Search the dblp DataBase
Haining Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cheng Jin , Haining Wang , Kang G. Shin Hop-count filtering: an effective defense against spoofed DDoS traffic. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:30-41 [Conf ] Mengjun Xie , Heng Yin , Haining Wang An effective defense against email spam laundering. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:179-190 [Conf ] Shansi Ren , Qun Li , Haining Wang , Xiaodong Zhang Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications. [Citation Graph (0, 0)][DBLP ] DCOSS, 2005, pp:228-243 [Conf ] Hemant Sengar , Duminda Wijesekera , Haining Wang , Sushil Jajodia VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:393-402 [Conf ] Xin Chen , Haining Wang , Shansi Ren DNScup: Strong Cache Consistency Protocol for DNS. [Citation Graph (0, 0)][DBLP ] ICDCS, 2006, pp:40- [Conf ] Haining Wang , Kang G. Shin Robust TCP Congestion Recovery. [Citation Graph (0, 0)][DBLP ] ICDCS, 2001, pp:199-206 [Conf ] Haining Wang , Danlu Zhang , Kang G. Shin SYN-dog: Sniffing SYN Flooding Sources. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:421-428 [Conf ] Xin Chen , Shansi Ren , Haining Wang , Xiaodong Zhang SCOPE: scalable consistency maintenance in structured P2P systems. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:1502-1513 [Conf ] Indra Widjaja , Haining Wang , Steven Wright , Amalendu Chatterjee Scalability Evaluation of Multi-Protocol Over ATM (MPOA). [Citation Graph (0, 0)][DBLP ] INFOCOM, 1999, pp:1505-1512 [Conf ] Haining Wang , Abhijit Bose , Mohamed A. El-Gendy , Kang G. Shin IP Easy-pass: Edge Resource Access Control. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] Haining Wang , Danlu Zhang , Kang G. Shin Detecting SYN Flooding Attacks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2002, pp:- [Conf ] Haining Wang , Kang G. Shin , Hongjie Xin , Douglas S. Reeves A Simple Refinement of Slow-Start of TCP Congestion Control. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:98-105 [Conf ] Shansi Ren , Qun Li , Haining Wang , Xin Chen , Xiaodong Zhang Analyzing Object Detection Quality Under Probabilistic Coverage in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IWQoS, 2005, pp:107-122 [Conf ] Mohamed A. El-Gendy , Abhijit Bose , Haining Wang , Kang G. Shin Statistical Characterization for Per-hop QoS. [Citation Graph (0, 0)][DBLP ] IWQoS, 2003, pp:21-40 [Conf ] Haining Wang , Carey L. Williamson A New Scheme for TCP Congestion Control: Smooth-Start and Dynamic Recovery. [Citation Graph (0, 0)][DBLP ] MASCOTS, 1998, pp:69-76 [Conf ] Mengjun Xie , Keywan Tabatabai , Haining Wang Identifying Low-ProfileWeb Server's IP Fingerprint. [Citation Graph (0, 0)][DBLP ] QEST, 2006, pp:365-374 [Conf ] Haining Wang , Kang G. Shin Layer-4 Service Differentiation and Resource Isolation. [Citation Graph (0, 0)][DBLP ] IEEE Real Time Technology and Applications Symposium, 2002, pp:67-0 [Conf ] Songqing Chen , Haining Wang , Xiaodong Zhang , Bo Shen , Susie Wee Segment-Based Proxy Caching for Internet Streaming Media Delivery. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2005, v:12, n:3, pp:59-67 [Journal ] Haining Wang , Kang G. Shin Robust TCP congestion recovery. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2004, v:13, n:2, pp:103-121 [Journal ] Shansi Ren , Qun Li , Haining Wang , Xin Chen , Xiaodong Zhang A study on object tracking quality under probabilistic coverage in sensor networks. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2005, v:9, n:1, pp:73-76 [Journal ] Haining Wang , Danlu Zhang , Kang G. Shin Change-Point Monitoring for the Detection of DoS Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:4, pp:193-208 [Journal ] Haining Wang , Abhijit Bose , Mohamed A. El-Gendy , Kang G. Shin IP Easy-pass: a light-weight network-edge resource access control. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2005, v:13, n:6, pp:1247-1260 [Journal ] Haining Wang , Kang G. Shin Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:873-884 [Journal ] Shansi Ren , Qun Li , Haining Wang , Xin Chen , Xiaodong Zhang Design and Analysis of Sensing Scheduling Algorithms under Partial Coverage for Object Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2007, v:18, n:3, pp:334-350 [Journal ] Chuan Yue , Mengjun Xie , Haining Wang Automatic Cookie Usage Setting with CookiePicker. [Citation Graph (0, 0)][DBLP ] DSN, 2007, pp:460-470 [Conf ] Lei Guo , Xiaoning Ding , Haining Wang , Qun Li , Songqing Chen , Xiaodong Zhang Exploiting Idle Communication Power to Improve Wireless Network Performance and Energy Efficiency. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Xin Chen , Haining Wang , Shansi Ren , Xiaodong Zhang Maintaining Strong Cache Consistency for the Domain Name System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2007, v:19, n:8, pp:1057-1071 [Journal ] Haining Wang , Cheng Jin , Kang G. Shin Defense against spoofed IP traffic using hop-count filtering. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2007, v:15, n:1, pp:40-53 [Journal ] HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. [Citation Graph (, )][DBLP ] Anti-Phishing in Offense and Defense. [Citation Graph (, )][DBLP ] Modeling and Analysis of a Shared Channel Architecture for Performance Improvement in Optical Burst Switched Networks. [Citation Graph (, )][DBLP ] Detecting covert timing channels: an entropy-based approach. [Citation Graph (, )][DBLP ] Battle of Botcraft: fighting bots in online games with human observational proofs. [Citation Graph (, )][DBLP ] Efficient resource management on template-based web servers. [Citation Graph (, )][DBLP ] SessionMagnifier: a simple approach to secure and convenient kiosk browsing. [Citation Graph (, )][DBLP ] A Collaboration-based Autonomous Reputation System for Email Services. [Citation Graph (, )][DBLP ] Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP ] Fast Detection of Denial-of-Service Attacks on IP Telephony. [Citation Graph (, )][DBLP ] Secure Passwords Through Enhanced Hashing. [Citation Graph (, )][DBLP ] Swift: A Fast Dynamic Packet Filter. [Citation Graph (, )][DBLP ] Model-Based Covert Timing Channels: Automated Modeling and Evasion. [Citation Graph (, )][DBLP ] Measurement and Classification of Humans and Bots in Internet Chat. [Citation Graph (, )][DBLP ] Characterizing insecure javascript practices on the web. [Citation Graph (, )][DBLP ] An automatic HTTP cookie management system. [Citation Graph (, )][DBLP ] PowerTracer: Tracing requests in multi-tier services to save cluster power consumption [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs