Profiling internet backbone traffic: behavior models and applications K Xu, ZL Zhang, S Bhattacharyya Proceedings of ACM SIGCOMM, 2005 | 584 | 2005 |
A first look at inter-data center traffic characteristics via yahoo! datasets Y Chen, S Jain, VK Adhikari, ZL Zhang, K Xu 2011 Proceedings IEEE INFOCOM, 1620-1628, 2011 | 257 | 2011 |
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks F Wang, H Wang, K Xu IEEE ICDCS Workshop on Peer-to-Peer Computing and Online Social Networking …, 2012 | 175 | 2012 |
Internet traffic behavior profiling for network security monitoring K Xu, ZL Zhang, S Bhattacharyya Networking, IEEE/ACM Transactions on 16 (6), 1241-1252, 2008 | 170 | 2008 |
Improving VoIP quality through path switching S Tao, K Xu, A Estepa, TFL Gao, R Guerin, J Kurose, D Towsley, ... INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 162 | 2005 |
Fast anomaly detection for large data centers A Li, L Gu, K Xu 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 134 | 2010 |
On Positive Influence Dominating Set in Social Networks F Wang, H Du, E Camacho, K Xu, S Shan Theoretical Computer Science 412 (3), 265-269, 2011 | 125 | 2011 |
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model F Wang, H Wang, K Xu, J Wu, X Jia IEEE International Conference on Distributed Computing Systems, 307-316, 2013 | 107 | 2013 |
Exploring the performance benefits of end-to-end path switching S Tao, K Xu, Y Xu, T Fei, L Gao, R Guerin, J Kurose, D Towsley, ZL Zhang Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE …, 2004 | 104 | 2004 |
Positive influence dominating set in online social networks F Wang, E Camacho, K Xu Combinatorial Optimization and Applications, 313-321, 2009 | 102 | 2009 |
Detecting fake news over online social media via domain reputations and content understanding K Xu, F Wang, H Wang, B Yang Tsinghua Science and Technology 25 (1), 20-27, 2020 | 95 | 2020 |
Securing ICN-Based UAV Ad Hoc Networks with Blockchain K Lei, Q Zhang, J Lou, B Bai, K Xu IEEE Communications Magazine 57 (6), 26-32, 2019 | 84 | 2019 |
On properties of internet exchange points and their impact on as topology and relationship K Xu, Z Duan, ZL Zhang, J Chandrashekar NETWORKING 2004. Networking Technologies, Services, and Protocols …, 2004 | 82 | 2004 |
Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections K Xu, F Wang, L Gu IEEE/ACM Transactions on Networking 22 (3), 931 - 942, 2014 | 80 | 2014 |
Reducing unwanted traffic in a backbone network K Xu, ZL Zhang, S Bhattacharyya USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI …, 2005 | 80 | 2005 |
Network-aware behavior clustering of Internet end hosts K Xu, F Wang, L Gu INFOCOM, 2011 Proceedings IEEE, 2078-2086, 2011 | 78 | 2011 |
IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes Y Wan, K Xu, G Xue, F Wang Proceedings of IEEE INFOCOM, 2020 | 73 | 2020 |
Scalable firewall policy management platform A Bechtel, J Vijayaraghavan, K Xu, P Hodigere, H Ong US Patent 8,146,134, 2012 | 71 | 2012 |
A NDN IoT Content Distribution Model with Network Coding Enhanced Forwarding Strategy for 5G K Lei, S Zhong, F Zhu, K Xu, H Zhang IEEE Transactions on Industrial Informatics 14 (6), 2725 - 2735, 2018 | 68 | 2018 |
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations H Wang, F Wang, K Xu ISBN 978-3-030-38850-8, Springer., 2020 | 67* | 2020 |