Fault management in software-defined networking: A survey Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ... IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018 | 114 | 2018 |
RuleTris: Minimizing rule update latency for TCAM-based SDN switches X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 96 | 2016 |
Is every flow on the right track?: Inspect SDN forwarding with RuleScope K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 84 | 2016 |
Unknown tag identification in large RFID systems: An efficient and complete solution X Liu, B Xiao, S Zhang, K Bu IEEE Transactions on Parallel and Distributed Systems 26 (6), 1775-1788, 2014 | 82 | 2014 |
Enda: Embracing network inconsistency for dynamic application offloading in mobile cloud computing J Li, K Bu, X Liu, B Xiao Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 39-44, 2013 | 71 | 2013 |
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. Q Tan, Z Zeng, K Bu, K Ren NDSS, 2020 | 67 | 2020 |
Deterministic detection of cloning attacks for anonymous RFID systems K Bu, M Xu, X Liu, J Luo, S Zhang, M Weng IEEE Transactions on Industrial Informatics 11 (6), 1255-1266, 2015 | 62 | 2015 |
Adversarial captchas C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang IEEE transactions on cybernetics 52 (7), 6095-6108, 2021 | 56 | 2021 |
Flexible and time-efficient tag scanning with handheld readers X Liu, S Zhang, B Xiao, K Bu IEEE Transactions on Mobile Computing 15 (4), 840-852, 2015 | 55 | 2015 |
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014 | 53 | 2014 |
Efficient distributed query processing in large RFID-enabled supply chains J Liu, B Xiao, K Bu, L Chen IEEE INFOCOM 2014-IEEE Conference On Computer Communications, 163-171, 2014 | 53 | 2014 |
Towards practical deployment-stage backdoor attack on deep neural networks X Qi, T Xie, R Pan, J Zhu, Y Yang, K Bu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 52 | 2022 |
Compiling minimum incremental update for modular SDN languages X Wen, C Diao, X Zhao, Y Chen, LE Li, B Yang, K Bu Proceedings of the third workshop on Hot topics in software defined …, 2014 | 50 | 2014 |
Efficient Misplaced-Tag Pinpointing in Large RFID Systems K Bu, B Xiao, Q Xiao, S Chen IEEE, 2012 | 48 | 2012 |
Unreconciled collisions uncover cloning attacks in anonymous RFID systems K Bu, X Liu, J Luo, B Xiao, G Wei IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013 | 47 | 2013 |
A locality-based range-free localization algorithm for anisotropic wireless sensor networks X Liu, S Zhang, K Bu Telecommunication Systems 62, 3-13, 2016 | 46 | 2016 |
STEP: A time-efficient tag searching protocol in large RFID systems X Liu, B Xiao, S Zhang, K Bu, A Chan IEEE Transactions on Computers 64 (11), 3265-3277, 2015 | 41 | 2015 |
Complete and Fast Unknown Tag Identification in Large RFID Systems X Liu, S Zhang, K Bu, B Xiao | 40* | |
You can clone but you cannot hide: A survey of clone prevention and detection for RFID K Bu, M Weng, Y Zheng, B Xiao, X Liu IEEE Communications Surveys & Tutorials 19 (3), 1682-1700, 2017 | 36 | 2017 |
Efficient polling-based information collection in RFID systems J Liu, B Xiao, X Liu, K Bu, L Chen, C Nie IEEE/ACM Transactions on Networking 27 (3), 948-961, 2019 | 31 | 2019 |