Fast efficient algorithm for enhancement of low lighting video X Dong, G Wang, Y Pang, W Li, J Wen, W Meng, Y Lu 2011 IEEE International Conference on Multimedia and Expo, 1-6, 2011 | 461 | 2011 |
Scalable name lookup in NDN using effective name component encoding Y Wang, K He, H Dai, W Meng, J Jiang, B Liu, Y Chen 2012 IEEE 32nd International Conference on Distributed Computing Systems ¡¦, 2012 | 173 | 2012 |
Wire Speed Name Lookup: A {GPU-based} Approach Y Wang, Y Zu, T Zhang, K Peng, Q Dong, B Liu, W Meng, H Dai, X Tian, ... 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI ¡¦, 2013 | 137 | 2013 |
Understanding malvertising through ad-injecting browser extensions X Xing, W Meng, B Lee, U Weinsberg, A Sheth, R Perdisci, W Lee Proceedings of the 24th international conference on world wide web, 1286-1295, 2015 | 96 | 2015 |
LAP: Lightweight anonymity and privacy HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng 2012 IEEE Symposium on Security and Privacy, 506-520, 2012 | 90 | 2012 |
The Price of Free: Privacy Leakage in Personalized Mobile In-App Ads W Meng, R Ding, SP Chung, S Han, W Lee NDSS Symposium 2016, 2016 | 80 | 2016 |
Exposing inconsistent web search results with bobble X Xing, W Meng, D Doozan, N Feamster, W Lee, AC Snoeren International Conference on Passive and Active Network Measurement, 131-140, 2014 | 57 | 2014 |
Parallel name lookup for named data networking Y Wang, H Dai, J Jiang, K He, W Meng, B Liu 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 47 | 2011 |
Take this personally: Pollution attacks on personalized services X Xing, W Meng, D Doozan, AC Snoeren, N Feamster, W Lee 22nd USENIX Security Symposium (USENIX Security 13), 671-686, 2013 | 45 | 2013 |
Your online interests: Pwned! a pollution attack against targeted advertising W Meng, X Xing, A Sheth, U Weinsberg, W Lee Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications ¡¦, 2014 | 27 | 2014 |
Rampart: Protecting Web Applications from {CPU-Exhaustion}{Denial-of-Service} Attacks W Meng, C Qian, S Hao, K Borgolte, G Vigna, C Kruegel, W Lee 27th USENIX Security Symposium (USENIX Security 18), 393-410, 2018 | 23 | 2018 |
Trackmeornot: Enabling flexible control on web tracking W Meng, B Lee, X Xing, W Lee Proceedings of the 25th International Conference on World Wide Web, 99-109, 2016 | 23 | 2016 |
Greening the internet using multi-frequency scaling scheme W Meng, Y Wang, C Hu, K He, J Li, B Liu 2012 IEEE 26th International Conference on Advanced Information Networking ¡¦, 2012 | 23 | 2012 |
GPU-accelerated name lookup with component encoding Y Wang, H Dai, T Zhang, W Meng, J Fan, B Liu Computer Networks 57 (16), 3165-3177, 2013 | 21 | 2013 |
ALFE: A replacement policy to cache elephant flows in the presence of mice flooding T Pan, X Guo, C Zhang, W Meng, B Liu 2012 IEEE International Conference on Communications (ICC), 2961-2965, 2012 | 21 | 2012 |
DNS Changer remediation study W Meng, R Duan, W Lee Talk at M3AAWG 27th, 2013 | 19 | 2013 |
Revisiting mobile advertising threats with MAdLife G Chen, W Meng, J Copeland The World Wide Web Conference, 207-217, 2019 | 17 | 2019 |
GreenVLAN: An energy-efficient approach for VLAN design K He, Y Wang, X Wang, W Meng, B Liu 2012 International Conference on Computing, Networking and Communications ¡¦, 2012 | 15 | 2012 |
All Your Clicks Belong to Me: Investigating Click Interception on the Web M Zhang, W Meng, S Lee, B Lee, X Xing 28th {USENIX} Security Symposium ({USENIX} Security 19), 2019 | 13 | 2019 |
Minethrottle: Defending against wasm in-browser cryptojacking W Bian, W Meng, M Zhang Proceedings of The Web Conference 2020, 3112-3118, 2020 | 9 | 2020 |