Rocky Chang
Cited by
Cited by
Defending against flooding-based distributed denial-of-service attacks: A tutorial
RKC Chang
IEEE communications magazine 40 (10), 42-51, 2002
Measuring the quality of experience of HTTP video streaming
RKP Mok, EWW Chan, RKC Chang
12th IFIP/IEEE international symposium on integrated network management (IM …, 2011
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd multimedia systems conference, 11-22, 2012
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
On a new class of pulsing denial-of-service attacks and the defense.
X Luo, RKC Chang
NDSS, 2005
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011
TCP covert timing channels: Design and detection
X Luo, EWW Chan, RKC Chang
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
Cloak: A ten-fold way for reliable covert communications
X Luo, EWW Chan, RKC Chang
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
Engineering of a global defense infrastructure for DDoS attacks
KKK Wan, RKC Chang
Proceedings 10th IEEE International Conference on Networks (ICON 2002 …, 2002
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
X Luo, EWW Chan, RKC Chang
USENIX Annual Technical Conference, 2009
Anomaly detection of network traffic based on wavelet packet
J Gao, G Hu, X Yao, RKC Chang
2006 Asia-Pacific Conference on Communications, 1-5, 2006
Inbound traffic engineering for multihomed ASs using AS path prepending
RKC Chang, M Lo
IEEE network 19 (2), 18-25, 2005
Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks
Y Tang, X Luo, Q Hui, RKC Chang
IEEE transactions on information forensics and security 9 (3), 339-353, 2013
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
X Luo, EWW Chan, RKC Chang
EURASIP Journal on Advances in Signal Processing 2009, 1-13, 2009
Centralized PSM: an AP-centric power saving mode for 802.11 infrastructure networks
Y Xie, X Luo, RKC Chang
2009 IEEE Sarnoff Symposium, 1-5, 2009
Teaching computer networking with the help of personal computer networks
RKC Chang
Proceedings of the 9th annual SIGCSE conference on Innovation and technology …, 2004
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015
Vanguard: A new detection scheme for a class of TCP-targeted denial-of-service attacks
X Luo, EWW Chan, RKC Chang
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 507-518, 2006
Robust network covert communications based on TCP and enumerative combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
The system can't perform the operation now. Try again later.
Articles 1–20