{"id":14,"date":"2019-12-05T04:53:29","date_gmt":"2019-12-04T20:53:29","guid":{"rendered":"http:\/\/47.94.221.113\/index.php\/publications-thuxukegroup\/"},"modified":"2025-12-30T13:02:43","modified_gmt":"2025-12-30T05:02:43","slug":"publications","status":"publish","type":"page","link":"http:\/\/thucsnet.com\/index.php\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"color: #000000;\"><strong>1. Magazine Publications<\/strong><\/span><\/h2>\r\n<div class=\"paragraph\" style=\"text-align: justify;\">\r\n<ul>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Jianping Wu. <span style=\"font-size: medium;\">\u201c<a style=\"color: #000000;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/xuewei_commACM2025.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP\/IP Protocol Suite<\/span><\/a>\u201d, <em>Communications of the ACM<\/em>, 68(3): 48-59, 2025.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ziqiang Wang, Ke Xu, Guang Cheng, Xiaoliang Wang, Shenglin Jiang, Yi Cai. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/ziqiang_network2023.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Negotiation-Based Scheme for Interconnecting Heterogeneous Networks With Enhanced Services<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 37(5): 190-196, 2023.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Peizhuang Cong, Yuchao Zhang, Wendong Wang, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/peizhuang_network2023.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SOHO-FL: A Fast Reconvergent Intra-domain Routing Scheme Using Federated Learning<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Huihong Wei, Yi Zhao, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/huihong_network2023.pdf\">G-Routing: Graph Neural Networks-Based Flexible Online Routing<\/a><\/span>\u201d. <em>IEEE Network<\/em>, 37(4): 90-96, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tianzhu Zhang, Han Qiu, Marco Mellia, Yuanjie Li, Hewu Li, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_mcom2022.pdf\">Interpreting AI for Networking: Where We Are and Where We Are Going<\/a><\/span>\u201d, <em>IEEE Communications Magazine<\/em>, 2022, 60(2): 25-31.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Ke Xu, Jiahui Chen, Qi Tan.<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_network22.pdf\"> \u201cCollaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges\u201d<\/a><\/span>. <em>IEEE Network<\/em>, 36(5): 98-105, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ke Xu, Yong Zheng, Su Yao, Bo Wu, Xiao Xu. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_network2021.pdf\">NetSpirit: A Smart Collaborative Learning Framework for DDoS Attack Detection<\/a><\/span>\u201d,\u00a0 <em>IEEE Network<\/em>, 2021, 35(6): 140-147.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Kai Zheng, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_IEEEInternetComputing21.pdf\">Acknowledgment on Demand for Transport Control<\/a><\/span>\u201d, <em>IEEE Internet Computing<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Ruoxi Jia. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_network21.pdf\">Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2021, 35(1): 163-169.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Su Yao, Jianfeng Guan, Yinan Wu, Ke Xu, Mingwei Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/su_wc20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Toward Secure and Lightweight Access Authentication in SAGINs<\/a><\/span>\u201d,<em> IEEE Wireless Communications<\/em>, 2020, 27(6): 75-81.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Meng Shen, Yiting Liu, Liehuang Zhu, Ke Xu, Xiaojiang Du, Nadra Guizani. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_network20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach<\/a><\/span>\u201d,<em>\u00a0IEEE Network<\/em>, 2020, 34(4): 20-27.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Xiaoliang Wang, Ke Xu,\u00a0Wenlong Chen, Qi Li, Meng Shen, Bo Wu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoliang_network20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">ID-Based SDN for the Internet of Things<\/a><\/span>\u201d,\u00a0<em>IEEE Network<\/em>, 2020, 34(4): 76-83.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Pengmiao Li, Zhili Zhang, Bo Bai, Gong Zhang, Wendong Wang, Bo Liang, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/yuchao_network20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">AutoSight: Distributed Edge Caching in Short Video Network<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2020, 34(3): 194-199.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Bo Wu, Ke Xu, Qi Li, Shoushou Ren, Zhuotao Liu, Zhichao Zhang, <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_network20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks<\/a><\/span>\u201d,\u00a0<em>IEEE Network<\/em>, 2020, 34(2): 30-36.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Lei Xu, Ke Xu, Tong Li, Kai Zheng, Meng Shen, Xiaojiang Du, Xinle Du, <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/lei_network20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">ABQ: Active Buffer Queueing in Datacenters<\/span><\/a>\u201d,\u00a0<em>IEEE Network<\/em>, 2020, 34(2): 232-237.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Zhichao Zhang, Ke Xu, Qi Li, Xin Liu, Lin Li, Bo Wu, Yunzhe Guo, <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhichao_communications20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SecCL: Securing Collaborative Learning Systems via Trusted Bulletin Boards<\/a><\/span>&#8220;,\u00a0<em>IEEE Communications Magazine<\/em>, 2020, 58(1): 47-53.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ziwei Li, Ke Xu, Haiyang Wang, Yi Zhao, Xiaoliang Wang, Meng Shen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/ziwei_network19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Machine-Learning-Based Positioning: A Survey and Future Directions<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2019, 33(3): 96-101.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Su Yao, Jianfeng Guan, Zhiwei Yan, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/su_network19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SI-STIN: A Smart Identifier Framework for Space and Terrestrial Integrated Network<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2019, 33(1): 8-14.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Ke Xu, Haiyang Wang, Qi Li, Tong Li, Xuan Cao, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/yuchao_network17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Going Fast and Fair: Latency Optimization for Cloud-Based Service Chains<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2017, 32(2): 138-143.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Xiaoliang Wang, Wei Wei, Houbing Song, Bo Mao, \u201c<a style=\"color: #000000;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/ke_communications16.pdf\"><span style=\"color: #3366ff;\">Toward Software Defined Smart Home<\/span><\/a>\u201d,\u00a0<em>IEEE Communications Magazine<\/em>,\u00a02016, 54(5): 116-122.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Yi Qu, Kun Yang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/ke_network15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Tutorial on Internet of Things: From A Heterogeneous Network Integration Perspective<\/a><\/span>\u201d, <em>IEEE Network<\/em>, 2016, 30(2): 102-108.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Wenlong Chen, Chuang Lin, Mingwei Xu, Dongchao Ma, Yi Qu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/ke_network14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Toward a practical reconfigurable router: a software component development approach<\/a><\/span>\u201d,\u00a0<em>IEEE Network<\/em>, 2014, 28(5): 74-80.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yong Cui,\u00a0Qi Sun,\u00a0Ke Xu,\u00a0Wendong Wang, Ted Lemon, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/yong_ic14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Configuring IPv4 over IPv6 Networks<\/a><\/span>\u201d,\u00a0<em>IEEE Internet Computing<\/em>, 2014, 18(3): 84-88.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Guangwu Hu,\u00a0Ke\u00a0Xu,\u00a0Jianping Wu, et al. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/guangwu_network13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A general framework of source address validation and traceback for IPv4\/IPv6 transition scenarios<\/a><\/span>\u201d,\u00a0<em>IEEE\u00a0Network<\/em>,\u00a02013, 27(6): 66-73.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Jiangchuan Liu, Haiyang Wang, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/jiangchuan_network10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Understanding Peer Distribution in the Global Internet<\/a><\/span>\u201d,\u00a0<em>IEEE Network,<\/em>\u00a02010, 24(4): 40-44.<\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"color: #000000;\"><strong>2. Journal Publications<\/strong><\/span><\/h2>\r\n<div class=\"paragraph\" style=\"text-align: justify;\">\r\n<ul>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Xu Yan, Bo Wu, Cheng Luo, Fuyu Wang, Jiuxiang Zhu, Haoyi Fang, Xinle Du, Ke Xu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_ton2025_AutoRec.pdf\"><span style=\"color: #3366ff;\">AutoRec: Accelerating Loss Recovery for Live Streaming in a Multi-Supplier Market<\/span><\/a>\u201d, <em>IEEE ToN<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Xinle Du, Xiangyu Gao, Guangmeng Zhou, Hanlin Huang, Zhuotao Liu, Mowei Wang, Kun Tan, Ke Xu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/revisiting_tong_ton2025.pdf\"><span style=\"color: #3366ff;\">Revisiting Random Early Detection Tuning for High-Performance Datacenter Networks<\/span><\/a>\u201d, <em>IEEE ToN<\/em>, 33(5): 2507-2522, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Zhirun Zheng, Zhetao Li, Saiqin Long, Suiming Guo, Chao Chen, Ke Xu, \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhirun_tdsc2025.pdf\"><span style=\"color: #3366ff;\">Pricing Utility vs. Location Privacy: A Differentially Private Data Sharing Framework for Ride-on-Demand Services<\/span><\/a>\u201d, <em>IEEE TDSC<\/em>, 22(4): 3497-3513, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Jinhe Wu, Ke Ye, Ke Xu, Gang Xiong, Liehuang Zhu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tifs2025.pdf\">Robust Detection of Malicious Encrypted Traffic via Contrastive Learning<span style=\"color: #000000;\">\u201d<\/span><\/a><\/span>, <em>IEEE TIFS<\/em>,20: 4228-4242, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Wenbo Yu, Hao Fang, Bin Chen, Xiaohang Sui, Chuan Chen, Hao Wu, Shu-Tao Xia, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wenbo_tifs2025.pdf\">GI-NAS: Boosting Gradient Inversion Attacks Through Adaptive Neural Architecture Search<\/a><\/span>\u201d,\u00a0<em>IEEE TIFS<\/em>,\u00a020: 7648-7662, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jingjing Xue, Sheng Sun, Min Liu, Yuwei Wang, Xuying Meng, Jingyuan Wang, Junbo Zhang, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jingjing_tmc2025.pdf\">Burst-Sensitive Traffic Forecast via Multi-Property Personalized Fusion in Federated Learning<\/a><\/span>\u201d,<em>IEEE TMC<\/em>,\u00a024(7): 5598-5614, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Yukuan Ding, Jiaxin Liang, Kai Zheng, Xu Zhang, Tian Pan, Dan Wang, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_tmc2025.pdf\">Toward Optimal Broadcast Mode in Offline Finding Network<\/a><\/span>\u201d,<em>IEEE TMC<\/em>,\u00a024(7): 6550-6565, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Su Yao, Mu Wang, Ju Ren, Tianyu Xia, Weiqiang Wang, Ke Xu, Mingwei Xu, Hongke Zhang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/su_tmc2025.pdf\">Multi-Agent Reinforcement Learning for Task Offloading in Crowd-Edge Computing<\/a><\/span>\u201d,<em>IEEE TMC<\/em>,\u00a024(10): 9289-9302, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Qi Tan, Yi Zhao, Qi Li, Ke Xu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qi_ton2025.pdf\"><span style=\"color: #3366ff;\">Expediting Federated Learning on Non-IID Data by Maximizing Communication Channel Utilization<\/span><\/a>\u201d, <em>IEEE ToN<\/em>, 33(5): 2336-2351, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Wei Liu, Xinyu Ma, Shuaipeng Zhu, Jingkun Cao, Duling Xu, Zhaoqi Yang, Senzhen Liu, Taotao Zhang, Yinfeng Zhu, Bo Wu, Kezhi Wang, Ke Xu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_computers2025.pdf\"><span style=\"color: #3366ff;\">Accelerating Loss Recovery for Content Delivery Network<\/span><\/a>\u201d, <em>IEEE Transactions on Computers<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xiaoli Zhang, Yiqiao Song, Yuefeng Du, Chengjun Cai, Hongbing Cheng, Ke Xu, Qi Li. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoli_tse2025.pdf\">SmartUpdater: Enabling Transparent, Automated, and Secure Maintenance of Stateful Smart Contracts<\/a><\/span>\u201d, <em>IEEE Transactions on Software Engineering<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Bingyang Liu, Weiyu Jiang, Ke Xu, Qi Li, Chuang Wang, Zongxin Dou, Yanjun Liu, \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_tdsc2025.pdf\">Pisces: In-Path Distributed Denial-of-Service Defense via Efficient Authentication Code Embedded in IP Address<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TDSC<\/em>, 22(4): 3337-3353, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yixiong Ji, Jiahao Cao, Qi Li, Yan Liu, Tao Wei, Ke Xu, Jianping Wu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yixiong_ton2025.pdf\">Constructing SDN Covert Timing Channels Between Hosts With Unprivileged Attackers<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE ToN<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Songsong Xu, Chuanpu Fu, Qi Li, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\">\u201c<a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songsong_ton2025.pdf\">One Model Fits All Nodes\u201d: Neuron Activation Pattern Analysis-Based Attack Traffic Detection Framework for P2P Networks<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE ToN<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Haibin Li, Qi Li, Yingying Su, Xuewei Feng, Chuanpu Fu, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haibin_ton2025.pdf\">StateShield: Real-Time Defenses Against Information Leakage Over Connectionless Protocols<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE ToN<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Xiaofeng He, Xiaotian Wang, Haiyang Wang, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_tii2025.pdf\">DeCross: Toward Accountable and Efficient Cross-Chain Collaboration in IIoT<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TII<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jingjing Xue, Sheng Sun, Min Liu, Qi Li, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jingjing_tifs2025.pdf\">Enhancing Federated Learning Robustness using Locally Benignity-Assessable Bayesian Dropout<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TIFS<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Su Yao, Yiying Lin, Mu Wang, Ke Xu, Mingwei Xu, Changqiao Xu, Hongke Zhang. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/su_jsac2025.pdf\">LEOEdge: A Satellite-Ground Cooperation Platform for the AI Inference in Large LEO Constellation<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE JSAC<\/em>, 43(1): 36-50, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Haoqiang Huang, Ahmed M. Abdelmoniem, Gaoxiong Zeng, Chenyue Zheng, Xirong Que, Wendong Wang, Ke Xu, \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_tcc2024.pdf\">FLAIR: A Fast and Low-Redundancy Failure Recovery Framework for Inter Data Center Network<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TCC<\/em>, 12(2): 737-749, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Zhiyuan Wu, Sheng Sun, Yuwei Wang, Min Liu, Ke Xu, Wen Wang, Xuefeng Jiang, Bo Gao, Jinda Lu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhiyuan_tmc2024.pdf\">FedCache: A Knowledge Cache-Driven Federated Learning Architecture for Personalized Edge Intelligence<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TMC<\/em>, 23(10): 9368-9382, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo, Chao Chen, Zhetao Li, Chengwu Liao, Yaxiao Liu, Ke Xu, Daqing Zhang. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_tmc2024.pdf\">Privacy Leakage From Dynamic Prices: Trip Purpose Mining as an Example<\/a><\/span><span style=\"color: #000000;\">\u201d,<em> IEEE TMC<\/em>, 23(12): 12378-12395, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Sitong Ling, Zhuotao Liu, Qi Li, Xinle Du, Jing Chen, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/sitong_ton2024.pdf\">Stable Byzantine Fault Tolerance in Wide Area Networks With Unreliable Links<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE\/ACM ToN<\/em>, 32(6): 5310-5325, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Luping Xiang, Ke Xu, Jie Hu, Kun Yang. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/luping_tvt2024.pdf\">Green Beamforming Design for Integrated Sensing and Communication Systems: A Practical Approach Using Beam-Matching Error Metrics<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TVT<\/em>, 73(4): 5935-5940, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Jin Meng, Ke Xu, Shui Yu, Liehuang Zhu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tb2024.pdf\">MemDefense: Defending against Membership Inference Attacks in IoT-based Federated Learning via Pruning Perturbations<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE Transactions on Big Data<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Songtao Fu, Qi Li, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang, Xinle Du, Kao Wan, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songtao_tdsc2024.pdf\">Secure Fault Localization in Path Aware Networking<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>IEEE TDSC, 2024<\/em>.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Hanlin Huang, Ke Xu, Tong Li, Zhuotao Liu, Xinle Du, Xiangyu Gao. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hanlin_ton2024_2.pdf\"><span style=\"color: #3366ff;\">DiffECN: Differential ECN Marking for Datacenter Networks<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, 2024.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Hanlin Huang, Xinle Du, Tong Li, Haiyang Wang, Ke Xu, Mowei Wang, Huichen Dai. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hanlin_ton2024.pdf\"><span style=\"color: #3366ff;\">Re-Architecting Buffer Management in Lossless Ethernet<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, 2024.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/Sibo_arXiv2024.pdf\"><span style=\"color: #3366ff;\">Jailbreak Attacks and Defenses Against Large Language Models: A Survey<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>arXiv<\/em>, 2024.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Suiming Guo, Baoying Deng, Chao Chen, Jintao Ke, Jingyuan Wang, Saiqin Long, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_iotj2024.pdf\"><span style=\"color: #3366ff;\">Seeking in Ride-on-demand Service: A Reinforcement Learning Model with Dynamic Price Prediction<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE IoTJ<\/em>, vol.11, no. 18, pp. 29890- <span class=\"fontstyle0\">29910, <\/span>2024.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Xiaoliang Wang, Ke Xu, Yangfei Guo, Haiyang Wang, Songtao Fu, Qi Li, Bin Wu, Jianping Wu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoliang_ton2024.pdf\"><span style=\"color: #3366ff;\">Toward Practical Inter-Domain Source Address Validation<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 32, no. 4, pp. 3126-3141, 2024.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Chuanpu Fu, Qi Li, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_ton2024.pdf\"><span style=\"color: #3366ff;\">Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 32, no. 4, pp. 2972-2987, 2024.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Jing Wang, Jie Zhang, Qinglin Zhao, Bohan Peng, Tong Wu, Liehuang Zhu, Ke Xu.<span style=\"color: #3366ff;\"> <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tnse2024.pdf\">Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-based Federated Learning\u201d<\/a><\/span>, <em>IEEE TNSE<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Xiaotian Wang, Xiaofeng He, Ning Zhang, Zibin Zheng, Ke Xu.<span style=\"color: #3366ff;\"> <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_iot2024.pdf\">Galaxy: A Scalable BFT and Privacy-Preserving Pub\/Sub IoT Data Sharing Framework Based on Blockchain\u201d<\/a><\/span>, <em>IEEE IoTJ<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xiaokun Fan, Yali Chen, Min Liu, Sheng Sun, Zhuotao Liu, Ke Xu, Zhongcheng Li.<span style=\"color: #3366ff;\"> <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaokun_tvt2023.pdf\">UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-off\u201d<\/a><\/span>, <em>IEEE TVT<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Guangmeng Zhou, Qi Li, Yang Liu, Yi Zhao, Qi Tan, Su Yao, Ke Xu.<span style=\"color: #3366ff;\"> <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangmeng_ton24.pdf\">FedPAGE: Pruning Adaptively Toward Global Efficiency of Heterogeneous Federated Learning\u201d<\/a><\/span>, <em>IEEE\/ACM ToN<\/em>, vol. 32, no. 3, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Chengwu Liao, Chao Chen, Suiming Guo, Leye Wang, Fuqiang Gu, Jing Luo, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chengwu_tits2023.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Enriching Large-Scale Trips With Fine-Grained Travel Purposes: A Semi-Supervised Deep Graph Embedding Framework<\/span><\/a>\u201d,\u00a0<em>IEEE TITS<\/em>, vol. 24, no. 11, pp. 13228-13239, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Songtao Fu, Qi Li, Min Zhu, Xiaoliang Wang, Su Yao, Guo Yangfei, Xinle Du, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songtao_ton2023.pdf\"><span style=\"color: #3366ff;\">MASK: Practical Source and Path Verification Based on Multi-AS-Key<\/span><\/a>\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 31, no. 4, pp.1478-1493, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Peizhuang Cong, Yuchao Zhang, Lei Wang, Wendong Wang, Xiangyang Gong, Tong Yang, Dan Li, Ke Xu. <span style=\"font-size: medium;\"><span style=\"color: #000000;\">\u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/peizhuang_iot2023.pdf\"><span style=\"color: #3366ff;\">DIT and Beyond: Inter-domain Routing with Intra-domain Awareness for IIoT<\/span><\/a>\u201d,<\/span>\u00a0<em>IEEE IoTJ<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Xiaoli Zhang, Wei Geng, Yiqiao Song, Hongbing Cheng, Ke Xu, Qi Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoli_ton2023.pdf\"><span style=\"color: #3366ff;\">Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, 2023.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_ton2023.pdf\">Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework<\/a><\/span>\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 31, no. 2, pp. 542-557, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Xinle Du, Ke Xu, Lei Xu, Kai Zheng, Meng Shen, Bo Wu, Tong Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinle_ton2023.pdf\"><span style=\"color: #3366ff;\">R-AQM: Reverse ACK Active Queue Management in Multitenant Data Centers<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 31, no. 2, pp. 526-541, 2023.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_ton23.pdf\"><span style=\"color: #3366ff;\">Frequency Domain Feature Based Robust Malicious Traffic Detection<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 31, no. 1, pp. 452-467, 2023.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo, Qianrong Shen, Zhiquan Liu, Chao Chen, Chaoxiong Chen, Jingyuan Wang, Zhetao Li, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_tits2023.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Seeking Based on Dynamic Prices: Higher Earnings and Better Strategies in Ride-on-Demand Services<\/span><\/a>\u201d,\u00a0<em>IEEE TITS<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Pengmiao\u00a0Li,\u00a0Yuchao\u00a0Zhang,\u00a0Huahai\u00a0Zhang,\u00a0Wendong\u00a0Wang,\u00a0Ke\u00a0Xu,\u00a0Zhili\u00a0Zhang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/Pengmiao_cn23\">A delayed eviction caching replacement strategy with unified standard for edge servers<\/a><\/span>\u201d. <em>Comput Netw<\/em>, vol. 230, pp. 109794, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xiaoxu Ren, Chao Qiu, Xiaofei Wang, Zhu Han, Ke Xu, Haipeng Yao, Song Guo. <span style=\"color: #3366ff;\">\u201c<a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoxu_tocc23.pdf\">AI-Bazaar: A Cloud-Edge Computing Power Trading Framework for Ubiquitous AI Services<\/a>\u201d<\/span>. <em>IEEE Trans on Cloud Comput<\/em>, vol. 11, no. 3, pp. 2337-2348, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Changyue Li, Hao Yu, Qi Li, Liehuang Zhu, Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tdsc23.pdf\">\u201cDecision-based Query Efficient Adversarial Attack via Adaptive Boundary Learning\u201d.<\/a><\/span> <em>TDSC<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Haibin Li, Yi Zhao, Wenbing Yao, Ke Xu, Qi Li. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haibin_sciencechina23.pdf\">\u201cTowards real-time ML-based DDoS detection via cost-efficient window-based feature extraction\u201d<\/a><\/span>. <em>Science<\/em> <em>China Information Sciences<\/em>, 66.5, 152105, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jiahui_Tifs23.pdf\">FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems\u201d<\/a><\/span>.<em> IEEE Trans Inf Forensics Secur<\/em>, vol. 18, pp. 4561\u20134576, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meikang Qiu, Ke Xu, Cheng Zhang, Tianwei Zhang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meikang_tosn2022.pdf\">Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond<\/a><\/span>\u201d,<em>ACM Trans. Sens. Networks<\/em>,\u00a018(4): 51e:1-51e:3, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Su Yao, Mu Wang, Qiang Qu, Ziyi Zhang, Yi-feng Zhang, Ke Xu, Mingwei Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yaosu_jsac2022.pdf\"><span style=\"color: #3366ff;\">Blockchain-Empowered Collaborative Task Offloading for Cloud-Edge-Device Computing<\/span><\/a>\u201d, <em>IEEE JSAC<\/em>, vol. 40, no. 12, pp. 3485-3500, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Ke Ye, Xingtong Liu, Liehuang Zhu, Jiawen Kang, Shui Yu, Qi Li, Ke Xu. \u201c<\/span><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_comst2022.pdf\"><span style=\"color: #3366ff;\">Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey<span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u201d<\/span><\/span><\/span><\/a><\/span><span style=\"color: #000000;\">, <em>IEEE Communications Surveys &amp; Tutorials<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Chengwu Liao, Chao Chen, Suiming Guo, Leye Wang, Fuqiang Gu, Jing Luo, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chengwu_tits2022.pdf\">Enriching Large-Scale Trips With Fine-Grained Travel Purposes: A Semi-Supervised Deep Graph Embedding Framework<\/a><\/span>\u201d, <em>IEEE TITS<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Peizhuang Cong, Yuchao Zhang, Bin Liu, Wendong Wang, Zehui Xiong, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/thucsnet.com\/wp-content\/papers\/yuchao_jsac2022.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A&amp;B: AI and Block-based TCAM Entries Replacement Scheme for Routers<\/a><\/span>\u201d, <em>IEEE JSAC<\/em>, vol. 40, no. 9, pp. 2643-2661, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Wenlong Chen, Xiaolin Wang, Xiaoliang Wang, Ke Xu, Sushu Guo. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wenlong_system2022.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">LRVP: Lightweight Real-Time Verification of Intradomain Forwarding Paths<\/span>\u201d<\/a>, <em>IEEE System Journal<\/em>, vol. 16, no. 4, 6309- 6320, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo, Chao Chen, Jingyuan Wang, Yan Ding, Yaxiao Liu, Ke Xu, Zhiwen Yu, Daqing Zhang. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_tmc2022.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">A Force-directed Approach to Seeking Route Recommendation in Ride-on-demand Service Using Multi-source Urban Data<\/span>\u201d<\/a>,\u00a0<em>IEEE TMC<\/em>, vol. 21, no. 6, pp. 1909-1926, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Qi Li, Kun Sun, Chuanpu Fu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ton22.pdf\">Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID<\/a><\/span>\u201d, <em>IEEE\/ACM ToN<\/em>, vol. 30, no. 1, pp. 409-422, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Pengmiao Li, Yuchao Zhang, Wendong Wang, Weiliang Meng, Yi Zheng, Ke Xu, Zhili Zhang. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/pengmiao_cc_22.pdf\">\u201cChameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network.&#8221;<\/a><\/span> <em>Comput Commun<\/em>, vol. 194, pp. 301-310, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Ke Xu, Qi Li, Haiyang Wang, Dan Wang, Min Zhu. <span style=\"color: #3366ff;\">\u201c<a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_science_china22.pdf\">Intelligent networking in adversarial environment: challenges and opportunities\u201d<\/a><\/span>. <em>Science China Information Sciences<\/em>, 65.7, 170301, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Hao Yu, Liehuang Zhu, Ke Xu, Qi Li, Jiankun Hu. \u201c<\/span><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tifs21_2.pdf\"><span style=\"color: #3366ff;\">Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems<span style=\"color: #000000;\">\u201d<\/span><\/span><\/a><\/span><span style=\"color: #000000;\">, <em>IEEE TIFS<\/em>, vol. 16, pp. 4063-4077, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Kai Zheng, Ke Xu, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein, Kun Tan. <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_ton21.pdf\"><span style=\"color: #3366ff;\">Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation<\/span><\/a>\u201d, <em>IEEE\/ACM ToN<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Meina Qiao, Haobin Shi. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_iotj21.pdf\">MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities<\/a><\/span>\u201d, <em>IEEE IoTJ<\/em>, vol. 8, no. 23, pp. 16933-16945, 2021.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Peizhuang Cong, Yuchao Zhang, Zheli Liu, Thar Baker, Hissam Tawfik, Wendong Wang, Ke Xu, Ruidong Li, Fuliang Li. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_cn21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Deep Reinforcement Learning-based Multi-optimality Routing Scheme for Dynamic IoT Networks<\/a><\/span>\u201d, <em>Computer Networks<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Xiaohui Nie, Junchen Jiang, Wendong Wang, Ke Xu, Youjian Zhao, Martin J. Reed, Kai Chen, Haiyang Wang, Guang Yao. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_ton21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BDS+: An Inter-Datacenter Data Replication System With Dynamic Bandwidth Separation<\/a><\/span>\u201d, <em>IEEE ToN<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Meng Shen, Huan Wang, Bin Zhang, Liehuang Zhu, Ke Xu, Qi Li, Xiaojiang Du. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iotj21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing<\/a><\/span>\u201d, <em>IEEE IoTJ<\/em>, vol. 8, no. 4, pp. 2265-2275, 2021.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Meng Shen, Jianpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tifs21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks<\/a><\/span>\u201d,<em>\u00a0IEEE TIFS<\/em>, vol. 16, pp. 2367-2380, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Zhiwen Yu, Daqing Zhang, Dah-Ming Chiu. <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_tmc20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">ROD-Revenue: Seeking Strategies Analysis and Revenue Prediction in Ride-on-demand Service Using Multi-source Urban Data<\/span><\/a>\u201d,\u00a0<em>IEEE TMC<\/em>, vol. 19, no. 9, pp. 2202-2220, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Ke Xu, Yifeng Zhong, Xiang-Yang Li, Ning Wang, Hui Su, Meng Shen, Ziwei Li. <span style=\"color: #3366ff;\"><span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_cn20.pdf\">Incentive Mechanisms for Mobile Data Offloading Through Operator-owned WiFi Access Points<\/a><\/span>\u201d,\u00a0<em>Computer Networks<\/em>, vol. 174, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Laizhong Cui, Shu Yang, Ziteng Chen, Yi Pan, Mingwei Xu, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/laizhong_TII20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An Efficient and Compacted DAG-based Blockchain Protocol for Industrial Internet of Things<\/a><\/span>\u201d, <em>IEEE TII<\/em>, vol.16, no. 6, pp. 4143-4145, 2020.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Meng Shen, Jie Zhang, Liehuang Zhu, Ke Xu, Xiangyun Tang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tvt20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Secure SVM Training over Vertically-Partitioned Datasets using Consortium Blockchain for Vehicular Social Networks<\/a><\/span>\u201d, <em>IEEE TVT<\/em>, vol. 69, no. 6, pp. 5773-5783, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Huisen Liu, Liehuang Zhu, Ke Xu, Hongbo Yu, Xiaojiang Du, Mohsen Guizani. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_jsac20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT<\/a><\/span>\u201d, <em>IEEE JSAC<\/em>, vol. 38, no. 5, pp. 942-954, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Haiyang Wang, Hui Su, Liang Zhang, Rui Zhang, Dan Wang, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_jsac20.pdf\">Understand Love of Variety in Wireless Data Market Under Sponsored Data Plans<\/a><\/span>\u201d,\u00a0<em>IEEE JSAC, vol. 38, no. 4, pp. 766-781, 2020.<\/em><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Ke Xu, Xiaojiang Du, Martin J Reed, Md Zakirul Alam Bhuiyan, Lan Zhang, Rashid Mijumbi. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_IToJ20.pdf\">\u201cGuest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities\u201d<\/a><\/span>. <em>IEEE\u00a0Internet Things J<\/em>, vol. 7, no. 5, pp. 3897-3900, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Dan Wang, Hao Qin, Bin Song, Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/dan_pc20.pdf\">\u201cJoint resource allocation and powercontrol for D2D communication with deep reinforcement learning in MCC\u201d<\/a><\/span>. <em>Physical Communication<\/em>, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Qi Tan, Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Meng Shen. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qi_ccfton19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Interference\u2011aware lifetime maximization with joint routing and charging in wireless sensor networks<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>CCF Trans. Netw.<\/em>, vol. 2, no. 3, 2019.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Wenlong Chen, Heyang Chen, Zhiliang Wang, Chengang Zhao, Mingwei Xu, Ke Xu, Yingya Guo. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wenlong_fgcs19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Congestion avoidance transmission mechanism based on two-dimensional forwarding<\/a><\/span>\u201d, <em>Future Generation Computer System<\/em>, vol. 102, pp. 1-13, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Liang Lv, Tong Li, Meng Shen, Haiyang Wang, Kun Yang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds19.pdf\">Minimizing Tardiness for Data-intensive Applications in Heterogeneous Systems: A Matching Theory Perspective<\/a><\/span>\u201d, <em>IEEE TPDS<\/em>, vol. 31, no. 1, pp. 144-158, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_mna19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Fine-grained Dynamic Price Prediction in Ride-on-demand Services: Models and Evaluations<\/a><\/span>\u201d,\u00a0<em>Mobile Networks and Applications<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Bo Wu, Ke Xu, Qi Li, Bingyang Liu, Shoushou Ren, Fan Yang, Meng Shen, Kui Ren. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_cn19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">RFL: Robust Fault Localization on Unreliable Communication Channels<\/span><\/a>\u201d,\u00a0<em>Computer Networks<\/em>, vol. 158, pp. 158-174, 2019.\u00a0<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Liang Lv, Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Wenlong Wang, Minghui Li, Xuan Cao, Qingqing Liang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_jsac19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Communication-aware Container Placement and Reassignment in Large-scale Internet Data Centers<\/a><\/span>\u201d, <em>IEEE JSAC<\/em>, vol. 37, no. 3, pp.540-555, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Tong Li, Kezhi Wang, Ke Xu, Kun Yang, Chathura Sarathchandra Magurawalage, Haiyang Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_ccfton18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Communication and computation cooperation in cloud radio access network with mobile edge computing<\/a><\/span>\u201d, <em>CCF Trans. Netw.<\/em>,\u00a0 vol.2, no.1, pp. 43-56, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Meng Shen, Baoli Ma,\u00a0Liehuang Zhu,\u00a0Xiaojiang Du,\u00a0Ke Xu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_IoTJ18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT<\/span><\/a>\u201d, \u00a0<em>IEEE Internet of Things Journal<\/em>, vol. 6, no. 2, pp. 1998-2008, 2019.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jia Hu, Kun Yang, Victor C. M. Leung, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jia_mobile_network19.pdf\">Guest Editorial: Smart Grid Inspired Data Sensing, Processing and Networking Technologie<\/a>s\u201d<\/span>. <em>Mobile Netw Appl<\/em>, vol. 24, pp. 1699\u20131700, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Xiaoliang Wang, Ke Xu, Bo Mao. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoliang_wcmc18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">GreenLink: An Energy Efficient Scatternet Formation for BLE Devices<\/a><\/span>\u201d, <em>Wireless Communications and Mobile Computing<\/em>, 2018.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Fei Chen, Haitao Li, Jiangchuan Liu, Bo Li, Ke Xu, Yuemin Hu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/fei_p2pna18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Migrating big video data to cloud: a peer-assisted approach for VoD<\/a><\/span>\u201d,\u00a0Peer-to-Peer Networking and Applications, vol. 11, no. 5,\u00a0pp. 1060\u20131074, 2018.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Ke Xu, Haiyang Wang, Jiangchuan Liu, Yifeng Zhong, Yong Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_ijcs18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Design, modeling, and analysis of online combinatorial double auction for mobile cloud computing markets<\/a><\/span>\u201d,\u00a0<em>International Journal of Communication Systems <\/em>31 (7), e3460\u00a0, 2018.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Tong Li, Haiyang Wang, Haitao Li, Wei Zhu, Jiangchuan Liu, Song Lin, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tsc16.pdf\">Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites<\/a><\/span>\u201d,\u00a0<em>IEEE Transactions on Services Computing<\/em> (TSC), vol.11, no. 3, pp. 534-548,\u00a02018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo, Chao Chen, Yaxiao Liu, Ke Xu, Bin Guo, and Dah Ming Chiu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_iet18.pdf\">How to pay less: a location\u2010specific approach to predict dynamic prices in ride\u2010on\u2010demand services\u201d<\/a><\/span>. <em>IET Intell Transp Syst,<\/em> vol. 12, no. 7, pp. 610-618, 2018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u200b<span style=\"font-size: medium;\">Haiyang Wang, Tong Li, Ryan Shea, Xiaoqiang Ma, Feng Wang, Jiangchuan Liu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_ton17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Toward Cloud-Based Distributed Interactive Applications: Measurement, Modeling, and Analysis<\/a><\/span>\u201d, <em>IEEE\/ACM Transaction on Networking (TON)<\/em>, 2017.\u00a0<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Guangwu Hu, Wenlong Chen, Qi Li, Yong Jiang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangwu_fgcs17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code<\/a><\/span>\u201d,\u00a0<em>Future Generation Computer Systems<\/em>, pp. 219-226, 2017.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Lei Xu, Ke Xu, Yong Jiang, Fengyuan Ren, Haiyang Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_cn17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Throughput optimization of TCP incast congestion control in large-scale datacenter networks<\/a><\/span>\u201d,\u00a0<em>Computer Networks<\/em>, pp. 46-60, 2017.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Li Li, Ke Xu, Dan Wang, Chunyi Peng, Kai Zheng, Rashid Mijumbi, Qiangyang Xiao. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_ton17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Longitudinal Measurement Study of TCP Performance and Behavior in 3G\/4G Networks over High Speed Rails<\/a><\/span>\u201d, <em>IEEE\/ACM Transactions on Networking (TON),<\/em>\u00a0vol. 25, no. 4, pp. 2195-2208, 2017.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Wang, Xiaoliang, Ke Xu, and Ziwei Li. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wang_wcmc17.pdf\">\u201cSmartfix: Indoor locating optimization algorithm for energy-constrained wearable devices\u201d<\/a><\/span>. <em>Wireless Communications and Mobile Computing<\/em>, 2017.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Guopeng Zhang, Kun Yang, Haifeng Jiang, Xiaofeng Lu, Ke Xu, Lianming Zhang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guopeng_mna16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Equilibrium Price and Dynamic Virtual Resource Allocation for Wireless Network Virtualization<\/a><\/span>\u201d,\u00a0<em>Mobile Networks and Applications<\/em><\/span><span style=\"font-size: medium;\">, pp. 1-13, 2016.\u00a0<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Kao Wan, XueFeng Luo, Yong Jiang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/kao_cjc16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The Flow-oriented Scheduling Algorithms In SDN System<\/a><\/span>\u201d,<\/span><span style=\"font-size: large;\">\u00a0<\/span><span style=\"font-size: medium;\"><em>Chinese Journal of Computers<\/em> (in Chinese), vol.39, no. 6, pp.1208-1223, 2016.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Ke Xu, Meng Shen, Hongying Liu, Jiangchuan Liu, Fan Li, Tong Li, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds16.pdf\">Achieving Optimal Traffic Engineering Using a Generalized Routing Framework<\/a><\/span>\u201d,<a style=\"color: #000000;\" href=\"http:\/\/thucsnet.org\/uploads\/2\/5\/2\/8\/25289795\/achieving%C2%A0optimal%C2%A0traffic%C2%A0engineering%C2%A0using%C2%A0a%C2%A0generalized%C2%A0routing%C2%A0framework.pdf\">\u00a0<\/a><em><em>IEEE Transactions on\u00a0<\/em>Parallel and Distributed Systems (TPDS)<\/em><\/span><span style=\"font-size: medium;\">, 27(1): 51-65, 2016.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Guodong Zhao, Ke Xu, Lei Xu, Bo Wu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guodong_access15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis<\/a><\/span>\u201d, <em>IEEE Access<\/em>, vol.3, pp.1132-1142, 2015.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat, Meng Shen, Ke Xu, Kun Yang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/rashid_esa15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Neuro-fuzzy Approach to Self-management of Virtual Resources<\/a><\/span>\u201d, <em>Elsevier Expert System with Applications<\/em>, 42(3):1376-1390, 2015<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ying Liu, Hong-Ying Liu, Ke Xu, Meng Shen. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ying_jcst15.pdf\">\u201cA Family of Stable Multipath Dual Congestion Control Algorithms\u201d<\/a><\/span>.<em> J. Comput. Sci. Technol,<\/em> vol. 30, no. 6, pp. 1274\u20131289, 2015<span style=\"font-size: medium;\">.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Yi Qu, Ke Xu, Jiangchuan Liu, Wenlong Chen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_IoTJ14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards a Practical Energy Conservation Mechanism with Assistance of Resourceful Mules<\/a><\/span>\u201d,\u00a0<em>IEEE Internet of Things Journal<\/em><\/span><span style=\"font-size: medium;\">, 2014.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Ke Xu, Yifeng Zhong, Huan He, \u201c<\/span><span style=\"font-size: medium;\"><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Can P2P Technology Benefit Eyeball ISPs A Cooperative Profit<\/a><\/span>\u201d,\u00a0<em><em>IEEE Transactions on\u00a0<\/em>Parallel and Distributed Systems (TPDS)<\/em><\/span><span style=\"font-size: medium;\">, 25(11): 2783-2793, 2014.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Meng Shen, Yong Cui, Mingjiang Ye, Yifeng Zhong, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds14_.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices<\/a><\/span>\u201d,\u00a0<em><em>IEEE Transactions on\u00a0<\/em>Parallel and Distributed Systems (TPDS)<\/em>, 25(5): 1101-1111, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Haiyang Wang, Jiangchuan Liu, Song Lin, Lei Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tnsm14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pushing Server Bandwidth Consumption to the Limit: Modeling and Analysis of Peer-assisted VoD<\/a><\/span>\u201d,\u00a0\u00a0<em>IEEE Transactions on Network and Service Management (TNSM)<\/em>, 2014.\u00a0<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Wei Tan, Ke Xu, Dan Wang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wei_IoTJ14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">An anti-tracking source-location privacy protection protocol in WSNs based on path extension<\/a><\/span>\u201d,\u00a0<em>IEEE Internet of Things Journal<\/em>, 1(5): 461-471, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Chang Ge, Zhili Sun, Ning Wang, Ke Xu, Jinsong Wu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chang_tnsm14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Energy management in cross-domain content delivery networks: a theoretical perspective<\/a><\/span>\u201d,\u00a0<em>IEEE Transactions on Network and Service Management (TNSM)<\/em>, 11(3): 264-277, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Sai Zhang,\u00a0Ke Xu,\u00a0Xi Chen,\u00a0Xue Liu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/sai_arxiv14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Dynamics of Information Spreading in Online Social Network<\/a><\/span>\u201d, arXiv:1404.5562, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Jiangchuan Liu, Ke Xu, Yongqiang Xiong, Dongchao Ma, Kai Shuang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jiangchuan_p2pna14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Peer-to-peer as an infrastructure service<\/a><\/span>\u201d, <em>Peer-to-Peer Networking and Applications<\/em><em> (PPNA)<\/em>, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_p2pna14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exploring the policy selection of the P2P VoD system: A simulation-based research<\/a><\/span>\u201d,<em>\u00a0<\/em><em>Peer-to-Peer Networking and Applications (PPNA)<\/em>, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Min Zhu, Guangwu Hu, Liang Zhu, Yifeng\u00a0Zhong, Ying\u00a0Liu, Jianping\u00a0Wu, Ning\u00a0Wang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_scis14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards Evolvable Internet Architecture-Design Constraints and Models Analysis<\/a><\/span>\u201d,\u00a0<em>Science China Information\u00a0 Science<\/em>, 2014.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Haiyang Wang, Feng Wang, Jiangchuan Liu, Chuang Lin, Ke Xu, and Chonggang Wang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_jsac13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Accelerating Peer-to-Peer File Sharing with Social Relations<\/a><\/span>\u201d,\u00a0<em>IEEE Journal on\u00a0Selected Areas in Communications (JSAC)<\/em>, 2013, 31(9): 66-74.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ying Liu, Jianping Wu, Qian Wu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ying_ptrs13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Recent progress in the study of the next generation Internet in China<\/a><\/span>\u201d, <em>Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Science<\/em>, 2013, 371(1987): 20120387.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Zhen Ma, Ke Xu, Jiangchuan Liu, Haiyang Wang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhen_cn12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Measurement, modeling and enhancement of BitTorrent-based VoD system<\/a><\/span>\u201d,\u00a0<em>Computer Networks,<\/em>\u00a02012, 56: 1103\u20131117.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Huan He, Ke Xu, Ying Liu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/huan_ns12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Internet resource pricing models, mechanisms, and methods<\/a><\/span>\u201d,\u00a0<em>Networking Science,<\/em>\u00a02012, 1(1-4): 48-66.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yan Huang, Ke Xu,\u00a0Haitao Li, Yang Cao, Xin Yao, <span style=\"color: #3366ff;\">\u201c<a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yan_scis11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Large-scale P2PVOD system: Focusing on clients<\/a>\u201d<\/span>,\u00a0<em>SCIENCE CHINA INFORMATION SCIENCES,<\/em>\u00a02011, 54(8):1677-1690.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Hongying Liu, Jiangchuan Liu, Jixiu Zhang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tpds11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">LBMP: A Logarithm-Barrier-based Multipath Protocol for Internet Traffic Management<\/a><\/span>\u201d,\u00a0<em>IEEE Transactions on Parallel and Distributed Systems (TPDS),<\/em>\u00a02011, 22(3): 476-488.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Dan Li, Jianping Wu, Jiangchuan Liu, Yong Cui, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/dan_ton11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Defending Against Distance Cheating in Link-Weighted Application-Layer Multicast<\/a><\/span>\u201d,\u00a0<em>IEEE\/ACM Transactions on Networking (TON),<\/em>\u00a02011, 19(5):1448-1457.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Ming Zhang, Jiangchuan Liu, Zhijing Qin, Mingjiang Ye, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_cn10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Proxy Caching for Peer-to-Peer Live Streaming<\/a>\u201d<\/span>,\u00a0<em>Computer Networks,<\/em>\u00a02010, 54(7):1229-1241.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_p2pna10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Measurement and Enhancement of BitTorrent-based Video File Swarming<\/span><\/a>\u201d, <em>Peer-to-Peer Networking and Applications (PPNA)<\/em>, 2010, 3(3): 237-253.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Ming Zhang, Mingjiang Ye, Dah Ming Chiu, Jianping Wu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_cc10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Identify P2P Traffic by Inspecting Data Transfer Behavior<\/a><\/span>\u201d,\u00a0<em>Computer Communications,<\/em>\u00a02010, 33(10):1141-1150.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Taoyu Li, Yuncheng Zhu, Ke Xu, Maoke Chen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/taoyu_cc09.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Performance Model and Evaluation on Geographic-based Routing<\/a><\/span>\u201d, <em>Computer Communications<\/em>, 2009, 32(2): 343-348.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Mingwei Xu, Qi Li, Song Lin, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_scis08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Analysis and Case Study on Multi-dimensional Scalability of the Internet Architecture<\/a><\/span>\u201d,\u00a0<em>Science in China Series F: Information Sciences,<\/em>\u00a02008, 51(11):1661-1680.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Ke Xu, Huan He, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_jcupt08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BGP Parallel Computing Model Based on the Iteration Tree<\/a><\/span>\u201d,\u00a0<em>The Journal of China, Universities of Posts and Telecommunications,<\/em>\u00a015(Suppl.): 1\u20138, 2008.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Suogang Li, Ke Xu, Ying Liu, Jianping Wu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suogang_jhsn08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Edge Overlay Multicast to Support Comparable Multi-class Services<\/a><\/span>\u201d,\u00a0<em>Journal of High Speed Networks, <\/em>2008,\u00a017(1):13-36.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Chunyu Liu, Ke Xu,\u00a0\u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chunyu_jcn07.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Framework for End-to-End Optimal Traffic Control Law Based on Overlay Mesh<\/a><\/span>\u201d,\u00a0<em>Journal of Communications and Networks,<\/em>\u00a02007, 9(4): 428-437.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Lijun Wang, Jianping Wu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lijun_cc07.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Modified Flap Damping Mechanism to Improve Inter-domain Routing Convergence<\/a><\/span>\u201d, <em>Computer Communications<\/em>, 2007, 30(7): 1588-1599.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Jianping Wu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianping_jcst06.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Research on\u00a0Next-generation Internet Architecture<\/a><\/span>\u201d,\u00a0<em>Journal of Computer Science and Technology,<\/em>\u00a021 (5): 723-731, 2006.<\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"color: #000000;\"><strong>3. Conference Publications<\/strong><\/span><\/h2>\r\n<div class=\"paragraph\" style=\"text-align: justify;\">\r\n<ul>\r\n \t<li><span style=\"color: #000000;\">Xiangyu Gao, Tong Li, Yinchao Zhang, Ziqiang Wang, Xiangsheng Zeng, Su Yao, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiangyu_nsdi2026.pdf\">FENIX: Enabling In-Network DNN Inference with FPGA-Enhanced Programmable Switches<\/a><\/span>\u201d, <em>USENIX NSDI<\/em>, 2026.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zixuan_ndss2026.pdf\">A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems<\/a><\/span>\u201d, <em>NDSS<\/em>, 2026.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Kuofeng Gao, Shutao Xia, Ke Xu, Philip Torr, Jindong Gu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/kuofeng_acl2025.pdf\">Benchmarking Open-ended Audio Dialogue Understanding for Large Audio-Language Models<\/a><\/span>\u201d,<em>ACL<\/em>, 2025: 4763-4784.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Qingjie Zhang, Di Wang, Haoting Qian, Yiming Li, Tianwei Zhang, Minlie Huang, Ke Xu, Hewu Li, Liu Yan, Han Qiu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingjie_acl2025.pdf\">Understanding the Dark Side of LLMs&#8217; Intrinsic Self-Correction<\/a><\/span>\u201d,<em>ACL<\/em>, 2025: 27066-27101.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhenhua_ccs2025.pdf\">RingSG: Optimal Secure Vertex-Centric Computation for Collaborative Graph Processing<\/a><\/span>\u201d,<em>ACM CCS<\/em>,\u00a02025: 483-497.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Jinhe Wu, Junyu Ai, Qi Li, Chenchen Ren, Ke Xu, Liehuang Zhu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ccs2025.pdf\">Swallow: A Transfer-Robust Website Fingerprinting Attack via Consistent Feature Learning<\/a><\/span>\u201d,\u00a0<em>ACM CCS<\/em>,\u00a02025: 1574-1588.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuqi Qing, Qilei Yin, Xinhao Deng, Xiaoli Zhang, Peiyang Li, Zhuotao Liu, Kun Sun, Ke Xu, Qi Li, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuqi_ccs2025.pdf\">Training Robust Classifiers for Classifying Encrypted Traffic under Dynamic Network Conditions<\/a><\/span>\u201d,<em>ACM CCS<\/em>,\u00a02025: 3564-3578.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Chuanpu Fu, Qi Li, Elisa Bertino, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_ccs2025.pdf\">Training with Only 1.0 \u2030 Samples: Malicious Traffic Detection via Cross-Modality Feature Fusion<\/a><\/span>\u201d,<em>ACM CCS<\/em>,\u00a02025: 3930-3944.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Zhaoxi Li, Qi Li, Ziqiang Wang, Kun Sun, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ccs2025.pdf\">Off-Path TCP Exploits: PMTUD Breaks TCP Connection Isolation in IP Address Sharing Scenarios<\/a><\/span>\u201d,<em>ACM CCS<\/em>,\u00a02025: 4574-4587.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jianfeng Guan, Kexian Liu, Su Yao, Xiaolong Hu, Ye Qin, Jianli Liu, Songtao Fu, Xiangyu Gao, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianfeng_icnp2025.pdf\">PIPE: Identity-Aware Privacy-Enhanced Source and Path Verification for Strengthened Network Accountability<\/a><\/span>\u201d,<em>IEEE ICNP<\/em>,\u00a02025: 1-11.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jinzhu Yan, Zhuotao Liu, Yuyang Xie, Shiyu Liang, Lin Liu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jinzhu_security2025.pdf\">CertTA: Certified Robustness Made Practical for Learning-Based Traffic Analysis<\/a><\/span>\u201d,<em>USENIX Security<\/em>, 2025: 7349-7368.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Weifei Jin, Yuxin Cao, Junjie Su, Minhui Xue, Jie Hao , Ke Xu, Jin Song Dong, Derui Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/weifei_NeurIPS2025.pdf\">ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio\u2013Language Models<\/a><\/span>\u201d, <em>NeurIPS<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Mingwei Zhan, Ruijie Zhao, Xianwen Deng, Zhi Xue, Qi Li, Zhuotao Liu, Guang Cheng, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/mingwei_NeurIPS2025.pdf\">FlowRefiner: A Robust Traffic Classification Framework against Label Noise<\/a><\/span>\u201d, <em>NeurIPS<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Qingjie Zhang, Di Wang, Haoting Qian, Liu Yan, Tianwei Zhang, Ke Xu, Qi Li, Minlie Huang, Hewu Li, Han Qiu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingjie_emnlp2025.pdf\">Speculating LLMs\u2019 Chinese Training Data Pollution from Their Tokens<\/a><\/span>\u201d, <em>EMNLP<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yanling Wang, Haoyang Li, Hao Zou, Jing Zhang, Xinlei He, Qi Li, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yanling_emnlp2025.pdf\">FacLens: Transferable Probe for Foreseeing Non-Factuality in Fact-Seeking Question Answering of Large Language Models<\/a><\/span>\u201d, <em>EMNLP<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yinchao Zhang, Su Yao, Yong Feng, Kang Chen, Tong Li, Zhuotao Liu, Yi Zhao, Lexuan Zhang, Xiangyu Gao, Feng Xiong, Qi Li, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yinchao_sigcomm2025.pdf\">Pegasus: A Universal Framework for Scalable Deep Learning Inference on the Dataplane<\/a><\/span>\u201d, <em>ACM SIGCOMM<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Hao Fang, Jiawei Kong, Wenbo Yu, Bin Chen, Jiawei Li, Hao Wu, Shu-Tao Xia, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hao_iccv2025.pdf\">One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models<\/a><\/span>\u201d, <em>IEEE ICCV<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ndss2025.pdf\">ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks<\/a><\/span>\u201d, <em>NDSS<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jianshuo Dong, Ziyuan Zhang, Qingjie Zhang, Han Qiu, Tianwei Zhang, Hao Wang, Hewu Li, Qi Li, Chao Zhang, Ke Xu.\u00a0\u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianshuo_iclr2025.pdf\">An Engorgio Prompt Makes Large Language Model Babble on<\/a><\/span>\u201d, <em>ICLR<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Li Gao, Chuanpu Fu, Xinhao Deng, Ke Xu, Qi Li. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_gao_kdd2025.pdf\"><span style=\"color: #3366ff;\">Wedjat: Detecting Sophisticated Evasion Attacks via Real-time Causal Analysis<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>ACM KDD<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Guangmeng Zhou, Xiongwen Guo, Zhuotao Liu, Tong Li, Qi Li, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangmeng_sp2025.pdf\"><span style=\"color: #3366ff;\">TrafficFormer: An Efficient Pre-trained Model for Traffic Data<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>IEEE S&amp;P<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ziqiang_ndss2025.pdf\"><span style=\"color: #3366ff;\">Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>NDSS<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xinle Du, Tong Li, Guangmeng Zhou, Zhuotao Liu, Hanlin Huang, Xiangyu Gao, Mowei Wang, Kun Tan, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinle_nsdi2025.pdf\"><span style=\"color: #3366ff;\">PRED: Performance-oriented Random Early Detection for Consistently Stable Performance in Datacenters<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>USENIX NSDI<\/em>, 2025.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Rongwu Xu, Zi\u2019an Zhou, Tianwei Zhang, Zehan Qi, Su Yao, Ke Xu, Wei Xu, Han Qiu, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/rongwu_emnlp2024.pdf\"><span style=\"color: #3366ff;\">Walking in Others\u2019 Shoes: How Perspective-Taking Guides Large Language Models in Reducing Toxicity and Bias<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>EMNLP<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Bo Wu, Tong Li, Cheng Luo, Xu Yan, Fuyu Wang, Xinle Du, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_mm2024.pdf\"><span style=\"color: #3366ff;\">Toward Timeliness-Enhanced Loss Recovery for Large-Scale Live Streaming<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>ACM MM<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yihao Chen, Qilei Yin, Qi Li, Zhuotao Liu, Ke Xu, Yi Xu, Mingwei Xu, Ziqian Liu, Jianping Wu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yihao_security2024.pdf\"><span style=\"color: #3366ff;\">Learning with Semantics: Towards a Semantics-Aware Routing Anomaly Detection System<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>USENIX Security<\/em>, 2024. (Internt Defense Prize, Distinguished Paper Award Winner)<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qi_security2024.pdf\"><span style=\"color: #3366ff;\">Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>USENIX Security<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Changyue Li, Qi Li, Hao Lu, Liehuang Zhu, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_security2024.pdf\"><span style=\"color: #3366ff;\">Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>USENIX Security<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ye Wang, Yunpeng Liu, Ningtao Wang, Peiyang Li, Jiahao Hu, Xing Fu, Weiqiang Wang, Kun Sun, Qi Li, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ye_iwqos2024.pdf\"><span style=\"color: #3366ff;\">Enhancing Fraud Transaction Detection via Unlabeled Suspicious Records<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2024. (Best Paper Award)<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Liang Lv, Yusen Li, Meng Shen, Liehuang Zhu, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_iwqos2024.pdf\"><span style=\"color: #3366ff;\">Rethinking and Optimizing Workload Redistribution in Large-scale Internet Data Centers<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Hanlin Huang, Ke Xu, Xinle Du, Yiyang Shao, Jie Li, Xiangyu Gao, Tong Li. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hanlin_iwqos2024.pdf\">Performant TCP over Wi-Fi Direct<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ao Wang, Xuewei Feng, Qi Li, Yuxiang Yang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ao_iwqos2024.pdf\">A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem<\/a><\/span>\u201d<\/span><span style=\"color: #000000;\">, <em>IEEE\/ACM IWQoS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Huahai Zhang, Peizhuang Cong, Wendong Wang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_iwqos2024.pdf\">Grandet: Cost-aware Traffic Scheduling without Prior Knowledge in SD-WAN<\/a><\/span>\u201d<\/span><span style=\"color: #000000;\">, <em>IEEE\/ACM IWQoS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ziwei Li, Zhaoqi Yang, Bowen Hu, Tong Li, Bo Wu, Yukuan Ding, Dulin Xu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ziwei_iwqos2024.pdf\">ReND: Toward Reasoning-based BLE Neighbor Discovery by Integrating with Wi-Fi Fingerprints<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Bo Wu, Tong Li, Cheng Luo, Xu Yan, Fuyu Wang, Changkui Ouyang, Linfeng Guo, Haiyang Wang, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_icdcs2024.pdf\"><span style=\"color: #3366ff;\">Reducing First-Frame Delay of Live Streaming by Simultaneously Initializing Window and Rate<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>IEEE ICDCS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jinzhu_nsdi2024.pdf\"><span style=\"color: #3366ff;\">Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>NSDI<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuxiang_ndss2024.pdf\"><span style=\"color: #3366ff;\">Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>NDSS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiyuan_CCS2024.pdf\">Towards Fine-Grained Webpage Fingerprinting at Scale<\/a><\/span>\u201d, <em>ACM CCS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xinhao Deng, Qi Li, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinhao_CCS2024.pdf\">Robust and Reliable Early-Stage Website Fingerprinting Attacks via Spatial-Temporal Distribution Analysis<\/a><\/span>\u201d. <em>ACM CCS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_CCS2024.pdf\">Detecting Tunneled Flooding Traffic via Deep Semantic Analysis of Packet Length Patterns<\/a><\/span>\u201d, <em>ACM CCS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xijia Che, Yi He, Xuewei Feng, Kun Sun, Ke Xu, Qi Li. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xijia_CCS2024.pdf\">BlueSWAT: A Lightweight State-Aware Security Framework for Bluetooth Low Energy<\/a><\/span>\u201d, ACM CCS, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Zhenhua Zou, Zhuotao Liu, Jinyong Shan, Qi Li, Ke Xu, Mingwei Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhenhua_CCS2024.pdf\">CoGNN: Towards Secure and Efficient Collaborative Graph Learning<\/a><\/span>\u201d, ACM CCS, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Kexin Ji, Jinhe Wu, Qi Li, Xiangdong Kong, Ke Xu, Liehuang Zhu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_sp2024.pdf\">Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization<\/a><\/span>\u201d, <em>IEEE SP<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Jiazhi Guan, Yi Zhao, Zhuoer Xu, Changhua Meng, Ke Xu, Youjian Zhao. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jiazhi_aaai2024.pdf\">Adversarial Robust Safeguard for Evading Deep Facial Manipulation<\/a><\/span>\u201d, <em>AAAI<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuanqi_ndss2024.pdf\"><span style=\"color: #3366ff;\">Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>NDSS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yue Xiao, Yi He, Xiaoli Zhang, Qian Wang, Renjie Xie, Kun Sun, Ke Xu, Qi Li. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yue_ndss2024.pdf\"><span style=\"color: #3366ff;\">From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>NDSS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuqi_ndss2024.pdf\"><span style=\"color: #3366ff;\">Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>NDSS<\/em>, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu. \u201c<\/span><a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_sp2023.pdf\"><span style=\"color: #3366ff;\">Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects<\/span><\/a><span style=\"color: #000000;\">\u201d, <em>IEEE S&amp;P<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Peiyang Li, Ye Wang, Qi Li, Zhuotao Liu, Ke Xu, Ju Ren, Zhiying Liu, Ruilin Lin. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/peiyang_ccs23.pdf\">\u201cLearning from Limited Heterogeneous Training Data: Meta-Learning for Unsupervised Zero-Day Web Attack Detection across Web Domains\u201d<\/a><\/span>. <em><i>ACM CCS,<\/i><\/em> 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Qi Li, Zhuotao Liu, Qi Li, Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qi_ccs23.pdf\">\u201cMartFL: Enabling Utility-Driven Data Marketplace with a Robust and Verifiable Federated Learning Architecture\u201d<\/a><\/span>. <em><i>ACM<\/i><\/em>\u00a0<em><i>CCS,\u00a0 <\/i><\/em>2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Chuanpu Fu, Qi Li, Ke Xu, Jianping Wu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_ccs23.pdf\">Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms\u201d<\/a><\/span>. <em><i>ACM CCS, <\/i><\/em>2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi He, Roland Guo, Yunlong Xing, Xijia Che, Kun Sun, Zhuotao Liu, Ke Xu, Qi Li. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_sec23.pdf\">\u201cCross container attacks: the bewildered eBPF on clouds\u201d<\/a><\/span>. <em>USENIX Security<\/em>, 5971\u20135988, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Shuaipeng Zhu, Tong Li, Xinyu Ma, Yinfeng Zhu, Taotao Zhang, Senzhen Liu, Haiyang Wang, and Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/shuaipeng_sigcomm23.pdf\">\u201cPoster: PolyCC: Poly-Algorithmic Congestion Control\u201d<\/a><\/span>. <i><\/i><em><i>ACM <\/i><\/em><em><i>SIGCOMM<\/i><\/em><em><i>, <\/i><\/em>1129-1131, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xu Yan, Tong Li, Bo Wu, Cheng Luo, Fuyu Wang, Haiyang Wang, and Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xu_sigcomm23.pdf\">\u201cPoster: TOO: Accelerating Loss Recovery by Taming On-Off Traffic Patterns\u201d<\/a>.<\/span> <em>ACM SIGCOMM<\/em>, 1147-1149, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu. 2023. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_turc23.pdf\">\u201cTraffic Hijacking in Wi-Fi Networks via ICMP Redirects\u201d<\/a><\/span>. <em>ACM TUR-C<\/em>, 141-142, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Haoqiang Huang,\u00a0Yuchao Zhang,\u00a0Ran Wang,\u00a0Qiao Xiang,\u00a0Wendong Wang,\u00a0Xirong Que,\u00a0Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haoqiang_wcnc23.pdf\">&#8220;FRAVaR: A Fast Failure Recovery Framework for Inter-DC Network,&#8221;<\/a><\/span> <em>IEEE WCNC<\/em>, 2023<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Wei Liu, Xinyu Ma, Shuaipeng Zhu, Jingkun Cao, Senzhen Liu, Taotao Zhang, Yinfeng Zhu, Bo Wu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_icnp2023.pdf\">ART: Adaptive Retransmission for Wide-Area Loss Recovery in the Wild<\/a><\/span>\u201d, <em>IEEE ICNP<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xiaoli Zhang, Zhicheng Xu, Hongbing Cheng, Tong Che, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Chunping Wang, Qi Li. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoli_icdcs2023.pdf\">Secure Collaborative Learning in Mining Pool via Robust and Efficient Verification<\/a><\/span>\u201d, <em>IEEE ICDCS<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_security2023.pdf\">Subverting Website Fingerprinting Defenses with Robust Traffic Representation<\/a><\/span>\u201d, <em>USENIX Security<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xinhao Deng, Qilei Yin, Zhuotao Liu, Xiyuan Zhao, Qi Li, Mingwei Xu, Ke Xu, Jianping Wu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinhao_sp2023.pdf\">Robust Multi-tab Website Fingerprinting Attacks in the Wild<\/a><\/span>\u201d, <em>IEEE S&amp;P<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Chuanpu Fu, Qi Li, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_ndss2023.pdf\"><span style=\"color: #3366ff;\">Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>NDSS<\/em>, 2023. <span style=\"color: #0000ff;\">[<a style=\"color: #0000ff;\" href=\"https:\/\/github.com\/fuchuanpu\/HyperVision\">Github Link<\/a>]<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Yunpeng Liu, Kexin Li, Zhuotao Liu, Bihan Wen, Ke Xu, Weiqiang Wang, Wenbiao Zhao, Qi Li. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yunpeng_www2023.pdf\"><span style=\"color: #3366ff;\">Provenance of Training without Training Data: Towards Privacy-Preserving DNN Model Ownership Verification<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>ACM WWW<\/em>, 2023.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Tianyu Xia, Shuheng Shen, Su Yao, Xinyi Fu, Ke Xu, Xiaolong Xu, Xing Fu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tianyu_aaai2023.pdf\"><span style=\"color: #3366ff;\">Differentially Private Learning with Per-Sample Adaptive Clipping<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>AAAI<\/em>, 2023.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Jiaxin Liang, Yukuan Ding, Kai Zheng, Xu Zhang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_infocom2023.pdf\">On Design and Performance of Offline Finding Network<\/a><\/span>\u201d, <em>IEEE INFOCOM<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Bowen Hu, Guanjie Tu, Jinwen Shuai, Jiaxin Liang, Yukuan Ding, Ziwei Li, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_infocom_demo2023.pdf\">Accelerating BLE Neighbor Discovery via Wi-Fi Fingerprints<\/a><\/span>\u201d, <em>IEEE INFOCOM (Demo)<\/em>, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Guangmeng Zhou, Zhuotao Liu, Chuanpu Fu, Qi Li, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangmeng_security2023.pdf\">An Efficient Design of Intelligent Network Data Plane<\/a><\/span>\u201d, <em>USENIX Security<\/em>, 2023. <span style=\"color: #0000ff;\">[<a style=\"color: #0000ff;\" href=\"https:\/\/github.com\/IDP-code\/NetBeacon\">Github Link<\/a>]<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Songtao Fu, Qi Li, Xiaoliang Wang, Su Yao, Xuewei Feng, Ziqiang Wang, Xinle Du, Kao Wan, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songtao_icdcs2022.pdf\">D3: Lightweight Secure Fault Localization in Edge Cloud<\/a><\/span>\u201d, <em>IEEE ICDCS<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Peiyang Li, Ye Wang, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Qi Li. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/peiyang_esorics20222.pdf\">Verifying the Quality of Outsourced Training on Clouds<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>Springer ESORICS<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Qi Li, Kun Sun, Zhiyuan Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_security22.pdf\">Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>USENIX Security<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Peizhuang Cong, Yuchao Zhang, Lei Wang, Hao Ni, Wendong Wang, Xiangyang Gong, Tong Yang, Dan Li, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_iwqos2022.pdf\"><span style=\"color: #3366ff;\">Break the Blackbox! Desensitize Intra-domain Information for Inter-domain Routing<\/span><\/a>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi Zhao, Qi Tan, Xiaohua Xu, Hui Su, Dan Wang, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_iwqos2022.pdf\"><span style=\"color: #3366ff;\">Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective<\/span><\/a>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Chengwu Liao, Chao Chen, Suiming Guo, Yaxiao Liu, Ke Xu, Daqing Zhang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ubicomp2022.pdf\">Wheels Know Why You Travel: Predicting Trip Purpose via a DualAttention Graph Embedding Network<\/a><\/span>\u201d, <em>ACM UbiComp<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_security22summer.pdf\">RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>USENIX Security<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ndss22.pdf\">PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP<\/a><\/span><span style=\"color: #000000;\">\u201d, <em>NDSS<\/em>, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Ziqiang Wang, Zhuotao Liu, Xiaoliang Wang, Songtao Fu, and Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinle_hotnet22.pdf\">\u201cDIP: unifying network layer innovations using shared L3 core functions\u201d<\/a>.<\/span> <em>ACM HotNets<\/em>, 60-67, 2022.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li,\u00a0Ke Xu,\u00a0Hanlin Huang,\u00a0Xinle Du,\u00a0Kai Zheng. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_wowmom22.pdf\">&#8220;WIP: When RDMA Meets Wireless,&#8221;<\/a><\/span> \u00a0<em>IEEE WoWMoM<\/em>, 177-180, 2022<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yang Liu, Yi Zhao, Guangmeng Zhou, Ke Xu, \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yang_iconip2021.pdf\">FedPrune: Personalized and Communication-Efficient Federated Learning on Non-IID Data<\/a><\/span><span style=\"color: #000000;\">\u201d,<em>ICONIP<\/em> (5) 2021: 430-437.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xinle Du, Tong Li, Lei Xu, Kai Zheng, Meng Shen, Bo Wu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/icnp21camera-paper13.pdf\">R-AQM: Reverse ACK Active Queue Management in Multi-tenant Data Centers<\/a><\/span>\u201d, <em>IEEE ICNP<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Zhenbo Gao, Liehuang Zhu, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos21_1.pdf\">Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2021. (Best Paper Award)<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, MingHui Wang, Ke Xu, Liehuang Zhu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos21_2.pdf\">Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Xiangxiang Wang, Jiangchuan Liu, Fangxin Wang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiangxiang_iwqos21.pdf\">Demystifying the Relationship Between Network Latency and Mobility on High-Speed Rails: Measurement and Prediction<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Peizhuang Cong, Bin Liu, Wendong Wang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_iwqos21.pdf\">AIR: An AI-based TCAM Entry Replacement Scheme for Routers<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Songtao Fu, Ke Xu, Qi Li, Xiaoliang Wang, Su Yao, Guo Yangfei, Xinle Du. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songtao_iwqos21.pdf\">MASK: Practical Source and Path Verification based on Multi-AS-Key<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qiyang_acsac21.pdf\">\u201cTry before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.\u201d<\/a><\/span> ACSAC, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Chuanpu Fu, Qi Li, Meng Shen, Ke Xu. \u201c<a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_ccs21.pdf\"><span style=\"color: #3366ff;\">Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>ACM CCS<\/em>, 2021. <span style=\"color: #0000ff;\">[<a style=\"color: #0000ff;\" href=\"https:\/\/github.com\/fuchuanpu\/Whisper\">Github Link<\/a>]<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Pengmiao Li, Yuchao Zhang, Wendong Wang, Kaichuan Zhao, Bo Lian, Ke Xu, Zhili Zhang. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhili_hpcc21.pdf\">&#8220;Frend for Edge Servers: Reduce Server Number! Keeping Service Quality!&#8221;<\/a><\/span> <em><i>HPCC,\u00a0<\/i>2021.<\/em><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Peizhuang Cong, Yuchao Zhang, Wendong Wang, Ke Xu, Ruidong Li, Fuliang Li. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/peizhuang_icc21.pdf\">&#8220;A Deep Reinforcement Learning-based Routing Scheme with Two Modes for Dynamic Networks,&#8221;<\/a><\/span> <em><i>ICC,\u00a0<\/i><\/em>2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Pengmiao Li, Yuchao Zhang, Huahai Zhang, Wendong Wang, Ke Xu, Zhili Zhang, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_msn21.pdf\">&#8220;CRATES: A Cache Replacement Algorithm for Low Access Frequency Period in Edge Server&#8221;<\/a><\/span>. <em>IEEE MSN<\/em>, 128-135, 2021.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Mingxing Liu, Ying Liu, Ke Xu, Lin He, Xiaoliang Wang, Yangfei Guo, Weiyu Jiang, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/mingxing_msn21.pdf\">&#8220;TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation&#8221;<\/a><\/span>. <em><i>IEEE<\/i><\/em><em><i>\u00a0<\/i><\/em><em><i>MSN<\/i><\/em><em><i>, <\/i><\/em>470-478, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Xuewei Feng, Chuanpu Fu, Qi Li, Kun Sun, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ccs20.pdf\">Off-Path TCP Exploits of the Mixed IPID Assignment<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>ACM CCS<\/em>, 2020. (Distinguished Paper Award Nomination)<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Tong Li, Kai Zheng, Ke Xu, Rahul Arvind Jadhav, Tao Xiong, Keith Winstein, Kun Tan. <span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_sigcomm20.pdf\"><span style=\"color: #3366ff;\">TACK: Improving Wireless Transport Performance by Taming Acknowledgments<\/span><\/a>\u201d,\u00a0<em>ACM SIGCOMM<\/em>, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen,\u00a0Jinpeng Zhang, Ke Xu, Liehuang Zhu, Jiangchuan Liu, Xiaojiang Du. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos20.pdf\">DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning<\/a><\/span>\u201d,\u00a0<em>IEEE\/ACM IWQoS<\/em>, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/fan_iwqos20.pdf\">I Know If the Journey Changes: Flexible Source and Path Validation<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2020.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yi Zhao, Ke Xu, Feng Yan, Yuchao Zhang, Yao Fu, Haiyang Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_icc20.pdf\">Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks<\/a><\/span>\u201d,\u00a0<em>IEEE ICC<\/em>, 2020.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yi Zhao, Wei Bao, Dan Wang, Ke Xu, Liang Lv. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_infocom20.pdf\">Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems<\/a><\/span>\u201d,<em>\u00a0IEEE INFOCOM poster<\/em>, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_infocom20.pdf\">Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>IEEE INFOCOM<\/em>, 2020.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Ye Tian, Wendong Wang, Peizhuang Cong, Chao Chen, Dan Li, Ke Xu. \u00a0<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_infocom20.pdf\">&#8220;Federated Routing Scheme for Large-scale Cross Domain Network&#8221;.<\/a><\/span>\u00a0 <em><i>INFOCOM WKSHPS,\u00a0<\/i><\/em>2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Lei Ding, Yang Li, Haiyang Wang, Ke Xu, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_infocom20.pdf\">&#8220;Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent<\/a><\/span>&#8220;. <em><i>INFOCOM WKSHPS, <\/i><\/em>2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Shuying Wei, Xiaoliang Wang, Ke Xu, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/shuying_msn20.pdf\">&#8220;NoPTPeer:Protecting Android Devices from Stealthy Spoofing and Stealing in WLANs without Privilege&#8221;<\/a><\/span>,<em>\u00a0IEEE MSN<\/em>, 576-583, 2020.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Meng Shen, Zelin Liao, Liehuang Zhu, Ke Xu, Xiaojiang Du. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ubicomp19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>ACM UbiComp<\/em>, 2019.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Wenbin Yao, Ke Xu, Qi Li. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/wenbin_iscc19.pdf\">Exploring the Influence of News Articles on Bitcoin Price with Machine Learning<\/a><\/span>\u201d, <em>IEEE ISCC<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yi Zhao, Hui Su, Liang Zhang, Dan Wang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_iwqos2019.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Variety Matters: A New Model for the Wireless Data Market under Sponsored Data Plans<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, Yiting Liu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Encrypted Traffic Classification of Decentralized Applications on Ethereum using Feature Fusion<\/a><\/span>\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Shu Yang, Ziteng Chen, Laizhong Cui, Mingwei Xu, Zhongxing Ming, Ke Xu. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/shuyang_blockchain19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol<\/a><\/span>\u201d,\u00a0<em>IEEE Blockchain<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Zhichao Zhang, Xinle Du, Bingyang Liu, Shoushou Ren. <span style=\"font-size: medium;\">\u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_icdcs19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection<\/a><\/span>\u201d,\u00a0<em>IEEE ICDCS<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu, Qi Tan. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_infocom19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information<\/span><\/a>\u201d, <em>IEEE INFOCOM<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Siqi Chen, Liehuang Zhu, Renyi Xiao, Ke Xu, Xiaojiang Du. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_globecom19.pdf\">&#8220;Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries&#8221;<\/a><\/span>, <em><i>GLOBECOM, <\/i><\/em>2019.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Bo Wu, Qi Li, Ke Xu, Ruoyu Li, Zhuotao Liu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_mass18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">SmartRetro: Blockchain-based Incentives for Distributed IoT Retrospective Detection<\/span><\/a>\u201d, <em>IEEE MASS,<\/em>\u00a02018. (Invited Paper)<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">\u200bSuiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Daqing Zhang, Dah Ming Chiu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_ubicomp18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Simple but Quantifiable Approach to Dynamic Price Prediction in Ride-on-demand Services Leveraging Multi-source Urban Data<\/a><\/span>\u201d, <em>ACM UbiComp<\/em>, 2018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Bo Wu, Ke Xu, Qi Li, Zhuotao Liu, Yih-Chun Hu, Martin J. Reed, Meng Shen, Fan Yang. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_iwqos18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Enabling Efficient Source and Path Verification via Probabilistic Packet Marking<\/span><\/a><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE\/ACM IWQoS<\/em>, 2018.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Li Li, Ke Xu, Tong Li, Kai Zheng, Chunyi Peng, Dan Wang, Xiangxiang Wang, Meng Shen, Rashid Mijumbi. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_sigcomm18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Measurement Study on Multi-path TCP with Multiple Cellular Carriers on High-speed Rails<\/a><\/span>\u201d, <em>ACM SIGCOMM<\/em>, 2018.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Junchen Jiang, Ke Xu, Xiaohui Nie, Martin J Reed, Haiyang Wang, Guang Yao, Miao Zhang, Kai Chen. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_eurosys18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">BDS: a centralized near-optimal overlay network for inter-datacenter data replication<\/a><\/span>\u201d, <em>ACM\u00a0<\/em><em>EuroSys<\/em>, 2018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Suiming Guo, Chao Chen, Yaxiao Liu, Ke Xu, Dah Ming Chiu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_ubicomp18_.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Modelling Passengers\u2019 Reaction to Dynamic Prices in Ride-on-demand Services: A Search for the Best Fare<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d,\u00a0<em>ACM UbiComp,<\/em>\u00a02018.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo, Chao Chen, Jingyuan Wang, Yaxiao Liu, Ke Xu, Dah Ming Chiu. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_mobiq18.pdf\">\u201cDynamic Price Prediction in Ride-on-demand Service with Multi-source Urban Data\u201d<\/a><\/span>. <em><i>MobiQuitous, <\/i><\/em>2018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Li Li, Ke Xu, Tong Li, Kai Zheng, Chunyi Peng, Dan Wang, Xiangxiang Wang, Meng Shen, and Rashid Mijumbi. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_sigcomm18.pdf\">\u201cA measurement study on multi-path TCP with multiple cellular carriers on high speed rails\u201d<\/a><\/span>. <em>ACM SIGCOMM<\/em>, 161-175, 2018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Bo Wu, Ke Xu, Qi Li, Fang Yang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_ipccc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Robust and Lightweight Fault Localization<\/a><\/span>\u201d,<em> IEEE IPCCC<\/em>, 2017.\u00a0(Best Paper Candidate)<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u200bSuiming Guo, Yaxiao Liu, Ke Xu Dah Ming Chiu, <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_percom17.pdf\">&#8220;Understanding passenger reaction to dynamic prices in ride-on-demand service&#8221;,<\/a><\/span> PerCom Workshops 2017<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Lei Xu, Ke Xu, Meng Shen, Kui Ren, Jingyuan Fan, Chaowen Guan, Wen-Long Chen. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_turc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">MINOS: regulating router dataplane actions in dynamic runtime environments<\/a><\/span>\u201d,\u00a0Proceedings of the ACM Turing 50th Celebration Conference-China, 2017.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Li Li, Ke Xu, Dan Wang, Chunyi Peng, Kai Zheng, Haiyang Wang, Rashid Mijumbi, Xiangxiang Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_iwqos17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Measurement Study on Skype Voice and Video Calls in LTE Networks on High Speed Rails<\/a><\/span>\u201d, <em>IEEE\/ACM\u00a0IWQoS,<\/em><\/span><span style=\"font-size: medium;\"> 2017<\/span>.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Minghui Li, Xuan Cao and Qingqing Liang<\/span><span style=\"font-size: medium;\">. \u201c<\/span><span style=\"font-size: medium; color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_icdcs17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Communication-aware Container Re-distribution Approach for High Performance VNFs<\/a><\/span><span style=\"font-size: medium;\">\u201d.<\/span><span style=\"font-size: large;\">\u00a0<\/span><span style=\"font-size: medium;\"><em>IEEE ICDCS<\/em>,\u00a0<\/span><span style=\"font-size: medium;\">2017.\u00a0<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Tong Li, Chathura Sarathchandra Magurawalage, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_icdcs17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On efficient offloading control in cloud radio access network with mobile edge computing<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d<\/span>, <span style=\"font-size: medium;\"><em>IEEE ICDCS<\/em>,\u00a0<\/span><span style=\"font-size: medium;\">2017.\u00a0<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Suiming Guo,\u00a0Chao Chen,\u00a0Yaxiao Liu,\u00a0Ke Xu,\u00a0Dah Ming Chiu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/suiming_mobiq17.pdf\">It Can be Cheaper: Using Price Prediction to Obtain Better Prices from Dynamic Pricing in Ride-on-demand Services.\u201d<\/a><\/span> <em>ACM MobiQuitous<\/em>, 146-155,\u00a02017<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Ke Xu, Guang Yao, Miao Zhang, Xiaohui Nie. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_sigcomm16.pdf\">PieBridge: A Cross-DR scale Large Data Transmission Scheduling System<\/a><\/span>\u201d,\u00a0<em>ACM SIGCOMM poster<\/em>, 2016.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Qingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingfang_icdcs16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d, <em>IEEE ICDCS<\/em>, 2016.<\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Yuchao Zhang, Ke Xu, Xuelin Shi, Haiyang Wang, Jiangchuan Liu, Yong Wang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_wcnc16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Continuous double auction for cloud market: Pricing and bidding analysis<\/a><\/span>\u201d,<em> IEEE WCNC<\/em>, 2016.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">Tong Li, Ke Xu, Meng Shen, Haiyang Wang, Kun Yang, Yuchao Zhang. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_icccn16.pdf\">Towards Minimal Tardiness of Data-intensive Applications in Heterogeneous Networks<\/a><\/span>\u201d,\u00a0<em>IEEE ICCCN<\/em>, 2016.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Lei Zhang, Cong Zhang, Jiangchuan Liu, Xiaowen Chu, Ke Xu, Haiyang Wang, Yong Jiang. \u201c<\/span><\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_icccn16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Power-Aware Wireless Transmission for Computation Offloading in Mobile Cloud<\/a><span style=\"color: #000000;\"><span style=\"font-size: large;\">\u201d, <span style=\"font-size: medium;\"><em>IEEE ICCCN<\/em>, 2016.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Qingfang Liu, Ke Xu, Haiyang Wang, Lei Xu. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingfang_mswim15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Modeling Multi-path TCP Throughput with Coupled Congestion Control and Flow Control<\/span><\/a><span style=\"font-size: large;\">\u201d<\/span>, <em>ACM MSWiM, <\/em>2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Yifeng Zhong, Ke Xu, Xiang-Yang Li, Hui Su, Qingyang Xiao. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yifeng_globecom15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">ESTRA: Incentivizing Storage Trading for Edge Caching in Mobile Content Delivery<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE GLOBECOM,\u00a0<\/em>2015. (Best Paper Award)<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Bo Wu. \u201c<\/span><\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yi_ipccc15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Lifetime Maximization in Rechargeable Wireless Sensor Networks with Charging Interference<\/a><\/span><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE IPCCC<\/em>, 2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Menghan Li, Dan Pei, Xiaoping Zhang, Beichuang Zhang, Ke Xu. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/menghan_icccn15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NDN Live Video Broadcasting over Wireless LAN<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE ICCCN,\u00a0<\/em>2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Meng Shen, Ke Xu, Fan Li, Kun Yang, Liehuang Zhu, Lei Guan, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_icpp15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-Tier Applications<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE ICPP, <\/em>2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Lei Xu, Ke Xu, Yong Jiang, Fengyuan Ren, Haiyang Wang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_iwqos15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Enhancing TCP Incast Congestion Control Over Large-scale Datacenter Networks<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE\/ACM\u00a0IWQoS, <\/em>2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Yuchao Zhang, Ke Xu, Haiyang Wang, Jiangchuan Liu, Yifeng Zhong, Wenlong Chen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_iwqos15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Performance and Incentive of Teamwork-based Channel Allocation in Spectrum Access Networks<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE IWQoS, <\/em>2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haitao Li, Yanfang Le, Feng Wang, Jiangchuan Liu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_cloud15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SNACS: Social Network-Aware Cloud Assistance for Online Propagated Video Sharing<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE CLOUD, <\/em>2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Li Li, Ke Xu, Dan Wang, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/li_infocom15.pdf\">A Measurement Study on the TCP Behaviors in HSPA+ Networks on High-speed Rails<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE INFOCOM,<\/em> 2015.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yudong Zhao, Ke Xu, Rashid Mijumbi, Meng Shen. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yudong_bigcom15.pdf\">\u201cDesign and Evaluation of a Policy-Based Security Routing and Switching System for Data Interception Attacks.\u201d<\/a><\/span><em><i>BigCom<\/i><\/em> 2015<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">Yuchao Zhang, Ke Xu, Haiyang Wang, Meng Shen. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/yuchao_ipccc15.pdf\">&#8220;Towards shorter task completion time in datacenter networks&#8221;<\/a><\/span>, <em><i>IPCCC, <\/i><\/em>2015.<\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ipccc14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Achieving Bandwidth Guarantees in Multi-tenant Cloud Networks Using A Dual-Hose Model<span style=\"font-size: large;\">\u201d<\/span><\/a><\/span>, <em>IEEE IPCCC<\/em> 2014.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ipccc14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Online Combinatorial Double Auction for Mobile Cloud Computing Markets<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE IPCCC<\/em> 2014.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Qingyang Xiao, Ke Xu, Dan Wang, Li Li, Yifeng Zhong, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/qingyang_icnp14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TCP Performance over Mobile Networks in High-speed Mobility Scenarios<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>,\u00a0<em>IEEE ICNP<\/em>\u00a02014.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Meng Shen, Ke Xu, Kun Yang, Hsiao-Hwa Chen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_iwqos14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards Efficient Virtual Network Embedding Across Multiple Network Domains<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>,\u00a0<em>IEEE\/ACM\u00a0<\/em><em>IWQoS\u00a0<\/em>2014.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_icc14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Incentive of Customer-Provided Resource Sharing in Cloud<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>,<em>\u00a0IEEE ICC<\/em>\u00a02014.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_infocom13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">Video Requests from Online Social Networks: Characterization, Analysis and Generation<\/span><\/a><span style=\"font-size: large;\">\u201d<\/span>, <em>IEEE INFOCOM 2013<\/em>.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haitao Li, Xiaoqiang Ma, Feng Wang, Jiangchuan Liu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_cikm13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Popularity Prediction of Videos Shared in Online Social Networks<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>, <em>ACM International Conference on Information &amp; Knowledge Management (CIKM)<\/em>, 2013: 169-178.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Guangwu Hu, Ke Xu, Jianping Wu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangwu_hpcc13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SuperFlow: A Reliable, Controllable, Manageable and Scalable Architecture for Large-scale Enterprise Networks<\/a><\/span><span style=\"font-size: large;\">\u201d<\/span>,\u00a0<em>IEEE HPCC\u00a0<\/em>2013.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Min Zhu, Ning Wang, Song Lin, Haiyang Wang, Tong Li, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_iscc13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The 2ACT Model-based Evaluation for In-network Caching Mechanism<\/a><\/span>\u201d,\u00a0<em>The IEEE symposium on Computers and Communications (ISCC),<\/em>\u00a02013.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haitao Li, Haiyang Wang, Jiangchuan Liu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_nossdav12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Video Sharing in Online Social Networks: Measurement and Analysis<\/a><\/span>\u201d, <em>ACM NOSSDAV 2012<\/em>.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Zhen Ma, Ke Xu, Yifeng Zhong, <span style=\"color: #3366ff;\">\u201c<a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhen_iwqos12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Exploring the Policy Selection of P2P VoD System-A Simulation based Research<\/a>\u201d<\/span>,\u00a0<em>IEEE\/ACM IWQoS<\/em>\u00a02012.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Meng Shen, Hongying Liu, Ke Xu, Ning Wang, Yifeng Zhong, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_ifip12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Routing on Demand: Toward the Energy-aware Traffic Engineering with OSPF<\/a><\/span>\u201d, <em>IFIP\/TC6 Networking<\/em>, 2012: 232-246.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haiyang Wang, Feng Wang, Jiangchuan Liu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_ifip12.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Enhancing Efficiency for Peer-to-Peer Traffic Locality: Measurement, Design and \u00a0Future Trends<\/a><\/span>\u201d, <em>IFIP\/TC6 Networking<\/em>, 2012.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Hongying Liu, Jiangchuan Liu, Meng Shen,\u00a0\u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_icdcs11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPF<\/a><\/span>\u201d, <em>IEEE ICDCS<\/em>\u00a02011.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Meng Shen, Mingjiang Ye, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_infocom11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Model Approach to Estimate Peer-to-Peer Traffic Matrices<\/a><\/span>\u201d, <em>IEEE INFOCOM<\/em>\u00a02011.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Haitao Li, Jiangchuan Liu, Wei Zhu, Wenyu Wang, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_iwqos10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PPVA: A Universal and Transparent Peer-to-Peer Accelerator for Interactive Online Video Sharing<\/a><\/span>\u201d, <em>IEEE IWQoS<\/em>\u00a02010.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haiyang Wang, Jiangchuan Liu, Bo Chen, Ke Xu, Zhen Ma, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haiyang_p2p10.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">On Tracker Selection for Peer-to-Peer Traffic Locality<\/a><\/span>\u201d,\u00a0<em>IEEE P2P, <\/em>2010.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Haitao Li, Ke Xu, James Seng, Po Hu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/haitao_ipccc09.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Towards health of replication in large-scale P2P-VoD systems<\/a><\/span>\u201d,\u00a0<em>IEEE IPCCC<\/em>\u00a02009.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Xiaowei Ma, Chunyu Liu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_icc08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Hash Tree Based Authentication Scheme in SIP Applications<\/a><\/span>\u201d,\u00a0<em>IEEE ICC<\/em>\u00a02008.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Minpeng Qi, Haitao Li, Peng Yang, Hui Deng, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_icc08_.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">A Novel Interfacing Solution to Make IKEv2 Work in MIPv6 Environment<\/a><\/span>\u201d,\u00a0<em>IEEE ICC<\/em>\u00a02008.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Yahui Yang, Tao Chen, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_euc08.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Improving BitTorrent Network&#8217;s Performance via Deploying Helpers<\/a><\/span>\u201d,\u00a0<em>IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC),<\/em>\u00a02008.<\/span><\/span><\/span><\/li>\r\n \t<li><span style=\"font-weight: 400; color: #000000;\"><span style=\"font-weight: 400;\"><span style=\"font-size: medium;\">Ke Xu, Jiangchuang Liu, Lizheng Fu, Chunyu Liu, \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_lncs06.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">On the Stability of Application-layer Multicast Tree<\/span><\/a>\u201d,\u00a0<em>ISCIS 2006, LNCS 4263<\/em>\u00a02006.<\/span><\/span><\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"color: #000000;\"><strong>4. \u4e2d\u6587\u671f\u520a(Chinese Journal)<\/strong><\/span><\/h2>\r\n<ul>\r\n \t<li><span style=\"color: #000000;\">\u5085\u5ddd\u6ea5, \u674e\u7426, \u5f90\u606a. <a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_scis_chinese_2025.pdf\"><span style=\"color: #000000;\">\u201c<\/span><\/a><\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/chuanpu_scis_chinese2025.pdf\">\u667a\u80fd\u653b\u51fb\u6d41\u91cf\u68c0\u6d4b\u7cfb\u7edf\u7684\u8bad\u7ec3\u52a0\u901f\u65b9\u6cd5\uff1a \u57fa\u4e8e\u6d41\u91cf\u7279\u5f81\u7a7a\u95f4\u70b9\u4e91\u5f62\u5fc3\u7684\u6570\u636e\u96c6\u538b\u7f29<\/a><\/span><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ruanjian23.pdf\">\u201d<\/a><span style=\"font-size: medium;\">,<\/span> \u4e2d\u56fd\u79d1\u5b66\u4fe1\u606f\u79d1\u5b66, 2025<\/span>.<\/li>\r\n \t<li><span style=\"color: #000000;\">\u9ec4\u7ff0\u6797, \u5f90\u606a, \u674e\u7426, \u674e\u5f64, \u4ed8\u677e\u6d9b, \u9ad8\u7fd4\u5b87. <a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songsong_scis_chinese_2023.pdf\"><span style=\"color: #000000;\">\u201c<\/span><\/a><\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hanlin_aes2024.pdf\">\u53ef\u6269\u5c55\u7684\u7f51\u7edc\u9a8c\u8bc1\u6280\u672f: \u7814\u7a76\u73b0\u72b6\u4e0e\u53d1\u5c55\u8d8b\u52bf<\/a><\/span><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ruanjian23.pdf\">\u201d<\/a><span style=\"font-size: medium;\">,<\/span> \u7535\u5b50\u5b66\u62a5, 2024<\/span>.<\/li>\r\n \t<li><span style=\"color: #000000;\">\u5f90\u677e\u677e, \u8fc7\u6653\u51b0, \u5f90\u606a. <a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/songsong_scis_chinese_2023.pdf\">\u201c<span style=\"color: #3366ff;\">\u53ef\u9a8c\u8bc1\u5e03\u9686\u8fc7\u6ee4\u5668: \u52a0\u901f\u533a\u5757\u94fe\u4e2d\u7684\u4e0d\u5b58\u5728\u67e5\u8be2\u4e0e\u8bc1\u660e\u201d<\/span><\/a><span style=\"font-size: medium; color: #3366ff;\">, <\/span><em>\u4e2d\u56fd\u79d1\u5b66\uff1a\u4fe1\u606f\u79d1\u5b66,<\/em> 1-20, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u674e\u5f64, \u90d1\u51ef, \u5f90\u606a. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/tong_ruanjian23.pdf\">\u201c\u4f20\u8f93\u63a7\u5236\u4e2d\u7684\u786e\u8ba4\u673a\u5236\u7814\u7a76\u201d<\/a><\/span><span style=\"font-size: medium;\">, <\/span><em>\u8f6f\u4ef6\u5b66\u62a5<\/em>, 1-29, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u51af\u5b66\u4f1f, \u5f90\u606a, \u674e\u7426, \u6768\u5b87\u7fd4, \u6731\u654f, \u4ed8\u677e\u6d9b. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xuewei_ruanjian23.pdf\">\u201c\u8f7b\u91cf\u7ea7\u94fe\u5f0f\u9a8c\u8bc1\u7684\u7f51\u7edc\u4f20\u8f93\u5c42\u5b89\u5168\u6027\u589e\u5f3a\u65b9\u6cd5\u201d<\/a><\/span><span style=\"font-size: medium;\">, <\/span><em>\u8f6f\u4ef6\u5b66\u62a5,<\/em> 1-19, 2023.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u5468\u5e7f\u731b, \u59da\u82cf, \u674e\u7433, \u5218\u6615, \u5f90\u606a. <a href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangmeng_zgkx21.pdf\">\u201c<span style=\"color: #3366ff;\">\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u6570\u5b57\u5185\u5bb9\u751f\u6001\u4ef7\u503c\u94fe\u6784\u5efa<\/span>\u201d<\/a>. <em>\u4e2d\u56fd\u79d1\u5b66 (\u4fe1\u606f\u79d1\u5b66)<\/em>, 51(9), 1559-1574, 2021.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f90\u606a, \u4ed8\u677e\u6d9b, \u674e\u7426, \u5218\u51b0\u6d0b, \u6c5f\u4f1f\u7389, \u5434\u6ce2, \u51af\u5b66\u4f1f. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_computer20_1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u5185\u751f\u5b89\u5168\u4f53\u7cfb\u7ed3\u6784\u7814\u7a76\u8fdb\u5c55<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f90\u606a, \u51cc\u601d\u901a, \u674e\u7426, \u5434\u6ce2, \u6c88\u8499, \u5f20\u667a\u8d85, \u59da\u82cf, \u5218\u6615, \u674e\u7433. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_computer20_2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u57fa\u4e8e\u533a\u5757\u94fe\u7684\u7f51\u7edc\u5b89\u5168\u4f53\u7cfb\u7ed3\u6784\u4e0e\u5173\u952e\u6280\u672f\u7814\u7a76\u8fdb\u5c55<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020, 43(15): 1-30.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u6c88\u8499, \u5f20\u6770, \u795d\u70c8\u714c, \u5f90\u606a, \u5f20\u5f00\u7fd4, \u5510\u6e58\u4e91. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_computer20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u9762\u5411\u5f81\u4fe1\u6570\u636e\u5b89\u5168\u5171\u4eab\u7684SVM\u8bad\u7ec3\u673a\u5236<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u675c\u946b\u4e50, \u5f90\u606a, \u674e\u5f64, \u90d1\u51ef, \u4ed8\u677e\u6d9b, \u6c88\u8499. \u201c<\/span><a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinle_computer20.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">\u6570\u636e\u4e2d\u5fc3\u7f51\u7edc\u7684\u6d41\u91cf\u63a7\u5236: \u7814\u7a76\u73b0\u72b6\u4e0e\u8d8b\u52bf<\/span><\/a><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2020, 43(17): 1-23.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f90\u606a, \u5434\u6ce2, \u6c88\u8499. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_zte18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u533a\u5757\u94fe: \u63cf\u7ed8\u7269\u8054\u7f51\u5b89\u5168\u65b0\u613f\u666f<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u4e2d\u5174\u901a\u8baf\u6280\u672f<\/em>, 2018, 24(6): 52-55.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u674e\u6325, \u90ac\u6c5f\u5174, \u90a2\u51ef\u8f69, \u4f0a\u9e4f, \u9648\u4e16\u80dc, \u6881\u4f1f\uff0c\u5f90\u606a\u7b49. (2019). <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hui_zgkx19.pdf\">\u201c\u591a\u8fb9\u5171\u7ba1\u7684\u591a\u6a21\u6001\u7f51\u7edc\u6807\u8bc6\u57df\u540d\u751f\u6210\u7ba1\u7406\u89e3\u6790\u539f\u578b\u7cfb\u7edf\u201d<\/a><\/span>. <em>\u4e2d\u56fd\u79d1\u5b66\uff1a\u4fe1\u606f\u79d1\u5b66<\/em>, 2019.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u845b\u5fd7\u8bda, \u5f90\u606a, \u9648\u9753, \u674e\u5f64, \u59da\u9f99, \u6c88\u8499. <span style=\"color: #3366ff;\"><span style=\"font-size: medium;\">\u201c<\/span><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/zhicheng_cjc18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e00\u79cd\u79fb\u52a8\u5185\u5bb9\u5206\u53d1\u7f51\u7edc\u7684\u5206\u5c42\u534f\u540c\u7f13\u5b58\u673a\u5236<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400; color: #3366ff;\">\u201d<\/span>,<\/span> <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2018, 41(12): 2769-2786.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f90\u78ca, \u5f90\u606a. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/lei_jtu18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u8303\u5f0f\u8def\u7531\u5668: \u89c4\u8303\u8def\u7531\u5668\u6570\u636e\u5c42\u7684\u52a8\u6001\u884c\u4e3a<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u6e05\u534e\u5927\u5b66\u5b66\u62a5\uff08\u81ea\u7136\u79d1\u5b66\u7248\uff09<\/em>, 2018, 58(8): 693-697.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u6731\u4eae, \u5f90\u606a, \u51af\u6885. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_aes18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u52a8\u6001\u5730\u5740\u547d\u540d\u4e0e\u89e3\u6790\u670d\u52a1<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u7535\u5b50\u5b66\u62a5<\/em><\/span><span style=\"font-size: medium;\">, 2018, 46(5): 1089-1094.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u82cf\u8f89, \u8c2d\u5d0e, \u8d75\u4e59, \u5f90\u606a. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hui_jtu18.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u79fb\u52a8\u8865\u8d34\u5e02\u573a\u8fd0\u8425\u5546\u5b9a\u4ef7\u7b56\u7565\u4e0e\u6536\u76ca\u5206\u914d<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u6e05\u534e\u5b66\u62a5\uff08\u81ea\u7136\u79d1\u5b66\u7248\uff09<\/em>, 2018, 58(1): 8-13.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u5f90\u606a, \u59da\u6587\u5175. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_gdgydxxb18.pdf\">\u201c\u8d5b\u535a\u667a\u80fd\u7ecf\u6d4e\u4e0e\u533a\u5757\u94fe\u201d<\/a><\/span>. <em>\u5e7f\u4e1c\u5de5\u4e1a\u5927\u5b66\u5b66\u62a5<\/em>, 35(03), 1-9, 2018.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u738b\u6653\u4eae, \u5f90\u606a, \u6768\u94ee, \u845b\u5fd7\u8bda. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xiaoliang_cjc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">TinyLoc: \u4e00\u79cd\u9762\u5411\u80fd\u8017\u53d7\u9650\u7684\u53ef\u7a7f\u6234\u8bbe\u5907\u7684\u5ba4\u5185\u5b9a\u4f4d\u7b97\u6cd5<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2017, 40(8): 1813-1828.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f90\u606a, \u8d75\u7389\u4e1c, \u9648\u6587\u9f99, \u6c88\u8499. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_cjc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u9632\u5fa1\u6570\u636e\u7a83\u542c\u653b\u51fb\u7684\u8def\u7531\u4ea4\u6362\u8303\u5f0f\u4f53\u7cfb<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2017, 40(7): 1649-1663.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u6bdb\u535a, \u5f90\u606a, \u91d1\u8dc3\u8f89, \u738b\u6653\u4eae. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/bo_cjc17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">DeepHome: \u4e00\u79cd\u57fa\u4e8e\u6df1\u5ea6\u5b66\u4e60\u7684\u667a\u80fd\u5bb6\u5c45\u7ba1\u63a7\u6a21\u578b<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 2017,40(8): 1-15.<\/span>\u200b<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f20\u6b23\u6b23, \u5f90\u606a, \u949f\u5b9c\u5cf0, \u82cf\u8f89. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/xinxin_jzu17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u7f51\u7edc\u670d\u52a1\u63d0\u4f9b\u5546\u5408\u4f5c\u884c\u4e3a\u7684\u6f14\u5316\u535a\u5f08\u5206\u6790<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u6d59\u6c5f\u5927\u5b66\u5b66\u62a5\uff08\u5de5\u5b66\u7248\uff09<\/em>, 2017, 51(6): 1214-1224.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u6731\u4eae, \u5f90\u606a, \u5f90\u78ca. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_jcrd17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e00\u79cd\u5f62\u5f0f\u5316\u7684\u4e92\u8054\u7f51\u5730\u5740\u673a\u5236\u901a\u7528\u6846\u67b6<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, <em>\u8ba1\u7b97\u673a\u7814\u7a76\u4e0e\u53d1\u5c55<\/em>, 2017, 54(5): 940-951.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u200b<span style=\"font-size: medium;\">\u6731\u4eae, \u5f90\u606a<\/span><span style=\"font-size: medium;\">. \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/liang_jxju17.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u901a\u7528\u5730\u5740\u4f53\u7cfb\u6846\u67b6<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>,\u00a0<em>\u897f\u5b89\u4ea4\u901a\u5927\u5b66\u5b66\u62a5<\/em>,\u00a0 2017, 51(2): 6-12.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u9676\u5efa\u534e, \u5218\u745e\u633a, \u5f90\u606a, \u97e9\u4f1f\u529b, \u5f20\u534e\u5e73, \u4e8e\u5251, \u7530\u4e30, \u6881\u6653\u8f89. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianhua_kjdb16.pdf\">\u201c\u4e2d\u56fd\u8ba1\u7b97\u673a\u53d1\u5c55\u7b80\u53f2\u201d<\/a><\/span>. <em>\u79d1\u6280\u5bfc\u62a5<\/em>, 34(14), 12-21, 2016.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\">\u5b9b\u8003, \u7f57\u96ea\u5cf0, \u6c5f\u52c7, \u5f90\u606a. <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/kao_cjc16.pdf\">\u201c\u8f6f\u4ef6\u5b9a\u4e49\u7f51\u7edc\u7cfb\u7edf\u4e2d\u9762\u5411\u6d41\u7684\u8c03\u5ea6\u7b97\u6cd5\u201d<\/a><\/span>. <em>\u8ba1\u7b97\u673a\u5b66\u62a5<\/em>, 39(6): 1208-1223, 2016<\/span>.<\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">\u5f90\u606a, \u6768\u5e06, \u5434\u6ce2. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ccfc16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4fdd\u8bc1\u6e90\u548c\u8def\u5f84\u771f\u5b9e\u6027\u7684\u8f6c\u53d1\u9a8c\u8bc1\u673a\u5236<\/a><\/span>\u201d,<em> \u4e2d\u56fd\u8ba1\u7b97\u673a\u5b66\u4f1a\u901a\u8baf<\/em>, 12(5):14-19, 2016.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">\u674e\u8d3a\u6b66, \u5434\u831c, \u5f90\u606a, \u5434\u5efa\u5e73, \u6768\u589e\u5370, \u6c5f\u5353, \u6731\u4eae. \u201c<a style=\"color: #000000;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hewu_str16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #3366ff;\">\u5929\u5730\u4e00\u4f53\u5316\u7f51\u7edc\u7814\u7a76\u8fdb\u5c55\u4e0e\u8d8b\u52bf<\/span><\/a>\u201d, <em>\u79d1\u6280\u5bfc\u62a5<\/em>, 34(14): 95-106, 2016.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">\u9676\u5efa\u534e, \u5218\u745e\u633a, \u5f90\u606a, \u97e9\u4f1f\u529b, \u5f20\u534e\u5e73, \u4e8e\u5251, \u7530\u4e30, \u6881\u6653\u8f89. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/jianhua_str16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e2d\u56fd\u8ba1\u7b97\u673a\u53d1\u5c55\u7b80\u53f2<\/a><\/span>\u201d, <em>\u79d1\u6280\u5bfc\u62a5<\/em>, 34(14): 12-21, 2016.<\/span><\/li>\r\n \t<li><span style=\"font-size: medium; color: #000000;\">\u82cf\u8f89, \u5f90\u606a, \u6c88\u8499, \u738b\u52c7, \u949f\u5b9c\u5cf0, \u674e\u5f64. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/hui_jcrd16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u4e92\u8054\u7f51\u6d41\u91cf\u8865\u8d34\u6a21\u578b\u7814\u7a76\u4e0e\u5b9e\u4f8b\u5206\u6790<\/a><\/span>\u201d, \u00a0<em>\u8ba1\u7b97\u673a\u7814\u7a76\u4e0e\u53d1\u5c55<\/em>,\u00a0 53(4): 861-872, 2016.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u5f90\u606a, \u6c88\u8499, \u9648\u6587\u9f99. \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_ccfc15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u57fa\u4e8e\u8def\u7531\u4ea4\u6362\u8303\u5f0f\u6784\u5efa\u5b89\u5168\u53ef\u4fe1\u7f51\u7edc<\/a><\/span><\/span><span style=\"font-size: medium;\">\u201d, <em>\u4e2d\u56fd\u8ba1\u7b97\u673a\u5b66\u4f1a\u901a\u8baf<\/em>, 11(1): 29-35, 2015.<\/span><\/span><\/li>\r\n<\/ul>\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"color: #000000;\"><strong>5. Books<\/strong><\/span><\/h2>\r\n<div class=\"paragraph\" style=\"text-align: left;\">\r\n<ul>\r\n \t<li><span style=\"color: #000000;\">Meng Shen, Liehuang Zhu, Ke Xu, \u201c<span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_book_springer2020.pdf\">Blockchain: Empowering Secure Data Sharing<\/a><\/span>\u201d,Springer 2020, ISBN 978-981-15-5938-9, pp. 1-130<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Yuchao Zhang, Ke Xu,\u00a0<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.springer.com\/gp\/book\/9789811501371\" target=\"_blank\" rel=\"noopener noreferrer\">Network Management in Cloud and Edge Computing<\/a><\/span><span style=\"font-size: medium;\">. Springer, 2020.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Ke Xu, Yifeng Zhong, Huan He,\u00a0<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_book13.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Resource Pricing Models<\/a><\/span><span style=\"font-size: medium;\">. Springer, 2013.<\/span><\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<h2 class=\"wsite-content-title\" style=\"text-align: left;\"><span style=\"color: #000000;\"><strong>6. Technical Reports<\/strong><\/span><\/h2>\r\n<div class=\"paragraph\" style=\"text-align: justify;\">\r\n<ul>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">\u201c<\/span><\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/LargeModelSecurityPracticesWhitePaper.pdf\">Large Model Security Practices<\/a><\/span><span style=\"color: #000000;\"><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span><\/span>, White paper, 2024.<\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen, \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/ke_tr14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Online Combinatorial Double Auction for Mobile Cloud Computing Markets<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, 2014.<\/span><\/span><\/li>\r\n \t<li><span style=\"color: #000000;\"><span style=\"font-size: medium;\">Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu, \u201c<\/span><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/meng_tr14.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Supplementary File of the IEEE IPCCC Submission<\/a><\/span><span style=\"font-size: medium;\"><span style=\"font-weight: 400;\">\u201d<\/span>, 2014.<\/span><\/span><\/li>\r\n<\/ul>\r\n<\/div>\r\n<!--more-->","protected":false},"excerpt":{"rendered":"1. Magazine Publications Xuewei Feng, Qi Li, Kun Sun, K [&hellip;]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/14"}],"collection":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":244,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":736,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/14\/revisions\/736"}],"wp:attachment":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}