Seguir
Kai Bu
Kai Bu
Dirección de correo verificada de zju.edu.cn - Página principal
Título
Citado por
Citado por
Año
Fault management in software-defined networking: A survey
Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ...
IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018
1092018
RuleTris: Minimizing rule update latency for TCAM-based SDN switches
X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
922016
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
862016
Unknown tag identification in large RFID systems: An efficient and complete solution
X Liu, B Xiao, S Zhang, K Bu
IEEE Transactions on Parallel and Distributed Systems 26 (6), 1775-1788, 2014
822014
Enda: Embracing network inconsistency for dynamic application offloading in mobile cloud computing
J Li, K Bu, X Liu, B Xiao
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 39-44, 2013
702013
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Q Tan, Z Zeng, K Bu, K Ren
NDSS, 2020
652020
Deterministic detection of cloning attacks for anonymous RFID systems
K Bu, M Xu, X Liu, J Luo, S Zhang, M Weng
IEEE Transactions on Industrial Informatics 11 (6), 1255-1266, 2015
612015
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics 52 (7), 6095-6108, 2021
552021
Flexible and time-efficient tag scanning with handheld readers
X Liu, S Zhang, B Xiao, K Bu
IEEE Transactions on Mobile Computing 15 (4), 840-852, 2015
552015
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary
Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014
522014
Efficient distributed query processing in large RFID-enabled supply chains
J Liu, B Xiao, K Bu, L Chen
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 163-171, 2014
522014
Compiling minimum incremental update for modular SDN languages
X Wen, C Diao, X Zhao, Y Chen, LE Li, B Yang, K Bu
Proceedings of the third workshop on Hot topics in software defined …, 2014
502014
Efficient Misplaced-Tag Pinpointing in Large RFID Systems
K Bu, B Xiao, Q Xiao, S Chen
IEEE, 2012
482012
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
462013
A locality-based range-free localization algorithm for anisotropic wireless sensor networks
X Liu, S Zhang, K Bu
Telecommunication Systems 62, 3-13, 2016
452016
Towards practical deployment-stage backdoor attack on deep neural networks
X Qi, T Xie, R Pan, J Zhu, Y Yang, K Bu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
442022
STEP: A time-efficient tag searching protocol in large RFID systems
X Liu, B Xiao, S Zhang, K Bu, A Chan
IEEE Transactions on Computers 64 (11), 3265-3277, 2015
402015
Complete and Fast Unknown Tag Identification in Large RFID Systems
X Liu, S Zhang, K Bu, B Xiao
39*
You can clone but you cannot hide: A survey of clone prevention and detection for RFID
K Bu, M Weng, Y Zheng, B Xiao, X Liu
IEEE Communications Surveys & Tutorials 19 (3), 1682-1700, 2017
342017
Efficient pinpointing of misplaced tags in large RFID systems
K Bu, B Xiao, Q Xiao, S Chen
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual …, 2011
312011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20