Follow
Rocky Chang
Rocky Chang
Calvin University
Verified email at calvin.edu - Homepage
Title
Cited by
Cited by
Year
Defending against flooding-based distributed denial-of-service attacks: a tutorial
RKC Chang
IEEE communications magazine 40 (10), 42-51, 2002
8142002
Measuring the quality of experience of HTTP video streaming
RKP Mok, EWW Chan, RKC Chang
12th IFIP/IEEE international symposium on integrated network management (IM …, 2011
6482011
QDASH: a QoE-aware DASH system
RKP Mok, X Luo, EWW Chan, RKC Chang
Proceedings of the 3rd multimedia systems conference, 11-22, 2012
4822012
On a new class of pulsing denial-of-service attacks and the defense.
X Luo, RKC Chang
NDSS, 2005
2642005
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
X Luo, P Zhou, EWW Chan, W Lee, RKC Chang, R Perdisci
NDSS 11, 2011
2172011
Inferring the QoE of HTTP video streaming from user-viewing activities
RKP Mok, EWW Chan, X Luo, RKC Chang
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack …, 2011
2012011
TCP covert timing channels: Design and detection
X Luo, EWW Chan, RKC Chang
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
1032008
Cloak: A ten-fold way for reliable covert communications
X Luo, EWW Chan, RKC Chang
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
602007
Inbound traffic engineering for multihomed ASs using AS path prepending
RKC Chang, M Lo
IEEE network 19 (2), 18-25, 2005
602005
Engineering of a global defense infrastructure for DDoS attacks
KKK Wan, RKC Chang
Proceedings 10th IEEE International Conference on Networks (ICON 2002 …, 2002
592002
Anomaly detection of network traffic based on wavelet packet
J Gao, G Hu, X Yao, RKC Chang
2006 Asia-Pacific Conference on Communications, 1-5, 2006
582006
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
X Luo, EWW Chan, RKC Chang
USENIX Annual Technical Conference, 2009
572009
Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks
Y Tang, X Luo, Q Hui, RKC Chang
IEEE transactions on information forensics and security 9 (3), 339-353, 2013
532013
Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
X Luo, EWW Chan, RKC Chang
EURASIP Journal on Advances in Signal Processing 2009, 1-13, 2009
522009
Centralized PSM: an AP-centric power saving mode for 802.11 infrastructure networks
Y Xie, X Luo, RKC Chang
2009 IEEE Sarnoff Symposium, 1-5, 2009
482009
Teaching computer networking with the help of personal computer networks
RKC Chang
Proceedings of the 9th annual SIGCSE conference on Innovation and technology …, 2004
462004
Exposing invisible timing-based traffic watermarks with BACKLIT
X Luo, P Zhou, J Zhang, R Perdisci, W Lee, RKC Chang
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
452011
On the accuracy of smartphone-based mobile network measurement
W Li, RKP Mok, D Wu, RKC Chang
2015 IEEE conference on computer communications (INFOCOM), 370-378, 2015
432015
Detecting low-quality workers in QoE crowdtesting: A worker behavior-based approach
RKP Mok, RKC Chang, W Li
IEEE Transactions on Multimedia 19 (3), 530-543, 2016
392016
Robust network covert communications based on TCP and enumerative combinatorics
X Luo, EWW Chan, P Zhou, RKC Chang
IEEE Transactions on Dependable and Secure Computing 9 (6), 890-902, 2012
392012
The system can't perform the operation now. Try again later.
Articles 1–20