ÆÈ·Î¿ì
Rocky Chang
Rocky Chang
comp.polyu.edu.hkÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Defending against flooding-based distributed denial-of-service attacks: A tutorial
RKC Chang
IEEE communications magazine 40 (10), 42-51, 2002
7892002
Measuring the quality of experience of HTTP video streaming
RKP Mok, EWW Chan, RKC Chang
12th IFIP/IEEE International Symposium on Integrated Network Management (IM ¡¦, 2011
6152011
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd Multimedia Systems Conference, 11-22, 2012
4702012
On a new class of pulsing denial-of-service attacks and the defense.
X Luo, RKC Chang
NDSS, 2005
2512005
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
2032011
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack ¡¦, 2011
1812011
TCP covert timing channels: Design and detection
X Luo, EWW Chan, RKC Chang
2008 IEEE International Conference on Dependable Systems and Networks With ¡¦, 2008
982008
Engineering of a global defense infrastructure for DDoS attacks
KKK Wan, RKC Chang
Proceedings 10th IEEE International Conference on Networks (ICON 2002 ¡¦, 2002
572002
Anomaly detection of network traffic based on wavelet packet
J Gao, G Hu, X Yao, RKC Chang
2006 Asia-Pacific Conference on Communications, 1-5, 2006
562006
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
X Luo, EWW Chan, RKC Chang
USENIX Annual Technical Conference, 2009
552009
Cloak: A ten-fold way for reliable covert communications
X Luo, EWW Chan, RKC Chang
Computer Security–ESORICS 2007: 12th European Symposium On Research In ¡¦, 2007
552007
Inbound traffic engineering for multihomed ASs using AS path prepending
RKC Chang, M Lo
IEEE network 19 (2), 18-25, 2005
552005
Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks
Y Tang, X Luo, Q Hui, RKC Chang
IEEE transactions on information forensics and security 9 (3), 339-353, 2013
512013
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
X Luo, EWW Chan, RKC Chang
EURASIP Journal on Advances in Signal Processing 2009, 1-13, 2009
472009
Centralized PSM: an AP-centric power saving mode for 802.11 infrastructure networks
Y Xie, X Luo, RKC Chang
2009 IEEE Sarnoff Symposium, 1-5, 2009
452009
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference ¡¦, 2011
422011
Vanguard: A new detection scheme for a class of TCP-targeted denial-of-service attacks
X Luo, EWW Chan, RKC Chang
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 507-518, 2006
422006
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE Conference on Computer Communications (INFOCOM), 370-378, 2015
412015
Teaching computer networking with the help of personal computer networks
RKC Chang
Proceedings of the 9th annual SIGCSE conference on Innovation and technology ¡¦, 2004
402004
Robust network covert communications based on TCP and enumerative combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
382012
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20