Kai Bu
Kai Bu
Correu electrònic verificat a - Pàgina d'inici
Citada per
Citada per
RuleTris: Minimizing rule update latency for TCAM-based SDN switches
X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Unknown tag identification in large RFID systems: An efficient and complete solution
X Liu, B Xiao, S Zhang, K Bu
IEEE Transactions on Parallel and Distributed Systems 26 (6), 1775-1788, 2014
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Enda: Embracing network inconsistency for dynamic application offloading in mobile cloud computing
J Li, K Bu, X Liu, B Xiao
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 39-44, 2013
Fault management in software-defined networking: A survey
Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ...
IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018
Efficient distributed query processing in large RFID-enabled supply chains
J Liu, B Xiao, K Bu, L Chen
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 163-171, 2014
Flexible and time-efficient tag scanning with handheld readers
X Liu, S Zhang, B Xiao, K Bu
IEEE Transactions on Mobile Computing 15 (4), 840-852, 2015
Compiling minimum incremental update for modular SDN languages
X Wen, C Diao, X Zhao, Y Chen, LE Li, B Yang, K Bu
Proceedings of the third workshop on Hot topics in software defined …, 2014
Efficient Misplaced-Tag Pinpointing in Large RFID Systems
K Bu, B Xiao, Q Xiao, S Chen
IEEE, 2012
A locality-based range-free localization algorithm for anisotropic wireless sensor networks
X Liu, S Zhang, K Bu
Telecommunication Systems 62 (1), 3-13, 2016
Deterministic detection of cloning attacks for anonymous RFID systems
K Bu, M Xu, X Liu, J Luo, S Zhang, M Weng
IEEE Transactions on Industrial Informatics 11 (6), 1255-1266, 2015
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary
Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
Complete and Fast Unknown Tag Identification in Large RFID Systems
X Liu, S Zhang, K Bu, B Xiao
STEP: A time-efficient tag searching protocol in large RFID systems
X Liu, B Xiao, S Zhang, K Bu, A Chan
IEEE Transactions on Computers 64 (11), 3265-3277, 2015
Efficient pinpointing of misplaced tags in large RFID systems
K Bu, B Xiao, Q Xiao, S Chen
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual …, 2011
You can clone but you cannot hide: A survey of clone prevention and detection for RFID
K Bu, M Weng, Y Zheng, B Xiao, X Liu
IEEE Communications Surveys & Tutorials 19 (3), 1682-1700, 2017
Iterative localization of wireless sensor networks: an accurate and robust approach
Q Xiao, B Xiao, K Bu, J Cao
IEEE/ACM transactions on networking 22 (2), 608-621, 2013
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics, 2021
Approaching the time lower bound on cloned-tag identification for large RFID systems
K Bu, X Liu, B Xiao
Ad Hoc Networks 13, 271-281, 2014
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20