default search action
Kai Bu
Person information
- affiliation: Zhejiang University, College of Computer Science and Technology, Hangzhou, China
- affiliation (2009 - 2013): Hong Kong Polytechnic University, Department of Computer Science, Kowloon, Hong Kong
- affiliation (until 2009): Nanjing University of Posts and Telecommunications, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j37]Anxiao He, Kai Bu, Jiongrui Huang, Yifei Pang, Qianping Gu, Kui Ren:
SwiftParade: Anti-Burst Multipath Validation. IEEE Trans. Dependable Secur. Comput. 21(4): 2720-2734 (2024) - [j36]Mengming Li, Kai Bu, Chenlu Miao, Kui Ren:
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks. IEEE Trans. Dependable Secur. Comput. 21(5): 4574-4588 (2024) - 2023
- [j35]Jingsen Zhu, Mengming Li, Xingjian Zhang, Kai Bu, Miao Zhang, Tianqi Song:
Hitchhiker: Accelerating ORAM With Dynamic Scheduling. IEEE Trans. Computers 72(8): 2321-2335 (2023) - [j34]Anxiao He, Xiang Li, Jiandong Fu, Haoyu Hu, Kai Bu, Chenlu Miao, Kui Ren:
Hummingbird: Dynamic Path Validation With Hidden Equal-Probability Sampling. IEEE Trans. Inf. Forensics Secur. 18: 1268-1282 (2023) - [j33]Shaoke Xi, Kai Bu, Wensen Mao, Xiaoyu Zhang, Kui Ren, Xinxin Ren:
RuleOut Forwarding Anomalies for SDN. IEEE/ACM Trans. Netw. 31(1): 395-407 (2023) - 2022
- [j32]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, Ting Wang:
Adversarial CAPTCHAs. IEEE Trans. Cybern. 52(7): 6095-6108 (2022) - 2021
- [j31]Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, Shigeng Zhang:
Securing middlebox policy enforcement in SDN. Comput. Networks 193: 108099 (2021) - [j30]Kai Bu, Avery Laird, Yutian Yang, Linfeng Cheng, Jiaqing Luo, Yingjiu Li, Kui Ren:
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation. ACM Comput. Surv. 53(5): 104:1-104:34 (2021) - 2020
- [j29]Lin Ma, Kai Bu, Ningchao Wu, Tianxiang Luo, Kui Ren:
Atlas: A First Step Toward Multipath Validation. Comput. Networks 173: 107224 (2020) - [j28]Anxiao He, Kai Bu, Yucong Li, Eikoh Chida, Qianping Gu, Kui Ren:
Atomos: Constant-Size Path Validation Proof. IEEE Trans. Inf. Forensics Secur. 15: 3832-3847 (2020) - [j27]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-preserving Network Path Validation. ACM Trans. Internet Techn. 20(1): 5:1-5:27 (2020) - 2019
- [j26]Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song, You Li:
A lightweight policy enforcement system for resource protection and management in the SDN-based cloud. Comput. Networks 161: 68-81 (2019) - [j25]Yinbo Yu, Xing Li, Kai Bu, Yan Chen, Jianfeng Yang:
Falcon: Differential fault localization for SDN control plane. Comput. Networks 162 (2019) - [j24]Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen, Jianfeng Yang, Liang Zhang, Kang Cheng, Xin Xiao:
Fault Management in Software-Defined Networking: A Survey. IEEE Commun. Surv. Tutorials 21(1): 349-392 (2019) - [j23]Jia Liu, Bin Xiao, Xuan Liu, Kai Bu, Lijun Chen, Changhai Nie:
Efficient Polling-Based Information Collection in RFID Systems. IEEE/ACM Trans. Netw. 27(3): 948-961 (2019) - 2018
- [j22]Kai Bu, Kaiwen Zhu, Yi Zheng, Yuanyuan Yang, Yutian Yang, Linfeng Cheng:
Fastlane-ing more flows with less bandwidth for software-Defined networking. Comput. Networks 147: 98-111 (2018) - [j21]Kai Bu, Yingjiu Li:
Every Step You Take, I'll Be Watching You: Practical StepAuth-Entication of RFID Paths. IEEE Trans. Inf. Forensics Secur. 13(4): 834-849 (2018) - 2017
- [j20]Kai Bu, Minyu Weng, Yi Zheng, Bin Xiao, Xuan Liu:
You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID. IEEE Commun. Surv. Tutorials 19(3): 1682-1700 (2017) - [j19]Kai Bu, Bin Xiao, Yi Qian:
High performance and security in cloud computing. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j18]Xitao Wen, Kai Bu, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen, Jianfeng Yang, Xue Leng:
RuleScope: Inspecting Forwarding Faults for Software-Defined Networking. IEEE/ACM Trans. Netw. 25(4): 2347-2360 (2017) - 2016
- [j17]Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, Shigeng Zhang:
Who stole my cheese?: Verifying intactness of anonymous RFID systems. Ad Hoc Networks 36: 111-126 (2016) - [j16]Xuan Liu, Shigeng Zhang, Kai Bu:
A locality-based range-free localization algorithm for anisotropic wireless sensor networks. Telecommun. Syst. 62(1): 3-13 (2016) - [j15]Xuan Liu, Shigeng Zhang, Bin Xiao, Kai Bu:
Flexible and Time-Efficient Tag Scanning with Handheld Readers. IEEE Trans. Mob. Comput. 15(4): 840-852 (2016) - [j14]Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates. IEEE/ACM Trans. Netw. 24(6): 3856-3869 (2016) - 2015
- [j13]Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, Alvin Chan:
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems. IEEE Trans. Computers 64(11): 3265-3277 (2015) - [j12]Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang, Minyu Weng:
Deterministic Detection of Cloning Attacks for Anonymous RFID Systems. IEEE Trans. Ind. Informatics 11(6): 1255-1266 (2015) - [j11]Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu:
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution. IEEE Trans. Parallel Distributed Syst. 26(6): 1775-1788 (2015) - 2014
- [j10]Kai Bu, Xuan Liu, Bin Xiao:
Approaching the time lower bound on cloned-tag identification for large RFID systems. Ad Hoc Networks 13: 271-281 (2014) - [j9]Wei Yi, Hui Xu, Kai Bu, Nan Li:
A new differential RAID for high reliable All Flash Array. IEICE Electron. Express 11(23): 20141007 (2014) - [j8]Qingjun Xiao, Bin Xiao, Kai Bu, Jiannong Cao:
Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach. IEEE/ACM Trans. Netw. 22(2): 608-621 (2014) - 2013
- [j7]Zhixin Sun, Bingqing Luo, Yadang Chen, Kai Bu:
Secure P2P topology based on a multidimensional DHT space mapping. Sci. China Inf. Sci. 56(5): 1-14 (2013) - [j6]Qingjun Xiao, Kai Bu, Bin Xiao, Limin Sun:
Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems. Concurr. Comput. Pract. Exp. 25(14): 2080-2097 (2013) - [j5]Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei:
Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Inf. Forensics Secur. 8(3): 429-439 (2013) - [j4]Qingjun Xiao, Kai Bu, Zhijun Wang, Bin Xiao:
Robust localization against outliers in wireless sensor networks. ACM Trans. Sens. Networks 9(2): 24:1-24:26 (2013) - [j3]Jiaqing Luo, Bin Xiao, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - 2012
- [j2]Kai Bu, Qingjun Xiao, Zhixin Sun, Bin Xiao:
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks. Comput. Commun. 35(13): 1549-1560 (2012) - [j1]Kai Bu, Bin Xiao, Qingjun Xiao, Shigang Chen:
Efficient Misplaced-Tag Pinpointing in Large RFID Systems. IEEE Trans. Parallel Distributed Syst. 23(11): 2094-2106 (2012)
Conference and Workshop Papers
- 2024
- [c33]Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren:
Symphony: Path Validation at Scale. NDSS 2024 - 2022
- [c32]Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, Kai Bu:
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks. CVPR 2022: 13337-13347 - [c31]Mengming Li, Chenlu Miao, Yilong Yang, Kai Bu:
unXpec: Breaking Undo-based Safe Speculation. HPCA 2022: 98-112 - [c30]Chenlu Miao, Kai Bu, Mengming Li, Shaowu Mao, Jianwei Jia:
SwiftDir: Secure Cache Coherence without Overprotection. MICRO 2022: 662-677 - 2020
- [c29]Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren:
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. NDSS 2020 - 2019
- [c28]Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, Ruijie Quan:
Thinking inside the Box: Differential Fault Localization for SDN Control Plane. IM 2019: 353-359 - 2018
- [c27]Weixin Liang, Kai Bu, Ke Li, Jinhong Li, Arya Tavakoli:
MemCloak: Practical Access Obfuscation for Untrusted Memory. ACSAC 2018: 187-197 - [c26]Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, Shigeng Zhang:
FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking. INFOCOM 2018: 396-404 - [c25]Xue Leng, Kaiyu Hou, Yan Chen, Kai Bu, Libin Song:
SDNKeeper: Lightweight Resource Protection and Management System for SDN-Based Cloud. IWQoS 2018: 1-10 - 2016
- [c24]Min Huang, Kai Bu, Hanlin Wang, Kaiwen Zhu:
Reviving Android Malware with DroidRide: And How Not To. CyberC 2016: 27-34 - [c23]Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu:
One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems. ICC 2016: 1-6 - [c22]Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, Chengchen Hu:
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches. ICDCS 2016: 179-188 - [c21]Kai Bu, Minyu Weng, Junze Bao, Zhenchao Lin, Zhikui Xu:
Toward Taming Policy Enforcement for SDN in the RIGHT Way: Or Can We? ICDCS Workshops 2016: 122-127 - [c20]Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen:
Is every flow on the right track?: Inspect SDN forwarding with RuleScope. INFOCOM 2016: 1-9 - 2015
- [c19]Kai Bu:
Gotta tell you switches only once: Toward bandwidth-efficient flow setup for SDN. INFOCOM Workshops 2015: 492-497 - [c18]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - 2014
- [c17]Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary:
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath. ACSAC 2014: 76-85 - [c16]Danghui Wang, Jie Guo, Kai Bu, Yiran Chen:
Reduction of data prevention cost and improvement of reliability in MLC NAND flash storage system. ICNC 2014: 259-263 - [c15]Kai Bu, Jia Liu, Bin Xiao, Xuan Liu, Shigeng Zhang:
Intactness verification in anonymous RFID systems. ICPADS 2014: 134-141 - [c14]Jia Liu, Bin Xiao, Kai Bu, Lijun Chen:
Efficient distributed query processing in large RFID-enabled supply chains. INFOCOM 2014: 163-171 - [c13]Xuan Liu, Bin Xiao, Kai Bu, Shigeng Zhang:
LOCK: A fast and flexible tag scanning mechanism with handheld readers. IWQoS 2014: 360-369 - [c12]Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang:
Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems. MASS 2014: 416-424 - [c11]Xitao Wen, Chunxiao Diao, Xun Zhao, Yan Chen, Li Erran Li, Bo Yang, Kai Bu:
Compiling minimum incremental update for modular SDN languages. HotSDN 2014: 193-198 - 2013
- [c10]Fei Wang, Bin Xiao, Kai Bu, Jinshu Su:
Detect and identify blocker tags in tree-based RFID systems. ICC 2013: 2133-2137 - [c9]Kai Bu, Xuan Liu, Jiwei Li, Bin Xiao:
Less is More: Efficient RFID-Based 3D Localization. MASS 2013: 86-94 - [c8]Jiwei Li, Kai Bu, Xuan Liu, Bin Xiao:
ENDA: embracing network inconsistency for dynamic application offloading in mobile cloud computing. MCC@SIGCOMM 2013: 39-44 - 2012
- [c7]Qiang Liu, Hongshan Nie, Kai Bu, Husheng Liu, Zhaolin Sun, Miao Li, Qiyou Xie:
An Efficient Flash-Based Remote Sense Image Storage Approach for Fast Access Geographic Information System. ICDMA 2012: 175-178 - [c6]Kai Bu, Xuan Liu, Bin Xiao:
Fast cloned-tag identification protocols for large-scale RFID systems. IWQoS 2012: 1-4 - [c5]Xuan Liu, Shigeng Zhang, Kai Bu, Bin Xiao:
Complete and fast unknown tag identification in large RFID systems. MASS 2012: 47-55 - 2011
- [c4]Qingjun Xiao, Kai Bu, Bin Xiao:
Efficient Monitoring of Dynamic Tag Populations in RFID Systems. EUC 2011: 106-113 - [c3]Kai Bu, Bin Xiao, Qingjun Xiao, Shigang Chen:
Efficient pinpointing of misplaced tags in large RFID systems. SECON 2011: 287-295 - 2009
- [c2]Zhixin Sun, Kai Bu, Ke Ding:
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT. Infoscale 2009: 192-205 - 2008
- [c1]Kai Bu, Zhixin Sun:
A Method Based on AMHI for DDoS Attacks Detection and Defense. ICYCS 2008: 1571-1576
Informal and Other Publications
- 2021
- [i4]Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, Kai Bu:
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks. CoRR abs/2111.12965 (2021) - 2019
- [i3]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, Ting Wang:
Adversarial CAPTCHAs. CoRR abs/1901.01107 (2019) - [i2]Binanda Sengupta, Yingjiu Li, Kai Bu, Robert H. Deng:
Privacy-Preserving Network Path Validation. IACR Cryptol. ePrint Arch. 2019: 407 (2019) - 2018
- [i1]Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren:
What's (Not) Validating Network Paths: A Survey. CoRR abs/1804.03385 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint