• Publications
  • Influence
QDASH: a QoE-aware DASH system
Dynamic Adaptation Streaming over HTTP (DASH) enhances the Quality of Experience (QoE) for users by automatically switching quality levels according to network conditions. Various adaptation schemesExpand
  • 317
  • 36
  • PDF
A Survey on the Security of Blockchain Systems
Since its inception, the blockchain technology has shown promising application prospects. From the initial cryptocurrency to the current smart contract, blockchain has been applied to many fields.Expand
  • 382
  • 21
  • PDF
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows
Leakage of private information from web applications— even when the traffic is encrypted—is a major security threat to many applications that use HTTP for data delivery. This paper considers theExpand
  • 125
  • 15
  • PDF
Detecting stealthy P2P botnets using statistical traffic fingerprints
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency to take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the way theyExpand
  • 115
  • 12
  • PDF
Under-optimized smart contracts devour your money
Smart contracts are full-fledged programs that run on blockchains (e.g., Ethereum, one of the most popular blockchains). In Ethereum, gas (in Ether, a cryptographic currency like Bitcoin) is theExpand
  • 123
  • 11
  • PDF
Understanding Ethereum via Graph Analysis
Being the largest blockchain with the capability of running smart contracts, Ethereum has attracted wide attention and its market capitalization has reached 20 billion USD. Ethereum not only supportsExpand
  • 77
  • 10
  • PDF
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of attack packets areExpand
  • 171
  • 9
  • PDF
Building a Scalable System for Stealthy P2P-Botnet Detection
Peer-to-peer (P2P) botnets have recently been adopted by botmasters for their resiliency against take-down efforts. Besides being harder to take down, modern botnets tend to be stealthier in the wayExpand
  • 80
  • 8
Inferring the QoE of HTTP video streaming from user-viewing activities
HTTP video streaming, employed by most of the video-sharing websites, allows users to control the video playback using, for example, pausing and switching the bit rate. These user-viewing activitiesExpand
  • 129
  • 7
  • PDF
TCP covert timing channels: Design and detection
Exploiting packetspsila timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them embed covertExpand
  • 67
  • 7
  • PDF