Author of the publication

Lumos: Identifying and Localizing Diverse Hidden IoT Devices in an Unfamiliar Environment.

, , , and . USENIX Security Symposium, page 1095-1112. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intent-driven composition of resource-management SDN applications., , , and . CoNEXT, page 86-97. ACM, (2018)Shedding light on the structure of internet video quality problems in the wild., , , and . CoNEXT, page 357-368. ACM, (2013)One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon., , , , and . SIGCOMM, page 101-114. ACM, (2016)CS2P: Improving Video Bitrate Selection and Adaptation with Data-Driven Throughput Prediction., , , , , , , and . SIGCOMM, page 272-285. ACM, (2016)Evolution of social-attribute networks: measurements, modeling, and implications using google+., , , , , , and . Internet Measurement Conference, page 131-144. ACM, (2012)A First Look at Performance in Mobile Virtual Network Operators., , , , and . Internet Measurement Conference, page 165-172. ACM, (2014)Coordinated sampling sans Origin-Destination identifiers: Algorithms and analysis., , , and . COMSNETS, page 1-10. IEEE, (2010)Less pain, most of the gain: incrementally deployable ICN., , , , , , , , and . SIGCOMM, page 147-158. ACM, (2013)Understanding internet video viewing behavior in the wild., , , and . SIGMETRICS, page 379-380. ACM, (2013)Accurately Measuring Global Risk of Amplification Attacks using AmpMap., , , , , and . USENIX Security Symposium, page 3881-3898. USENIX Association, (2021)