Kuai Xu, Ph.D, CISSP
Cited by
Cited by
Profiling internet backbone traffic: behavior models and applications
K Xu, ZL Zhang, S Bhattacharyya
Proceedings of ACM SIGCOMM, 2005
A first look at inter-data center traffic characteristics via yahoo! datasets
Y Chen, S Jain, VK Adhikari, ZL Zhang, K Xu
2011 Proceedings IEEE INFOCOM, 1620-1628, 2011
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks
F Wang, H Wang, K Xu
IEEE ICDCS Workshop on Peer-to-Peer Computing and Online Social Networking …, 2012
Internet traffic behavior profiling for network security monitoring
K Xu, ZL Zhang, S Bhattacharyya
Networking, IEEE/ACM Transactions on 16 (6), 1241-1252, 2008
Improving VoIP quality through path switching
S Tao, K Xu, A Estepa, TFL Gao, R Guerin, J Kurose, D Towsley, ...
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and …, 2005
Fast anomaly detection for large data centers
A Li, L Gu, K Xu
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
On Positive Influence Dominating Set in Social Networks
F Wang, H Du, E Camacho, K Xu, S Shan
Theoretical Computer Science 412 (3), 265-269, 2011
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model
F Wang, H Wang, K Xu, J Wu, X Jia
IEEE International Conference on Distributed Computing Systems, 307-316, 2013
Exploring the performance benefits of end-to-end path switching
S Tao, K Xu, Y Xu, T Fei, L Gao, R Guerin, J Kurose, D Towsley, ZL Zhang
Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE …, 2004
Positive influence dominating set in online social networks
F Wang, E Camacho, K Xu
Combinatorial Optimization and Applications, 313-321, 2009
Detecting fake news over online social media via domain reputations and content understanding
K Xu, F Wang, H Wang, B Yang
Tsinghua Science and Technology 25 (1), 20-27, 2020
Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections
K Xu, F Wang, L Gu
IEEE/ACM Transactions on Networking 22 (3), 931 - 942, 2014
Reducing unwanted traffic in a backbone network
K Xu, ZL Zhang, S Bhattacharyya
USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI …, 2005
On properties of internet exchange points and their impact on as topology and relationship
K Xu, Z Duan, ZL Zhang, J Chandrashekar
NETWORKING 2004. Networking Technologies, Services, and Protocols …, 2004
Securing ICN-Based UAV Ad Hoc Networks with Blockchain
K Lei, Q Zhang, J Lou, B Bai, K Xu
IEEE Communications Magazine 57 (6), 26-32, 2019
Network-aware behavior clustering of Internet end hosts
K Xu, F Wang, L Gu
INFOCOM, 2011 Proceedings IEEE, 2078-2086, 2011
Scalable firewall policy management platform
A Bechtel, J Vijayaraghavan, K Xu, P Hodigere, H Ong
US Patent 8,146,134, 2012
A NDN IoT Content Distribution Model with Network Coding Enhanced Forwarding Strategy for 5G
K Lei, S Zhong, F Zhu, K Xu, H Zhang
IEEE Transactions on Industrial Informatics 14 (6), 2725 - 2735, 2018
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations
H Wang, F Wang, K Xu
ISBN 978-3-030-38850-8, Springer., 2020
IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes
Y Wan, K Xu, G Xue, F Wang
Proceedings of IEEE INFOCOM, 2020
The system can't perform the operation now. Try again later.
Articles 1–20