Author of the publication

The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links.

, , , , , , and . USENIX Security Symposium, page 19-36. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures., , , , , , and . IEEE/ACM Trans. Netw., 30 (5): 2158-2172 (2022)TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN., , , and . MSN, volume 747 of Communications in Computer and Information Science, page 483-496. Springer, (2017)Less is More: Mitigating Tor Traffic Correlation with Distance-Aware Path Selection., , , and . HPCC/DSS/SmartCity/DependSys, page 538-545. IEEE, (2022)RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features., , , , and . ICC, page 5240-5246. IEEE, (2023)Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots., , , , , , and . DIMVA, volume 13358 of Lecture Notes in Computer Science, page 197-217. Springer, (2022)SEC: Secure, Efficient, and Compatible Source Address Validation with Packet Tags., , and . IPCCC, page 1-8. IEEE, (2020)Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace., , , , and . ACSAC, page 260-272. ACM, (2021)Aspect Is Not You Need: No-aspect Differential Sentiment Framework for Aspect-based Sentiment Analysis., , , , and . NAACL-HLT, page 1599-1609. Association for Computational Linguistics, (2022)From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding., , , , , and . CIAT, page 407-413. ACM, (2020)cSFC: Building Credible Service Function Chain on the Cloud., , , , and . GLOBECOM, page 1-6. IEEE, (2019)