Follow
Kai Bu
Kai Bu
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Fault management in software-defined networking: A survey
Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ...
IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018
1152018
RuleTris: Minimizing rule update latency for TCAM-based SDN switches
X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
982016
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
842016
Unknown tag identification in large RFID systems: An efficient and complete solution
X Liu, B Xiao, S Zhang, K Bu
IEEE Transactions on Parallel and Distributed Systems 26 (6), 1775-1788, 2014
822014
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Q Tan, Z Zeng, K Bu, K Ren
NDSS, 2020
762020
Enda: Embracing network inconsistency for dynamic application offloading in mobile cloud computing
J Li, K Bu, X Liu, B Xiao
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 39-44, 2013
712013
Deterministic detection of cloning attacks for anonymous RFID systems
K Bu, M Xu, X Liu, J Luo, S Zhang, M Weng
IEEE Transactions on Industrial Informatics 11 (6), 1255-1266, 2015
632015
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics 52 (7), 6095-6108, 2021
612021
Towards practical deployment-stage backdoor attack on deep neural networks
X Qi, T Xie, R Pan, J Zhu, Y Yang, K Bu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
572022
Flexible and time-efficient tag scanning with handheld readers
X Liu, S Zhang, B Xiao, K Bu
IEEE Transactions on Mobile Computing 15 (4), 840-852, 2015
552015
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary
Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014
532014
Efficient distributed query processing in large RFID-enabled supply chains
J Liu, B Xiao, K Bu, L Chen
IEEE INFOCOM 2014-IEEE Conference On Computer Communications, 163-171, 2014
532014
Compiling minimum incremental update for modular SDN languages
X Wen, C Diao, X Zhao, Y Chen, LE Li, B Yang, K Bu
Proceedings of the third workshop on Hot topics in software defined …, 2014
502014
A locality-based range-free localization algorithm for anisotropic wireless sensor networks
X Liu, S Zhang, K Bu
Telecommunication Systems 62, 3-13, 2016
482016
Efficient Misplaced-Tag Pinpointing in Large RFID Systems
K Bu, B Xiao, Q Xiao, S Chen
IEEE, 2012
482012
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
472013
STEP: A time-efficient tag searching protocol in large RFID systems
X Liu, B Xiao, S Zhang, K Bu, A Chan
IEEE Transactions on Computers 64 (11), 3265-3277, 2015
412015
Complete and Fast Unknown Tag Identification in Large RFID Systems
X Liu, S Zhang, K Bu, B Xiao
40*
You can clone but you cannot hide: A survey of clone prevention and detection for RFID
K Bu, M Weng, Y Zheng, B Xiao, X Liu
IEEE Communications Surveys & Tutorials 19 (3), 1682-1700, 2017
372017
Efficient polling-based information collection in RFID systems
J Liu, B Xiao, X Liu, K Bu, L Chen, C Nie
IEEE/ACM Transactions on Networking 27 (3), 948-961, 2019
312019
The system can't perform the operation now. Try again later.
Articles 1–20