On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles | 0 | 0.34 | 2022 |
Vivisecting mobility management in 5G cellular networks | 0 | 0.34 | 2022 |
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols | 0 | 0.34 | 2021 |
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software | 1 | 0.36 | 2021 |
SkyCore: moving core to the edge for untethered and reliable UAV-based LTE networks | 1 | 0.35 | 2021 |
EMP: edge-assisted multi-vehicle perception | 2 | 0.38 | 2021 |
CVShield - Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment. | 1 | 0.35 | 2020 |
MPBond: efficient network-level collaboration among personal mobile devices | 0 | 0.34 | 2020 |
CSI: inferring mobile ABR video adaptation behavior under HTTPS and QUIC | 1 | 0.35 | 2020 |
A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications | 0 | 0.34 | 2019 |
MP-H2: A Client-only Multipath Solution for HTTP/2 | 3 | 0.40 | 2019 |
Poster: Characterizing Performance and Power for mmWave 5G on Commodity Smartphones | 0 | 0.34 | 2019 |
Dragon: Scalable, Flexible, and Efficient Traffic Engineering in Software Defined ISP Networks. | 2 | 0.36 | 2018 |
QoE Inference and Improvement Without End-Host Control | 0 | 0.34 | 2018 |
No One In The Middle: Enabling Network Access Control Via Transparent Attribution. | 0 | 0.34 | 2018 |
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. | 0 | 0.34 | 2018 |
Production as a service: A centralized framework for small batch manufacturing | 1 | 0.38 | 2017 |
Android UI Deception Revisited: Attacks and Defenses. | 1 | 0.35 | 2016 |
Understanding On-device Bufferbloat for Cellular Upload. | 13 | 0.58 | 2016 |
Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks. | 18 | 0.71 | 2016 |
Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild | 13 | 0.53 | 2015 |
Poster: Context-Triggered Mobile Network Measurement | 0 | 0.34 | 2015 |
Tango: Accelerating Mobile Applications through Flip-Flop Replication. | 0 | 0.34 | 2015 |
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture | 5 | 0.41 | 2015 |
WACCO and LOKO: Strong Consistency at Global Scale. | 0 | 0.34 | 2015 |
Summary Report for the First NSF Workshop on Mobile Community Measurement Infrastructure | 0 | 0.34 | 2015 |
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication | 4 | 0.38 | 2015 |
Accelerating Mobile Applications through Flip-Flop Replication | 27 | 0.91 | 2015 |
Mobilyzer: An Open Platform for Controllable Mobile Network Measurements | 51 | 2.24 | 2015 |
Automatic Generation Of Mobile App Signatures From Traffic Observations | 17 | 0.74 | 2015 |
Performance Analysis of Location Profile Routing. | 0 | 0.34 | 2014 |
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones | 5 | 0.41 | 2014 |
Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET). | 2 | 0.38 | 2014 |
Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis | 36 | 1.37 | 2014 |
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph | 24 | 0.94 | 2014 |
FLOWR: a self-learning system for classifying mobileapplication traffic | 5 | 0.55 | 2014 |
RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks | 4 | 0.52 | 2014 |
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users | 54 | 1.84 | 2013 |
An in-depth study of LTE: effect of network protocol and application behavior on performance | 145 | 5.19 | 2013 |
Panappticon: Event-based tracing to measure mobile application and platform performance | 26 | 0.99 | 2013 |
SocialWatch: detection of online service abuse via large-scale social graphs | 9 | 0.59 | 2013 |
PROTEUS: network performance forecast for real-time, interactive mobile applications | 52 | 1.84 | 2013 |
Collaborative TCP sequence number inference attack: how to crack sequence number under a second | 36 | 1.26 | 2012 |
COMET: code offload by migrating execution transparently | 149 | 5.53 | 2012 |
ADEL: an automatic detector of energy leaks for smartphone applications | 35 | 1.31 | 2012 |
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security | 30 | 1.24 | 2012 |
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. | 10 | 0.68 | 2012 |
Demo: mobile application resource optimizer (ARO) | 3 | 0.41 | 2011 |
KnowOps: towards an embedded knowledge base for network management and operations | 2 | 0.38 | 2011 |
Identifying diverse usage behaviors of smartphone apps | 187 | 8.31 | 2011 |