Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
20072022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Adversarial policy training against deep reinforcement learning

    Wu, X., Guo, W., Wei, H. & Xing, X., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 1883-1900 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Adversary resistant deep neural networks with an application to malware detection

    Wang, Q., Guo, W., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Aug 13 2017, KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1145-1153 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. Part F129685).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Scopus citations
  • A fault inference mechanism in sensor networks using Markov Chain

    Shakshuki, E. & Xinyu, X., 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications, AINA 2008. p. 628-635 8 p. 4482765. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Agent based approach towards energy aware routing in wireless sensor networks

    Malik, H., Shakshuki, E. & Xing, X., 2007, 2007 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2007. p. 2149-2154 6 p. 4414095. (Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Agent-based fault detection mechanism in wireless sensor networks

    Shakshuki, E., Xing, X. & Zhang, H., 2007, Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007. Institute of Electrical and Electronics Engineers Inc., p. 31-34 4 p. 4407253. (Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Agent-based routing for wireless sensor network

    Shakshuki, E., Malik, H. & Xing, X., 2007, Advanced Intelligent Computing Theories and Applications: With Aspects of Theoretical and Methodological Issues - Third International Conference on Intelligent Computing, ICIC 2007, Proceedings. Springer Verlag, p. 68-79 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4681 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • A highly scalable bandwidth estimation of commercial hotspot access points

    Xing, X., Dang, J., Mishra, S. & Liu, X., 2011, 2011 Proceedings IEEE INFOCOM. p. 1143-1151 9 p. 5934891. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • All your clicks belong to me: Investigating click interception on the web

    Zhang, M., Meng, W., Lee, S., Lee, B. & Xing, X., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 941-957 17 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • An intelligent agent for fault reconnaissance in sensor networks

    Shakshuki, E. M., Xing, X. & Sheltami, T. R., 2009, iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services. p. 139-146 8 p. (iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

    Xing, X., Mishra, S. & Liu, X., 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • A Systematic Study of Elastic Objects in Kernel Exploitation

    Chen, Y., Lin, Z. & Xing, X., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1165-1184 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Automated finite state machine extraction

    Chen, Y., Song, L., Xing, X., Xu, F. & Wu, W., Nov 15 2019, FEAST 2019 - Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation. Association for Computing Machinery, p. 9-15 7 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning

    Wang, L., Javed, Z., Wu, X., Guo, W., Xing, X. & Song, D., 2021, Proceedings of the 30th International Joint Conference on Artificial Intelligence, IJCAI 2021. Zhou, Z-H. (ed.). International Joint Conferences on Artificial Intelligence, p. 3699-3705 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • BScout: Direct whole patch presence test for Java executables

    Dai, J., Zhang, Y., Jiang, Z., Zhou, Y., Chen, J., Xing, X., Zhang, X., Tan, X., Yang, M. & Yang, Z., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 1147-1164 18 p. (Proceedings of the 29th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • CADE: Detecting and explaining concept drift samples for security applications

    Yang, L., Guo, W., Hao, Q., Ciptadi, A., Ahmadzadeh, A., Xing, X. & Wang, G., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2327-2344 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • CREDAL: Towards locating a memory corruption vulnerability with your core dump

    Xu, J., Mu, D., Chen, P., Xing, X., Wang, P. & Liu, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 529-540 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • DeepVSA: Facilitating value-set analysis with deep learning for postmortem program analysis

    Guo, W., Mu, D., Xing, X., Du, M. & Song, D., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1787-1804 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Defending Against Adversarial Samples Without Security through Obscurity

    Guo, W., Wang, Q., Zhang, K., Ororbia, A. G., Huang, S., Liu, X., Giles, C. L., Lin, L. & Xing, X., Dec 27 2018, 2018 IEEE International Conference on Data Mining, ICDM 2018. Institute of Electrical and Electronics Engineers Inc., p. 137-146 10 p. 8594838. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2018-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • EDGE: Explaining Deep Reinforcement Learning Policies

    Guo, W., Wu, X., Khan, U. & Xing, X., 2021, Advances in Neural Information Processing Systems 34 - 35th Conference on Neural Information Processing Systems, NeurIPS 2021. Ranzato, MA., Beygelzimer, A., Dauphin, Y., Liang, P. S. & Wortman Vaughan, J. (eds.). Neural information processing systems foundation, p. 12222-12236 15 p. (Advances in Neural Information Processing Systems; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient misbehaving user detection in online video chat services

    Cheng, H., Liang, Y. L., Xing, X., Liu, X., Han, R., Lv, Q. & Mishra, S., 2012, WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining. p. 23-32 10 p. (WSDM 2012 - Proceedings of the 5th ACM International Conference on Web Search and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Enhancing group recommendation by incorporating social relationship interactions

    Gartrell, M., Xing, X., Lv, Q., Beach, A., Han, R., Mishra, S. & Seada, K., 2010, Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10. p. 97-106 10 p. (Proceedings of the 16th ACM International Conference on Supporting Group Work, GROUP'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    158 Scopus citations
  • Errors, misunderstandings, and attacks: Analyzing the crowdsourcing process of ad-blocking systems

    Alrizah, M., Xing, X. & Zhu, S., Oct 21 2019, IMC 2019 - Proceedings of the 2019 ACM Internet Measurement Conference. Association for Computing Machinery, p. 230-244 15 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    9 Scopus citations
  • Exposing inconsistent web search results with bobble

    Xing, X., Meng, W., Doozan, D., Feamster, N., Lee, W. & Snoeren, A. C., 2014, Passive and Active Measurement - 15th International Conference, PAM 2014, Proceedings. Springer Verlag, p. 131-140 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8362 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Facilitating Vulnerability Assessment through PoC Migration

    Dai, J., Zhang, Y., Xu, H., Lyu, H., Wu, Z., Xing, X. & Yang, M., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3300-3317 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware

    Huang, J., Xu, J., Xing, X., Liu, P. & Qureshi, M. K., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2231-2244 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • From physical to cyber: Escalating protection for personalized auto insurance

    Guan, L., Xu, J., Wang, S., Xing, X., Lin, L., Huang, H., Liu, P. & Lee, W., Nov 14 2016, Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016. Association for Computing Machinery, Inc, p. 42-55 14 p. (Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems, SenSys 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Fusing mobile, sensor, and social data to fully enable context-aware computing

    Beach, A., Gartrell, M., Xing, X., Han, R., Lv, Q., Mishra, S. & Seada, K., 2010, HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications. p. 60-65 6 p. (HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    99 Scopus citations
  • FUZE: Towards facilitating exploit generation for kernel use-after-free vulnerabilities

    Wu, W., Chen, Y., Xu, J., Xing, X., Gong, X. & Zou, W., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 781-797 17 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs

    Lin, Z., Chen, Y., Wu, Y., Mu, D., Yu, C., Xing, X. & Li, K., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2078-2095 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hart: Hardware-assisted kernel module tracing on arm

    Du, Y., Ning, Z., Xu, J., Wang, Z., Lin, Y. H., Zhang, F., Xing, X. & Mao, B., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 316-337 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Kepler: Facilitating control-flow hijacking primitive evaluation for linux kernel vulnerabilities

    Wu, W., Chen, Y., Xing, X. & Zou, W., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1187-1204 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Lemna: Explaining deep learning based security applications

    Guo, W., Mu, D., Xu, J., Su, P., Wang, G. & Xing, X., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 364-379 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    115 Scopus citations
  • Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise

    Liu, F., Jiang, X., Wen, Y., Xing, X., Zhang, D. & Meng, D., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1777-1794 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • Mobile agent for efficient routing among source nodes in wireless sensor networks

    Shakshuki, E., Xing, X. & Malik, H., 2007, 3rd International Conference on Autonomic and Autonomous Systems, ICAS 2007. 4437916. (3rd International Conference on Autonomic and Autonomous Systems, ICAS'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • PDiff: Semantic-based Patch Presence Testing for Downstream Kernels

    Jiang, Z., Zhang, Y., Xu, J., Wen, Q., Wang, Z., Zhang, X., Xing, X., Yang, M. & Yang, Z., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1149-1163 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • PoMP: Postmortem program analysis with hardware-enhanced post-crash artifacts

    Xu, J., Mu, D., Xing, X., Liu, P., Chen, P. & Mao, B., 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 17-32 16 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • PTrix: Efficient hardware-assisted fuzzing for COTS binary

    Chen, Y., Mu, D., Xu, J., Sun, Z., Shen, W., Xing, X., Lu, L. & Mao, B., Jul 2 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 633-645 13 p. (AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    19 Scopus citations
  • RENN: Efficient reverse execution with neural-network-assisted alias analysis

    Mu, D., Guo, W., Cuevas, A., Chen, Y., Gai, J., Xing, X., Mao, B. & Song, C., Nov 2019, Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019. Institute of Electrical and Electronics Engineers Inc., p. 924-935 12 p. 8952186. (Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SafeVchat: Detecting obscene content and misbehaving users in online video chat services

    Xing, X., Liang, Y. L., Cheng, H., Dang, J., Huang, S., Han, R., Liu, X., Lv, Q. & Mishra, S., 2011, Proceedings of the 20th International Conference on World Wide Web, WWW 2011. Association for Computing Machinery, p. 685-694 10 p. (Proceedings of the 20th International Conference on World Wide Web, WWW 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Scalable misbehavior detection in online video chat services

    Xing, X., Liang, Y. L., Huang, S., Cheng, H., Han, R., Lv, Q., Liu, X., Mishra, S. & Zhu, Y., 2012, KDD'12 - 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 552-560 9 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Security analysis and authentication improvement for IEEE 802.11i specification

    Xing, X., Shakshuki, E., Benoit, D. & Sheltami, T., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 1887-1891 5 p. 4698140. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

    Chen, Y. & Xing, X., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1707-1722 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Scopus citations
  • Supporting transparent snapshot for bare-metal malware analysis on mobile devices

    Guan, L., Jia, S., Chen, B., Zhang, F., Luo, B., Lin, J., Liu, P., Xing, X. & Xia, L., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 339-349 11 p. (ACM International Conference Proceeding Series; vol. Part F132521).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • System service call-oriented symbolic execution of Android Framework with applications to vulnerability discovery and exploit generation

    Luo, L., Zeng, Q., Cao, C., Chen, K., Liu, J., Liu, L., Gao, N., Yang, M., Xing, X. & Liu, P., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 225-238 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Scopus citations
  • Take this personally: Pollution attacks on personalized services

    Xing, X., Meng, W., Doozan, D., Snoeren, A. C., Feamster, N. & Lee, W., 2013, Proceedings of the 22nd USENIX Security Symposium. USENIX Association, p. 671-686 16 p. (Proceedings of the 22nd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Towards inspecting and eliminating trojan backdoors in deep neural networks

    Guo, W., Wang, L., Xu, Y., Xing, X., Du, M. & Song, D., Nov 2020, Proceedings - 20th IEEE International Conference on Data Mining, ICDM 2020. Plant, C., Wang, H., Cuzzocrea, A., Zaniolo, C. & Wu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 162-171 10 p. 9338311. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Towards the detection of inconsistencies in public security vulnerability reports

    Dong, Y., Guo, W., Chen, Y., Xing, X., Zhang, Y. & Wang, G., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 869-885 17 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Scopus citations
  • Tracking anonymous sinks in wireless sensor networks

    Shakshuki, E. M., Sheltami, T. R., Kang, N. & Xing, X., 2009, Proceedings - 2009 International Conference on Advanced Information Networking and Applications, AINA 2009. p. 510-516 7 p. 5076241. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Trackmeornot: Enabling flexible control on web tracking

    Meng, W., Lee, B., Xing, X. & Lee, W., 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 99-109 11 p. (25th International World Wide Web Conference, WWW 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • TrustShadow: Secure execution of unmodified applications with ARM TrustZone

    Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    63 Scopus citations