2009 | ||
---|---|---|
45 | Steven Gianvecchio, Zhenyu Wu, Mengjun Xie, Haining Wang: Battle of Botcraft: fighting bots in online games with human observational proofs. ACM Conference on Computer and Communications Security 2009: 256-268 | |
44 | Eli Courtwright, Chuan Yue, Haining Wang: Efficient resource management on template-based web servers. DSN 2009: 249-258 | |
43 | Chuan Yue, Haining Wang: SessionMagnifier: a simple approach to secure and convenient kiosk browsing. UbiComp 2009: 125-134 | |
42 | Chuan Yue, Haining Wang: Characterizing insecure javascript practices on the web. WWW 2009: 961-970 | |
41 | Chuan Yue, Haining Wang: Profit-aware overload protection in E-commerce Web sites. J. Network and Computer Applications 32(2): 347-356 (2009) | |
2008 | ||
40 | Chuan Yue, Haining Wang: Anti-Phishing in Offense and Defense. ACSAC 2008: 345-354 | |
39 | Zhenyu Wu, Mengjun Xie, Haining Wang: Swift: A Fast Dynamic Packet Filter. NSDI 2008: 279-292 | |
38 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 | |
37 | Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang: Measurement and Classification of Humans and Bots in Internet Chat. USENIX Security Symposium 2008: 155-170 | |
36 | Mengjun Xie, Heng Yin, Haining Wang: Thwarting E-mail Spam Laundering. ACM Trans. Inf. Syst. Secur. 12(2): (2008) | |
35 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008) | |
2007 | ||
34 | Steven Gianvecchio, Haining Wang: Detecting covert timing channels: an entropy-based approach. ACM Conference on Computer and Communications Security 2007: 307-316 | |
33 | Mengjun Xie, Zhenyu Wu, Haining Wang: HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. ACSAC 2007: 64-73 | |
32 | Chuan Yue, Mengjun Xie, Haining Wang: Automatic Cookie Usage Setting with CookiePicker. DSN 2007: 460-470 | |
31 | Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang: Cooperative Relay Service in a Wireless LAN. IEEE Journal on Selected Areas in Communications 25(2): 355-368 (2007) | |
30 | Xin Chen, Haining Wang, Shansi Ren, Xiaodong Zhang: Maintaining Strong Cache Consistency for the Domain Name System. IEEE Trans. Knowl. Data Eng. 19(8): 1057-1071 (2007) | |
29 | Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang: Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 18(3): 334-350 (2007) | |
28 | Haining Wang, Cheng Jin, Kang G. Shin: Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Trans. Netw. 15(1): 40-53 (2007) | |
27 | Heng Yin, Haining Wang: Building an application-aware IPsec policy system. IEEE/ACM Trans. Netw. 15(6): 1502-1513 (2007) | |
2006 | ||
26 | Mengjun Xie, Heng Yin, Haining Wang: An effective defense against email spam laundering. ACM Conference on Computer and Communications Security 2006: 179-190 | |
25 | Wyatt Chaffee, Bin Wang, Haining Wang: Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks. BROADNETS 2006 | |
24 | Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 | |
23 | Xin Chen, Haining Wang, Shansi Ren: DNScup: Strong Cache Consistency Protocol for DNS. ICDCS 2006: 40 | |
22 | Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Songqing Chen, Xiaodong Zhang: Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency. INFOCOM 2006 | |
21 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 | |
20 | Mengjun Xie, Keywan Tabatabai, Haining Wang: Identifying Low-ProfileWeb Server's IP Fingerprint. QEST 2006: 365-374 | |
2005 | ||
19 | Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang: Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications. DCOSS 2005: 228-243 | |
18 | Xin Chen, Shansi Ren, Haining Wang, Xiaodong Zhang: SCOPE: scalable consistency maintenance in structured P2P systems. INFOCOM 2005: 1502-1513 | |
17 | Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang: Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks. IWQoS 2005: 107-122 | |
16 | Songqing Chen, Haining Wang, Xiaodong Zhang, Bo Shen, Susie Wee: Segment-Based Proxy Caching for Internet Streaming Media Delivery. IEEE MultiMedia 12(3): 59-67 (2005) | |
15 | Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin: IP Easy-pass: a light-weight network-edge resource access control. IEEE/ACM Trans. Netw. 13(6): 1247-1260 (2005) | |
14 | Shansi Ren, Qun Li, Haining Wang, Xin Chen, Xiaodong Zhang: A study on object tracking quality under probabilistic coverage in sensor networks. Mobile Computing and Communications Review 9(1): 73-76 (2005) | |
2004 | ||
13 | Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin: IP Easy-pass: Edge Resource Access Control. INFOCOM 2004 | |
12 | Haining Wang, Danlu Zhang, Kang G. Shin: Change-Point Monitoring for the Detection of DoS Attacks. IEEE Trans. Dependable Sec. Comput. 1(4): 193-208 (2004) | |
11 | Haining Wang, Kang G. Shin: Robust TCP congestion recovery. J. High Speed Networks 13(2): 103-121 (2004) | |
2003 | ||
10 | Cheng Jin, Haining Wang, Kang G. Shin: Hop-count filtering: an effective defense against spoofed DDoS traffic. ACM Conference on Computer and Communications Security 2003: 30-41 | |
9 | Mohamed A. El-Gendy, Abhijit Bose, Haining Wang, Kang G. Shin: Statistical Characterization for Per-hop QoS. IWQoS 2003: 21-40 | |
8 | Haining Wang, Kang G. Shin: Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. IEEE Trans. Parallel Distrib. Syst. 14(9): 873-884 (2003) | |
2002 | ||
7 | Haining Wang, Danlu Zhang, Kang G. Shin: SYN-dog: Sniffing SYN Flooding Sources. ICDCS 2002: 421-428 | |
6 | Haining Wang, Kang G. Shin: Layer-4 Service Differentiation and Resource Isolation. IEEE Real Time Technology and Applications Symposium 2002: 67- | |
5 | Haining Wang, Danlu Zhang, Kang G. Shin: Detecting SYN Flooding Attacks. INFOCOM 2002 | |
2001 | ||
4 | Haining Wang, Kang G. Shin: Robust TCP Congestion Recovery. ICDCS 2001: 199-206 | |
2000 | ||
3 | Haining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves: A Simple Refinement of Slow-Start of TCP Congestion Control. ISCC 2000: 98-105 | |
1999 | ||
2 | Indra Widjaja, Haining Wang, Steven Wright, Amalendu Chatterjee: Scalability Evaluation of Multi-Protocol Over ATM (MPOA). INFOCOM 1999: 1505-1512 | |
1998 | ||
1 | Haining Wang, Carey L. Williamson: A New Scheme for TCP Congestion Control: Smooth-Start and Dynamic Recovery. MASCOTS 1998: 69-76 |