2008 |
25 | EE | Xiapu Luo,
Edmond W. W. Chan,
Rocky K. C. Chang:
TCP covert timing channels: Design and detection.
DSN 2008: 420-429 |
2007 |
24 | EE | Yajuan Tang,
Xiapu Luo,
Rocky K. C. Chang:
Protecting Internet Services from Low-Rate DoS Attacks.
Critical Infrastructure Protection 2007: 251-265 |
23 | EE | Xiapu Luo,
Edmond W. W. Chan,
Rocky K. C. Chang:
Cloak: A Ten-Fold Way for Reliable Covert Communications.
ESORICS 2007: 283-298 |
22 | EE | Samantha Lo,
Rocky K. C. Chang,
Lorenzo Colitti:
An active approach to measuring routing dynamics induced by autonomous systems.
Experimental Computer Science 2007: 20 |
21 | EE | Xiapu Luo,
Edmond W. W. Chan,
Rocky K. C. Chang:
Crafting Web Counters into Covert Channels.
SEC 2007: 337-348 |
2006 |
20 | EE | Yi Xie,
Rocky K. C. Chang:
Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints.
GLOBECOM 2006 |
19 | EE | Xiapu Luo,
Edmond W. W. Chan,
Rocky K. C. Chang:
Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks.
NOMS 2006: 507-518 |
18 | EE | Yi Xie,
Rocky K. C. Chang:
Stability-constrained optimization for energy efficiency in polling-based wireless networks.
VALUETOOLS 2006: 23 |
17 | EE | Sum Lam,
Rocky K. C. Chang,
Yi Xie:
Relative stability analysis of multiple queues.
VALUETOOLS 2006: 65 |
2005 |
16 | EE | Xiapu Luo,
Rocky K. C. Chang:
Optimizing the Pulsing Denial-of-Service Attacks.
DSN 2005: 582-591 |
15 | EE | Guangmin Hu,
Rocky K. C. Chang:
Forwarding State Scalability-Aware Multicast Routing.
ISCC 2005: 395-400 |
14 | EE | Xiapu Luo,
Rocky K. C. Chang:
Novel Approaches to End-to-End Packet Reordering Measurement.
Internet Measurment Conference 2005: 227-238 |
13 | EE | Xiapu Luo,
Rocky K. C. Chang,
Edmond W. W. Chan:
Performance Analysis of TCP/AQM Under Denial-of-Service Attacks.
MASCOTS 2005: 97-104 |
12 | EE | Xiapu Luo,
Rocky K. C. Chang:
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
NDSS 2005 |
2004 |
11 | EE | Rocky K. C. Chang:
Teaching computer networking with the help of personal computer networks.
ITiCSE 2004: 208-212 |
10 | EE | Rocky K. C. Chang,
Michael Lo:
Inbound traffic engineering for multi-homed ASes using AS path prepending.
NOMS (1) 2004: 89-102 |
2003 |
9 | EE | Rocky K. C. Chang:
A Multicast-On-Large-Demand Approach to the Flash Crowd Problem.
WWW (Posters) 2003 |
8 | EE | Sum Lam,
Rocky K. C. Chang:
Per-queue stability analysis of a dynamic quota sharing scheme for wireless networks.
SIGMETRICS Performance Evaluation Review 31(2): 20-22 (2003) |
2002 |
7 | EE | Rocky K. C. Chang,
King P. Fung:
Transport layer proxy for stateful UDP packet filtering.
ISCC 2002: 595-600 |
6 | EE | Fai Siu,
Rocky K. C. Chang:
Effectiveness of optimal node assignments in wavelength division multiplexing networks with fixed regular virtual topologies.
Computer Networks 38(1): 61-74 (2002) |
2001 |
5 | EE | Rocky K. C. Chang,
Hong Y. Wang:
Routing Properties of a Recursive Interconnection Network.
J. Parallel Distrib. Comput. 61(6): 838-849 (2001) |
4 | EE | Sum Lam,
Rocky K. C. Chang:
Stability comparison in single-server-multiple-queue systems.
SIGMETRICS Performance Evaluation Review 29(3): 32-34 (2001) |
2000 |
3 | EE | Filli Y. Y. Cheng,
Rocky K. C. Chang:
A Tree Switching Protocol for Multicast State Reduction.
ISCC 2000: 672-677 |
2 | EE | King P. Fung,
Rocky K. C. Chang:
A Transport-Level Proxy for Secure Multimedia Streams.
IEEE Internet Computing 4(6): 57-67 (2000) |
1 | | Rocky K. C. Chang,
Sum Lam:
A novel approach to queue stability analysis of polling models.
Perform. Eval. 40(1-3): 27-46 (2000) |