Login / Signup
Ke Xu
ORCID
Publication Activity (10 Years)
Years Active: 2001-2024
Publications (10 Years): 202
Top Topics
Double Auction
Congestion Control
Video Sharing
E Learning
Top Venues
CoRR
IWQoS
IEEE Netw.
IEEE/ACM Trans. Netw.
</>
Publications
</>
Meng Shen
,
Changyue Li
,
Hao Yu
,
Qi Li
,
Liehuang Zhu
,
Ke Xu
Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Jiazhi Guan
,
Yi Zhao
,
Zhuoer Xu
,
Changhua Meng
,
Ke Xu
,
Youjian Zhao
Adversarial Robust Safeguard for Evading Deep Facial Manipulation.
AAAI
(2024)
Jinzhu Yan
,
Haotian Xu
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
,
Mingwei Xu
,
Jianping Wu
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
NSDI
(2024)
Xuanqi Liu
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
,
Mingwei Xu
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption.
CoRR
(2024)
Jinzhu Yan
,
Haotian Xu
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
,
Mingwei Xu
,
Jianping Wu
Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed.
CoRR
(2024)
Ziqiang Wang
,
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Mengyuan Li
,
Ke Xu
,
Jianping Wu
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack.
CoRR
(2024)
Qi Tan
,
Qi Li
,
Yi Zhao
,
Zhuotao Liu
,
Xiaobing Guo
,
Ke Xu
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
USENIX Security Symposium
(2024)
Yuxiang Yang
,
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Ziqiang Wang
,
Ke Xu
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks.
CoRR
(2024)
Yihao Chen
,
Qilei Yin
,
Qi Li
,
Zhuotao Liu
,
Ke Xu
,
Yi Xu
,
Mingwei Xu
,
Ziqian Liu
,
Jianping Wu
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
CoRR
(2024)
Zhenhua Zou
,
Zhuotao Liu
,
Jinyong Shan
,
Qi Li
,
Ke Xu
,
Mingwei Xu
CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
IACR Cryptol. ePrint Arch.
2024 (2024)
Xiaoli Zhang
,
Wei Geng
,
Yiqiao Song
,
Hongbing Cheng
,
Ke Xu
,
Qi Li
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds.
IEEE/ACM Trans. Netw.
32 (1) (2024)
Peizhuang Cong
,
Yuchao Zhang
,
Wendong Wang
,
Ke Xu
SOHO-FL: A Fast Reconvergent Intra-Domain Routing Scheme Using Federated Learning.
IEEE Netw.
38 (1) (2024)
Meng Shen
,
Changyue Li
,
Qi Li
,
Hao Lu
,
Liehuang Zhu
,
Ke Xu
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services.
USENIX Security Symposium
(2024)
Meng Shen
,
Jing Wang
,
Jie Zhang
,
Qinglin Zhao
,
Bohan Peng
,
Tong Wu
,
Liehuang Zhu
,
Ke Xu
Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning.
IEEE Trans. Netw. Sci. Eng.
11 (3) (2024)
Xiaokun Fan
,
Yali Chen
,
Min Liu
,
Sheng Sun
,
Zhuotao Liu
,
Ke Xu
,
Zhongcheng Li
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off.
IEEE Trans. Veh. Technol.
73 (5) (2024)
Xinhao Deng
,
Qi Li
,
Ke Xu
Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis.
CoRR
(2024)
Sibo Yi
,
Yule Liu
,
Zhen Sun
,
Tianshuo Cong
,
Xinlei He
,
Jiaxing Song
,
Ke Xu
,
Qi Li
Jailbreak Attacks and Defenses Against Large Language Models: A Survey.
CoRR
(2024)
Yuchao Zhang
,
Xiaotian Wang
,
Xiaofeng He
,
Ning Zhang
,
Zibin Zheng
,
Ke Xu
Galaxy: A Scalable BFT and Privacy-Preserving Pub/Sub IoT Data Sharing Framework Based on Blockchain.
IEEE Internet Things J.
11 (3) (2024)
Qi Tan
,
Qi Li
,
Yi Zhao
,
Zhuotao Liu
,
Xiaobing Guo
,
Ke Xu
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach.
CoRR
(2024)
Ke Wang
,
Tianyu Xia
,
Zhangxuan Gu
,
Yi Zhao
,
Shuheng Shen
,
Changhua Meng
,
Weiqiang Wang
,
Ke Xu
E-ANT: A Large-Scale Dataset for Efficient Automatic GUI NavigaTion.
CoRR
(2024)
Yue Xiao
,
Yi He
,
Xiaoli Zhang
,
Qian Wang
,
Renjie Xie
,
Kun Sun
,
Ke Xu
,
Qi Li
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices.
CoRR
(2024)
Yuchao Zhang
,
Haoqiang Huang
,
Ahmed M. Abdelmoniem
,
Gaoxiong Zeng
,
Chenyue Zheng
,
Xirong Que
,
Wendong Wang
,
Ke Xu
FLAIR: A Fast and Low-Redundancy Failure Recovery Framework for Inter Data Center Network.
IEEE Trans. Cloud Comput.
12 (2) (2024)
Guangmeng Zhou
,
Qi Li
,
Yang Liu
,
Yi Zhao
,
Qi Tan
,
Su Yao
,
Ke Xu
FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning.
IEEE/ACM Trans. Netw.
32 (3) (2024)
Yihao Chen
,
Qilei Yin
,
Qi Li
,
Zhuotao Liu
,
Ke Xu
,
Yi Xu
,
Mingwei Xu
,
Ziqian Liu
,
Jianping Wu
Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System.
USENIX Security Symposium
(2024)
Xijia Che
,
Yi He
,
Xuewei Feng
,
Kun Sun
,
Ke Xu
,
Qi Li
BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy.
CoRR
(2024)
Rongwu Xu
,
Zi'an Zhou
,
Tianwei Zhang
,
Zehan Qi
,
Su Yao
,
Ke Xu
,
Wei Xu
,
Han Qiu
Walking in Others' Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias.
CoRR
(2024)
Chengwu Liao
,
Chao Chen
,
Suiming Guo
,
Leye Wang
,
Fuqiang Gu
,
Jing Luo
,
Ke Xu
Enriching Large-Scale Trips With Fine-Grained Travel Purposes: A Semi-Supervised Deep Graph Embedding Framework.
IEEE Trans. Intell. Transp. Syst.
24 (11) (2023)
Meng Shen
,
Ke Ye
,
Xingtong Liu
,
Liehuang Zhu
,
Jiawen Kang
,
Shui Yu
,
Qi Li
,
Ke Xu
Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials
25 (1) (2023)
Xiaoxu Ren
,
Chao Qiu
,
Xiaofei Wang
,
Zhu Han
,
Ke Xu
,
Haipeng Yao
,
Song Guo
AI-Bazaar: A Cloud-Edge Computing Power Trading Framework for Ubiquitous AI Services.
IEEE Trans. Cloud Comput.
11 (3) (2023)
Peizhuang Cong
,
Yuchao Zhang
,
Lei Wang
,
Wendong Wang
,
Xiangyang Gong
,
Tong Yang
,
Dan Li
,
Ke Xu
DIT and Beyond: Interdomain Routing With Intradomain Awareness for IIoT.
IEEE Internet Things J.
10 (23) (2023)
Suiming Guo
,
Qianrong Shen
,
Zhiquan Liu
,
Chao Chen
,
Chaoxiong Chen
,
Jingyuan Wang
,
Zhetao Li
,
Ke Xu
Seeking Based on Dynamic Prices: Higher Earnings and Better Strategies in Ride-on-Demand Services.
IEEE Trans. Intell. Transp. Syst.
24 (5) (2023)
Xiaoli Zhang
,
Zhicheng Xu
,
Hongbing Cheng
,
Tong Che
,
Ke Xu
,
Weiqiang Wang
,
Wenbiao Zhao
,
Chunping Wang
,
Qi Li
Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification.
ICDCS
(2023)
Peiyang Li
,
Ye Wang
,
Qi Li
,
Zhuotao Liu
,
Ke Xu
,
Ju Ren
,
Zhiying Liu
,
Ruilin Lin
Learning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains.
CoRR
(2023)
Qi Li
,
Zhuotao Liu
,
Qi Li
,
Ke Xu
martFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture.
CoRR
(2023)
Guangmeng Zhou
,
Zhuotao Liu
,
Chuanpu Fu
,
Qi Li
,
Ke Xu
An Efficient Design of Intelligent Network Data Plane.
USENIX Security Symposium
(2023)
Haoqiang Huang
,
Yuchao Zhang
,
Ran Wang
,
Qiao Xiang
,
Wendong Wang
,
Xirong Que
,
Ke Xu
FRAVaR: A Fast Failure Recovery Framework for Inter-DC Network.
WCNC
(2023)
Jiahui Chen
,
Yi Zhao
,
Qi Li
,
Xuewei Feng
,
Ke Xu
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Ziqiang Wang
,
Ke Xu
,
Guang Cheng
,
Xiaoliang Wang
,
Shenglin Jiang
,
Yi Cai
A Negotiation-Based Scheme for Interconnecting Heterogeneous Networks With Enhanced Services.
IEEE Netw.
37 (5) (2023)
Shuaipeng Zhu
,
Tong Li
,
Xinyu Ma
,
Yinfeng Zhu
,
Taotao Zhang
,
Senzhen Liu
,
Haiyang Wang
,
Ke Xu
Poster: PolyCC: Poly-Algorithmic Congestion Control.
SIGCOMM
(2023)
Pengmiao Li
,
Yuchao Zhang
,
Huahai Zhang
,
Wendong Wang
,
Ke Xu
,
Zhili Zhang
A delayed eviction caching replacement strategy with unified standard for edge servers.
Comput. Networks
230 (2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Ke Xu
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects.
SP
(2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Yuxiang Yang
,
Ke Xu
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects.
ACM TUR-C
(2023)
Xu Yan
,
Tong Li
,
Bo Wu
,
Cheng Luo
,
Fuyu Wang
,
Haiyang Wang
,
Ke Xu
Poster: TOO: Accelerating Loss Recovery by Taming On-Off Traffic Patterns.
SIGCOMM
(2023)
Huihong Wei
,
Yi Zhao
,
Ke Xu
G-Routing: Graph Neural Networks-Based Flexible Online Routing.
IEEE Netw.
37 (4) (2023)
Yuchao Zhang
,
Huahai Zhang
,
Peizhuang Cong
,
Wendong Wang
,
Ke Xu
Grandet: Cost-aware Traffic Scheduling without Prior Knowledge in SD-WAN.
IWQoS
(2023)
Xiaoliang Wang
,
Zhuotao Liu
,
Qi Li
,
Yangfei Guo
,
Sitong Ling
,
Jiangou Zhan
,
Yi Xu
,
Ke Xu
Secure Inter-domain Routing and Forwarding via Verifiable Forwarding Commitments.
CoRR
(2023)
Xinhao Deng
,
Qilei Yin
,
Zhuotao Liu
,
Xiyuan Zhao
,
Qi Li
,
Mingwei Xu
,
Ke Xu
,
Jianping Wu
Robust Multi-tab Website Fingerprinting Attacks in the Wild.
SP
(2023)
Xinle Du
,
Ke Xu
,
Lei Xu
,
Kai Zheng
,
Meng Shen
,
Bo Wu
,
Tong Li
R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers.
IEEE/ACM Trans. Netw.
31 (2) (2023)
Meng Shen
,
Kexin Ji
,
Zhenbo Gao
,
Qi Li
,
Liehuang Zhu
,
Ke Xu
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
USENIX Security Symposium
(2023)
Yi Zhao
,
Meina Qiao
,
Haiyang Wang
,
Rui Zhang
,
Dan Wang
,
Ke Xu
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework.
IEEE/ACM Trans. Netw.
31 (2) (2023)
Tong Li
,
Wei Liu
,
Xinyu Ma
,
Shuaipeng Zhu
,
Jingkun Cao
,
Senzhen Liu
,
Taotao Zhang
,
Yinfeng Zhu
,
Bo Wu
,
Ke Xu
ART: Adaptive Retransmission for Wide-Area Loss Recovery in the Wild.
ICNP
(2023)
Chuanpu Fu
,
Qi Li
,
Meng Shen
,
Ke Xu
Frequency Domain Feature Based Robust Malicious Traffic Detection.
IEEE/ACM Trans. Netw.
31 (1) (2023)
Tianyu Xia
,
Shuheng Shen
,
Su Yao
,
Xinyi Fu
,
Ke Xu
,
Xiaolong Xu
,
Xing Fu
Differentially Private Learning with Per-Sample Adaptive Clipping.
AAAI
(2023)
Chuanpu Fu
,
Qi Li
,
Ke Xu
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
NDSS
(2023)
Songtao Fu
,
Qi Li
,
Min Zhu
,
Xiaoliang Wang
,
Su Yao
,
Yangfei Guo
,
Xinle Du
,
Ke Xu
MASK: Practical Source and Path Verification Based on Multi-AS-Key.
IEEE/ACM Trans. Netw.
31 (4) (2023)
Yuqi Qing
,
Qilei Yin
,
Xinhao Deng
,
Yihao Chen
,
Zhuotao Liu
,
Kun Sun
,
Ke Xu
,
Jia Zhang
,
Qi Li
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
CoRR
(2023)
Yi He
,
Roland Guo
,
Yunlong Xing
,
Xijia Che
,
Kun Sun
,
Zhuotao Liu
,
Ke Xu
,
Qi Li
Cross Container Attacks: The Bewildered eBPF on Clouds.
USENIX Security Symposium
(2023)
Linjie Tong
,
Ke Xu
,
Jiarun Hu
,
Flavio Ferrarotti
,
Klaus-Dieter Schewe
Exploration of Reflective ASMs for Security.
ABZ
(2023)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Zhiyun Qian
,
Gang Zhao
,
Xiaohui Kuang
,
Chuanpu Fu
,
Ke Xu
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.
USENIX Security Symposium
(2022)
Tong Li
,
Ke Xu
,
Hanlin Huang
,
Xinle Du
,
Kai Zheng
WIP: When RDMA Meets Wireless.
WoWMoM
(2022)
Yi Zhao
,
Ke Xu
,
Qi Li
,
Haiyang Wang
,
Dan Wang
,
Min Zhu
Intelligent networking in adversarial environment: challenges and opportunities.
Sci. China Inf. Sci.
65 (7) (2022)
Suiming Guo
,
Chao Chen
,
Jingyuan Wang
,
Yan Ding
,
Yaxiao Liu
,
Ke Xu
,
Zhiwen Yu
,
Daqing Zhang
A Force-Directed Approach to Seeking Route Recommendation in Ride-on-Demand Service Using Multi-Source Urban Data.
IEEE Trans. Mob. Comput.
21 (6) (2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Chuanpu Fu
,
Ke Xu
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.
IEEE/ACM Trans. Netw.
30 (1) (2022)
Peizhuang Cong
,
Yuchao Zhang
,
Bin Liu
,
Wendong Wang
,
Zehui Xiong
,
Ke Xu
A&B: AI and Block-Based TCAM Entries Replacement Scheme for Routers.
IEEE J. Sel. Areas Commun.
40 (9) (2022)
Peiyang Li
,
Ye Wang
,
Zhuotao Liu
,
Ke Xu
,
Qian Wang
,
Chao Shen
,
Qi Li
Verifying the Quality of Outsourced Training on Clouds.
ESORICS (2)
(2022)
Chengwu Liao
,
Chao Chen
,
Suiming Guo
,
Zhu Wang
,
Yaxiao Liu
,
Ke Xu
,
Daqing Zhang
Wheels Know Why You Travel: Predicting Trip Purpose via a Dual-Attention Graph Embedding Network.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
6 (1) (2022)
Yi Zhao
,
Ke Xu
,
Jiahui Chen
,
Qi Tan
Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges.
IEEE Netw.
36 (5) (2022)
Songtao Fu
,
Qi Li
,
Xiaoliang Wang
,
Su Yao
,
Xuewei Feng
,
Ziqiang Wang
,
Xinle Du
,
Kao Wan
,
Ke Xu
D3: Lightweight Secure Fault Localization in Edge Cloud.
ICDCS
(2022)
Xuewei Feng
,
Qi Li
,
Kun Sun
,
Ke Xu
,
Baojun Liu
,
Xiaofeng Zheng
,
Qiushi Yang
,
Haixin Duan
,
Zhiyun Qian
PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
NDSS
(2022)
Peizhuang Cong
,
Yuchao Zhang
,
Lei Wang
,
Hao Ni
,
Wendong Wang
,
Xiangyang Gong
,
Tong Yang
,
Dan Li
,
Ke Xu
Break the Blackbox! Desensitize Intra-domain Information for Inter-domain Routing.
IWQoS
(2022)
Yi Zhao
,
Qi Tan
,
Xiaohua Xu
,
Hui Su
,
Dan Wang
,
Ke Xu
Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective.
IWQoS
(2022)
Wenlong Chen
,
Xiaolin Wang
,
Xiaoliang Wang
,
Ke Xu
,
Sushu Guo
LRVP: Lightweight Real-Time Verification of Intradomain Forwarding Paths.
IEEE Syst. J.
16 (4) (2022)
Tianzhu Zhang
,
Han Qiu
,
Marco Mellia
,
Yuanjie Li
,
Hewu Li
,
Ke Xu
Interpreting AI for Networking: Where We Are and Where We Are Going.
IEEE Commun. Mag.
60 (2) (2022)
Jiahui Chen
,
Yi Zhao
,
Qi Li
,
Ke Xu
FedDef: Robust Federated Learning-based Network Intrusion Detection Systems Against Gradient Leakage.
CoRR
(2022)
Pengmiao Li
,
Yuchao Zhang
,
Wendong Wang
,
Weiliang Meng
,
Yi Zheng
,
Ke Xu
,
Zhili Zhang
: A Self-adaptive cache strategy under the ever-changing access frequency in edge network.
Comput. Commun.
194 (2022)
Yi He
,
Zhenhua Zou
,
Kun Sun
,
Zhuotao Liu
,
Ke Xu
,
Qian Wang
,
Chao Shen
,
Zhi Wang
,
Qi Li
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
USENIX Security Symposium
(2022)
Qiyang Song
,
Jiahao Cao
,
Kun Sun
,
Qi Li
,
Ke Xu
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
ACSAC
(2021)
Meng Shen
,
Hao Yu
,
Liehuang Zhu
,
Ke Xu
,
Qi Li
,
Jiankun Hu
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur.
16 (2021)
Pengmiao Li
,
Yuchao Zhang
,
Wendong Wang
,
Kaichuan Zhao
,
Bo Lian
,
Ke Xu
,
Zhili Zhang
Frend for Edge Servers: Reduce Server Number! Keeping Service Quality!
HPCC/DSS/SmartCity/DependSys
(2021)
Chuanpu Fu
,
Qi Li
,
Meng Shen
,
Ke Xu
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
CCS
(2021)
Dan Wang
,
Hao Qin
,
Bin Song
,
Ke Xu
,
Xiaojiang Du
,
Mohsen Guizani
Joint resource allocation and power control for D2D communication with deep reinforcement learning in MCC.
Phys. Commun.
45 (2021)
Meng Shen
,
Zhenbo Gao
,
Liehuang Zhu
,
Ke Xu
Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning.
IWQoS
(2021)
Songtao Fu
,
Ke Xu
,
Qi Li
,
Xiaoliang Wang
,
Su Yao
,
Yangfei Guo
,
Xinle Du
MASK: Practical Source and Path Verification based on Multi-AS-Key.
IWQoS
(2021)
Meng Shen
,
Minghui Wang
,
Ke Xu
,
Liehuang Zhu
Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs.
IWQoS
(2021)
Guangmeng Zhou
,
Ke Xu
,
Qi Li
,
Yang Liu
,
Yi Zhao
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning.
CoRR
(2021)
Ke Xu
,
Yong Zheng
,
Su Yao
,
Bo Wu
,
Xiao Xu
NetSpirit: A Smart Collaborative Learning Framework for DDoS Attack Detection.
IEEE Netw.
35 (6) (2021)
Tong Li
,
Kai Zheng
,
Ke Xu
,
Yong Cui
Acknowledgment on Demand for Transport Control.
IEEE Internet Comput.
25 (2) (2021)
Pengmiao Li
,
Yuchao Zhang
,
Huahai Zhang
,
Wendong Wang
,
Ke Xu
,
Zhili Zhang
CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge Server.
MSN
(2021)
Xiangxiang Wang
,
Jiangchuan Liu
,
Fangxin Wang
,
Ke Xu
Demystifying the Relationship Between Network Latency and Mobility on High-Speed Rails: Measurement and Prediction.
IWQoS
(2021)
Yuchao Zhang
,
Xiaohui Nie
,
Junchen Jiang
,
Wendong Wang
,
Ke Xu
,
Youjian Zhao
,
Martin J. Reed
,
Kai Chen
,
Haiyang Wang
,
Guang Yao
BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation.
IEEE/ACM Trans. Netw.
29 (2) (2021)
Yuchao Zhang
,
Peizhuang Cong
,
Bin Liu
,
Wendong Wang
,
Ke Xu
AIR: An AI-based TCAM Entry Replacement Scheme for Routers.
IWQoS
(2021)
Meng Shen
,
Huan Wang
,
Bin Zhang
,
Liehuang Zhu
,
Ke Xu
,
Qi Li
,
Xiaojiang Du
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J.
8 (4) (2021)
Mingxing Liu
,
Ying Liu
,
Ke Xu
,
Lin He
,
Xiaoliang Wang
,
Yangfei Guo
,
Weiyu Jiang
TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation.
MSN
(2021)
Peizhuang Cong
,
Yuchao Zhang
,
Wendong Wang
,
Ke Xu
,
Ruidong Li
,
Fuliang Li
A Deep Reinforcement Learning-based Routing Scheme with Two Modes for Dynamic Networks.
ICC
(2021)
Peizhuang Cong
,
Yuchao Zhang
,
Zheli Liu
,
Thar Baker
,
Hissam Tawfik
,
Wendong Wang
,
Ke Xu
,
Ruidong Li
,
Fuliang Li
A deep reinforcement learning-based multi-optimality routing scheme for dynamic IoT networks.
Comput. Networks
192 (2021)
Yi Zhao
,
Ke Xu
,
Haiyang Wang
,
Bo Li
,
Ruoxi Jia
Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services.
IEEE Netw.
35 (1) (2021)
Chuanpu Fu
,
Qi Li
,
Meng Shen
,
Ke Xu
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis.
CoRR
(2021)
Tong Li
,
Kai Zheng
,
Ke Xu
,
Rahul Arvind Jadhav
,
Tao Xiong
,
Keith Winstein
,
Kun Tan
Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation.
IEEE/ACM Trans. Netw.
29 (6) (2021)
Yi Zhao
,
Ke Xu
,
Haiyang Wang
,
Bo Li
,
Meina Qiao
,
Haobin Shi
MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities.
IEEE Internet Things J.
8 (23) (2021)
Meng Shen
,
Jinpeng Zhang
,
Liehuang Zhu
,
Ke Xu
,
Xiaojiang Du
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur.
16 (2021)