Packet-level adversarial network traffic crafting using sequence generative adversarial networks Q Cheng, S Zhou, Y Shen, D Kong, C Wu
arXiv preprint arXiv:2103.04794, 2021
31 2021 Machine learning based malicious payload identification in software-defined networking Q Cheng, C Wu, H Zhou, D Kong, D Zhang, J Xing, W Ruan
Journal of Network and Computer Applications 192, 103186, 2021
26 2021 TableGuard: A novel security mechanism against flow table overflow attacks in SDN D Kong, C Wu, Y Shen, X Chen, H Liu, D Zhang
GLOBECOM 2022-2022 IEEE Global Communications Conference, 4167-4172, 2022
13 2022 Combination attacks and defenses on sdn topology discovery D Kong, Y Shen, X Chen, Q Cheng, H Liu, D Zhang, X Liu, S Chen, C Wu
IEEE/ACM Transactions on Networking 31 (2), 904-919, 2022
11 2022 TPDD: A two-phase DDoS detection system in software-defined networking Y Shen, C Wu, D Kong, M Yang
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
11 2020 The impact of the collective influence of search engines on social networks D Kong, C Fu, J Yang, D Xu, L Han
IEEE Access 5, 24920-24930, 2017
11 2017 AFTM: An adaptive flow table management scheme for OpenFlow switches Y Shen, C Wu, Q Cheng, D Kong
2020 IEEE 22nd International Conference on High Performance Computing and …, 2020
9 2020 Flow table saturation attack against dynamic timeout mechanisms in SDN Y Shen, C Wu, D Kong, Q Cheng
Applied Sciences 13 (12), 7210, 2023
8 2023 In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks D Kong, Z Zhou, Y Shen, X Chen, Q Cheng, D Zhang, C Wu
2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), 1-10, 2023
5 2023 Escala: Timely elastic scaling of control channels in network measurement H Liu, X Chen, Q Huang, D Kong, J Sun, D Zhang, H Zhou, C Wu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1848-1857, 2022
5 2022 Think that attackers think: Using first-order theory of mind in intrusion response system Q Cheng, C Wu, B Hu, D Kong, B Zhou
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
4 2019 STEP: spatial-temporal network security event prediction Q Cheng, Y Shen, D Kong, C Wu
arXiv preprint arXiv:2105.14932, 2021
3 2021 RDefender: A lightweight and robust defense against flow table overflow attacks in SDN D Kong, X Chen, C Wu, Y Shen, Z Zhou, Q Cheng, X Liu, M Yang, Y Qiu, ...
IEEE Transactions on Information Forensics and Security, 2024
2 2024 An advanced flow table saturation attack against dynamic timeouts in sdn Y Shen, C Wu, D Kong, Q Cheng
Available at SSRN 4129904, 2022
2 2022 Elastically Scaling Control Channels in Network Measurement With H Liu, X Chen, Q Huang, D Kong, D Zhang, C Wu, X Liu
IEEE/ACM Transactions on Networking, 2024
2024 Toward Security-Enhanced In-band Network Telemetry in Programmable Networks D Kong, X Chen, H Lin, Z Zhou, Y Shen, H Liu, Q Cheng, X Liu, D Zhang, ...
IEEE Transactions on Network and Service Management, 2024
2024 Flowtracker: A Refined and Versatile Data Plane Measurement Approach X Jiang, C Wu, Z Zhou, D Wang, D Kong, X Liu
Muhammad and Liu, Xuan, Flowtracker: A Refined and Versatile Data Plane …, 0