Songqing Chen
Songqing Chen
Verified email at
Cited by
Cited by
Measurements, analysis, and modeling of bittorrent-like systems
L Guo, S Chen, Z Xiao, E Tan, X Ding, X Zhang
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, 4-4, 2005
Containment of Unknown and Polymorphic Fast Spreading Worms
S Chen, X Wang
US Patent App. 12/042,587, 2008
A new deep learning-based food recognition system for dietary assessment on an edge computing service infrastructure
C Liu, Y Cao, Y Luo, G Chen, V Vokkarane, M Yunsheng, S Chen, P Hou
IEEE Transactions on Services Computing 11 (2), 249-261, 2017
Analyzing patterns of user content generation in online social networks
L Guo, E Tan, S Chen, X Zhang, Y Zhao
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation
Y Cao, S Chen, P Hou, D Brown
2015 IEEE international conference on networking, architecture and storage …, 2015
A performance study of BitTorrent-like peer-to-peer systems
L Guo, S Chen, Z Xiao, E Tan, X Ding, X Zhang
IEEE Journal on selected areas in communications 25 (1), 155-169, 2007
Virusmeter: Preventing your cellphone from spies
L Liu, G Yan, X Zhang, S Chen
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
The stretched exponential distribution of internet media access patterns
L Guo, E Tan, S Chen, Z Xiao, X Zhang
Proceedings of the twenty-seventh ACM symposium on Principles of distributed …, 2008
Delving into internet DDoS attacks by botnets: characterization and analysis
A Wang, W Chang, S Chen, A Mohaisen
IEEE/ACM Transactions on Networking 26 (6), 2843-2855, 2018
Adaptive and lazy segmentation based proxy caching for streaming media delivery
S Chen, B Shen, S Wee, X Zhang
Proceedings of the 13th international workshop on Network and Operating …, 2003
Help your mobile applications with fog computing
MA Hassan, M Xiao, Q Wei, S Chen
2015 12th Annual IEEE International Conference on Sensing, Communication …, 2015
Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing
Y Cao, P Hou, D Brown, J Wang, S Chen
Proceedings of the 2015 Workshop on Mobile Big Data, 43-48, 2015
Chrome Extensions: Threat Analysis and Countermeasures.
L Liu, X Zhang, G Yan, S Chen
NDSS, 2012
Bottracer: Execution-based bot-like malware detection
L Liu, S Chen, G Yan, Z Zhang
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
PROP: a scalable and reliable P2P assisted proxy streaming system
L Guo, S Chen, S Ren, X Chen, S Jiang
24th International Conference on Distributed Computing Systems, 2004 …, 2004
Scotch: Elastically scaling up sdn control-plane using vswitch based overlay
A Wang, Y Guo, F Hao, TV Lakshman, S Chen
Proceedings of the 10th ACM International on Conference on emerging …, 2014
PSM-throttling: Minimizing energy consumption for bulk data communications in WLANs
E Tan, L Guo, S Chen, X Zhang
2007 IEEE International Conference on Network Protocols, 123-132, 2007
Unik: Unsupervised social network spam detection
E Tan, L Guo, S Chen, X Zhang, Y Zhao
Proceedings of the 22nd ACM international conference on Information …, 2013
Optile: Toward optimal tiling in 360-degree video streaming
M Xiao, C Zhou, Y Liu, S Chen
Proceedings of the 25th ACM international conference on Multimedia, 708-716, 2017
Delving into internet streaming media delivery: a quality and resource utilization perspective
L Guo, E Tan, S Chen, Z Xiao, O Spatscheck, X Zhang
Proceedings of the 6th ACM SIGCOMM Conference on internet Measurement, 217-230, 2006
The system can't perform the operation now. Try again later.
Articles 1–20