Author of the publication

FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.

, , , , , and . INFOCOM, page 396-404. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LOCK: A fast and flexible tag scanning mechanism with handheld readers., , , and . IWQoS, page 360-369. IEEE, (2014)Detect and identify blocker tags in tree-based RFID systems., , , and . ICC, page 2133-2137. IEEE, (2013)A new differential RAID for high reliable All Flash Array., , , and . IEICE Electronic Express, 11 (23): 20141007 (2014)Efficient pinpointing of misplaced tags in large RFID systems., , , and . SECON, page 287-295. IEEE, (2011)A Range-Free Localization of Passive RFID Tags Using Mobile Readers., , , , and . MASS, page 445-446. IEEE Computer Society, (2015)Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems., , , and . Concurrency and Computation: Practice and Experience, 25 (14): 2080-2097 (2013)Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach., , , and . IEEE/ACM Trans. Netw., 22 (2): 608-621 (2014)FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking., , , , , and . INFOCOM, page 396-404. IEEE, (2018)Efficient Misplaced-Tag Pinpointing in Large RFID Systems., , , and . IEEE Trans. Parallel Distrib. Syst., 23 (11): 2094-2106 (2012)A Method Based on AMHI for DDoS Attacks Detection and Defense., and . ICYCS, page 1571-1576. IEEE Computer Society, (2008)