Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peeking into Spammer Behavior from a Unique Vantage Point., , and . LEET, USENIX Association, (2008)No One In The Middle: Enabling Network Access Control Via Transparent Attribution., , , , , and . AsiaCCS, page 651-658. ACM, (2018)An Initial Investigation of Protocol Customization., , and . FEAST@CCS, page 57-64. ACM, (2017)SoftMoW: a dynamic and scalable software defined architecture for cellular WANs., , and . HotSDN, page 201-202. ACM, (2014)Demo: Mobilyzer: Mobile Network Measurement Made Easy., , , , and . MobiSys, page 467. ACM, (2015)Identifying diverse usage behaviors of smartphone apps., , , , , and . Internet Measurement Conference, page 329-344. ACM, (2011)Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild., , , , , and . Internet Measurement Conference, page 339-345. ACM, (2015)QoE Inference Without Application Control., , , , and . Internet-QoE@SIGCOMM, page 19-24. ACM, (2016)On Network-level Clusters for Spam Detection., , , and . NDSS, The Internet Society, (2010)You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks., , , , , and . NDSS, The Internet Society, (2012)