: system design, experimental methodology, and data resources. LSAD@SIGCOMM 2006: 169-176 - [c24]Lunquan Li, Peng Liu, George Kesidis:
Visual toolkit for network security experiment specification and data analysis. VizSEC 2006: 7-14 - [c23]Glenn Carl, Shashi Phoha, George Kesidis, Bharat B. Madan:
Path preserving scale down for validation of internet inter-domain routing protocols. WSC 2006: 2210-2218 - 2005
- [j20]Youngmi Jin, George Kesidis:
Dynamics of usage-priced communication networks: the case of a single bottleneck resource. IEEE/ACM Trans. Netw. 13(5): 1041-1053 (2005) - [c22]Soranun Jiwasurat, George Kesidis, David J. Miller:
Hierarchical shaped deficit round-robin scheduling. GLOBECOM 2005: 6 - [c21]John W. Lockwood, George Kesidis, Changcheng Huang:
Advances for networks & internet. GLOBECOM 2005 - [c20]Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty:
A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. PADS 2005: 191-198 - [c19]Paul Barom Jeon, George Kesidis:
Pheromone-aided robust multipath and multipriority routing in wireless MANETs. PE-WASUN 2005: 106-113 - [c18]George Kesidis, Ihab Hamadeh, Soranun Jiwasurat:
Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. QoS-IP 2005: 101-109 - 2004
- [j19]Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. Commun. ACM 47(3): 58-61 (2004) - [j18]Hao Zhu, Guohong Cao, George Kesidis, Chita R. Das:
An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks. Comput. Commun. 27(9): 828-839 (2004) - [j17]Soranun Jiwasurat, George Kesidis:
A Class of Shaped Deficit Round-Robin (SDRR) Schedulers. Telecommun. Syst. 25(3-4): 173-191 (2004) - [j16]Rajesh N. Rao, George Kesidis:
Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks. IEEE Trans. Mob. Comput. 3(3): 225-232 (2004) - [c17]Xidong Deng, Sungwon Yi, George Kesidis, Chita R. Das:
RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks. Communications, Internet, and Information Technology 2004: 369-374 - [c16]Youngmi Jin, George Kesidis:
TCP windowcontrol in a priced network. Communications, Internet, and Information Technology 2004: 596-600 - [c15]Xiang Ji, Hongyuan Zha, John J. Metzner, George Kesidis:
Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks. ICC 2004: 3807-3811 - [c14]Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson:
Preliminary results using scale-down to explore worm dynamics. WORM 2004: 65-72 - 2003
- [c13]Sungwon Yi, Xidong Deng, George Kesidis, Chita R. Das:
HaTCh: a two-level caching scheme for estimating the number of active flows. CDC 2003: 2829-2834 - [c12]Xidong Deng, Sungwon Yi, George Kesidis, Chita R. Das:
A control theoretic approach for designing adaptive AQM schemes. GLOBECOM 2003: 2947-2951 - [c11]Rajesh N. Rao, George Kesidis:
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. GLOBECOM 2003: 2957-2961 - [c10]Youngmi Jin, George Kesidis:
Nash equilibria of a generic networking game with applications to circuit-switched networks. INFOCOM 2003: 1242-1249 - 2002
- [j15]Youngmi Jin, George Kesidis:
Equilibria of a noncooperative game for heterogeneous users of an ALOHA network. IEEE Commun. Lett. 6(7): 282-284 (2002) - [c9]Sungwon Yi, Xidong Deng, George Kesidis, Chita R. Das:
Providing fairness in DiffServ architecture. GLOBECOM 2002: 1435-1439 - [c8]Xidong Deng, Sungwon Yi, George Kesidis, Chita R. Das:
Stabilized virtual buffer (SVB) - an active queue management scheme for Internet quality-of-service. GLOBECOM 2002: 1628-1632 - [c7]Hao Zhu, Guohong Cao, George Kesidis, Chita R. Das:
An adaptive power-conserving service discipline for Bluetooth. ICC 2002: 303-307 - [c6]Bobby M. Ninan, George Kesidis, Michael Devetsikiotis:
A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks. MASCOTS 2002: 257- - 2001
- [c5]George Kesidis, Leandros Tassiulas:
General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud. ICN (2) 2001: 339-347 - 2000
- [j14]George Kesidis, Takis Konstantopoulos:
Worst-case performance of a buffer with independent shaped arrival processes. IEEE Commun. Lett. 4(1): 26-28 (2000) - [j13]George Kesidis, Kaushik Chakraborty, Leandros Tassiulas:
Traffic shaping for a loss system. IEEE Commun. Lett. 4(12): 417-419 (2000) - [j12]George Kesidis, Takis Konstantopoulos:
Extremal shape-controlled traffic patterns in high-speed networks. IEEE Trans. Commun. 48(5): 813-819 (2000)
1990 – 1999
- 1998
- [j11]Anthony Hung, Marie-José Montpetit, George Kesidis:
ATM via satellite: A framework and implementation. Wirel. Networks 4(2): 141-153 (1998) - [c4]Anthony Hung, George Kesidis, Nick McKeown:
ATM input-buffered switches with the guaranteed-rate property. ISCC 1998: 331-335 - 1997
- [j10]Marie-José Montpetit, George Kesidis:
Broadband via Satellite. IEEE Commun. Mag. 35(7): 28 (1997) - [c3]George Kesidis, Nick McKeown:
Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks. ICC (3) 1997: 1684-1688 - 1996
- [j9]Gustavo de Veciana, George Kesidis:
Bandwidth allocation for multiple qualities of service using generalized processor sharing. IEEE Trans. Inf. Theory 42(1): 268-272 (1996) - [j8]Anthony Hung, George Kesidis:
Bandwidth scheduling for wide-area ATM networks using virtual finishing times. IEEE/ACM Trans. Netw. 4(1): 49-54 (1996) - 1995
- [j7]Gustavo de Veciana, George Kesidis, Jean C. Walrand:
Resource Management in Wide-Area ATM Networks Using Effective Bandwiths. IEEE J. Sel. Areas Commun. 13(6): 1081-1090 (1995) - [j6]Costas Courcoubetis, George Kesidis, Ad Ridder, Jean C. Walrand, Richard R. Weber:
Admission control and routing in ATM networks using inferences from measured buffer occupancy. IEEE Trans. Commun. 43(2/3/4): 1778-1784 (1995) - [j5]George Kesidis:
Analog optimization with Wong's stochastic neural network. IEEE Trans. Neural Networks 6(1): 258-260 (1995) - 1994
- [c2]George Kesidis:
Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network. MASCOTS 1994: 318-322 - 1993
- [j4]George Kesidis, Jean C. Walrand:
Relative entropy between Markov transition rate matrices. IEEE Trans. Inf. Theory 39(3): 1056-1057 (1993) - [j3]George Kesidis, Jean C. Walrand:
Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources. ACM Trans. Model. Comput. Simul. 3(3): 269-276 (1993) - [j2]George Kesidis, Jean C. Walrand, Cheng-Shang Chang:
Effective bandwidths for multiclass Markov fluids and other ATM sources. IEEE/ACM Trans. Netw. 1(4): 424-428 (1993) - [c1]George Kesidis, Jean C. Walrand:
A Review of Quick Simulation Methods for Queues. MASCOTS 1993: 17-21 - 1991
- [j1]Jean C. Walrand, George Kesidis:
Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990). IEEE Trans. Inf. Theory 37(5): 1493- (1991)
Coauthor Index
aka: Mahmut Taylan Kandemir
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint