Name
Affiliation
Papers
ZHUOQING MORLEY MAO
University of Michigan
149
Collaborators
Citations 
PageRank 
281
5719
363.11
Referers 
Referees 
References 
10892
3098
1997
Search Limit
1001000
Title
Citations
PageRank
Year
On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles00.342022
Vivisecting mobility management in 5G cellular networks00.342022
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols00.342021
A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software10.362021
SkyCore: moving core to the edge for untethered and reliable UAV-based LTE networks10.352021
EMP: edge-assisted multi-vehicle perception20.382021
CVShield - Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment.10.352020
MPBond: efficient network-level collaboration among personal mobile devices00.342020
CSI: inferring mobile ABR video adaptation behavior under HTTPS and QUIC10.352020
A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications00.342019
MP-H2: A Client-only Multipath Solution for HTTP/230.402019
Poster: Characterizing Performance and Power for mmWave 5G on Commodity Smartphones00.342019
Dragon: Scalable, Flexible, and Efficient Traffic Engineering in Software Defined ISP Networks.20.362018
QoE Inference and Improvement Without End-Host Control00.342018
No One In The Middle: Enabling Network Access Control Via Transparent Attribution.00.342018
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.00.342018
Production as a service: A centralized framework for small batch manufacturing10.382017
Android UI Deception Revisited: Attacks and Defenses.10.352016
Understanding On-device Bufferbloat for Cellular Upload.130.582016
Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks.180.712016
Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild130.532015
Poster: Context-Triggered Mobile Network Measurement00.342015
Tango: Accelerating Mobile Applications through Flip-Flop Replication.00.342015
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture50.412015
WACCO and LOKO: Strong Consistency at Global Scale.00.342015
Summary Report for the First NSF Workshop on Mobile Community Measurement Infrastructure00.342015
Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication40.382015
Accelerating Mobile Applications through Flip-Flop Replication270.912015
Mobilyzer: An Open Platform for Controllable Mobile Network Measurements512.242015
Automatic Generation Of Mobile App Signatures From Traffic Observations170.742015
Performance Analysis of Location Profile Routing.00.342014
Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones50.412014
Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET).20.382014
Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis361.372014
Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph240.942014
FLOWR: a self-learning system for classifying mobileapplication traffic50.552014
RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks40.522014
AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users541.842013
An in-depth study of LTE: effect of network protocol and application behavior on performance1455.192013
Panappticon: Event-based tracing to measure mobile application and platform performance260.992013
SocialWatch: detection of online service abuse via large-scale social graphs90.592013
PROTEUS: network performance forecast for real-time, interactive mobile applications521.842013
Collaborative TCP sequence number inference attack: how to crack sequence number under a second361.262012
COMET: code offload by migrating execution transparently1495.532012
ADEL: an automatic detector of energy leaks for smartphone applications351.312012
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security301.242012
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.100.682012
Demo: mobile application resource optimizer (ARO)30.412011
KnowOps: towards an embedded knowledge base for network management and operations20.382011
Identifying diverse usage behaviors of smartphone apps1878.312011
  • 1
  • 2