Author of the publication

VSiM: Improving QoE Fairness for Video Streaming in Mobile Environments.

, , , , , , and . INFOCOM, page 1309-1318. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Fuzzy Game-based Energy Efficient Localization in Underwater Sensor Networks., , , , and . SIGCOMM Posters and Demos, page 119-121. ACM, (2019)Multi-Agent Deep Reinforcement Learning for Urban Traffic Light Control in Vehicular Networks., , , , , , and . IEEE Trans. Veh. Technol., 69 (8): 8243-8256 (2020)EcRD: Edge-Cloud Computing Framework for Smart Road Damage Detection and Warning., , , , , and . IEEE Internet Things J., 8 (16): 12734-12747 (2021)Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX., , , , , , and . Sci. China Inf. Sci., (2021)Network Intrusion Detection with Edge-Directed Graph Multi-Head Attention Networks., , , and . CoRR, (2023)ADA: Adaptive Deep Log Anomaly Detector., , , , , and . INFOCOM, page 2449-2458. IEEE, (2020)DeMarking: A Defense for Network Flow Watermarking in Real-Time., , and . CoRR, (2024)EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1579-1591 (2022)Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services., , , , and . ICICS, volume 14252 of Lecture Notes in Computer Science, page 370-382. Springer, (2023)An Input-Aware Mimic Defense Theory and its Practice., , , , , and . CoRR, (2022)