


default search action
Ke Xu 0002
Person information
- affiliation: Tsinghua University, Department of Computer Science, Beijing, China
Other persons with the same name
- Ke Xu — disambiguation page
- Ke Xu 0001
— Beihang University, Department of Computer Science and Engineering, Beijing, China
- Ke Xu 0003
— Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, China
- Ke Xu 0004 — National University of Singapore, Department of Electrical and Computer Engineering, Singapore
- Ke Xu 0005
— University of Science and Technology Beijing, Collaborative Innovation Center of Steel Technology, China
- Ke Xu 0006
— Fudan University, Center for Intelligent Medical Electronics, School of Information Science and Technology, Shanghai, China
- Ke Xu 0007
— Nanjing University of Aeronautics and Astronautics, National Key Laboratory of Science and Technology on Helicopter Transmission, China (and 1 more)
- Ke Xu 0008
— University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China
- Ke Xu 0009
— South China University of Technology, Key Laboratory of Robotics and Intelligent Software, China
- Ke Xu 0010
— City University of Hong Kong (and 1 more)
- Ke Xu 0011
— Beijing Jiaotong University, Institute of Information Science, China
- Ke Xu 0012 — Chinese Academy of Sciences, National Space Science Center, Beijing, China (and 1 more)
- Ke Xu 0013
— National University of Defense Technology, College of Electronic Science and Technology, Changsha, China
- Ke Xu 0014
— ZTE Microelectronics Research Institute, China (and 1 more)
- Ke Xu 0015
— Shenzhen Polytechnic, School of Electronic and Communication Engineering, China (and 1 more)
- Ke Xu 0016
— Bohai University, College of Mathematical Sciences and Physics, Jinzhou, China (and 1 more)
- Ke Xu 0017
— Beihang University, School of Aeronautic Science and Engineering, Beijing, China
Other persons with a similar name
- Xu Ke
- Xue Ke
- Xue-Ke Liu
- Xue-ke Song
- Ke-Fu Xu
- Ke-Jun Xu
- Xiao-ke Xu (aka: Xiao-Ke Xu) — disambiguation page
- Anke Xue (aka: An-ke Xue)
- Ke Xue — disambiguation page
- Ke Xue 0001
— Nanjing University, State Key Laboratory for Novel Software Technology, China (and 1 more)
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j142]Su Yao
, Yiying Lin
, Mu Wang
, Ke Xu
, Mingwei Xu
, Changqiao Xu
, Hongke Zhang
:
LEOEdge: A Satellite-Ground Cooperation Platform for the AI Inference in Large LEO Constellation. IEEE J. Sel. Areas Commun. 43(1): 36-50 (2025) - [j141]Songtao Fu
, Qi Li, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang
, Xinle Du, Kao Wan, Ke Xu:
Secure Fault Localization in Path Aware Networking. IEEE Trans. Dependable Secur. Comput. 22(1): 205-220 (2025) - [i41]Zhiyuan Wu, Sheng Sun, Yuwei Wang, Min Liu, Ke Xu, Quyang Pan, Bo Gao, Tian Wen:
Beyond Model Scale Limits: End-Edge-Cloud Federated Learning with Self-Rectified Knowledge Agglomeration. CoRR abs/2501.00693 (2025) - [i40]Xinhao Deng, Xiyuan Zhao, Qilei Yin, Zhuotao Liu, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Towards Robust Multi-tab Website Fingerprinting. CoRR abs/2501.12622 (2025) - 2024
- [j140]Yuchao Zhang
, Xiaotian Wang
, Xiaofeng He, Ning Zhang
, Zibin Zheng
, Ke Xu
:
Galaxy: A Scalable BFT and Privacy-Preserving Pub/Sub IoT Data Sharing Framework Based on Blockchain. IEEE Internet Things J. 11(3): 5222-5236 (2024) - [j139]Luping Xiang
, Ke Xu
, Jie Hu
, Christos Masouros
, Kun Yang
:
Robust NOMA-Assisted OTFS-ISAC Network Design With 3-D Motion Prediction Topology. IEEE Internet Things J. 11(9): 15909-15918 (2024) - [j138]Suiming Guo
, Baoying Deng
, Chao Chen
, Jintao Ke
, Jingyuan Wang
, Saiqin Long, Ke Xu
:
Seeking in Ride-on-Demand Service: A Reinforcement Learning Model With Dynamic Price Prediction. IEEE Internet Things J. 11(18): 29890-29910 (2024) - [j137]Peizhuang Cong
, Yuchao Zhang
, Wendong Wang
, Ke Xu
:
SOHO-FL: A Fast Reconvergent Intra-Domain Routing Scheme Using Federated Learning. IEEE Netw. 38(1): 272-279 (2024) - [j136]Yuchao Zhang
, Haoqiang Huang
, Ahmed M. Abdelmoniem
, Gaoxiong Zeng
, Chenyue Zheng
, Xirong Que
, Wendong Wang
, Ke Xu
:
FLAIR: A Fast and Low-Redundancy Failure Recovery Framework for Inter Data Center Network. IEEE Trans. Cloud Comput. 12(2): 737-749 (2024) - [j135]Meng Shen
, Changyue Li
, Hao Yu
, Qi Li
, Liehuang Zhu
, Ke Xu
:
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 1740-1753 (2024) - [j134]Zhiyuan Wu
, Sheng Sun
, Yuwei Wang
, Min Liu
, Ke Xu
, Wen Wang
, Xuefeng Jiang
, Bo Gao
, Jinda Lu
:
FedCache: A Knowledge Cache-Driven Federated Learning Architecture for Personalized Edge Intelligence. IEEE Trans. Mob. Comput. 23(10): 9368-9382 (2024) - [j133]Suiming Guo
, Chao Chen
, Zhetao Li
, Chengwu Liao
, Yaxiao Liu, Ke Xu
, Daqing Zhang
:
Privacy Leakage From Dynamic Prices: Trip Purpose Mining as an Example. IEEE Trans. Mob. Comput. 23(12): 12378-12395 (2024) - [j132]Meng Shen
, Jing Wang
, Jie Zhang
, Qinglin Zhao
, Bohan Peng
, Tong Wu
, Liehuang Zhu
, Ke Xu
:
Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning. IEEE Trans. Netw. Sci. Eng. 11(3): 3105-3119 (2024) - [j131]Xiaoli Zhang
, Wei Geng, Yiqiao Song, Hongbing Cheng
, Ke Xu
, Qi Li
:
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds. IEEE/ACM Trans. Netw. 32(1): 159-174 (2024) - [j130]Guangmeng Zhou
, Qi Li
, Yang Liu, Yi Zhao
, Qi Tan
, Su Yao
, Ke Xu
:
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning. IEEE/ACM Trans. Netw. 32(3): 1873-1887 (2024) - [j129]Chuanpu Fu
, Qi Li
, Ke Xu
:
Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection. IEEE/ACM Trans. Netw. 32(4): 2972-2987 (2024) - [j128]Xiaoliang Wang
, Ke Xu
, Yangfei Guo, Haiyang Wang, Songtao Fu, Qi Li
, Bin Wu, Jianping Wu:
Toward Practical Inter-Domain Source Address Validation. IEEE/ACM Trans. Netw. 32(4): 3126-3141 (2024) - [j127]Hanlin Huang
, Xinle Du, Tong Li
, Haiyang Wang, Ke Xu
, Mowei Wang
, Huichen Dai
:
Re-Architecting Buffer Management in Lossless Ethernet. IEEE/ACM Trans. Netw. 32(6): 4749-4764 (2024) - [j126]Sitong Ling
, Zhuotao Liu
, Qi Li
, Xinle Du
, Jing Chen, Ke Xu
:
Stable Byzantine Fault Tolerance in Wide Area Networks With Unreliable Links. IEEE/ACM Trans. Netw. 32(6): 5310-5325 (2024) - [j125]Luping Xiang
, Ke Xu
, Jie Hu
, Kun Yang
:
Green Beamforming Design for Integrated Sensing and Communication Systems: A Practical Approach Using Beam-Matching Error Metrics. IEEE Trans. Veh. Technol. 73(4): 5935-5940 (2024) - [j124]Xiaokun Fan
, Yali Chen
, Min Liu
, Sheng Sun
, Zhuotao Liu
, Ke Xu
, Zhongcheng Li
:
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off. IEEE Trans. Veh. Technol. 73(5): 6993-7006 (2024) - [c214]Jiazhi Guan, Yi Zhao, Zhuoer Xu, Changhua Meng, Ke Xu, Youjian Zhao:
Adversarial Robust Safeguard for Evading Deep Facial Manipulation. AAAI 2024: 118-126 - [c213]Xiyuan Zhao
, Xinhao Deng
, Qi Li
, Yunpeng Liu
, Zhuotao Liu
, Kun Sun
, Ke Xu
:
Towards Fine-Grained Webpage Fingerprinting at Scale. CCS 2024: 423-436 - [c212]Xinhao Deng
, Qi Li
, Ke Xu
:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. CCS 2024: 1997-2011 - [c211]Xijia Che
, Yi He
, Xuewei Feng
, Kun Sun
, Ke Xu
, Qi Li
:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. CCS 2024: 2087-2101 - [c210]Chuanpu Fu
, Qi Li
, Meng Shen
, Ke Xu
:
Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns. CCS 2024: 3659-3673 - [c209]Zhenhua Zou
, Zhuotao Liu
, Jinyong Shan
, Qi Li
, Ke Xu
, Mingwei Xu
:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. CCS 2024: 4032-4046 - [c208]Rongwu Xu, Zi'an Zhou, Tianwei Zhang, Zehan Qi, Su Yao, Ke Xu, Wei Xu, Han Qiu:
Walking in Others' Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias. EMNLP 2024: 8341-8368 - [c207]Bo Wu, Tong Li, Cheng Luo, Xu Yan
, Fuyu Wang, Changkui Ouyang, Linfeng Guo, Haiyang Wang, Ke Xu:
Reducing First-Frame Delay of Live Streaming by Simultaneously Initializing Window and Rate. ICDCS 2024: 232-242 - [c206]Hanlin Huang, Ke Xu, Xinle Du, Yiyang Shao, Jie Li, Xiangyu Gao, Tong Li:
Performant TCP over Wi-Fi Direct. IWQoS 2024: 1-10 - [c205]Ziwei Li, Zhaoqi Yang, Bowen Hu, Tong Li, Bo Wu, Yukuan Ding, Dulin Xu, Ke Xu:
ReND: Toward Reasoning-based BLE Neighbor Discovery by Integrating with Wi-Fi Fingerprints. IWQoS 2024: 1-6 - [c204]Ao Wang, Xuewei Feng, Qi Li, Yuxiang Yang, Ke Xu:
A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem. IWQoS 2024: 1-10 - [c203]Ye Wang, Yunpeng Liu, Ningtao Wang, Peiyang Li, Jiahao Hu, Xing Fu, Weiqiang Wang, Kun Sun, Qi Li, Ke Xu:
Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records. IWQoS 2024: 1-10 - [c202]Yi Zhao, Liang Lv, Yusen Li, Meng Shen, Liehuang Zhu, Ke Xu:
Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers. IWQoS 2024: 1-10 - [c201]Bo Wu
, Tong Li
, Cheng Luo
, Xu Yan
, Fuyu Wang
, Xinle Du
, Ke Xu
:
Toward Timeliness-Enhanced Loss Recovery for Large-Scale Live Streaming. ACM Multimedia 2024: 7891-7899 - [c200]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. NDSS 2024 - [c199]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. NDSS 2024 - [c198]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. NDSS 2024 - [c197]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. NDSS 2024 - [c196]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. NSDI 2024: 419-440 - [c195]Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu:
Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization. SP 2024: 3238-3256 - [c194]Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu:
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services. USENIX Security Symposium 2024 - [c193]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. USENIX Security Symposium 2024 - [c192]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. USENIX Security Symposium 2024 - [d1]Zhenhua Zou
, Zhuotao Liu
, Jinyong Shan
, Qi Li
, Ke Xu
, Mingwei Xu
:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts). Zenodo, 2024 - [i39]Tianyu Cui, Yanling Wang, Chuanpu Fu, Yong Xiao, Sijia Li, Xinhao Deng, Yunpeng Liu, Qinglin Zhang, Ziyi Qiu, Peiyang Li, Zhixing Tan, Junwu Xiong, Xinyu Kong, Zujie Wen, Ke Xu, Qi Li:
Risk Taxonomy, Mitigation, and Assessment Benchmarks of Large Language Model Systems. CoRR abs/2401.05778 (2024) - [i38]Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. CoRR abs/2402.12716 (2024) - [i37]Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu:
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System. CoRR abs/2402.16025 (2024) - [i36]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. CoRR abs/2403.01268 (2024) - [i35]Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu:
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed. CoRR abs/2403.11090 (2024) - [i34]Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu:
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption. CoRR abs/2403.11166 (2024) - [i33]Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li:
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices. CoRR abs/2403.15271 (2024) - [i32]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. CoRR abs/2404.04601 (2024) - [i31]Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li:
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy. CoRR abs/2405.17987 (2024) - [i30]Yanling Wang, Haoyang Li, Hao Zou, Jing Zhang, Xinlei He, Qi Li, Ke Xu:
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models. CoRR abs/2406.05328 (2024) - [i29]Ke Wang, Tianyu Xia, Zhangxuan Gu, Yi Zhao, Shuheng Shen, Changhua Meng, Weiqiang Wang, Ke Xu:
E-ANT: A Large-Scale Dataset for Efficient Automatic GUI NavigaTion. CoRR abs/2406.14250 (2024) - [i28]Xinhao Deng, Qi Li, Ke Xu:
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis. CoRR abs/2407.00918 (2024) - [i27]Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li:
Jailbreak Attacks and Defenses Against Large Language Models: A Survey. CoRR abs/2407.04295 (2024) - [i26]Rongwu Xu, Zi'an Zhou, Tianwei Zhang, Zehan Qi, Su Yao, Ke Xu, Wei Xu, Han Qiu:
Walking in Others' Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias. CoRR abs/2407.15366 (2024) - [i25]Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu:
Towards Fine-Grained Webpage Fingerprinting at Scale. CoRR abs/2409.04341 (2024) - [i24]Xuewei Feng, Yuxiang Yang, Qi Li, xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu:
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks. CoRR abs/2410.21984 (2024) - [i23]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Jianping Wu:
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. CoRR abs/2411.09895 (2024) - [i22]Jianshuo Dong, Ziyuan Zhang, Qingjie Zhang, Han Qiu, Tianwei Zhang, Hao Wang, Hewu Li, Qi Li, Chao Zhang, Ke Xu:
An Engorgio Prompt Makes Large Language Model Babble on. CoRR abs/2412.19394 (2024) - [i21]Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu:
CoGNN: Towards Secure and Efficient Collaborative Graph Learning. IACR Cryptol. ePrint Arch. 2024: 987 (2024) - 2023
- [j123]Haibin Li, Yi Zhao, Wenbing Yao, Ke Xu, Qi Li:
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction. Sci. China Inf. Sci. 66(5) (2023) - [j122]Pengmiao Li, Yuchao Zhang
, Huahai Zhang
, Wendong Wang, Ke Xu, Zhili Zhang:
A delayed eviction caching replacement strategy with unified standard for edge servers. Comput. Networks 230: 109794 (2023) - [j121]Meng Shen
, Ke Ye, Xingtong Liu, Liehuang Zhu
, Jiawen Kang
, Shui Yu
, Qi Li
, Ke Xu
:
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 791-824 (2023) - [j120]Peizhuang Cong
, Yuchao Zhang
, Lei Wang, Wendong Wang
, Xiangyang Gong
, Tong Yang
, Dan Li
, Ke Xu
:
DIT and Beyond: Interdomain Routing With Intradomain Awareness for IIoT. IEEE Internet Things J. 10(23): 20602-20616 (2023) - [j119]Huihong Wei, Yi Zhao, Ke Xu:
G-Routing: Graph Neural Networks-Based Flexible Online Routing. IEEE Netw. 37(4): 90-96 (2023) - [j118]Ziqiang Wang
, Ke Xu
, Guang Cheng
, Xiaoliang Wang
, Shenglin Jiang
, Yi Cai:
A Negotiation-Based Scheme for Interconnecting Heterogeneous Networks With Enhanced Services. IEEE Netw. 37(5): 190-196 (2023) - [j117]Xiaoxu Ren
, Chao Qiu
, Xiaofei Wang
, Zhu Han
, Ke Xu
, Haipeng Yao
, Song Guo
:
AI-Bazaar: A Cloud-Edge Computing Power Trading Framework for Ubiquitous AI Services. IEEE Trans. Cloud Comput. 11(3): 2337-2348 (2023) - [j116]Jiahui Chen
, Yi Zhao
, Qi Li
, Xuewei Feng, Ke Xu
:
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems. IEEE Trans. Inf. Forensics Secur. 18: 4561-4576 (2023) - [j115]Suiming Guo
, Qianrong Shen
, Zhiquan Liu
, Chao Chen
, Chaoxiong Chen
, Jingyuan Wang
, Zhetao Li
, Ke Xu
:
Seeking Based on Dynamic Prices: Higher Earnings and Better Strategies in Ride-on-Demand Services. IEEE Trans. Intell. Transp. Syst. 24(5): 5527-5542 (2023) - [j114]Chengwu Liao
, Chao Chen
, Suiming Guo
, Leye Wang
, Fuqiang Gu
, Jing Luo, Ke Xu
:
Enriching Large-Scale Trips With Fine-Grained Travel Purposes: A Semi-Supervised Deep Graph Embedding Framework. IEEE Trans. Intell. Transp. Syst. 24(11): 13228-13239 (2023) - [j113]Chuanpu Fu
, Qi Li
, Meng Shen
, Ke Xu
:
Frequency Domain Feature Based Robust Malicious Traffic Detection. IEEE/ACM Trans. Netw. 31(1): 452-467 (2023) - [j112]Xinle Du
, Ke Xu
, Lei Xu, Kai Zheng, Meng Shen
, Bo Wu
, Tong Li
:
R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers. IEEE/ACM Trans. Netw. 31(2): 526-541 (2023) - [j111]Yi Zhao
, Meina Qiao
, Haiyang Wang, Rui Zhang
, Dan Wang
, Ke Xu
:
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework. IEEE/ACM Trans. Netw. 31(2): 542-557 (2023) - [j110]Songtao Fu
, Qi Li
, Min Zhu, Xiaoliang Wang
, Su Yao
, Yangfei Guo
, Xinle Du
, Ke Xu
:
MASK: Practical Source and Path Verification Based on Multi-AS-Key. IEEE/ACM Trans. Netw. 31(4): 1478-1493 (2023) - [j109]Jie Hu
, Ke Xu
, Luping Xiang
, Kun Yang
:
Orthogonal-Time-Frequency-Space Signal Design for Integrated Data and Energy Transfer: Benefits From Doppler Offsets. IEEE Wirel. Commun. Lett. 12(4): 689-693 (2023) - [c191]Tianyu Xia
, Shuheng Shen, Su Yao, Xinyi Fu, Ke Xu, Xiaolong Xu, Xing Fu:
Differentially Private Learning with Per-Sample Adaptive Clipping. AAAI 2023: 10444-10452 - [c190]Xuewei Feng
, Qi Li
, Kun Sun
, Yuxiang Yang
, Ke Xu
:
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. ACM TUR-C 2023: 141-142 - [c189]Chuanpu Fu
, Qi Li
, Ke Xu
, Jianping Wu
:
Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms. CCS 2023: 1005-1019 - [c188]Peiyang Li
, Ye Wang
, Qi Li
, Zhuotao Liu
, Ke Xu
, Ju Ren
, Zhiying Liu
, Ruilin Lin
:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CCS 2023: 1020-1034 - [c187]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CCS 2023: 1496-1510 - [c186]Xiaoli Zhang, Zhicheng Xu, Hongbing Cheng, Tong Che, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Chunping Wang, Qi Li:
Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification. ICDCS 2023: 794-805 - [c185]Tong Li, Wei Liu, Xinyu Ma, Shuaipeng Zhu, Jingkun Cao, Senzhen Liu, Taotao Zhang, Yinfeng Zhu, Bo Wu, Ke Xu:
ART: Adaptive Retransmission for Wide-Area Loss Recovery in the Wild. ICNP 2023: 1-11 - [c184]Tong Li, Bowen Hu, Guanjie Tu, Jinwen Shuai, Jiaxin Liang, Yukuan Ding, Ziwei Li, Ke Xu:
Accelerating BLE Neighbor Discovery via Wi-Fi Fingerprints. INFOCOM Workshops 2023: 1-2 - [c183]Tong Li, Jiaxin Liang, Yukuan Ding, Kai Zheng, Xu Zhang, Ke Xu:
On Design and Performance of Offline Finding Network. INFOCOM 2023: 1-10 - [c182]Yuchao Zhang, Huahai Zhang, Peizhuang Cong, Wendong Wang, Ke Xu:
Grandet: Cost-aware Traffic Scheduling without Prior Knowledge in SD-WAN. IWQoS 2023: 1-10 - [c181]Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. NDSS 2023 - [c180]Shuaipeng Zhu
, Tong Li
, Xinyu Ma
, Yinfeng Zhu
, Taotao Zhang
, Senzhen Liu
, Haiyang Wang
, Ke Xu
:
Poster: PolyCC: Poly-Algorithmic Congestion Control. SIGCOMM 2023: 1129-1131 - [c179]Xu Yan
, Tong Li
, Bo Wu
, Cheng Luo
, Fuyu Wang
, Haiyang Wang
, Ke Xu
:
Poster: TOO: Accelerating Loss Recovery by Taming On-Off Traffic Patterns. SIGCOMM 2023: 1147-1149 - [c178]Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Robust Multi-tab Website Fingerprinting Attacks in the Wild. SP 2023: 1005-1022 - [c177]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. SP 2023: 3162-3177 - [c176]Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu:
Subverting Website Fingerprinting Defenses with Robust Traffic Representation. USENIX Security Symposium 2023: 607-624 - [c175]Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li:
Cross Container Attacks: The Bewildered eBPF on Clouds. USENIX Security Symposium 2023: 5971-5988 - [c174]Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu:
An Efficient Design of Intelligent Network Data Plane. USENIX Security Symposium 2023: 6203-6220 - [c173]Haoqiang Huang, Yuchao Zhang, Ran Wang, Qiao Xiang, Wendong Wang, Xirong Que, Ke Xu:
FRAVaR: A Fast Failure Recovery Framework for Inter-DC Network. WCNC 2023: 1-6 - [c172]Yunpeng Liu
, Kexin Li
, Zhuotao Liu
, Bihan Wen
, Ke Xu
, Weiqiang Wang
, Wenbiao Zhao
, Qi Li
:
Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification. WWW 2023: 1980-1990 - [c171]Linjie Tong, Ke Xu, Jiarun Hu, Flavio Ferrarotti, Klaus-Dieter Schewe:
Exploration of Reflective ASMs for Security. ABZ 2023: 185-192 - [i20]Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. CoRR abs/2301.13686 (2023) - [i19]Zhiyuan Wu, Sheng Sun, Yuwei Wang, Min Liu, Ke Xu, Wen Wang, Xuefeng Jiang, Bo Gao, Jinda Lu:
FedCache: A Knowledge Cache-driven Federated Learning Architecture for Personalized Edge Intelligence. CoRR abs/2308.07816 (2023) - [i18]Qi Li, Zhuotao Liu, Qi Li, Ke Xu:
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture. CoRR abs/2309.01098 (2023) - [i17]Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin:
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains. CoRR abs/2309.03660 (2023) - [i16]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. CoRR abs/2309.04798 (2023) - [i15]Xiaoliang Wang, Zhuotao Liu, Qi Li, Yangfei Guo, Sitong Ling, Jiangou Zhan, Yi Xu, Ke Xu:
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments. CoRR abs/2309.13271 (2023) - 2022
- [j108]Yi Zhao, Ke Xu, Qi Li, Haiyang Wang, Dan Wang
, Min Zhu:
Intelligent networking in adversarial environment: challenges and opportunities. Sci. China Inf. Sci. 65(7): 1-11 (2022) - [j107]Tianzhu Zhang
, Han Qiu, Marco Mellia
, Yuanjie Li, Hewu Li, Ke Xu:
Interpreting AI for Networking: Where We Are and Where We Are Going. IEEE Commun. Mag. 60(2): 25-31 (2022) - [j106]Pengmiao Li
, Yuchao Zhang
, Wendong Wang, Weiliang Meng, Yi Zheng, Ke Xu, Zhili Zhang:
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network. Comput. Commun. 194: 301-310 (2022) - [j105]Chengwu Liao, Chao Chen, Suiming Guo, Zhu Wang, Yaxiao Liu, Ke Xu, Daqing Zhang:
Wheels Know Why You Travel: Predicting Trip Purpose via a Dual-Attention Graph Embedding Network. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 22:1-22:22 (2022) - [j104]Peizhuang Cong
, Yuchao Zhang
, Bin Liu
, Wendong Wang
, Zehui Xiong
, Ke Xu
:
A&B: AI and Block-Based TCAM Entries Replacement Scheme for Routers. IEEE J. Sel. Areas Commun. 40(9): 2643-2661 (2022) - [j103]Su Yao, Mu Wang
, Qiang Qu
, Ziyi Zhang, Yi-Feng Zhang, Ke Xu, Mingwei Xu:
Blockchain-Empowered Collaborative Task Offloading for Cloud-Edge-Device Computing. IEEE J. Sel. Areas Commun. 40(12): 3485-3500 (2022) - [j102]Yi Zhao, Ke Xu, Jiahui Chen
, Qi Tan:
Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges. IEEE Netw. 36(5): 98-105 (2022) - [j101]Wenlong Chen, Xiaolin Wang, Xiaoliang Wang, Ke Xu, Sushu Guo:
LRVP: Lightweight Real-Time Verification of Intradomain Forwarding Paths. IEEE Syst. J. 16(4): 6309-6320 (2022) - [j100]Suiming Guo
, Chao Chen
, Jingyuan Wang
, Yan Ding, Yaxiao Liu, Ke Xu, Zhiwen Yu
, Daqing Zhang:
A Force-Directed Approach to Seeking Route Recommendation in Ride-on-Demand Service Using Multi-Source Urban Data. IEEE Trans. Mob. Comput. 21(6): 1909-1926 (2022) - [j99]Xuewei Feng
, Qi Li
, Kun Sun
, Chuanpu Fu
, Ke Xu
:
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. IEEE/ACM Trans. Netw. 30(1): 409-422 (2022) - [j98]Meikang Qiu, Ke Xu, Cheng Zhang, Tianwei Zhang:
Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond. ACM Trans. Sens. Networks 18(4): 51e:1-51e:3 (2022) - [c170]Peiyang Li, Ye Wang
, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. ESORICS (2) 2022: 126-144 - [c169]Ziqiang Wang, Zhuotao Liu, Xiaoliang Wang, Songtao Fu, Ke Xu:
DIP: unifying network layer innovations using shared L3 core functions. HotNets 2022: 60-67 - [c168]Songtao Fu, Qi Li, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang, Xinle Du, Kao Wan, Ke Xu:
D3: Lightweight Secure Fault Localization in Edge Cloud. ICDCS 2022: 515-525 - [c167]Peizhuang Cong
, Yuchao Zhang, Lei Wang, Hao Ni, Wendong Wang, Xiangyang Gong, Tong Yang, Dan Li, Ke Xu:
Break the Blackbox! Desensitize Intra-domain Information for Inter-domain Routing. IWQoS 2022: 1-10 - [c166]Yi Zhao, Qi Tan, Xiaohua Xu, Hui Su, Dan Wang
, Ke Xu:
Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective. IWQoS 2022: 1-11 - [c165]Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian:
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. NDSS 2022 - [c164]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [c163]Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu:
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. USENIX Security Symposium 2022: 2619-2636 - [c162]Tong Li
, Ke Xu, Hanlin Huang, Xinle Du, Kai Zheng:
WIP: When RDMA Meets Wireless. WoWMoM 2022: 177-180 - [i14]Jiahui Chen, Yi Zhao, Qi Li, Ke Xu:
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage. CoRR abs/2210.04052 (2022) - [i13]Tianyu Xia, Shuheng Shen, Su Yao, Xinyi Fu, Ke Xu, Xiaolong Xu, Xing Fu, Weiqiang Wang:
Differentially Private Learning with Per-Sample Adaptive Clipping. CoRR abs/2212.00328 (2022) - 2021
- [j97]Peizhuang Cong
, Yuchao Zhang
, Zheli Liu, Thar Baker
, Hissam Tawfik, Wendong Wang, Ke Xu, Ruidong Li
, Fuliang Li:
A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks. Comput. Networks 192: 108057 (2021) - [j96]Tong Li
, Kai Zheng, Ke Xu
, Yong Cui:
Acknowledgment on Demand for Transport Control. IEEE Internet Comput. 25(2): 109-115 (2021) - [j95]Meng Shen
, Huan Wang, Bin Zhang, Liehuang Zhu
, Ke Xu
, Qi Li
, Xiaojiang Du
:
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing. IEEE Internet Things J. 8(4): 2265-2275 (2021) - [j94]Yi Zhao
, Ke Xu
, Haiyang Wang, Bo Li, Meina Qiao, Haobin Shi
:
MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities. IEEE Internet Things J. 8(23): 16933-16945 (2021) - [j93]Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Ruoxi Jia:
Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services. IEEE Netw. 35(1): 163-169 (2021) - [j92]Ke Xu, Yong Zheng, Su Yao, Bo Wu, Xiao Xu:
NetSpirit: A Smart Collaborative Learning Framework for DDoS Attack Detection. IEEE Netw. 35(6): 140-147 (2021) - [j91]Dan Wang, Hao Qin, Bin Song
, Ke Xu, Xiaojiang Du, Mohsen Guizani
:
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC. Phys. Commun. 45: 101262 (2021) - [j90]Meng Shen
, Jinpeng Zhang, Liehuang Zhu
, Ke Xu
, Xiaojiang Du
:
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks. IEEE Trans. Inf. Forensics Secur. 16: 2367-2380 (2021) - [j89]Meng Shen
, Hao Yu
, Liehuang Zhu
, Ke Xu
, Qi Li
, Jiankun Hu
:
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems. IEEE Trans. Inf. Forensics Secur. 16: 4063-4077 (2021) - [j88]Yuchao Zhang
, Xiaohui Nie
, Junchen Jiang, Wendong Wang
, Ke Xu
, Youjian Zhao, Martin J. Reed
, Kai Chen
, Haiyang Wang, Guang Yao:
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation. IEEE/ACM Trans. Netw. 29(2): 918-934 (2021) - [j87]Tong Li
, Kai Zheng, Ke Xu
, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein
, Kun Tan:
Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation. IEEE/ACM Trans. Netw. 29(6): 2678-2692 (2021) - [c161]Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. ACSAC 2021: 260-272 - [c160]Chuanpu Fu
, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CCS 2021: 3431-3446 - [c159]Pengmiao Li, Yuchao Zhang, Wendong Wang, Kaichuan Zhao, Bo Lian, Ke Xu, Zhili Zhang:
Frend for Edge Servers: Reduce Server Number! Keeping Service Quality! HPCC/DSS/SmartCity/DependSys 2021: 107-114 - [c158]Peizhuang Cong
, Yuchao Zhang, Wendong Wang, Ke Xu, Ruidong Li, Fuliang Li:
A Deep Reinforcement Learning-based Routing Scheme with Two Modes for Dynamic Networks. ICC 2021: 1-6 - [c157]Xinle Du, Tong Li
, Lei Xu, Kai Zheng, Meng Shen, Bo Wu, Ke Xu:
R-AQM: Reverse ACK Active Queue Management in Multi-tenant Data Centers. ICNP 2021: 1-12 - [c156]Yang Liu, Yi Zhao, Guangmeng Zhou, Ke Xu:
FedPrune: Personalized and Communication-Efficient Federated Learning on Non-IID Data. ICONIP (5) 2021: 430-437 - [c155]Songtao Fu, Ke Xu, Qi Li, Xiaoliang Wang, Su Yao, Yangfei Guo, Xinle Du:
MASK: Practical Source and Path Verification based on Multi-AS-Key. IWQoS 2021: 1-10 - [c154]Meng Shen, Zhenbo Gao, Liehuang Zhu, Ke Xu:
Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning. IWQoS 2021: 1-10 - [c153]Meng Shen, Minghui Wang, Ke Xu, Liehuang Zhu:
Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs. IWQoS 2021: 1-10 - [c152]Xiangxiang Wang, Jiangchuan Liu, Fangxin Wang, Ke Xu:
Demystifying the Relationship Between Network Latency and Mobility on High-Speed Rails: Measurement and Prediction. IWQoS 2021: 1-10 - [c151]Yuchao Zhang, Peizhuang Cong
, Bin Liu, Wendong Wang, Ke Xu:
AIR: An AI-based TCAM Entry Replacement Scheme for Routers. IWQoS 2021: 1-10 - [c150]Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang, Ke Xu, Zhili Zhang:
CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge Server. MSN 2021: 128-135 - [c149]Mingxing Liu, Ying Liu, Ke Xu, Lin He, Xiaoliang Wang, Yangfei Guo, Weiyu Jiang:
TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation. MSN 2021: 470-478 - [i12]Guangmeng Zhou, Ke Xu, Qi Li, Yang Liu, Yi Zhao:
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning. CoRR abs/2106.14126 (2021) - [i11]Chuanpu Fu, Qi Li, Meng Shen, Ke Xu:
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis. CoRR abs/2106.14707 (2021) - 2020
- [b3]Meng Shen
, Liehuang Zhu
, Ke Xu
:
Blockchain: Empowering Secure Data Sharing. Springer 2020, ISBN 978-981-15-5938-9, pp. 1-130 - [b2]Yuchao Zhang, Ke Xu:
Network Management in Cloud and Edge Computing. Springer 2020, ISBN 978-981-15-0137-1, pp. 1-138 - [j86]Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo:
SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards. IEEE Commun. Mag. 58(1): 47-53 (2020) - [j85]Yi Zhao, Ke Xu, Yifeng Zhong, Xiangyang Li, Ning Wang, Hui Su, Meng Shen, Ziwei Li:
Incentive mechanisms for mobile data offloading through operator-owned WiFi access points. Comput. Networks 174: 107226 (2020) - [j84]Wenlong Chen, Heyang Chen, Zhiliang Wang, Chengan Zhao, Mingwei Xu, Ke Xu, Yingya Guo:
Congestion avoidance transmission mechanism based on two-dimensional forwarding. Future Gener. Comput. Syst. 102: 1-13 (2020) - [j83]Meng Shen
, Ke Xu, Xiaojiang Du, Martin J. Reed, Md. Zakirul Alam Bhuiyan, Lan Zhang, Rashid Mijumbi:
Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities. IEEE Internet Things J. 7(5): 3897-3900 (2020) - [j82]Yi Zhao
, Haiyang Wang, Hui Su, Liang Zhang
, Rui Zhang
, Dan Wang
, Ke Xu
:
Understand Love of Variety in Wireless Data Market Under Sponsored Data Plans. IEEE J. Sel. Areas Commun. 38(4): 766-781 (2020) - [j81]Meng Shen
, Huisen Liu, Liehuang Zhu
, Ke Xu, Hongbo Yu, Xiaojiang Du
, Mohsen Guizani
:
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT. IEEE J. Sel. Areas Commun. 38(5): 942-954 (2020) - [j80]Suiming Guo
, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Fine-grained Dynamic Price Prediction in Ride-on-demand Services: Models and Evaluations. Mob. Networks Appl. 25(2): 505-520 (2020) - [j79]Bo Wu, Ke Xu, Qi Li, Shoushou Ren, Zhuotao Liu, Zhichao Zhang:
Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Netw. 34(2): 30-36 (2020) - [j78]Lei Xu, Ke Xu, Tong Li
, Kai Zheng, Meng Shen, Xiaojiang Du, Xinle Du:
ABQ: Active Buffer Queueing in Datacenters. IEEE Netw. 34(2): 232-237 (2020) - [j77]Yuchao Zhang, Pengmiao Li, Zhili Zhang, Bo Bai, Gong Zhang, Wendong Wang, Bo Lian, Ke Xu:
AutoSight: Distributed Edge Caching in Short Video Network. IEEE Netw. 34(3): 194-199 (2020) - [j76]Meng Shen, Yiting Liu, Liehuang Zhu, Ke Xu, Xiaojiang Du, Nadra Guizani:
Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach. IEEE Netw. 34(4): 20-27 (2020) - [j75]Xiaoliang Wang, Ke Xu, Wenlong Chen, Qi Li, Meng Shen, Bo Wu:
ID-Based SDN for the Internet of Things. IEEE Netw. 34(4): 76-83 (2020) - [j74]Laizhong Cui
, Shu Yang
, Ziteng Chen
, Yi Pan
, Mingwei Xu, Ke Xu
:
An Efficient and Compacted DAG-Based Blockchain Protocol for Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(6): 4134-4145 (2020) - [j73]Suiming Guo
, Chao Chen
, Jingyuan Wang
, Yaxiao Liu, Ke Xu, Zhiwen Yu
, Daqing Zhang, Dah Ming Chiu
:
ROD-Revenue: Seeking Strategies Analysis and Revenue Prediction in Ride-on-Demand Service Using Multi-Source Urban Data. IEEE Trans. Mob. Comput. 19(9): 2202-2220 (2020) - [j72]Ke Xu
, Liang Lv
, Tong Li
, Meng Shen
, Haiyang Wang, Kun Yang
:
Minimizing Tardiness for Data-Intensive Applications in Heterogeneous Systems: A Matching Theory Perspective. IEEE Trans. Parallel Distributed Syst. 31(1): 144-158 (2020) - [j71]Meng Shen
, Jie Zhang
, Liehuang Zhu
, Ke Xu
, Xiangyun Tang
:
Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5773-5783 (2020) - [j70]Su Yao, Jianfeng Guan, Yinan Wu, Ke Xu, Mingwei Xu:
Toward Secure and Lightweight Access Authentication in SAGINs. IEEE Wirel. Commun. 27(6): 75-81 (2020) - [c148]Xuewei Feng, Chuanpu Fu
, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CCS 2020: 1323-1335 - [c147]Yi Zhao, Ke Xu, Feng Yan, Yuchao Zhang, Yao Fu, Haiyang Wang:
Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks. ICC 2020: 1-6 - [c146]Lei Ding, Yang Li
, Haiyang Wang, Ke Xu:
Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent. INFOCOM Workshops 2020: 1300-1301 - [c145]Yi Zhao, Wei Bao, Dan Wang
, Ke Xu, Liang Lv:
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems. INFOCOM Workshops 2020: 1302-1303 - [c144]Yuchao Zhang, Ye Tian, Wendong Wang, Peizhuang Cong
, Chao Chen, Dan Li, Ke Xu:
Federated Routing Scheme for Large-scale Cross Domain Network. INFOCOM Workshops 2020: 1358-1359 - [c143]Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu:
Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering. INFOCOM 2020: 2223-2232 - [c142]Meng Shen, Jinpeng Zhang, Ke Xu, Liehuang Zhu, Jiangchuan Liu, Xiaojiang Du:
DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning. IWQoS 2020: 1-10 - [c141]Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen:
I Know If the Journey Changes: Flexible Source and Path Validation. IWQoS 2020: 1-6 - [c140]Shuying Wei, Xiaoliang Wang, Ke Xu:
NoPTPeer: Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without Privilege. MSN 2020: 576-583 - [c139]Tong Li
, Kai Zheng, Ke Xu, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein
, Kun Tan:
TACK: Improving Wireless Transport Performance by Taming Acknowledgments. SIGCOMM 2020: 15-30 - [i10]Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu:
Off-Path TCP Exploits of the Mixed IPID Assignment. CoRR abs/2008.12981 (2020) - [i9]Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du:
Robust Attacks on Deep Learning Face Recognition in the Physical World. CoRR abs/2011.13526 (2020)
2010 – 2019
- 2019
- [j69]Tong Li
, Kezhi Wang, Ke Xu, Kun Yang, Chathura M. Sarathchandra Magurawalage
, Haiyang Wang:
Communication and computation cooperation in cloud radio access network with mobile edge computing. CCF Trans. Netw. 2(1): 43-56 (2019) - [j68]Qi Tan
, Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Meng Shen:
Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks. CCF Trans. Netw. 2(3-4): 188-206 (2019) - [j67]Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen
, Kui Ren:
RFL: Robust fault localization on unreliable communication channels. Comput. Networks 158: 158-174 (2019) - [j66]Meng Shen, Zelin Liao, Liehuang Zhu, Ke Xu, Xiaojiang Du:
VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(3): 103:1-103:19 (2019) - [j65]Meng Shen
, Baoli Ma
, Liehuang Zhu
, Xiaojiang Du
, Ke Xu
:
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT. IEEE Internet Things J. 6(2): 1998-2008 (2019) - [j64]Liang Lv
, Yuchao Zhang
, Yusen Li
, Ke Xu, Dan Wang
, Wendong Wang, Minghui Li, Xuan Cao, Qingqing Liang:
Communication-Aware Container Placement and Reassignment in Large-Scale Internet Data Centers. IEEE J. Sel. Areas Commun. 37(3): 540-555 (2019) - [j63]Jia Hu, Kun Yang, Victor C. M. Leung, Ke Xu:
Guest Editorial: Smart Grid Inspired Data Sensing, Processing and Networking Technologies. Mob. Networks Appl. 24(5): 1699-1700 (2019) - [j62]Ziwei Li, Ke Xu, Haiyang Wang, Yi Zhao, Xiaoliang Wang, Meng Shen:
Machine-Learning-Based Positioning: A Survey and Future Directions. IEEE Netw. 33(3): 96-101 (2019) - [c138]Shu Yang, Ziteng Chen, Laizhong Cui, Mingwei Xu, Zhongxing Ming, Ke Xu:
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol. Blockchain 2019: 314-318 - [c137]Meng Shen, Siqi Chen, Liehuang Zhu, Renyi Xiao, Ke Xu, Xiaojiang Du:
Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries. GLOBECOM 2019: 1-6 - [c136]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren:
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection. ICDCS 2019: 1106-1116 - [c135]Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang
, Dan Wang
, Ke Xu, Qi Tan:
TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information. INFOCOM 2019: 1981-1989 - [c134]Wenbing Yao, Ke Xu, Qi Li:
Exploring the Influence of News Articles on Bitcoin Price with Machine Learning. ISCC 2019: 1-6 - [c133]Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, Yiting Liu:
Encrypted traffic classification of decentralized applications on ethereum using feature fusion. IWQoS 2019: 18:1-18:10 - [c132]Yi Zhao, Hui Su, Liang Zhang, Dan Wang
, Ke Xu:
Variety matters: a new model for the wireless data market under sponsored data plans. IWQoS 2019: 23:1-23:10 - 2018
- [j61]Yuchao Zhang
, Ke Xu, Xuelin Shi, Haiyang Wang, Jiangchuan Liu, Yong Wang:
Design, modeling, and analysis of online combinatorial double auction for mobile cloud computing markets. Int. J. Commun. Syst. 31(7) (2018) - [j60]Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Daqing Zhang, Dah Ming Chiu:
A Simple but Quantifiable Approach to Dynamic Price Prediction in Ride-on-demand Services Leveraging Multi-source Urban Data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(3): 112:1-112:24 (2018) - [j59]Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li
, Xuan Cao:
Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains. IEEE Netw. 32(2): 138-143 (2018) - [j58]Su Yao, Jianfeng Guan, Zhiwei Yan, Ke Xu:
SI-STIN: A Smart Identifier Framework for Space and Terrestrial Integrated Network. IEEE Netw. 33(1): 8-14 (2018) - [j57]Fei Chen, Haitao Li, Jiangchuan Liu, Bo Li, Ke Xu, Yuemin Hu
:
Migrating big video data to cloud: a peer-assisted approach for VoD. Peer-to-Peer Netw. Appl. 11(5): 1060-1074 (2018) - [j56]Haiyang Wang, Tong Li
, Ryan Shea
, Xiaoqiang Ma
, Feng Wang
, Jiangchuan Liu
, Ke Xu
:
Toward Cloud-Based Distributed Interactive Applications: Measurement, Modeling, and Analysis. IEEE/ACM Trans. Netw. 26(1): 3-16 (2018) - [j55]Ke Xu, Tong Li
, Haiyang Wang, Haitao Li, Wei Zhu, Jiangchuan Liu
, Song Lin:
Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites. IEEE Trans. Serv. Comput. 11(3): 534-548 (2018) - [j54]Ke Xu
, Tong Li
, Haiyang Wang, Haitao Li, Wei Zhu, Jiangchuan Liu
, Song Lin:
Errata to "Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites". IEEE Trans. Serv. Comput. 11(4): 740 (2018) - [j53]Xiaoliang Wang
, Ke Xu
, Bo Mao
:
GreenLink: An Energy Efficient Scatternet Formation for BLE Devices. Wirel. Commun. Mob. Comput. 2018: 1836198:1-1836198:13 (2018) - [c131]Yuchao Zhang, Junchen Jiang, Ke Xu, Xiaohui Nie, Martin J. Reed, Haiyang Wang, Guang Yao, Miao Zhang, Kai Chen:
BDS: a centralized near-optimal overlay network for inter-datacenter data replication. EuroSys 2018: 10:1-10:14 - [c130]Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang:
Enabling Efficient Source and Path Verification via Probabilistic Packet Marking. IWQoS 2018: 1-10 - [c129]Bo Wu, Qi Li, Ke Xu, Ruoyu Li
, Zhuotao Liu:
SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection. MASS 2018: 308-316 - [c128]Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Dynamic Price Prediction in Ride-on-demand Service with Multi-source Urban Data. MobiQuitous 2018: 412-421 - [c127]Li Li, Ke Xu, Tong Li
, Kai Zheng, Chunyi Peng, Dan Wang
, Xiangxiang Wang, Meng Shen, Rashid Mijumbi:
A measurement study on multi-path TCP with multiple cellular carriers on high speed rails. SIGCOMM 2018: 161-175 - [i8]Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu:
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT. CoRR abs/1809.07914 (2018) - 2017
- [j52]Lei Xu, Ke Xu, Yong Jiang, Fengyuan Ren, Haiyang Wang:
Throughput optimization of TCP incast congestion control in large-scale datacenter networks. Comput. Networks 124: 46-60 (2017) - [j51]Menghan Li, Dan Pei
, Xiaoping Zhang, Beichuan Zhang, Ke Xu:
Interest-suppression-based NDN live video broadcasting over wireless LAN. Frontiers Comput. Sci. 11(4): 675-687 (2017) - [j50]Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu:
TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code. Future Gener. Comput. Syst. 72: 219-226 (2017) - [j49]Suiming Guo, Chao Chen, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Modelling Passengers' Reaction to Dynamic Prices in Ride-on-demand Services: A Search for the Best Fare. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(4): 136:1-136:23 (2017) - [j48]Guopeng Zhang, Kun Yang, Haifeng Jiang, Xiaofeng Lu, Ke Xu, Lianming Zhang
:
Equilibrium Price and Dynamic Virtual Resource Allocation for Wireless Network Virtualization. Mob. Networks Appl. 22(3): 564-576 (2017) - [j47]Li Li
, Ke Xu, Dan Wang
, Chunyi Peng
, Kai Zheng, Rashid Mijumbi, Qingyang Xiao:
A Longitudinal Measurement Study of TCP Performance and Behavior in 3G/4G Networks Over High Speed Rails. IEEE/ACM Trans. Netw. 25(4): 2195-2208 (2017) - [j46]Xiaoliang Wang
, Ke Xu
, Ziwei Li:
SmartFix: Indoor Locating Optimization Algorithm for Energy-Constrained Wearable Devices. Wirel. Commun. Mob. Comput. 2017 (2017) - [c126]Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wenlong Chen:
MINOS: regulating router dataplane actions in dynamic runtime environments. ACM TUR-C 2017: 40:1-40:10 - [c125]Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang
, Minghui Li, Xuan Cao, Qingqing Liang:
A Communication-Aware Container Re-Distribution Approach for High Performance VNFs. ICDCS 2017: 1555-1564 - [c124]Tong Li
, Chathura M. Sarathchandra Magurawalage
, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang:
On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing. ICDCS 2017: 2258-2263 - [c123]Bo Wu, Ke Xu, Qi Li, Fan Yang:
Robust and lightweight fault localization. IPCCC 2017: 1-8 - [c122]Li Li, Ke Xu, Dan Wang
, Chunyi Peng, Kai Zheng, Haiyang Wang, Rashid Mijumbi, Xiangxiang Wang:
A measurement study on Skype voice and video calls in LTE networks on high speed rails. IWQoS 2017: 1-10 - [c121]Suiming Guo, Chao Chen, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
It Can be Cheaper: Using Price Prediction to Obtain Better Prices from Dynamic Pricing in Ride-on-demand Services. MobiQuitous 2017: 146-155 - [c120]Suiming Guo, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Understanding passenger reaction to dynamic prices in ride-on-demand service. PerCom Workshops 2017: 42-45 - [c119]Suiming Guo, Yaxiao Liu, Ke Xu, Dah Ming Chiu:
Understanding ride-on-demand service: Demand and dynamic pricing. PerCom Workshops 2017: 509-514 - 2016
- [j45]Ke Xu, Xiaoliang Wang, Wei Wei, Houbing Song
, Bo Mao:
Toward software defined smart home. IEEE Commun. Mag. 54(5): 116-122 (2016) - [j44]Ke Xu, Yi Qu, Kun Yang:
A tutorial on the internet of things: from a heterogeneous network integration perspective. IEEE Netw. 30(2): 102-108 (2016) - [j43]Ke Xu, Meng Shen, Hongying Liu, Jiangchuan Liu, Fan Li, Tong Li
:
Achieving Optimal Traffic Engineering Using a Generalized Routing Framework. IEEE Trans. Parallel Distributed Syst. 27(1): 51-65 (2016) - [c118]Tong Li
, Ke Xu, Meng Sheng, Haiyang Wang, Kun Yang, Yuchao Zhang:
Towards Minimal Tardiness of Data-Intensive Applications in Heterogeneous Networks. ICCCN 2016: 1-9 - [c117]Lei Zhang, Cong Zhang, Jiangchuan Liu, Xiaowen Chu
, Ke Xu, Haiyang Wang, Yong Jiang:
Power-Aware Wireless Transmission for Computation Offloading in Mobile Cloud. ICCCN 2016: 1-9 - [c116]Qingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao:
Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios. ICDCS 2016: 629-638 - [c115]Yuchao Zhang, Ke Xu, Guang Yao, Miao Zhang, Xiaohui Nie:
PieBridge: A Cross-DR scale Large Data Transmission Scheduling System. SIGCOMM 2016: 553-554 - [c114]Yuchao Zhang, Ke Xu, Xuelin Shi, Haiyang Wang, Jiangchuan Liu, Yong Wang:
Continuous double auction for cloud market: Pricing and bidding analysis. WCNC 2016: 1-6 - 2015
- [j42]Guodong Zhao, Ke Xu, Lei Xu, Bo Wu:
Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis. IEEE Access 3: 1132-1142 (2015) - [j41]Jia Hu, Kun Yang, Chirag Warty, Ke Xu:
Special issue on big data inspired data sensing, processing and networking technologies. Ad Hoc Networks 35: 1-2 (2015) - [j40]Guopeng Zhang, Kun Yang, Ke Xu, Yongquan Dong:
A bargaining game theoretic method for virtual resource allocation in LTE-based cellular networks. Sci. China Inf. Sci. 58(12): 1-9 (2015) - [j39]Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat, Meng Shen, Ke Xu, Kun Yang:
A neuro-fuzzy approach to self-management of virtual network resources. Expert Syst. Appl. 42(3): 1376-1390 (2015) - [j38]Yi Qu, Ke Xu, Jiangchuan Liu, Wenlong Chen:
Toward a Practical Energy Conservation Mechanism With Assistance of Resourceful Mules. IEEE Internet Things J. 2(2): 145-158 (2015) - [j37]Ying Liu, Hongying Liu, Ke Xu, Meng Shen:
A Family of Stable Multipath Dual Congestion Control Algorithms. J. Comput. Sci. Technol. 30(6): 1274-1289 (2015) - [j36]Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen:
Exploring the policy selection of the P2P VoD system: A simulation-based research. Peer-to-Peer Netw. Appl. 8(3): 459-473 (2015) - [j35]Wenjing Su, Chunyu Liu, Constantino M. Lagoa
, Hao Che, Ke Xu, Yong Cui:
Integrated, Distributed Traffic Control in Multidomain Networks. IEEE Trans. Control. Syst. Technol. 23(4): 1373-1386 (2015) - [c113]Haitao Li, Feng Wang, Jiangchuan Liu, Ke Xu:
SNACS: Social Network-Aware Cloud Assistance for Online Propagated Video Sharing. CLOUD 2015: 877-884 - [c112]Yudong Zhao, Ke Xu, Rashid Mijumbi, Meng Shen:
Design and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks. BigCom 2015: 179-192 - [c111]Yifeng Zhong, Ke Xu, Xiang-Yang Li, Hui Su, Qingyang Xiao:
ESTRA: Incentivizing Storage Trading for Edge Caching in Mobile Content Delivery. GLOBECOM 2015: 1-6 - [c110]Meng Shen, Ke Xu, Fuliang Li, Fan Li, Liehuang Zhu, Lei Guan:
Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks. HPCC/CSS/ICESS 2015: 1-6 - [c109]Menghan Li, Dan Pei
, Xiaoping Zhang, Beichuan Zhang, Ke Xu:
NDN Live Video Broadcasting over Wireless LAN. ICCCN 2015: 1-7 - [c108]Meng Shen, Ke Xu, Fan Li, Kun Yang, Liehuang Zhu, Lei Guan:
Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications. ICPP 2015: 929-938 - [c107]Kevin Collados, Juan-Luis Gorricho, Joan Serrat, Zheng Hu, Ke Xu:
An intelligent two-agent self-configuration approach for radio resource management. IM 2015: 706-712 - [c106]Guopeng Zhang, Kun Yang, Junyi Wei, Ke Xu, Peng Liu:
Virtual resource allocation for wireless virtualization networks using market equilibrium theory. INFOCOM Workshops 2015: 366-371 - [c105]Li Li, Ke Xu, Dan Wang
, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi:
A measurement study on TCP behaviors in HSPA+ networks on high-speed rails. INFOCOM 2015: 2731-2739 - [c104]Yi Qu, Ke Xu, Haiyang Wang, Dan Wang
, Bo Wu:
Lifetime maximization in rechargeable wireless sensor networks with charging interference. IPCCC 2015: 1-8 - [c103]Yuchao Zhang, Ke Xu, Haiyang Wang, Meng Shen:
Towards shorter task completion time in datacenter networks. IPCCC 2015: 1-8 - [c102]Hui Su, Tong Li
, Ke Xu, Shenglin Zhang
, Xiaoliang Wang:
TSP: A traffic sharing platform for mobile networks. IWQoS 2015: 67-68 - [c101]Lei Xu, Ke Xu, Yong Jiang, Fengyuan Ren, Haiyang Wang:
Enhancing TCP Incast congestion control over large-scale datacenter networks. IWQoS 2015: 225-230 - [c100]Yuchao Zhang, Ke Xu, Haiyang Wang, Jiangchuan Liu, Yifeng Zhong, Wenlong Chen:
Performance and incentive of teamwork-based channel allocation in spectrum access networks. IWQoS 2015: 255-260 - [c99]Qingfang Liu, Ke Xu, Haiyang Wang, Lei Xu:
Modeling Multi-path TCP Throughput with Coupled Congestion Control and Flow Control. MSWiM 2015: 99-106 - [e1]Shiyong Zhang, Ke Xu, Mingwei Xu, Jie Wu, Chengrong Wu, YiPing Zhong:
Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers. Communications in Computer and Information Science 502, Springer 2015, ISBN 978-3-662-46825-8 [contents] - 2014
- [b1]Ke Xu, Yifeng Zhong, Huan He:
Internet Resource Pricing Models. Springer Briefs in Computer Science, Springer 2014, ISBN 978-1-4614-8408-0, pp. i-x, 1-87 - [j34]Ke Xu, Min Zhu, Guangwu Hu, Liang Zhu, Yifeng Zhong, Ying Liu, Jianping Wu, Ning Wang:
Towards evolvable Internet architecture-design constraints and models analysis. Sci. China Inf. Sci. 57(11): 1-24 (2014) - [j33]Frédéric François, Ning Wang, Klaus Moessner
, Stylianos Georgoulas, Ke Xu:
On IGP link weight optimization for joint energy efficiency and load balancing improvement. Comput. Commun. 50: 130-141 (2014) - [j32]Yong Cui, Qi Sun, Ke Xu, Wendong Wang, Ted Lemon:
Configuring IPv4 over IPv6 Networks: Transitioning with DHCP. IEEE Internet Comput. 18(3): 84-88 (2014) - [j31]Wei Tan, Ke Xu, Dan Wang
:
An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension. IEEE Internet Things J. 1(5): 461-471 (2014) - [j30]Ke Xu, Wenlong Chen, Chuang Lin, Mingwei Xu, Dongchao Ma, Yi Qu:
Toward a practical reconfigurable router: a software component development approach. IEEE Netw. 28(5): 74-80 (2014) - [j29]Jiangchuan Liu, Ke Xu, Yongqiang Xiong, Dongchao Ma, Kai Shuang:
Peer-to-peer as an infrastructure service. Peer-to-Peer Netw. Appl. 7(4): 456-458 (2014) - [j28]Chang Ge, Zhili Sun
, Ning Wang, Ke Xu, Jinsong Wu
:
Energy Management in Cross-Domain Content Delivery Networks: A Theoretical Perspective. IEEE Trans. Netw. Serv. Manag. 11(3): 264-277 (2014) - [j27]Ke Xu, Haiyang Wang, Jiangchuan Liu, Song Lin, Lei Xu:
Pushing Server Bandwidth Consumption to the Limit: Modeling and Analysis of Peer-Assisted VoD. IEEE Trans. Netw. Serv. Manag. 11(4): 472-485 (2014) - [j26]Ke Xu, Meng Shen, Yong Cui, Mingjiang Ye, Yifeng Zhong:
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. IEEE Trans. Parallel Distributed Syst. 25(5): 1101-1111 (2014) - [j25]Ke Xu, Yifeng Zhong, Huan He:
Can P2P Technology Benefit Eyeball ISPs? A Cooperative Profit Distribution Answer. IEEE Trans. Parallel Distributed Syst. 25(11): 2783-2793 (2014) - [c98]Haiyang Wang, Jiangchuan Liu, Ke Xu:
On incentive of customer-provided resource sharing in cloud. ICC 2014: 3450-3455 - [c97]Qingyang Xiao, Ke Xu, Dan Wang
, Li Li, Yifeng Zhong:
TCP Performance over Mobile Networks in High-Speed Mobility Scenarios. ICNP 2014: 281-286 - [c96]Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu:
Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model. IPCCC 2014: 1-8 - [c95]Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen:
Online combinatorial double auction for mobile cloud computing markets. IPCCC 2014: 1-8 - [c94]Meng Shen, Ke Xu, Kun Yang, Hsiao-Hwa Chen:
Towards efficient virtual network embedding across multiple network domains. IWQoS 2014: 61-70 - 2013
- [j24]Gang Su, Markus Hidell, Henrik Abrahamsson, Bengt Ahlgren, Dan Li, Peter Sjödin, Voravit Tanyingyong, Ke Xu:
Resource management in radio access and IP-based core networks for IMT Advanced and Beyond. Sci. China Inf. Sci. 56(2): 169-184 (2013) - [j23]Ying Liu, Jianping Wu, Zhou Zhang, Ke Xu:
Research achievements on the new generation Internet architecture and protocols. Sci. China Inf. Sci. 56(11): 1-25 (2013) - [j22]Haiyang Wang, Feng Wang, Jiangchuan Liu, Chuang Lin, Ke Xu, Chonggang Wang:
Accelerating Peer-to-Peer File Sharing with Social Relations. IEEE J. Sel. Areas Commun. 31(9-Supplement): 66-74 (2013) - [j21]Guangwu Hu, Ke Xu, Jianping Wu, Yong Cui, Fan Shi:
A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios. IEEE Netw. 27(6): 66-73 (2013) - [j20]Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu, Di Wu:
Torrents on Twitter: Explore Long-Term Social Relationships in Peer-to-Peer Systems. IEEE Trans. Netw. Serv. Manag. 10(1): 95-104 (2013) - [c93]Haitao Li, Xiaoqiang Ma, Feng Wang, Jiangchuan Liu, Ke Xu:
On popularity prediction of videos shared in online social networks. CIKM 2013: 169-178 - [c92]Guangwu Hu, Ke Xu, Jianping Wu:
SuperFlow: A Reliable, Controllable and Scalable Architecture for Large-Scale Enterprise Networks. HPCC/EUC 2013: 1195-1202 - [c91]Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu, Di Wu, Qiang Lin:
Resource provisioning on customer-provided clouds: Optimization of service availability. ICC 2013: 2954-2958 - [c90]Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu:
Video requests from Online Social Networks: Characterization, analysis and generation. INFOCOM 2013: 50-54 - [c89]Ke Xu, Min Zhu, Ning Wang, Song Lin, Haiyang Wang, Tong Li:
The 2ACT model-based evaluation for in-network caching mechanism. ISCC 2013: 636-641 - [c88]Frédéric François, Ning Wang, Klaus Moessner, Stylianos Georgoulas, Ke Xu:
Green IGP link weights for energy-efficiency and load-balancing in IP backbone networks. Networking 2013: 1-9 - [i7]Xuelin Shi, Ke Xu, Jiangchuan Liu, Yong Wang:
Continuous Double Auction Mechanism and Bidding Strategies in Cloud Computing Markets. CoRR abs/1307.6066 (2013) - 2012
- [j19]Zhen Ma, Ke Xu, Jiangchuan Liu, Haiyang Wang:
Measurement, modeling and enhancement of BitTorrent-based VoD system. Comput. Networks 56(3): 1103-1117 (2012) - [j18]Haiyang Wang, Jiangchuan Liu, Ke Xu:
Understand traffic locality of peer-to-peer video file swarming. Comput. Commun. 35(15): 1930-1937 (2012) - [j17]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee
, Ke Xu:
Enhancing the Trust of Internet Routing With Lightweight Route Attestation. IEEE Trans. Inf. Forensics Secur. 7(2): 691-703 (2012) - [c87]Song Lin, Ke Xu, Jianping Wu, Ning Wang, Zhou Zhang, Yifeng Zhong:
Will the three-network convergence happen? - An evolution model based analysis. ICCC 2012: 149-154 - [c86]Haitao Li, Jiangchuan Liu, Ke Xu, Song Wen:
Understanding video propagation in online social networks. IWQoS 2012: 1-9 - [c85]Zhen Ma, Ke Xu, Yifeng Zhong:
Exploring the policy selection of P2P VoD system - A simulation based research. IWQoS 2012: 1-4 - [c84]Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu:
Enhancing Traffic Locality in BitTorrent via Shared Trackers. Networking (2) 2012: 59-70 - [c83]Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong:
Routing On Demand: Toward the Energy-Aware Traffic Engineering with OSPF. Networking (1) 2012: 232-246 - [c82]Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu:
Video sharing in online social networks: measurement and analysis. NOSSDAV 2012: 83-88 - [i6]Ke Xu, Yifeng Zhong, Huan He:
Can P2P Technology Benefit Eyeball ISPs? A Cooperative Profit Distribution Answer. CoRR abs/1212.4915 (2012) - 2011
- [j16]Yan Huang, Ke Xu, Haitao Li, Yang Cao, Xin Yao:
Large-scale P2PVOD system: Focusing on clients. Sci. China Inf. Sci. 54(8): 1677-1690 (2011) - [j15]Dan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu:
Impact of user selfishness in construction action on the streaming quality of overlay multicast. Comput. Networks 55(15): 3318-3331 (2011) - [j14]Dan Li, Jianping Wu, Jiangchuan Liu, Yong Cui, Ke Xu:
Defending Against Distance Cheating in Link-Weighted Application-Layer Multicast. IEEE/ACM Trans. Netw. 19(5): 1448-1457 (2011) - [j13]Ke Xu, Hongying Liu, Jiangchuan Liu, Jixiu Zhang:
LBMP: A Logarithm-Barrier-Based Multipath Protocol for Internet Traffic Management. IEEE Trans. Parallel Distributed Syst. 22(3): 476-488 (2011) - [c81]Haitao Li, Lili Zhong, Jiangchuan Liu, Bo Li, Ke Xu:
Cost-Effective Partial Migration of VoD Services to Content Clouds. IEEE CLOUD 2011: 203-210 - [c80]Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee
, Ke Xu:
Enhancing the trust of internet routing with lightweight route attestation. AsiaCCS 2011: 92-101 - [c79]Jie Li, Jianping Wu, Ke Xu:
SafeZone: A Hierarchical Inter-Domain Authenticated Source Address Validation Solution. GLOBECOM 2011: 1-6 - [c78]Guangwu Hu, Jianping Wu, Ke Xu, Wenlong Chen:
SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network. ICCCN 2011: 1-8 - [c77]Qi Li, Mingwei Xu, Jianping Wu, Patrick P. C. Lee
, Ke Xu:
An Algebraic Approach to Computing the Reliability of Internet Routing. ICCCN 2011: 1-6 - [c76]Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. ICDCS 2011: 836-846 - [c75]Ke Xu, Meng Shen, Mingjiang Ye:
A model approach to estimate Peer-to-Peer traffic matrices. INFOCOM 2011: 676-684 - [c74]Min Zhu, Ke Xu, Qi Li:
Access Path Based Source Address Validation in Mobile IPv6. NPC 2011: 334-349 - [c73]Wei Zhu, Haitao Li, Jiangchuan Liu, Ke Xu:
PPVA: A universal and transparent P2SP accelerator for online video sharing. Peer-to-Peer Computing 2011: 160-161 - [c72]Haiyang Wang, Xu Cheng, Feng Wang, Jiangchuan Liu, Ke Xu:
Pitfalls of re-sharing BitTorrent contents: The failure of daily pattern. Peer-to-Peer Computing 2011: 352-355 - [c71]Yin Liu, Baojin Wang, Ke Xu, Zhen Ma:
PACC: A Path Associativity Congestion Control and Throughput Model For Multi-path TCP. ICCS 2011: 1278-1287 - [i5]Jie Li, Jianping Wu, Ke Xu:
SafeZone: A Hierarchical Inter-Domain Authenticated Source Address Validation Solution. CoRR abs/1103.3766 (2011) - [i4]Huan He, Ke Xu, Ying Liu:
Internet Resource Pricing Models, Mechanisms, and Methods. CoRR abs/1104.2005 (2011) - [i3]Ying Liu, Hongying Liu, Ke Xu, Meng Shen, Yifeng Zhong:
A Large Family of Multi-path Dual Congestion Control Algorithms. CoRR abs/1104.3636 (2011) - 2010
- [j12]Ke Xu, Ming Zhang, Jiangchuan Liu, Zhijing Qin, Mingjiang Ye:
Proxy caching for peer-to-peer live streaming. Comput. Networks 54(7): 1229-1241 (2010) - [j11]Ke Xu, Ming Zhang, Mingjiang Ye, Dah-Ming Chiu, Jianping Wu:
Identify P2P traffic by inspecting data transfer behavior. Comput. Commun. 33(10): 1141-1150 (2010) - [j10]Jiangchuan Liu, Haiyang Wang, Ke Xu:
Understanding peer distribution in the global internet. IEEE Netw. 24(4): 40-44 (2010) - [j9]Haiyang Wang, Jiangchuan Liu, Ke Xu:
Measurement and enhancement of BitTorrent-based video file swarming. Peer-to-Peer Netw. Appl. 3(3): 237-253 (2010) - [c70]Song Lin, Jianping Wu, Ke Xu, Zhen Ma:
The Minimum Server Bandwidth in Peer-Assisted VoD Systems. ICCCN 2010: 1-7 - [c69]Haiyang Wang, Jiangchuan Liu, Ke Xu:
Exploring BitTorrent peer distribution via hybrid PlanetLab-Internet measurement. IWQoS 2010: 1-2 - [c68]Ke Xu, Haitao Li, Jiangchuan Liu, Wei Zhu, Wenyu Wang:
PPVA: A universal and transparent peer-to-peer accelerator for interactive online video sharing. IWQoS 2010: 1-9 - [c67]Xu Cheng, Feng Wang, Jiangchuan Liu, Ke Xu:
Collaborative delay-aware scheduling in peer-to-peer UGC video sharing. NOSSDAV 2010: 105-110 - [c66]Haiyang Wang, Jiangchuan Liu, Bo Chen, Ke Xu, Zhen Ma:
On Tracker Selection for Peer-to-Peer Traffic Locality. Peer-to-Peer Computing 2010: 1-10 - [i2]Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen:
One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF. CoRR abs/1011.5015 (2010)
2000 – 2009
- 2009
- [c65]Mingjiang Ye, Ke Xu, Jianping Wu, Hu Po:
AutoSig-Automatically Generating Signatures for Applications. CIT (2) 2009: 104-109 - [c64]Shengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu:
Proportional fairness of call blocking probability. ICIS 2009: 47-52 - [c63]Haiyang Wang, Jiangchuan Liu, Ke Xu:
On the locality of BitTorrent-based video file swarming. IPTPS 2009: 12 - [c62]Mingjiang Ye, Jianping Wu, Ke Xu, Dah-Ming Chiu:
Identify P2P Traffic by Inspecting Data Transfer Behaviour. Networking 2009: 131-144 - [c61]Song Lin, Zhiguo Gao, Ke Xu:
Web 2.0 traffic measurement: analysis on online map applications. NOSSDAV 2009: 7-12 - [c60]Shengling Wang, Yong Cui, Ke Xu, Sajal K. Das
, Jianping Wu, Yanping Xiao:
Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells. QSHINE 2009: 203-217 - 2008
- [j8]Ke Xu, Mingwei Xu, Qi Li, Song Lin:
Analysis and case study on multi-dimensional scalability of the Internet architecture. Sci. China Ser. F Inf. Sci. 51(11): 1661-1680 (2008) - [j7]Suogang Li, Ke Xu, Ying Liu, Jianping Wu:
Edge overlay multicast to support comparable multi-class services. J. High Speed Networks 17(1): 13-36 (2008) - [c59]Ke Xu, Jiangchuan Liu, Haiyang Wang:
Tod-Cache: Peer-to-Peer Traffic Management and Optimization Using Combined Caching and Redirection. GLOBECOM 2008: 2216-2220 - [c58]Hongfei Du, Haiyang Wang, Ke Xu:
Hierarchical Packet Scheduling for Satellite Multimedia Broadcasting: An Adaptive QoS-Aware Design. GLOBECOM 2008: 4133-4137 - [c57]Ke Xu, Xiaowei Ma, Chunyu Liu:
A Hash Tree Based Authentication Scheme in SIP Applications. ICC 2008: 1510-1514 - [c56]Xiaowen Chu
, Yi Sun, Ke Xu, Z. Sakander, Jiangchuan Liu:
Quadratic Residue Based Address Allocation for Mobile Ad Hoc Networks. ICC 2008: 2343-2347 - [c55]Mingjiang Ye, Jianping Wu, Ke Xu:
Caching the P2P Traffic in ISP Network. ICC 2008: 5876-5880 - [c54]Qi Li, Mingwei Xu, Ke Xu, Jianping Wu:
Evaluating Service Scalability of Network Architectures. ICN 2008: 434-438 - [c53]Qi Li, Mingwei Xu, Ke Xu:
Toward A Practical Scheme for IPSec Management. ICOIN 2008: 1-5 - [c52]Mingjiang Ye, Ke Xu, Jianping Wu, Yong Cui:
A High Performance and Scalable Packet Pattern-Matching Architecture. ICOIN 2008: 1-5 - [c51]Mingwei Xu, Ke Xu, Yong Cui, Jianping Wu:
NetRiver, a computer network experiment system. Summit on Computing Education in China 2008: 12 - [i1]Jianping Wu, Jun Bi, Xing Li, Gang Ren, Ke Xu, Mark I. Williams:
A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience. RFC 5210: 1-25 (2008) - 2007
- [j6]Lijun Wang, Jianping Wu, Ke Xu:
Modified flap damping mechanism to improve inter-domain routing convergence. Comput. Commun. 30(7): 1588-1599 (2007) - [j5]Yong Cui, Ke Xu, Jianping Wu, Linjian Song:
CBroadcast: an Application Layer Multicast mechanism based on combination of central control and self-organisation. Int. J. Ad Hoc Ubiquitous Comput. 2(4): 232-238 (2007) - [j4]Chunyu Liu, Ke Xu:
Framework for end-to-end optimal traffic control law based on overlay mesh. J. Commun. Networks 9(4): 428-437 (2007) - [c50]Lijun Wang, Jianping Wu, Ke Xu:
Analysis of BGP Convergence Using SHLPN Model. AICT 2007: 4 - [c49]Guozhi Wei, Anne Wei, Ke Xu, Gerard Dupeyrat:
Optimization of Mobile IPv6 Handover Performance Using E-HCF Method. International Conference on Computational Science (4) 2007: 506-513 - [c48]Rui Sun, Ke Xu, Zhao Li, Li Zhang:
A Strategyproof Protocol in Mesh-Based Overlay Streaming System. MMM (1) 2007: 495-504 - 2006
- [j3]Jianping Wu, Ke Xu:
Research on Next-Generation Internet Architecture. J. Comput. Sci. Technol. 21(5): 723-731 (2006) - [c47]Kun Wu, Jianping Wu, Ke Xu:
A Tree-Based Distributed Model for BGP Route Processing. HPCC 2006: 119-128 - [c46]Suogang Li, Jianping Wu, Ke Xu, Ying Liu:
Heterogeneous QoS Multicast and Its Improvement on Edge-Based Overlay Networks. HPCC 2006: 436-446 - [c45]Dan Li, Yong Cui, Ke Xu, Jianping Wu:
Segment-sending Schedule in Data-driven Overlay Network. ICC 2006: 6-11 - [c44]Guozhi Wei, Anne Wei, Ke Xu, Hui Deng:
Handover Control Function Based Handover for Mobile IPv6. International Conference on Computational Science (4) 2006: 17-24 - [c43]Kun Wu, Jianping Wu, Ke Xu:
A Novel Control Plane Model of Extensible Routers. International Conference on Computational Science (4) 2006: 33-40 - [c42]Suogang Li, Jianping Wu, Ke Xu, Ying Liu:
Building Trees to Support Comparable Multi-class Services in Edge Overlay Multicast. ICCCN 2006: 441-446 - [c41]Kun Wu, Jianping Wu, Lizheng Fu, Ke Xu:
PS2: An HA-Enabled Memory Management Scheme In Core Routers. ICNS 2006: 26 - [c40]Lijun Wang, Ke Xu, Jianping Wu:
BGP Route Selection Notice. ICOIN 2006: 440-449 - [c39]Yong Cui, Lingjian Song, Ke Xu:
RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. ICOIN 2006: 764-774 - [c38]Zhao Li, Lizheng Fu, Ke Xu, Zhenyu Shi, Jianping Wu:
Smooth Handoff Based on Virtual Interface in Wireless Network. ICWMC 2006: 79 - [c37]Suogang Li, Jianping Wu, Ke Xu, Ying Liu:
A modularized QoS multicasting approach on common homogeneous trees for heterogeneous members in DiffServ. IPCCC 2006 - [c36]Donghong Yang, Ke Xu, Yong Cui:
An improved Wu-Manber multiple patterns matching algorithm. IPCCC 2006 - [c35]Ke Xu, Jiangchuan Liu, Lizheng Fu, Chunyu Liu:
On the Stability of Application-Layer Multicast Tree. ISCIS 2006: 401-412 - [c34]Dan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu:
Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALM. ISCIS 2006: 844-853 - [c33]Lijun Wang, Ke Xu, Jianping Wu:
A Variation of Route Flap Damping to Improve BGP Routing Convergence. IWQoS 2006: 297-301 - [c32]Hao Che, Wenjing Su, Constantino Lagoa
, Ke Xu, Chunyu Liu, Yong Cui:
An integrated, distributed traffic control strategy for the future internet. INM@SIGCOMM 2006: 17-22 - 2005
- [j2]Yong Cui, Jianping Wu, Ke Xu:
Precomputation for intra-domain QoS routing. Comput. Networks 47(6): 923-937 (2005) - [c31]Dan Li, Jianping Wu, Ke Xu, Yong Cui, Ying Liu, Xiaoping Zhang:
Performance Analysis of Multicast Routing Protocol PIM-SM. AICT/SAPIR/ELETE 2005: 157-162 - [c30]Dan Li, Yong Cui, Ke Xu, Jianping Wu:
Impact of receiver cheating on the stability of ALM tree. GLOBECOM 2005: 5 - [c29]Jiangchuan Liu, Xiamen Chu, Ke Xu:
On peer-to-peer client web cache sharing. ICC 2005: 306-310 - [c28]Luo Wen, Jianping Wu, Ke Xu:
Overlay Logging: An IP Traceback Scheme in MPLS Network. ICN (2) 2005: 75-82 - [c27]Shen Lin, Yong Cui, Mingwei Xu, Ke Xu:
Quality of Service Routing Network and Performance Evaluation. ICN (2) 2005: 202-209 - [c26]Hui-shan Liu, Ke Xu, Mingwei Xu, Yong Cui:
S-Chord: Hybrid Topology Makes Chord Efficient. ICN (2) 2005: 480-487 - [c25]Suogang Li, Jianping Wu, Ke Xu:
ComBAQ: Provisioning Loss Differentiated Services for Hybrid Traffic in Routers. ICOIN 2005: 313-320 - [c24]Hui-shan Liu, Ke Xu, Mingwei Xu, Yong Cui:
3Sons: Semi-structured Substrate Support for Overlay Network Services. ICOIN 2005: 590-599 - [c23]Qiang Ding, Ke Xu, Hui-shan Liu:
Construct Optimal Diameter Network and d-partition Routing Algorithm. ISPA Workshops 2005: 74-81 - [c22]Dan Li, Yong Cui, Ke Xu, Jianping Wu:
Improvement of Multicast Routing Protocol Using Petri Nets. RSFDGrC (2) 2005: 634-643 - 2004
- [c21]Shen Lin, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao:
Simple quality-of-service path first protocol and modeling analysis. ICC 2004: 2122-2126 - [c20]Yong Cui, Ke Xu, Jianping Wu:
Multi-constrained End-to-End Admission Control in Core-Stateless Networks. ICOIN 2004: 420-429 - [c19]Zhiyong Liang, Ke Xu, Jianping Wu:
A Scalable Parallel Lookup Framework Avoiding Longest Prefix Match. ICOIN 2004: 616-625 - [c18]Hui-shan Liu, Ke Xu, Mingwei Xu:
A Novel ECN-Based Congestion Control and Avoidance Algorithm with Forecasting and Verifying. ICT 2004: 199-206 - [c17]Miao Zhang, Fengyuan Ren, Jianping Wu, Ke Xu:
Using fuzzy-PI controller in active queue management. ISCC 2004: 742-747 - 2003
- [c16]Yong Cui, Ke Xu, Jianping Wu, Mingwei Xu:
Precomputation for finding paths with two additive weights. ICC 2003: 636-640 - [c15]Yong Cui, Ke Xu, Jianping Wu, Zhongchao Yu, Youjian Zhao:
Multi-constrained routing based on simulated annealing. ICC 2003: 1718-1722 - [c14]Feng Shi, Jianping Wu, Ke Xu:
The Stability Problem of Multicast Trees in Layered Multicast. ICOIN 2003: 212-221 - [c13]Miao Zhang, Jianping Wu, Chuang Lin, Ke Xu, Mingwei Xu:
SAP: On Designing Simple AQM Algorithm for Supporting TCP Flows. ICOIN 2003: 515-524 - [c12]Yong Cui, Ke Xu, Mingwei Xu, Jianping Wu:
Optimal QoS Routing Based on Extended Simulated Annealing. ICOIN 2003: 553-562 - [c11]Feng Shi, Ke Xu, Jianping Wu:
An equation-based network-supported for layered multicast congestion control. ICON 2003: 185-189 - [c10]Yong Cui, Ke Xu, Jianping Wu:
Precomputation for Multi-constrained QoS Routing in High-speed Networks. INFOCOM 2003: 1414-1424 - [c9]Yong Cui, Ke Xu, Jianping Wu:
Adjustable multi-constrained routing with a novel evaluation method. IPCCC 2003: 141-148 - [c8]Feng Shi, Jianping Wu, Ke Xu:
Stability of a multicast tree in cumulative layered multicast congestion control. IPCCC 2003: 487-492 - [c7]Lei Sun, Ke Xu, Weidong Liu, Jianping Wu:
TMS: A Scalable Transition Multicast Scheme. IWDC 2003: 80-90 - 2002
- [j1]Ke Xu, Jianping Wu, Zhongchao Yu, Mingwei Xu:
A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm. J. Comput. Sci. Technol. 17(2): 219-226 (2002) - [c6]Yong Jiang, Jianping Wu, Ke Xu:
Proportional fairness scheduling on tandem network. ICC 2002: 991-995 - [c5]Ke Xu, Anping Wang, Bin Wang, Jianping Wu:
NLRI storage aggregation of BGP-4 routing information. ICON 2002: 57-62 - [c4]Yong Cui, Ke Xu, Mingwei Xu, Jianping Wu:
Stress testing of OSPF protocol implementation based on large-scale routing simulation. ICON 2002: 63-68 - [c3]Yixin Zhao, Ke Xu, Anping Wang, Jianping Wu:
A hierarchical approach to establish an efficient upgrade plan. ICON 2002: 414-418 - [c2]Miao Zhang, Jianping Wu, Chuang Lin, Ke Xu:
Rethink the tradeoff between proportional controller and PI controller. ISCC 2002: 57-62 - 2001
- [c1]Zhongchao Yu, Jianping Wu, Ke Xu, Mingwei Xu:
A fast IP classification algorithm applying to multiple fields. ICC 2001: 2058-2062
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 02:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint