|
For an the current list of publications, please visit here .
2011
Contrail: Enabling Decentralized Social Networks on
Smartphones by Patrick Stuedi, Iqbal Mohomed, Mahesh Balakrishnan,
Ted Wobber, Doug Terry and Z. Morley Mao, Proceedings of Middleware
2011.(PDF)
Identifying Diverse Usage Behaviors of Smartphone Apps by
Qiang Xu, Jeffrey Erman, Alexandre Gerber, Z. Morley Mao, Jeffrey
Pang, and Shobha Venkataraman, Proceedings of IMC 2011.(PDF)
Designing Scalable and Effective Decision Support for Mitigating
Attacks in Large Enterprise Networks by Zhiyun Qian, Z. Morley
Mao, Ammar Rayes and David Jaffe, Proceedings of SecureComm
2011.(PDF)
An Untold Story of Middleboxes in Cellular Networks by
Zhaoguang Wang, Zhiyun Qian, Qiang Xu, Zhuoqing Morley Mao, and Ming
Zhang, Proceedings of SIGCOMM 2011.(PDF)
AccuLoc: Practical Localization of Performance Measurements in
3G Networks by Qiang Xu, Alex Gerber,
Z. Morley Mao, and Jeff Pang, Proceedings of Mobisys 2011.(PDF)
Profiling Resource Usage for Mobile Applications: a Cross-layer
Approach by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao,
Subhabrata Sen, and Oliver Spatscheck Proceedings of Mobisys 2011.(PDF)
KnowOps: Towards an Embedded Knowledge Base for Network
Management and Operations by Xu Chen, Yun Mao, Z. Morley Mao, and
Jacobus Van der Merwe, Proceedings of The first Hot-ICE workshop 2011.(PDF)
Internet Censorship in China: Where Does the Filtering Occur? by Xueyang
Xu, Z. Morley Mao, and J. Alex Halderman, Proceedings of PAM
2011.(PDF)
Can Deterministic Replay be an Enabling Tool for Mobile
Computing? by Jason Flinn and Z. Morley Mao, Proceedings of
HotMobile 2011.(PDF)
Cellular Data Network Infrastructure Characterization and
Implication on Mobile Content Placement by Qiang Xu, Junxian
Huang, Zhaoguang Wang, Feng Qian, Alexandre Gerber, and Z. Morley Mao,
Proceedings of SIGMETRICS 2011.(PDF)
2010
Characterizing Radio Resource Allocation for 3G Networks
by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley Mao, Subhabrata
Sen, and Oliver Spatscheck, Proceedings of IMC 2010.
TOP: Tail Optimization Protocol for Cellular Radio Resource
Allocation by Feng Qian, Zhaoguang Wang, Alex Gerber, Z. Morley
Mao, Subhabrata Sen, and Oliver Spatscheck, Proceedings of ICNP 2010.
iSPY: Detecting IP Prefix Hijacking on My Own by Zheng Zhang, Ying
Zhang, Y. Charlie Hu, Z. Morley Mao, and Randy Bush, To appear in
ACM/IEEE Transactions on Networking (ToN), 2010.
Accurate Online Power Estimation and Automatic Battery Behavior
Based Power Model Generation for Smartphones by Lide Zhang,
Birjodh Tiwana, Zhiyun Qian, Zhaoguang Wang, Robert Dick, Z. Morley Mao
and Lei Yang, Proceedings of CODES+ISSS 2010.
Performance and Power Modeling in a Multi-Programmed Multi-Core Environment by Xi Chen, Chi Xu, Robert Dick, and Z. Morley Mao,
Proceedings of Design Automation Conference (DAC) 2010.
Anatomizing Application Performance Differences on
Smartphones by Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley
Mao, Ming Zhang, Paramvir Bahl, Proceedings of Mobisys 2010.
A Case for Unsupervised-Learning-based Spam Filtering by
Feng Qian, Abhinav Pathak, Y. Charlie Hu, Z. Morley Mao, and Yinglian
Xie, Proceedings of SIGMETRICS 2010 (Extended Abstract).
Cache Contention and Application Performance Prediction for
Multi-Core Systems by Chi Xu, Xi Chen, Robert P. Dick, and
Z. Morley Mao, Proceedings of ISPASS 2010.
Investigation of Triangular Spamming: a Stealthy and Efficient
Spamming Technique by Zhiyun Qian, Z. Morley Mao, Yinglian Xie,
and Fang Yu, Proceedings of IEEE Security and Privacy (Oakland) 2010.
On Network-level Clusters for Spam Detection by Zhiyun
Qian, Z. Morley Mao, Yinglian Xie, and Fang Yu, Proceedings of 17th Annual Network & Distributed System Security Symposium (NDSS) 2010.
On the Safety of Enterprise Policy Deployment by Yudong
Gao, Xu Chen, Ni Pan, and Z. Morley Mao, Proceedings of 17th Annual Network & Distributed System Security Symposium (NDSS) 2010.
2009
PACMAN: a Platform for Automated and Controlled network
operations and configuration MANagement by Xu Chen,
Z. Morley Mao, and Jacobus Van der Merwe,
Proceedings of
CoNext 2009.
TCP Revisited: A Fresh Look at TCP in the Wild by Feng
Qian, Alex Gerber, Z. Morley Mao, Subhabrata Sen, Oliver
Spatscheck, and Walter Willinger,
Proceedings of IMC 2009.
Detecting Traffic Differentiation in Backbone ISPs with
NetPolice by Ying Zhang, Z. Morley Mao, and Ming Zhang,
Proceedings of IMC 2009.
Ensemble: Community-based Anomaly Detection for Popular
Applications by Feng Qian, Zhiyun Qian, Z. Morley Mao, and Atul
Prakash, Proceedings of SecureComm 2009.
DECOR: DEClarative network management and OpeRation by Xu
Chen, Yun Mao, Z. Morley Mao, and Jacobus Van der Merwe, Proceedings of
PRESTO Workshop 2009.
(fast-tracked to CCR)
ShadowNet: A Platform for Rapid and Safe Network Evolution
by Xu Chen, Z. Morley Mao, and Kobus van der Merwe, Proceedings of
Usenix Technical Conference 2009.
Botnet Spam Campaigns can be Long Lasting: Evidence,
Implications, and Analysis by Abhinav Pathak, Feng Qian,
Y. Charlie Hu, Z. Morley Mao, and Supranamaya Ranjan, Proceedings
of SIGMETRICS 2009.
HC-BGP: A Light-weight and Flexible Scheme for Securing Prefix
Ownership by Ying Zhang, Zheng Zhang, Z. Morley Mao and
Y. Charlie Hu, Proceedings of DSN-DCCS 2009.
2008
Routing analysis, network security and management:
WebBee: A Platform for Secure Mobile Coordination and
Communication in Crisis Scenarios by Sugih Jamin, Z. Morley Mao,
T. V. Lakshman, Sarit Mukherjee, Jignesh Patel, and Limin Wang et
al. , STSC CrossTalk Journal of Defense Software Engineering, Oct
2008.
Ascertaining the Reality of Network Neutrality Violation in
Backbone ISPs by Ying Zhang, Z. Morley Mao, and Ming Zhang,
Proceedings of HotNets 2008.
Automating Network Application Dependency Discovery:
Experiences, Limitations, and New Solutions by Xu Chen, Ming
Zhang, Z. Morley Mao, and Victor Bahl, Proceedings of OSDI 2008.
iSPY: Detecting IP Prefix Hijacking on My Own by Zheng
Zhang, Ying Zhang, Y Charlie Hu, Z Morley Mao, and Randy Bush,
Proceedings of ACM SIGCOMM 2008.
Peeking into Spammer Behavior from a Unique Vantage Point
by Abhinav Pathak, Y. Charlie Hu, and Z. Morley Mao, Proceedings of
the First USENIX Workshop on Large-Scale Exploits and Emergent Threats
(LEET) 2008.
Deterring Malware by Imitating Emulation and Debugging
Environment by Xu Chen, Jon Andersen, Z. Morley Mao, Michael
Bailey, Jose Nazario, and Farnam Jahanian, Proceedings of DSN-DCCS
2008.
A Measurement Study of Internet Delay Asymmetry by Abhinav
Pathak, Himabindu Pucha, Ying Zhang, Y. Charlie Hu, and Z. Morley Mao,
Proceedings of Passive and Active Measurement Conference (PAM) 2008.
Effective Diagnosis of Routing Disruptions from End Systems
by Ying Zhang, Z. Morley Mao and Ming Zhang, Proceedings of NSDI
2008.
Wide-Area IP Network Mobility by Xin Hu, Li Li, Z. Morley
Mao, and Yang Richard Yang, Proceedings of IEEE INFOCOM 2008.
Internet traffic and multiresolution analysis by Ying
Zhang, Zihui Ge, Suhas Diggavi, Z. Morley Mao, Matthew Roughan, Vinay
Vaishampayan, Walter Willinger, and Yin Zhang, Markov Processes
and Related Fields: A Festschrift in Honor of Thomas G. Kurtz/,
S. N. Ethier, J. Feng and R. H. Stockbridge (eds.), IMS Lecture
Notes--Monograph Series.
2007
- Internet traffic and multiresolution analysis by Ying Zhang, Zihui Ge, Suhas Diggavi, Z. Morley Mao, Matthew Roughan, Vinay Vaishampayan, Walter Willinger, and Yin Zhang, Markov Processes and Related Fields: A Festschrift in Honor of Thomas G. Kurtz/, S. N. Ethier, J. Feng and R. H. Stockbridge (eds.), IMS Lecture Notes--Monograph Series.(PDF)
- Practical Defenses Against BGP Prefix Hijacking by Zheng Zhang, Ying Zhang, Y. Charlie Hu and Z. Morley Mao, Proceedings of CoNext 2007.(PDF)
- Internet Routing Resilience to Failures: Analysis and Implications by Jian Wu and Ying Zhang, Z. Morley Mao, and Kang Shin, Proceedings of CoNext 2007.(PDF)
- On the Impact of Route Monitor Selection by Ying Zhang, Zheng Zhang, Z. Morley Mao, Y. Charlie Hu, and Bruce Maggs, Proceedings of ACM Internet Measurement Conference (IMC) 2007.(PDF)
- Automated Classification and Analysis of Internet Malware by Michael Bailey, Jon Oberheide, Jon Andersen, Z. Morley Mao, Farnam Jahanian, and Jose Nazario, Proceedings of RAID 2007.(PDF)
- Towards Automated Network Management: Network Operations using Dynamic Views by Xu Chen, Z. Morley Mao, and Kobus van der Merwe, Procedings of SIGCOMM INM workshop 2007.(PDF)
- MIDAS: An Impact Scale for DDoS attacks by Ranga Vasudevan, Z. Morley Mao, Oliver Spatscheck, Kobus Van der Merwe, Proceedings of LANMAN 2007 (15th Workshop on Local and Metropolitan Area Networks).(PDF)
- Characterizing Dark DNS Behavior by Jon Oberheide, Manish Karir and Z. Morley Mao, Proceedings of DIMVA 2007.(PDF)
- A Firewall for Routers: Protecting Against Routing Misbehavior by Ying Zhang, Z. Morley Mao, Jia Wang, Proceedings of DSN-DCCS 2007.(PDF)
- Understanding Network Delay Changes Caused by Routing Events by Himabindu Pucha, Ying Zhang, Z. Morley Mao, Y. Charlie Hu, Proceedings of ACM SIGMETRICS 2007.(PDF)
- Accurate Real-time Identification of IP Prefix Hijacking by Xin Hu and Z. Morley Mao, Proceedings of IEEE Security and Privacy (Oakland) 2007.(PDF)
- A Framework for Measuring and Predicting Impact of Routing Changes by Ying Zhang, Z. Morley Mao, and Jia Wang, Proceedings of IEEE INFOCOM 2007. (PDF)
- Low-Rate TCP-Targeted DoS Attacks Disrupts Internet Routing by Ying Zhang, Z. Morley Mao, and Jia Wang, Proceedings of 14th Annual Network & Distributed System Security Symposium (NDSS) 2007.(PDF)
2006
- Tussle in Routing: Who Determines Internet Paths? by Z. Morley Mao. Invited paper, Workshop on Internet Routing Evolution and Design (WIRED), 2006 (PDF)
- On the Impact of Research Network Based Testbeds on Wide-area Experiments by Himabindu Pucha, Y. Charlie Hu, and Z. Morley Mao, Proceedings of ACM Internet Measurement Conference (IMC) 2006. (paper [PDF])
- Internet-scale Malware Mitigation: Combining Intelligence of the Control and Data Plane by Ying Zhang, Evan Cooke, and Z. Morley Mao, Proceedings of WORM 2006. (paper [PDF])
- Differentiated BGP Update Processing for Improved Routing Convergence by Wei Sun, Z. Morley Mao, and Kang Shin, Proceedings of IEEE ICNP 2006. (paper [PDF])
- Analyzing Large DDoS Attacks using Multiple Data Sources, by Z. Morley Mao, Vyas Sekar, Oliver Spatscheck, Jacobus van der Merwe, Rangarajan Vasudevan, Proceedings of ACM SIGCOMM Workshop on Large-Scale Attack Defense (LSAD) 2006. (paper [PDF])
- A Measurement Study on the Impact of Routing Events on End-to-End Internet Path Performance, by Feng Wang, Z. Morley Mao, Jia Wang, Lixin Gao, and Randy Bush, Proceedings of ACM SIGCOMM 2006. (paper [PDF])
- Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies, by Ranga Vasudevan, Z. Morley Mao, Oliver Spatscheck, Kobus Van der Merwe, Proceedings of Usenix Technical Conference 2006. (paper [PDF])
- Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware, by Evan Cooke, Z. Morley Mao, Farnam Jahanian, Proceedings of DSN 2006. (paper [PDF])
- Is BGP Update Storm a Sign of Trouble: Observing the Internet Control and Data Planes During Internet Worms, by Matthew Roughan, Jun Li, Randy Bush, Zhuoqing Mao and Timothy Griffin, Proceedings of SPECTS 2006. (paper [PDF])
- Watching Data Streams Toward a Multi-Homed Sink Under Routing Changes Introduced by a BGP Beacon, by Jun Li, Randy Bush, Z. Mao, Tim Griffin, Matt Roughan, Dan Stutzbach, and E. Purpus, Proceedings of Passive and Active Measurement Conference (PAM) 2006. (paper [PDF]
|