Recent Publications

Guohong Cao

Heting Liu, Fang He and Guohong Cao, “Communication-Efficient Federated Learning for Heterogeneous Edge Devices Based on Adaptive Gradient Quantization,” IEEE INFOCOM, 2023.

Xianda Chen and Guohong Cao, “Energy-Efficient 360-Degree Video Streaming on Multicore-Based Mobile Devices,” IEEE INFOCOM, 2023.

C. Guan, H. Liu, G. Cao, S. Zhu, and T. La Porta, “HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning,” ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2023.

H. Liu, Z. Li, C. Tan, R. Yang, G. Cao, Z. Liu, and C. Guo, “Predicting GPU Failures With High Precision Under Deep Learning Workloads,” ACM International Systems and Storage Conference (SYSTOR), 2023.

X. Chen, T. Tan, and G. Cao, “Macrotile: Toward QoE-Aware and Energy-Efficient 360-Degree Video Streaming,” IEEE Transactions on Mobile Computing, to appear.

Tianxiang Tan and Guohong Cao, “Deep Learning Video Analytics Through Edge Computing and Neural Processing Units on Mobile Devices,” IEEE Transactions on Mobile Computing, 22(3):1433-1448, 2023.

Tianxiang Tan and Guohong Cao, “Deep Learning on Mobile Devices Through Neural Processing Units and Edge Computing,” IEEE INFOCOM, 2022.

X. Chen and G. Cao, “Energy-Efficient and QoE-Aware 360-Degree Video Streaming on Mobile Devices,” IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.

Heting Liu and Guohong Cao, “Deep Learning Video Analytics Through Online Learning Based Edge Computing,” IEEE Transactions on Wireless Communication, Vol. 21, No. 10, 2022.

X. Chen, T. Tan, G. Cao, and T. La Porta, “Context-Aware and Energy-Aware Video Streaming on Smartphones,” IEEE Transactions on Mobile Computing, Vol. 21, No. 3, March 2022.

B. Niu, Q. Li, H. Wang, G. Cao, F. Li, H. Li, “A Framework for Personalized Location Privacy,” IEEE Transactions on Mobile Computing, Vol. 21, No. 9, September 2022.

Tianxiang and Guohong Cao, “Efficient Execution of Deep Neural Networks on Mobile Devices with NPU,” ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2021.

Xianda Chen, Tianxiang and Guohong Cao, “Popularity-Aware 360-Degree Video Streaming,” IEEE INFOCOM, 2021.

X. Chen, Y. Xiao, Y. Tang, J. Fernandez-Mendoza, and G. Cao, “ApneaDetector: Detecting Sleep Apnea with Smartwatches,” ACM International Conference on Pervasive and Ubiquitous Computing (UbiComp), 2021.

H. Liu and G. Cao, “Deep Reinforcement Learning-Based Server Selection for Mobile Edge Computing,” IEEE Transactions on Vehicular Technology, December 2021.

X. Zhang and G. Cao, “Event Attendance Prediction in Social Networks,” Springer, ISBN: 9783030892616, 2022.

X. Zhang Y. Wu, L. Huang, H. Ji and G. Cao, “Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing,” IEEE Transactions on Mobile Computing, March 2021.

Mahanth Gowda

One Ring to Rule Them All: An Open Source Smartring Platform for Finger Motion Analytics and Healthcare Applications (Best Paper Award for Edge IoT AI)Hao Zhou, Taiting Lu, Yilin Liu, Shijia Zhang, Runze Liu, Mahanth Gowda ACM/IEEE IoTDI 2023

Leveraging the Properties of mmWave Signals for 3D Finger Motion Tracking for Interactive IoT Applications Yilin Liu, Shijia Zhang, Mahanth Gowda, Srihari Nelakuditi ACM SIGMETRICS 2023

mmSpy: Spying Phone Calls using mmWave Radars. Suryoday Basak, Mahanth Gowda IEEE Symposium on Security and Privacy (Oakland) 2022

When Video meets Inertial Sensors: Zero-shot Domain Adaptation for Finger Motion Analytics with thank you what time is it stop Inertial Sensors (Best Paper Award)Yilin Liu, Shijia Zhang, Mahanth Gowda ACM/IEEE IoTDI 2021

I Spy You: Eavesdropping Continuous Speech on Smartphones via Motion Sensors Shijia Zhang, Yilin Liu, Mahanth Gowda ACM IMWUT/UbiComp 2022

URL which will be regularly updated: https://www.cse.psu.edu/~mkg31/research.html

Tom La Porta

S. Silvestri, N. Bartolini, S. Ciavaralla, T.F. La Porta, “On the Vulnerabilities of Voronoi-based Approaches to Mobile Sensor Deployment,” IEEE Transactions on Mobile Computing, to appear.

R. Ramanathan, E. Ciftcioglu, A. Samanta, R. Urgaonkar, T. F. La Porta, “Symptotics: A Framework for Estimating the Scalability of Real-World Wireless Networks,” ACM/Springer Wireless Networks Journal, DOI 10.1007/s11276-016-1204-4, to to appear.

B. Holbert, S. Tati, S. Silvestri, T.F. La Porta, A. Swami, “Network Topology Inference with Partial Information,” IEEE Transactions on Network and Service Management, 12(3):406-419.

A. Atya, I. Broustis, S. Singh, D. Syrivelis, S. Krishnamurthy, T.F. La Porta, “A Policy Aware Enforcement Logic for Appropriately Invoking Network Coding,” IEEE/ACM Transactions on Networking, to appear.

Y. Alayev, A. Bar-Noy, M.P. Johnson, L. Kaplan, T.F. La Porta, “You Can’t Get There From Here: Sensor Scheduling with Refocusing Delays,” ACM/Springer Wireless Networks Journal, 21(5):1683-1698, 2015.

Z. Lu, X. Sun, W. Wen, G. Cao. T.F. La Porta, “Algorithms and Applications for Community Detection in Weighted Networks,” IEEE Transactions on Parallel and Distributed Systems, to appear.

S. Tati, S. Rager, B.-J. Ko, G. Cao, A. Swami, T.F. La Porta, “netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks,” IEEE Transactions on Dependable and Secure Computing, to appear.

E. Ciftioglu, A. Michaloliakos, A. Yener, K. Psounis, T.F. La Porta, R. Govindan, “Operational Information Content Sum Capacity: From Theory to Practice,” Computer Networks, Elsevier, 10.1016/j.comnet.2014.08.017 pp. 1-17.

Y. Aleyev, F. Chen, Y. Hou, M. P. Johnson, A. Bar-Noy, T. F. La Porta, K. Leung, “Throughput Maximization in Mobile WSN Scheduling with Power Control and Rate Selection,” IEEE Transactions on Wireless, 13(7):4066-4079, July, 2014.

G. Bongiovani, N. Bartolini, T. F. La Porta, S. Silvestri, “On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment,” IEEE Transactions on Mobile Computing, 13(11):2592-2605, Nov., 2014.

S. Tati, B.J. Ko, G. Cao, A. Swami, T.F. La Porta, “Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks,” IEEE Transactions on Parallel and Distributed Systems, 26(3):646, 2015.

G. Papageorgiou, S. Singh, S. Krishnamurthy, R. Govindan, T.F. La Porta, “A Distortion Resistant Routing Framework for Video Traffic in Wireless Multi-hop Networks,” IEEE/ACM Transactions on Networking, 23(2):412-425, April, 2015.

T.F. La Porta, C. Petrioli, C. Phillips, D. Spenza, “Sensor-mission assignment in rechargeable wireless sensor networks,” ACM Transactions on Sensor Networks, 10(4), 2014.

Q. Li, G. Cao, T.F. La Porta, “Efficient and Privacy-Aware Data Aggregation in Mobile Sensing,” IEEE Transactions on Dependable and Secure Computing, 11(2):115-129, March/April, 2014.

J. Edwards, A. Bahjat, Y. Jiang, T. Cook, T.F. La Porta, “Quality of Information-aware Mobile Applications,” Pervasive and Mobile Computing, Elsevier, 11 (2014):216–228.

Q. Zheng, G. Cao. T. F. La Porta, A. Swami, “A Cross-Layer Approach for Minimizing Routing Disrpution in IP Networks,” IEEE Transactions on Parallel and Distributed Systems, 25 (7): 1659-1669 (2014).

T-S. Kim, I. Broustis , S. Vural, D. Syrivelis, S. Singh, S.V. Krishnamurthy, T.F. La Porta, “Realizing the Benefits of Wireless Network Coding in Multi-Rate Settings,” IEEE/ACM Transactions on Networking, 21(3):950-962, June, 2013.

L.A. Tang, Y. Zheng, J. Yuan, J. Han, A. Leung, W.-C. Peng, T.F. La Porta, “A Framework of Traveling Companion Discovery on Trajectory Data Streams,” ACM Transactions on Intelligent Systems and Technology” to appear.

S. Ray, T.F. La Porta, P. Basu. G. Cao, S. Schaffer, D. Dent, “Metric Driven Mobility Modeling in Tactical Networks,” Journal of Defense Modeling and Simulation, 10(2):161-180, April 2013.

L.A. Tang, X. Yu, S. Kim, J. Han, W.-C. Peng, Y. Sun. A. Leung, T.F. La Porta, “Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach,” International Journal of Distributed Sensor Networks, to appear.

F. Chen, M.P. Johnson, A. Bar-Noy, T.F. La Porta, “Proactive Data Dissemination to Mission Sites,” Springer/ACM Wireless Networks, 18(7):749-762.

W. Gao, G. Cao, T.F. La Porta, J. Han, “On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay Tolerant Networks,” IEEE Transactions on Mobile Computing, January, 201

N. Bartolini, S. Ciavarella, T. F. La Porta, S. Silvestri, “Network Recovery After Massive Failures,” IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), to appear.

S. Achleitner, T.F. La Porta, S. Krishnamurthy, V.S. Quizhpi, “Network Coding Efficiency in the Presence of an Intermittent Backhaul Network,” Proc. of IEEE ICC 2016 (to appear).

J. Edwards, T. Cassidy, G. de Mel, T. F. La Porta, “Integrating Quality of Information with Pragmatic Assistance,” Proc. of IEEE 13th International Workshop on Managing Communications and Services, March, 2013.

S. Rager, E. Ciftioglu, R. Ramanathan, T.F. La Porta, R. Govindan, “Scalability and Satisfiability of Quality of Information in Wireless Networks,” Proc. of IEEE WCNC, 2016.

Z. Lu, X. Sun, T. F. La Porta, “Cooperative Data Offloading in Opportunistic Mobile Networks,” Proc. of IEEE INFOCOM, 2016 (to appear).

M. Lin, N. Bartolini, T. F. La Porta, “Power Adjustment and Scheduling in OFDMA Femtocell Networks,” Proc. of IEEE INFOCOM, 2016 (to appear).

Z. Lu, G. Cao, T.F. La Porta, “Networking Smartphones for Disaster Recovery,” Proc. of IEEE PERCOM, 2016.

N. Hu, T. F. La Porta, N. Bartolini, “Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks,” Proc. of IEEE MASS, 2015.

M. Lin, S. Silvestri, N. Bartolini, T.F. La Porta, “Energy-Efficient Selective Activation in Femtocell Networks,” Proc. of IEEE MASS, 2015.

S. Silvestri, B. Holbert, P. Novotny, T. F. La Porta, A. Wolf, A. Swami, “Inferring Network Topologies in MANETs Applied to Service Redeployment,” IEEE International Conference on Computer Communication Networks (ICCCN), 2015.

M. Mukherjee, J. Edwards, H. Kwong, T.F. La Porta, “Quality of Information-aware Real-time Traffic Flow Analysis and Reporting,” Proc. of 7th International Workshop on Information Quality and Quality of Service for Pervasive Computing (I2QS), in conjunction with IEEE PERCOM, 2015.

B. Prabhala, T.F. La Porta, “Spatial and Temporal Considerations in Next Place Predictions,” Proc. Seventh IEEE International Workshop on Network Science for Communication Networks (NetSciCom 2015).

B. Holbert, S.Tati, S. Silvestri, T.F. La Porta, A. Swami, “Network Topology Inference with Partial Path Information,” International Conference on Computing, Networking and Communications, Network Algorithm & Performance Evaluation Symposium (ICNC), 2015.

T. Dao, A. Chowdhury, H. Madhyastha, S. Krishnamurthy, T.F. La Porta, “Managing Redundant Content in Bandwidth Constrained Wireless Networks,” Proc. of ACM CoNEXT, 2014.

S. Rager, E. Ciftioglu, T. F. La Porta, Performance Analysis of Practical Distributed Backpressure Protocols, Proc. of IEEE ICCCN, 2014.

S. Rager, E. Ciftioglu, T. F. La Porta, A. Leung, W. Dron, R. Ramanathan, J. Hancock, “Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints,” Proc. of IEEE DCOSS, 2014.

S. Tati, S. Silvestri, T. He, T. F. La Porta, “Robust Network Tomography in the Presence of Failures,” Proc. of IEEE ICDCS, 2014.

N. Bartolini, B. Bongiovanni, T.F. La Porta, S. Silvestri, F. Vincenti, “Voronoi-based Deployment of  Mobile Sensors in the Face of Adversaries,” Proc. of IEEE ICC 2014.

B. Prabhala, J. Wang, B. Deb, T.F. La Porta, J. Han, “Leveraging Periodicity in Human Mobility for Next Place Prediction,” Proc. of IEEE WCNC, 2014.

Ciftcioglu, A. Michaloliakos, K. Psounis, T.F. La Porta, A. Yener,” Power Minimization with Quality-of-Information Outages,” Proc. of IEEE WCNC, 2014.

E.N. Ciftcioglu, A. Michaloliakos, K. Psounis, T.F. La Porta, A. Yener,” Power Minimization with Quality-of-Information Outages,” Proc. of IEEE WCNC, 2014.

M. Lin, T. F. La Porta, “Energy-Aware Enterprise Femtocell Deployment, “Proc of IEEE WCNC, 2014.

G. Papageorgiou, J. Gasparis, S.V. Krishnamurthy, R. Govindan, T.F. La Porta, “Resource Thrifty Secure Mobile Video Transfer on Open WiFi Networks,” Proc. of 9th ACM International Conference on Emerging Network Experiments and Technologies (CoNext), 2103.

B. Holbert, S. Tati, S. Silvestri, A. Swami, T.F. La Porta,” Effects of Partial Topology on Fault Diagnosis,” IEEE MILOCM 2013.

E. Ciftioglu, R. Ramanathan, T.F. La Porta, “Scalability Analysis of Tactical Mobility Patterns,” IEEE MILCOM 2013.

N. Hu, D. Pizzocaro, M.P. Johnson, T. F. La Porta, A. Preece, “Resource Allocation With Non-Deterministic Demands and Profits,” Proc. of IEEE MASS, 2013.

M. Lin, T.F. La Porta, “Utility-based Femto-cell Pilot Management,” IEEE PIMRC, 2013.

L.-A. Tang, X. Yu, Q. Gu, J. Han, A. Leung, T. F. La Porta, “Mining Lines in the Sand: On Trajectory Discovery From Untrustworthy Data in Cyber-Physical System.” Proc of 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2013.

N. Bartolini, G. Bongiovanni, T.F. La Porta, S. Silvestri, “On the Security Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment,” Proc. of IEEE INFOCOM 2013.

A.F. Atya, I. Broustis,  S. Singh, D. Syrivelis, S.V. Krishnamurthy, T.F. La Porta, “Wireless Network Coding: Deciding When to Flip the Switch,” Proc. of IEEE INFOCOM Mini-conference, 2013.

Z. Feng, G. Papageorgiou, S.V. Krishnamurthy, R, Govindan, T.F. La Porta, “Trading Off Distortion for Delay for Video Transmissions in Wireless Networks,” Proc. of IEEE INFOCOM 2013.

 

Bin Li

Book Chapters:

  • Bin Li, Bo Ji, Atilla Eryilmaz, Efficient Age-based Scheduling in Communication Networks, in book Age of Information: Foundations and Applications, Edited by: Walid Saad, Harpreet Dhillon, Nikolaos Pappas, Mohamed A. Abd-Elmagid, and Bo Zhou, Cambridge University Press, 2023.

Journal Papers:

  • [J19] Zhongdong Liu, Bin Li, Zizhan Zheng, Tom Hou, and Bo Ji, Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems, accepted by IEEE Internet of Things Journal, 2023.
  • [J18] Xudong Qin, Bin Li, Lei Ying, Efficient Distributed Threshold-based Offloading for Large-Scale Mobile Cloud Computing, accepted by IEEE/ACM Transactions on Networking (ToN), 2022.
  • [J17] Bin Li, Jia Liu, Achieving Information Freshness with Selfish and Rational Users in Mobile Crowd-Learning, IEEE Selected Areas in Communication (JSAC), 39(5), 2021.
  • [J16] Fengjiao Lin, Yu Sang, Zhongdong Liu, Huasen Wu, Bin Li, Bo Ji, Waiting but not Aging: Optimizing Information Freshness under the Pull Model, IEEE/ACM Transactions on Networking (ToN), 29(1), 2021.
  • [J15] Zhongdong Liu, Liang Huang, Bin Li, Bo Ji, Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study, Journal of Communications and Networks, 2021.
  • [J14] Xiangqi Kong, Ning Lu, Bin Li, Optimal Scheduling for Unmanned Aerial Vehicle Networks with Flow-Level Dynamics, accepted by IEEE Transactions on Mobile Computing (TMC), 2019.
  • [J13] Bin Li, Jia Liu, Bo Ji, Low-Overhead Wireless Uplink Scheduling for Large-Scale Internet-of-Things, accepted by IEEE Transactions on Mobile Computing (TMC), 2019. (An earlier version of this paper has appeared in the Proc. WiOpt 2018)
  • [J12] Ning Lu, Yi Zhou, Chenhao Shi, Nan Cheng, Lin Cai, Bin Li, Planning While Flying: A Measurement Aided Dynamic Planning of Drone Small Cells, IEEE Internet of Things Journal, 6(2), 2018.
  • [J11] Bin Li, Aditya Ramamoorthy, R. Srikant, Mean-Field-Analysis of Coding versus Replication in Large Data Storage Systems, ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), 3(1), 2018. (An earlier version of this paper has appeared in the Proc. IEEE INFOCOM 2016)

Conference Papers:

  • [C49] Yuming Hu, Mingyu Zhu, Qiao Jin, Feng Qian, Bin Li, MagicCloth: Protect User Privacy in AR Streaming, in ACM Workshop on Mobile Immersive Computing, Networking, and Systems (ImmerCom), Madrid, Spain, October, 2023.
  • [C48] Xiaoyi Wu, Jing Yang, Huacheng Zeng, Bin Li, Joint User Association and Wireless Scheduling with Smaller Time-Scale Rate Adaptation, In International Symposium on Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks (WiOpt), Singapore, August, 2023.
  • [C47] Xudong Qin, Qiaomin Xie, Bin Li, Distributed Threshold-based Offloading for Heterogeneous Mobile Edge Computing, In Proc. IEEE International Conference on Distributed Computing Systems (ICDCS), Hong Kong, China, July, 2023. [ Acceptance rate: 18.9%]
  • [C46] Juaren Steiger, Bin Li, Bo Ji, Ning Lu, Constrained Bandit Learning with Switching Costs for Wireless Networks, In Proc. IEEE International Conference on Computer Com[C45] Guojun Xiong, Xudong Qin, Bin Li, Rahul Singh, Jian Li, Index-Aware Reinforcement Learning for Adaptive Video Streaming at the Wireless Edge, In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), Seoul, South Korea, October, 2022. [ Acceptance rate: 19.83%]
  • [C44] Zhongdong Liu, Bin Li, Zizhan Zheng, Tom Hou, and Bo Ji, Towards Optimal Tradeoff Between Data Freshness and Update Cost in Information-update Systems, International Conference on Computer Communications and Networks (ICCCN), July 2022. (invited paper)
  • [C43] Jiangong Chen, Feng Qian, Bin Li, Enhancing Quality of Experience for Collaborative Virtual Reality with Commodity Mobile Devices, In Proc. IEEE International Conference on Distributed Computing Systems (ICDCS), July, 2022. [ Acceptance rate: 19.9%]
    [C42] Harsh Gupta, Jiangong Chen, Bin Li, R. Srikant, Online Learning-Based Rate Selection for Wireless Interactive Panoramic Scene Delivery, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2022. [ Acceptance rate: 19.9%]
  • [C41] Juaren Steiger, Bin Li, Ning Lu, Learning from Delayed Semi-Bandit Feedback under Strong Fairness Guarantees, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2022. [ Acceptance rate: 19.9%]
  • [C40] Xin Liu, Bin Li, Peiyi Shi, Lei Ying, An Efficient Pessimistic-Optimistic Algorithm for Stochastic Linear Bandits with General Constraints, In Conference on Neural Information Processing Systems (NeurIPS), December, 2021. [ Acceptance rate: 26%] [Technical Report]
  • [C39] Xin Liu, Bin Li, Peiyi Shi, Lei Ying, A Constrained Bandit Approach for Online Dispatching., Reinforcement Learning in Networks and Queues (RLNQ) Workshop in conjunction with ACM SIGMETRICS 2021.
  • [C38] Bin Li, Efficient Learning-based Scheduling for Information Freshness in Wireless Networks, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2021. [ Acceptance rate: 19.9%]
  • [C37] Jiangong Chen, Xudong Qin, Guangyu Zhu, Bo Ji, Bin Li, Motion-Prediction-based Wireless Scheduling for Multi-User Panoramic Video Streaming, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2021. [ Acceptance rate: 19.9%]
  • [C36] Xudong Qin, Bin Li, Lei Ying, Distributed Threshold-based Offloading for Large-Scale Mobile Cloud Computing, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2021. [ Acceptance rate: 19.9%]
    [C35] Zhongdong Liu, Yu Sang, Bin Li, Bo Ji, A Worst-Case Approximate Analysis of Peak Age-of-Information Via Robust Queueing Approach, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2021. [ Acceptance rate: 19.9%]
  • [C34] Bin Li, Atilla Eryilmaz, R. Srikant, Emulating Round-Robin for Serving Dynamic Flows over Wireless Fading Channels, In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), October, 2020. [ Acceptance rate: 15%]
  • [C33] Zhengxiong Yuan, Bin Li, Jia Liu, Can We Improve Information Freshness with Predictions in Mobile Crowd-Learning?, in Proc. IEEE INFOCOM 2020 Age of Information Workshhop, Toronto, Canada, July, 2020.
  • [C32] Zhongdong Liu, Liang Huang, Bin Li, Bo Ji, Anti-Aging Scheduling in Single-Server Queues: A Systematic and Comparative Study, in Proc. IEEE INFOCOM 2020 Age of Information Workshhop, Toronto, Canada, July, 2020.
  • [C31] Jiangong Chen, Bin Li, R. Srikant, Thompson-Sampling-Based Wireless Transmission for Panoramic Video Streaming, In WiOpt Workshop on Machine Learning in Wireless Communications (WMLC), June, 2020 (invited paper).
  • [C30] Bin Li, Optimal Offloading for Dynamic Compute-Intensive Applications in Wireless Networks, In Proc. IEEE Conference on Global Communications Conference (GLOBECOM), Waikoloa, Hawaii, December, 2019.
  • [C29] Bin Li, Jia Liu, Can We Achieve Fresh Information with Selfish Users in Mobile Crowd-Learning?, In International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks(WiOpt), Avignon, France, June, 2019.
  • [C28] Xudong Qin, Weijian Xu, Bin Li, Low-Complexity Joint Offloading and Wireless Scheduling for Parallel Computing with Deadlines, In International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks(WiOpt), Avignon, France, June, 2019.
  • [C27] Ning Lu, Bo Ji, Bin Li, Age-based Scheduling: Improving Data Freshness for Wireless Real-Time Traffic, In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), Los Angeles, California, June, 2018. [ Acceptance rate: 16.85%]
  • [C26] Bin Li, Bo Ji, Jia Liu, Efficient and Low-Overhead Uplink Scheduling for Large-Scale Wireless Internet-of-Things, In International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks(WiOpt), Shanghai, China, May, 2018.
  • [C25] Bin Li, Zai Shi, Atilla Eryilmaz, Efficient Scheduling for Synchronized Demands in Stochastic Networks, In International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks(WiOpt), Shanghai, China, May, 2018.
  • [C24] Gamal Sallam, Gagan R Gupta, Bin Li, Bo Ji, Shortest Path and Maximum Flow Problems Under Service Function Chaining Constraints, In Proc. IEEE International Conference on Computer Communications(INFOCOM), Honolulu, Hawaii, USA, April, 2018. [ Acceptance rate: 19.2%]

Demo & Poster Papers:

  • [DP8] Zhanchen Dong, Jiangong Chen, Bin Li, Demo: Collaborative Mixed-Reality-Based Firefighter Training, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2023 (demo paper). [Best Demo Award]
  • [DP7] Michael Artlip, Jiangong Chen and Bin Li, “Virtual Reality-Based Gymnastics Visualization Using Real-Time Motion Capture Suit”, National Workshop for REU Research in Networking and Systems (REUNS), Denver, CO, October, 2022 (demo paper). [Michael is an undergraduate student who worked on my NSF REU supplemental project] [Best Demo Presentation Award]
  • [DP6] Owen Sweeny, Zhanchen Dong and Bin Li, “A Collaborative Augmented Reality Platform for Interactive and Immersive Education”, National Workshop for REU Research in Networking and Systems (REUNS), Denver, CO, October, 2022 (demo paper). [Owen is an undergraduate student who worked on my NSF REU supplemental project]
  • [DP5] Feng Qian, Bin Li, Poster: Boosting Remote Multi-user AR Privacy through a Magic Rope, In Proc. ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), June, 2022 (poster paper).
  • [DP4] Xinyi Yao, Jiangong Chen, Ting He, Jing Yang, Bin Li, A Scalable Mixed Reality Platform for Remote Collaborative LEGO Design, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2022 (demo paper). [Demo Video]
  • [DP3] Jiangong Chen, Feng Qian, Bin Li, An Interactive and Immersive Remote Education Platform based on Commodity Devices, In Proc. IEEE International Conference on Computer Communications (INFOCOM), May, 2021 (demo paper).
  • [DP2] Bin Li, Xiangqi Kong, Lei Wang, Optimal Load-Balancing for High-Density Wireless Networks with Flow-Level Dynamics, In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), Los Angeles, California, June, 2018 (poster paper). [Technical report] [Best Poster Award]
  • [DP1] Minghui Weng, Xiangqi Kong, Lianfen Huang, Bin Li, A Low-Cost Wireless System Implementation for Interactive and Immersive Teaching, In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), Los Angeles, California, June, 2018 (demo paper).
Ting He
  • He, L. Ma, A. Swami, and D. Towsley, “Network Tomography: Identifiability, Measurement Design, and Network State Inference,” Cambridge University Press, May 2021.
  • Xie, S. Thakkar, T. He, P. McDaniel, and Q. Burke, “Joint Caching and Routing in Cache Networks with Arbitrary Topology,” accepted to IEEE Transactions on Parallel and Distributed Systems, May 2023
  • B-S. Kim, B-H. Lim, B. Suh, S. Ha, He, B. Shah, and K-I. Kim, “Enabling Grant-free URLLC for AoI Minimization in RAN-Coordinated 5G Health Monitoring System,” accepted to IEEE Internet of Things Journal, May 2023
  • C-C. Chiu, X. Zhang, He, S. Wang, and A. Swami, “Laplacian Matrix Sampling for Communication-efficient Decentralized Learning,” IEEE Journal on Selected Areas in Communications – Special Issue on Communication-Efficient Distributed Learning over Networks, vol. 41, no. 4, pp. 887-901, Apr. 2023
  • Gharebaghi, N. R. Chaudhuri, T. He, and T. La Porta, “An Approach for Fast Cascading Failure Simulation in Dynamic Models of Power Systems,” Applied Energy, vol. 332, pp. 120534, Feb. 2023
  • Xie, N. Nambiar, T. He, and P. McDaniel, “Attack Resilience of Cache Replacement Policies: A Study Based on TTL Approximation,” IEEE/ACM Transactions on Networking, vol. 30, no. 6, pp. 2433-2447, Dec. 2022
  • Kim, B. Shah, T. He, and K. Kim, “A Survey on Analytical Models for Dynamic Resource Management in Wireless Body Area Networks,” Ad Hoc Networks, Vol. 135, pp. 102936, Oct. 2022
  • Liu, T. He, S. Wang, C. Liu, M. Mahdavi, V. Narayanan, K. S. Chan, and S. Pasteris, “Communication-efficient k-Means for Edge-based Machine Learning,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 10, pp. 2509-2523, Oct. 2022
  • Huang, T. He, N. R. Chaudhuri, and T. La Porta, “Line State Estimation under Cyber-Physical Attacks: Theory and Algorithms,” IEEE Transactions on Smart Grid, vol. 13, no. 5, pp. 3760-3773, Sep. 2022
  • Farhadi, S. G. Vennelaganti, T. He, N. Chaudhuri, and T. La Porta, “Improvement of SCADA-based Preventive Control under Budget Constraints,” IEEE Transactions on Network Sciences and Engineering, vol. 9, no. 4, pp. 2601-2616, Jul. 2022
  • Huang, T. He, N. R. Chaudhuri, and T. La Porta, “Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs,” IEEE Transactions on Smart Grid, vol. 13, no. 4, pp. 3160-3173, Jul. 2022
  • Burke, P. McDaniel, T. La Porta, M. Yu, and T. He, “Misreporting Attacks against Load Balancers in Software-Defined Networking,” accepted to Springer Mobile Networks and Applications (MONET), Dec. 2021
  • Yu, T. Xie, T. He, P. McDaniel, and Q. K. Burke, “Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks,” IEEE/ACM Transactions on Networking, vol. 29, no. 6, pp. 2793-2806, Dec. 2021
  • Gharebaghi, S. G. Vennelaganti, N. R. Chaudhuri, T. He, and T. La Porta, “Inclusion of Pre-Existing Undervoltage Load Shedding Schemes in AC-QSS Cascading Failure Models,” IEEE Transactions on Power Systems (TPWRS), vol. 36, no. 6, pp. 5645-5656, Nov. 2021
  • C-C. Chiu and He, “Stealthy DGoS Attack: DeGrading of Service under the Watch of Network Tomography,” IEEE/ACM Transactions on Networking, vol. 29, no. 3, pp. 1294-1307, Jun. 2021
  • C-C. Chiu and He, “Stealthy DGoS Attack against Network Tomography: The Role of Active Measurements,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1745-1758, Apr. 2021
  • Farhadi, F. Mehmeti, T. He, T. La Porta, H. Khamfroush, S. Wang, K. S. Chan, and K. Poularakis, “Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds,” IEEE/ACM Transactions on Networking, vol. 29, no. 2, pp. 779-792, Apr. 2021
  • Wang, L. Jiao, T. He, J. Li, and H. Bal, “Service Placement for Collaborative Edge Applications,” IEEE/ACM Transactions on Networking, vol. 29, no. 1, pp. 34-47, Feb. 2021
  • Munir, He, R. Raghavendra, F. Le, and A. X. Liu, “Network Scheduling and Compute Resource Aware Task Placement in Datacenters,” IEEE/ACM Transactions on Networking, vol. 28, no. 6, pp. 2435-2448, Dec. 2020
  • Lu, M-J. Li, T. He, S. Wang, V. Narayanan, and K. S. Chan, “Robust Coreset Construction for Distributed Machine Learning,” IEEE Journal on Selected Areas in Communications – Special Issue on Advances in Artificial Intelligence and Machine Learning for Networking, vol. 38, no. 10, pp. 2400-2417, Oct. 2020
  • Lin, T. He, S. Wang, K. Chan, and S. Pasteris, “Looking Glass of NFV: Inferring the Structure and State of NFV Network from External Observations,” IEEE/ACM Transactions on Networking, vol. 28, no. 4, pp. 1477-1490, Aug. 2020
  • Bartolini, T. He, V. Arrigoni, A. Massini, F. Trombetti, and H. Khamfroush, “On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography,” IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 588-601, Apr. 2020
  • Wang, R. Urgaonkar, M. Zafer, T. He, K. Chan, and K. Leung, “Dynamic Service Migration in Mobile Edge Computing based on Markov Decision Process,” IEEE/ACM Transactions on Networking, vol. 27, no. 3, pp. 1272-1288, Jun. 2019
  • Z. Tootaghaj, N. Bartolini, H. Khamfroush, T. He, N. R. Chaudhuri, and T. La Porta, “Mitigation and Recovery from Cascading Failures in Interdependent Networks under Uncertainty,” IEEE Transactions on Control of Network Systems, vol. 6, no. 2, pp. 501-514, Jun. 2019
  • Wang, T. Tuor, T. Salonidis, K.K. Leung, C. Makaya, T. He, and K. Chan, “Adaptive Federated Learning in Resource Constrained Edge Computing Systems,” IEEE Journal on Selected Areas in Communications, Special Issue on Artificial Intelligence and Machine Learning for Networking and Communications, vol. 37, no. 6, pp. 1205-1221, Jun. 2019 (IEEE Communications Society Leonard G. Abraham Prize)
  • Achleitner, N. Bartolini, T. He, T. La Porta, and D. Z. Tootaghaj, “Fast Network Configuration in Software Defined Networking,” IEEE Transactions on Network and Service Management, vol. 15, no. 4, pp. 1249-1263, Dec. 2018
  • Shukla, O. Bhardwaj, A. Abouzeid, T. Salonidis, and T. He, “Proactive Retention-Aware Caching with Multi-path Routing for Wireless Edge Networks,” IEEE Journal on Selected Areas in Communications, Special Issue on Caching for Communication Systems and Networks, vol. 36, no. 6, pp. 1286-1299, Jun. 2018
  • He, E. N. Ciftcioglu, S. Wang, and K. S. Chan, “Location Privacy in Mobile Edge Clouds: A Chaff-based Approach,” IEEE Journal on Selected Areas in Communications, Special Issue on Emerging Technologies in Software-driven Communication, vol. 35, no. 11, pp. 2625-2636, Nov. 2017
  • He, A. Gkelias, L. Ma, K. K. Leung, A. Swami, and D. Towsley, “Robust and Efficient Monitor Placement for Network Tomography in Dynamic Networks,” IEEE/ACM Transactions on Networking, vol. 25, no. 3, pp. 1732-1745, Jun. 2017
  • Dehghan, B. Jiang, A. Seetharam, T. He, T. Salonidis, J. Kurose, D. Towsley, and R. Sitaraman, “On the Complexity of Optimal Request Routing and Content Caching in Heterogeneous Cache Networks,” IEEE/ACM Transactions on Networking, vol. 25, no. 3, pp. 1635-1648, Jun. 2017
  • Wang, R. Urgaonkar, T. He, K. Chan, M. Zafer, and K. K. Leung, “Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs,” IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 4, pp. 1002-1016, Apr. 2017
  • Ma, T. He, A. Swami, D. Towsley, and K. K. Leung, “Network Capability in Localizing Node Failures via End-to-End Path Measurements,” IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 434-450, Feb. 2017
  • Farhadi, T. La Porta, T. He, N. R. Chaudhuri, “Resource Allocation in 5G Multi-tenancy Network Slicing for Balancing Distribution Power Systems,” IEEE MASS, Oct. 2022
  • Xie, S. Thakkar, T. He, P. McDaniel, and Q. Burke, “Joint Caching and Routing in Cache Networks with Arbitrary Topology,” IEEE ICDCS, Jul. 2022
  • Huang, T. He, N. R. Chaudhuri, and T. La Porta, “Preventing Outages under Coordinated Cyber-Physical Attack with Secured PMUs,” IEEE SmartGridComm, Oct. 2021
  • Farhadi, S. G. Vennelaganti, T. He, N. R. Chaudhuri, and T. La Porta, “Budget-Constrained Reinforcement of SCADA for Cascade Mitigation,” IEEE ICCCN, Jul. 2021
  • Gharebaghi, S. G. Vennelaganti, N. R. Chaudhuri, T. He, and T. La Porta, “A More Realistic AC-QSS Cascading Failure Model with Decentralized UVLS and Centralized RAS,” IEEE Power & Energy Society General Meeting (PESGM), Jul. 2021
  • Lin, T. He, and G. Pang, “Queuing Network Topology Inference Using Passive Measurements,” IFIP Networking, Jun. 2021
  • Xie, T. He, P. McDaniel, and N. Nambiar, “Attack Resilience of Cache Replacement Policies,” IEEE INFOCOM, May 2021
  • Pasteris, T. He, F. Vitale, S. Wang, and M. Herbster, “Online Learning of Facility Locations,” Algorithmic Learning Theory, Mar. 2021
  • Chiu and He, “Stealthy DGoS Attack under Passive and Active Measurements,” IEEE Globecom, Dec. 2020
  • Huang, T. He, N. R. Chaudhuri, and T. La Porta, “Power Grid State Estimation under General Cyber-Physical Attacks,” IEEE SmartGridComm, Nov. 2020 (Best Paper Finalist)
  • Burke, P. McDaniel, T. La Porta, M. Yu, and T. He, “Misreporting Attacks in Software-Defined Networking,” International Conference on Security and Privacy in Communication Networks (SecureComm 2020), Oct. 2020
  • Gharebaghi, S. G. Vennelaganti, N. R. Chaudhuri, T. He, and T. La Porta, “Solving the Divergence Problem in AC-QSS Cascading Failure Model by Introducing the Effect of a Realistic UVLS Scheme,” IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), Oct. 2020
  • Lu, C. Liu, T. He, S. Wang, and K. S. Chan, “Sharing Models or Coresets: A Study based on Membership Inference Attack,” International Workshop on Federated Learning for User Privacy and Data Confidentiality in Conjunction with ICML 2020, Jul. 2020
  • Lu, T. He, S. Wang, C. Liu, M. Mahdavi, V. Narayanan, K. S. Chan, and S. Pasteris, “Communication-efficient k-Means for Edge-based Machine Learning,” IEEE ICDCS, Jul. 2020
  • Lu, C. Liu, S. Wang, T. He, V. Narayanan, K. S. Chan, and S. Pasteris, “Joint Coreset Construction and Quantization for Distributed Machine Learning,” IFIP Networking, Jun. 2020
  • Lin, T. He, S. Wang, and K. S. Chan, “Waypoint-based Topology Inference,” IEEE ICC, Jun. 2020
  • Stein, M. Ochal, I.-A. Moisoiu, E. Gerding, R. Ganti, T. He, and T. La Porta, “Strategyproof Reinforcement Learning for Online Resource Allocation,” AAMAS, May 2020
  • C-C. Chiu and He, “Stealthy DGoS Attack: DeGrading of Service under the Watch of Network Tomography,” IEEE INFOCOM, Apr. 2020
  • Yu, T. He, P. McDaniel, and Q. K. Burke, “Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks,” IEEE INFOCOM, Apr. 2020
  • Lu, M-J Li, T. He, S. Wang, V. Narayanan, and K. S. Chan, “Robust Coreset Construction for Distributed Machine Learning,” IEEE Globecom, Dec. 2019
  • Ko, S. Wang, He, and D. Conway-Jones, “On Data Summarization for Machine Learning in Multi-Organization Federations,” DAIS workshop at IEEE SMARTCOMP, Jun. 2019
  • Lin, T. He, S. Wang, K. Chan, and S. Pasteris, “Multicast-based Weight Inference in General Network Topologies,” IEEE ICC, May 2019
  • Tootaghaj, S. Achleitner, T. He, N. Bartolini, and T. La Porta, “A Minimally Disruptive Rule Update Approach in Software Defined Networking,” IFIP Networking (poster), May 2019
  • Farhadi, F. Mehmeti, T. La Porta, T. He, H. Khamfroush, S. Wang, and K. S. Chan, “Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds,” IEEE INFOCOM, Apr. 2019
  • Pasteris, S. Wang, M. Herbster, and T. He, “Service Placement with Provable Guarantees in Heterogeneous Edge Computing Systems,” IEEE INFOCOM, Apr. 2019
  • Lin, T. He, S. Wang, K. S. Chan, and S. Pasteris, “Looking Glass of NFV: Inferring the Structure and State of NFV Network from External Observations,” IEEE INFOCOM, Apr. 2019
  • Tootaghaj, T. La Porta, and T. He, “Modeling, Monitoring, and Scheduling Techniques for Network Recovery from Massive Failures,” IFIP/IEEE International Symposium on Integrated Network Management (IM) – Dissertation Papers, Apr. 2019
  • Ochal, S. Stein, F. Bi, M. Cook, E. Gerding, T. He, and T. La Porta, “Online Mechanism Design using Reinforcement Learning for Cloud Resource Allocation,” The AAMAS-IJCAI Workshop on Agents and Incentives in Artificial Intelligence (AI^3), Jul. 2018
  • He, H. Khamfroush, S. Wang, T. La Porta, and S. Stein, “It’s Hard to Share: Joint Service Placement and Request Scheduling in Edge Clouds with Sharable and Non-sharable Resources,” IEEE ICDCS, Jul. 2018
  • Wang, L. Jiao, T. He, J. Li, and M. Muhlhauser, “Service Entity Placement for Social Virtual Reality Applications in Edge Computing,” IEEE INFOCOM, Apr. 2018
  • Wang, T. Tuor, T. Salonidis, K. K. Leung, T. He, and K. S. Chan, “When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning,” IEEE INFOCOM, Apr. 2018
  • He, “Distributed Link Anomaly Detection via Partial Network Tomography,” IFIP Performance, Nov. 2017
  • Z. Tootaghaj, T. He, and T. La Porta, “Parsimonious Tomography: Optimizing Cost-Identifiability Trade-off for Probing-based Network Monitoring,” IFIP Performance, Nov. 2017
  • Shukla, O. Bhardwaj, A. A. Abouzeid, T. Salonidis, and T. He, “Hold’em Caching: Proactive Retention-Aware Caching with Multi-path Routing for Wireless Edge Networks,” ACM MobiHoc, Jul. 2017
  • He, E. N. Ciftcioglu, S. Wang, and K. S. Chan, “Location Privacy in Mobile Edge Clouds,” IEEE ICDCS (short paper), Jun. 2017
  • Bartolini, T. He, and H. Khamfroush, “Fundamental Limits of Failure Identifiability by Boolean Network Tomography,” IEEE INFOCOM, Apr. 2017
  • Munir, He, R. Raghavendra, F. Le, and A. Liu, “Network Scheduling Aware Task Placement in Datacenters,” ACM CoNext, Dec. 2016
  • He, N. Bartolini, H. Khamfroush, I. Kim, L. Ma, and T. La Porta, “Service Placement for Detecting and Localizing Failures Using End-to-End Observations,” IEEE ICDCS, Jun. 2016
  • He, L. Ma, A. Gkelias, K.K. Leung, A. Swami, and D. Towsley, “Robust Monitor Placement for Network Tomography in Dynamic Networks,” IEEE INFOCOM, Apr. 2016

 

 

 

Rômulo Meira-Góes

[1] Meira-Góes, R., Dardik, I., Kang, E., Lafortune, S., Tripakis, S. (2023). Safe Environmental Envelopes of Discrete Systems. In: Enea, C., Lal, A. (eds) Computer Aided Verification. CAV 2023. Lecture Notes in Computer Science, vol 13964. Springer, Cham. https://doi.org/10.1007/978-3-031-37706-8_17

[2] Meira-Góes, R., Marchand, H., & Lafortune, S. (2023). Dealing with sensor and actuator deception attacks in supervisory control. Automatica, 147, 110736.

[3] Zhang, C., Saluja, T., Meira-Góes, R., Bolton, M., Garlan, D., & Kang, E. (2023). Robustification of Behavioral Designs against Environmental Deviations. In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) (pp. 423-434). IEEE.

[4] Meira-Góes, R., Kang, E., Lafortune, S., & Tripakis, S. (2023). On tolerance of discrete systems with respect to transition perturbations. Discrete Event Dynamic Systems, 1-30.

[5] Meira-Góes, R., Kwong, R. H., & Lafortune, S. (2021). Synthesis of Optimal Multiobjective Attack Strategies for Controlled Systems Modeled by Probabilistic Automata. IEEE Transactions on Automatic Control, 67(6), 2873-2888.

Syed Rafiul Hussain
  • Adaptive Frequency Hopping for 5G New Radio mMTC Security, The 24th IEEE International Conference on Industrial Technology (ICIT), 2023, Wai Ming Chan, Hyuck M. Kwon, R ́emi A. Chou, David J. Love, Sonia Fahmy, Syed Rafiul Hussain, Sang Wu Kim, Chris Vander Valk, Christopher G. Brinton, Vuk Marojevic, Khanh D. Pham, and Taejoon Kim
  • BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations, IEEE Symposium on Security and Privacy (IEEE S&P), 2023, Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, and Elisa Bertino
  • Metrics for Sustainability in Data Centers, Proceedings of the 1st Workshop on Sustainable Computer Systems Design and Implementation (HotCarbon’22), Anshul Gandhi, Kanad Ghose, Kartik Gopalan, Syed Rafiul Hussain, Dongyoon Lee, David Liu, Zhenhua Liu, Patrick McDaniel, Shuai Mu and Erez Zadok
  • BaseDiff: Differential Security Analysis of Cellular Basebands, Qualcomm Product Security Summit (QPSS), 2022., Syed Rafiul Hussain
  • More at: https://syed-rafiul-hussain.github.io/index.php/publications/
Shagufta Mehnaz
  • Towards Sentence Level Inference Attack Against Pre-trained Language Models, Kang Gu, Ehsanul Kabir, Neha Ramsurrun, Soroush Vosoughi, Shagufta Mehnaz, 23rd Privacy Enhancing Technologies Symposium (PETS 2023), accepted with shepherding.
    Publication year: 2023
  • Model Inversion Attack with Least Information and an In-depth Analysis of its Disparate Vulnerability, Sayanton V. Dibbo, Dae Lim Chung, Shagufta Mehnaz, First IEEE Conference on Secure and Trustworthy Machine Learning (SaTML 2023)
    Publication year: 2023
  • Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models, Shagufta Mehnaz, Sayanton Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino, 31st USENIX Security Symposium, Publication year: 2022
  • A Fine-grained Approach for Anomaly Detection in File System Accesses with Enhanced Temporal User Profiles, Shagufta Mehnaz, Elisa Bertino, IEEE Transactions on Dependable and Secure Computing (TDSC), Publication year: 2021
  • More at: https://smehnaz.github.io/publications/
Sencun Zhu

C.Guan, H.Liu, G.Cao, S.Zhu, T.LaPorta. HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2023.

Sun, S. Zhu and Y. Chen. ZoomP^3: Privacy-Preserving Publishing of Online Video Conference Recordings. Proceedings of the 22nd Privacy Enhancing Technologies Symposium (PoPETS), 2022.

Wu, X. Yang, S. Zhu and P. Mitra. Toward Cleansing Backdoored Neural Networks in Federated Learning. Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems (ICDCS), 2022.

Yuan, P. Liu, and S. Zhu. Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2021.

L.Yuan, E. Choo, T. Yu, I. Khalil, S. Zhu. Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. Proceedings of the 51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021.

L. Luo, Y. Fu, D. Wu, S. Zhu and P. Liu. Repackage-proofing Android Apps.  To appear in Proceedings of The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016.

Q. Guan, H. Huang, W. Luo and S. Zhu. Semantics-based Repackaging Detection for Mobile Apps.To appear in Proceedings of International Symposium on Engineering Secure Software and Systems (ESSOS), 2016.

H. Huang, S. Zhu, K. Chen and P. Liu. From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application.Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS), 2015.

H. Huang and S. Zhu. Multi-objective Software Assignment for Active Cyber Defense. Proceedings of IEEE Conference on Communications and Network Security (CNS), 2015.

X. Chen and S. Zhu. DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications. Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.

Z. Xie and S. Zhu. AppWatcher: Unveiling the Underground Market of Trading Mobile App Reviews. Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2015.

Z. Xu and S. Zhu. SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. Proceedings of The Fifth ACM Conference on Data and Application Security and Privacy (CODASPY), 2015.  (Outstanding paper award)

H. Huang, K. Chen, C. Ren, P. Liu, S. Zhu and D. Wu..Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015.

Y. Jhi, X. Jia, X. Wang, S. Zhu, P. Liu, and D. Wu. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection. IEEE Transactions on Software Engineering (TSE), 2015.

F. Zhang, D. Wu, P. Liu, and S. Zhu. Program Logic Based Software Plagiarism Detection. Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2014.

L. Li, S. Zhu, D. Torrieri, and S. Jajodia. Self- Healing Wireless Networks under Insider Jamming Attacks. Proceedings of IEEE Conference on Communications and Network Security (CNS), 2014.

L. Luo, J. Ming, D. Wu, P. Liu and S. Zhu.Proceedings of The 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), 2014.

C. Huang, S. Zhu, and R. Erbacher. Toward Software Diversity in Heterogeneous Networked Systems. Proceedings of the 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), 2014.

X. Xie and S. Zhu. GroupTie: Toward Hidden Collusion Group Discovery in App Stores. Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014.

F. Zhang, H. Huang, S. Zhu, D. Wu, and P. Liu. ViewDroid: Towards Obfuscation-Resilient Mobile Application Repackaging Detection.Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2014.

X. Chen, J. Cho, and S. Zhu. GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks. Proceedings of 11th IEEE Conference on Sensing and Communication in Wireless Networks (SECON), 2014.

W. Xu, F. Zhang, and S. Zhu. Permlyzer: Analyzing Permission Usage in Android Apps. Proceedings of the 24th IEEE International Symposium on Software Reliability Engineering (ISSRE), 2013.

Y. Chen, S. Zhu, H. Xu, and Y. Zhou.Children’s Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.Proceedings of The ASE/IEEE International Conference on Social Computing (SocialCom), 2013.

H. Huang, S. Zhu, P. Liu and D. Wu. A Framework for Evaluating Mobile App Repackaging Detection Algorithms. Proceedings of the 6th International Conference on Trust & Trustworthy Computing (TRUST), 2013.

Y. Chen, H. Xu, Y. Zhou and S. Zhu. Is This App Safe for Children? A Comparison Study of Maturity Ratings on Android and iOS Applications. Proceedings of the 22nd International World Wide Web conference (WWW), 2013.

X. Chen, H. Patankar, S. Zhu, M. Srivatsa, J. Opper. Zigzag: Partial Mutual Revocation Based Trust Management in Tactical Ad Hoc Networks. Proceedings of 10th IEEE Conference on Sensing and Communication in Wireless Networks (SECON), 2013.

W. Xu, F. Zhang and S. Zhu. JStill: Mostly Static Detection of Obfuscated Malicious JavaScript Code. Proceedings of Third ACM Conference on Data and Application Security and Privacy (CODASPY), 2013.

T. Cheng, P. Li,  S. Zhu, and D. Torrieri. M-cluster and X-ray: Two Methods for Multi-Jammer Localization in Wireless Sensor Networks. Journal of Integrated Computer-Aided Engineering (ICAE), 2013.