Kai Bu
Kai Bu
Verified email at - Homepage
Cited by
Cited by
Fault management in software-defined networking: A survey
Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ...
IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018
RuleTris: Minimizing rule update latency for TCAM-based SDN switches
X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Unknown tag identification in large RFID systems: An efficient and complete solution
X Liu, B Xiao, S Zhang, K Bu
IEEE Transactions on Parallel and Distributed Systems 26 (6), 1775-1788, 2014
Enda: Embracing network inconsistency for dynamic application offloading in mobile cloud computing
J Li, K Bu, X Liu, B Xiao
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 39-44, 2013
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Q Tan, Z Zeng, K Bu, K Ren
NDSS, 2020
Deterministic detection of cloning attacks for anonymous RFID systems
K Bu, M Xu, X Liu, J Luo, S Zhang, M Weng
IEEE Transactions on Industrial Informatics 11 (6), 1255-1266, 2015
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics 52 (7), 6095-6108, 2021
Flexible and time-efficient tag scanning with handheld readers
X Liu, S Zhang, B Xiao, K Bu
IEEE Transactions on Mobile Computing 15 (4), 840-852, 2015
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary
Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014
Efficient distributed query processing in large RFID-enabled supply chains
J Liu, B Xiao, K Bu, L Chen
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 163-171, 2014
Compiling minimum incremental update for modular SDN languages
X Wen, C Diao, X Zhao, Y Chen, LE Li, B Yang, K Bu
Proceedings of the third workshop on Hot topics in software defined …, 2014
Efficient Misplaced-Tag Pinpointing in Large RFID Systems
K Bu, B Xiao, Q Xiao, S Chen
IEEE, 2012
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
Towards practical deployment-stage backdoor attack on deep neural networks
X Qi, T Xie, R Pan, J Zhu, Y Yang, K Bu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
A locality-based range-free localization algorithm for anisotropic wireless sensor networks
X Liu, S Zhang, K Bu
Telecommunication Systems 62, 3-13, 2016
STEP: A time-efficient tag searching protocol in large RFID systems
X Liu, B Xiao, S Zhang, K Bu, A Chan
IEEE Transactions on Computers 64 (11), 3265-3277, 2015
Complete and Fast Unknown Tag Identification in Large RFID Systems
X Liu, S Zhang, K Bu, B Xiao
You can clone but you cannot hide: A survey of clone prevention and detection for RFID
K Bu, M Weng, Y Zheng, B Xiao, X Liu
IEEE Communications Surveys & Tutorials 19 (3), 1682-1700, 2017
Efficient pinpointing of misplaced tags in large RFID systems
K Bu, B Xiao, Q Xiao, S Chen
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20