Packet-level adversarial network traffic crafting using sequence generative adversarial networks Q Cheng, S Zhou, Y Shen, D Kong, C Wu arXiv preprint arXiv:2103.04794, 2021 | 31 | 2021 |
Machine learning based malicious payload identification in software-defined networking Q Cheng, C Wu, H Zhou, D Kong, D Zhang, J Xing, W Ruan Journal of Network and Computer Applications 192, 103186, 2021 | 26 | 2021 |
TableGuard: A novel security mechanism against flow table overflow attacks in SDN D Kong, C Wu, Y Shen, X Chen, H Liu, D Zhang GLOBECOM 2022-2022 IEEE Global Communications Conference, 4167-4172, 2022 | 13 | 2022 |
Combination attacks and defenses on sdn topology discovery D Kong, Y Shen, X Chen, Q Cheng, H Liu, D Zhang, X Liu, S Chen, C Wu IEEE/ACM Transactions on Networking 31 (2), 904-919, 2022 | 11 | 2022 |
TPDD: A two-phase DDoS detection system in software-defined networking Y Shen, C Wu, D Kong, M Yang ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 11 | 2020 |
The impact of the collective influence of search engines on social networks D Kong, C Fu, J Yang, D Xu, L Han IEEE Access 5, 24920-24930, 2017 | 11 | 2017 |
AFTM: An adaptive flow table management scheme for OpenFlow switches Y Shen, C Wu, Q Cheng, D Kong 2020 IEEE 22nd International Conference on High Performance Computing and …, 2020 | 9 | 2020 |
Flow table saturation attack against dynamic timeout mechanisms in SDN Y Shen, C Wu, D Kong, Q Cheng Applied Sciences 13 (12), 7210, 2023 | 8 | 2023 |
In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks D Kong, Z Zhou, Y Shen, X Chen, Q Cheng, D Zhang, C Wu 2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), 1-10, 2023 | 5 | 2023 |
Escala: Timely elastic scaling of control channels in network measurement H Liu, X Chen, Q Huang, D Kong, J Sun, D Zhang, H Zhou, C Wu IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1848-1857, 2022 | 5 | 2022 |
Think that attackers think: Using first-order theory of mind in intrusion response system Q Cheng, C Wu, B Hu, D Kong, B Zhou 2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019 | 4 | 2019 |
STEP: spatial-temporal network security event prediction Q Cheng, Y Shen, D Kong, C Wu arXiv preprint arXiv:2105.14932, 2021 | 3 | 2021 |
RDefender: A lightweight and robust defense against flow table overflow attacks in SDN D Kong, X Chen, C Wu, Y Shen, Z Zhou, Q Cheng, X Liu, M Yang, Y Qiu, ... IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |
An advanced flow table saturation attack against dynamic timeouts in sdn Y Shen, C Wu, D Kong, Q Cheng Available at SSRN 4129904, 2022 | 2 | 2022 |
Elastically Scaling Control Channels in Network Measurement With H Liu, X Chen, Q Huang, D Kong, D Zhang, C Wu, X Liu IEEE/ACM Transactions on Networking, 2024 | | 2024 |
Toward Security-Enhanced In-band Network Telemetry in Programmable Networks D Kong, X Chen, H Lin, Z Zhou, Y Shen, H Liu, Q Cheng, X Liu, D Zhang, ... IEEE Transactions on Network and Service Management, 2024 | | 2024 |
Flowtracker: A Refined and Versatile Data Plane Measurement Approach X Jiang, C Wu, Z Zhou, D Wang, D Kong, X Liu Muhammad and Liu, Xuan, Flowtracker: A Refined and Versatile Data Plane …, 0 | | |