default search action
Kuai Xu
Person information
- affiliation: Arizona State University, School of Mathematical and Natural Sciences, Tempe, AZ, USA
- affiliation (former): Yahoo! Inc., Sunnyvale, CA, USA
- affiliation (PhD 2006): University of Minnesota, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c50]Yinxin Wan, Xuanli Lin, Kuai Xu, Feng Wang, Guoliang Xue:
Extracting Spatial Information of IoT Device Events for Smart Home Safety Monitoring. INFOCOM 2023: 1-10 - [c49]Yinxin Wan, Xuanli Lin, Abdulhakim Sabur, Alena Chang, Kuai Xu, Guoliang Xue:
IoT System Vulnerability Analysis and Network Hardening with Shortest Attack Trace in a Weighted Attack Graph. IoTDI 2023: 315-326 - [c48]Feng Wang, Kuai Xu, Guoliang Xue:
A Holistic Curriculum Towards Teaching Smart Home Security. SIGCSE (2) 2023: 1284 - 2022
- [b1]Kuai Xu:
Network Behavior Analysis - Measurement, Models, and Applications. Springer 2022, ISBN 978-981-16-8324-4, pp. 1-163 - [j26]Guoliang Xue, Yinxin Wan, Xuanli Lin, Kuai Xu, Feng Wang:
An Effective Machine Learning Based Algorithm for Inferring User Activities From IoT Device Events. IEEE J. Sel. Areas Commun. 40(9): 2733-2745 (2022) - [j25]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
IoTAthena: Unveiling IoT Device Activities From Network Traffic. IEEE Trans. Wirel. Commun. 21(1): 651-664 (2022) - [c47]Keith Erkert, Andrew Lamontagne, Jereming Chen, John Cummings, Mitchell Hoikka, Kuai Xu, Feng Wang:
An End-to-End System for Monitoring IoT Devices in Smart Homes. CCNC 2022: 929-930 - [c46]Xuanli Lin, Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities. ICCCN 2022: 1-10 - [c45]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart Homes. INFOCOM 2022: 370-379 - 2021
- [j24]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks. IEEE Trans. Netw. Sci. Eng. 8(1): 89-101 (2021) - [i3]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
IoTAthena: Unveiling IoT Device Activities from Network Traffic. CoRR abs/2105.14405 (2021) - 2020
- [j23]Kai Lei, Junjie Fang, Qichao Zhang, Junjun Lou, Maoyu Du, Jiyue Huang, Jianping Wang, Kuai Xu:
Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks. J. Grid Comput. 18(4): 593-613 (2020) - [j22]Kuai Xu, Feng Wang, Sergio Jimenez, Andrew Lamontagne, John Cummings, Mitchell Hoikka:
Characterizing DNS Behaviors of Internet of Things in Edge Networks. IEEE Internet Things J. 7(9): 7991-7998 (2020) - [j21]Kuai Xu, Feng Wang, Haiyan Wang, Yufang Wang, Ying Zhang:
Mitigating the Impact of Data Sampling on Social Media Analysis and Mining. IEEE Trans. Comput. Soc. Syst. 7(2): 546-555 (2020) - [c44]Yinxin Wan, Kuai Xu, Guoliang Xue, Feng Wang:
IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes. INFOCOM 2020: 874-883
2010 – 2019
- 2019
- [j20]Kai Lei, Qichao Zhang, Junjun Lou, Bo Bai, Kuai Xu:
Securing ICN-Based UAV Ad Hoc Networks with Blockchain. IEEE Commun. Mag. 57(6): 26-32 (2019) - [j19]Kuai Xu, Yinxin Wan, Guoliang Xue:
Powering Smart Homes with Information-Centric Networking. IEEE Commun. Mag. 57(6): 40-46 (2019) - [c43]Kai Lei, Maoyu Du, Liwei Yang, Jin Liu, Jiyue Huang, Danxia Xie, Kuai Xu:
Towards Decentralized Equilibrium Asset Trading Based on Blockchain. HPCC/SmartCity/DSS 2019: 1461-1468 - [c42]Kai Lei, Qiuai Fu, Jiake Ni, Feiyang Wang, Min Yang, Kuai Xu:
Detecting Malicious Domains with Behavioral Modeling and Graph Embedding. ICDCS 2019: 601-611 - [c41]Kuai Xu, Yinxin Wan, Guoliang Xue, Feng Wang:
Multidimensional behavioral profiling of internet-of-things in edge networks. IWQoS 2019: 37:1-37:10 - 2018
- [j18]Kai Lei, Ying Liu, Shangru Zhong, Yongbin Liu, Kuai Xu, Ying Shen, Min Yang:
Understanding User Behavior in Sina Weibo Online Social Network: A Community Approach. IEEE Access 6: 13302-13316 (2018) - [j17]Feng Wang, Ken Orton, Paul Wagenseller III, Kuai Xu:
Towards Understanding Community Interests With Topic Modeling. IEEE Access 6: 24660-24668 (2018) - [j16]Kai Lei, Shangru Zhong, Fangxing Zhu, Kuai Xu, Haijun Zhang:
An NDN IoT Content Distribution Model With Network Coding Enhanced Forwarding Strategy for 5G. IEEE Trans. Ind. Informatics 14(6): 2725-2735 (2018) - [c40]Yi Zhang, Bo Bai, Kuai Xu, Kai Lei:
IFS-RL: An Intelligent Forwarding Strategy Based on Reinforcement Learning in Named-Data Networking. NetAI@SIGCOMM 2018: 54-59 - [c39]Kuai Xu, Feng Wang, Haiyan Wang, Bo Yang:
A First Step Towards Combating Fake News over Online Social Media. WASA 2018: 521-531 - 2017
- [j15]Haojin Zhu, Kuai Xu, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. Peer-to-Peer Netw. Appl. 10(2): 293-295 (2017) - 2016
- [j14]Feng Wang, Haiyan Wang, Kuai Xu, Ross Raymond, Jaime Chon, Shaun Fuller, Anton Debruyn:
Regional Level Influenza Study with Geo-Tagged Twitter Data. J. Medical Syst. 40(8): 189:1-189:8 (2016) - [j13]Xiuzhen Cheng, Miroslaw Kutylowski, Kuai Xu, Haojin Zhu:
Cyber security, crime, and forensics of wireless networks and applications. Secur. Commun. Networks 9(16): 3763-3764 (2016) - [j12]Kuai Xu, Feng Wang, Xiaohua Jia:
Secure the Internet, one home at a time. Secur. Commun. Networks 9(16): 3821-3832 (2016) - [c38]WeiTao Weng, Kai Lei, Kuai Xu, Xiaoyou Liu, Tao Sun:
Internet Traffic Analysis in a Large University Town: A Graphical and Clustering Approach. WAIM (1) 2016: 378-389 - 2015
- [c37]Kai Lei, Chaojun Hou, Lihua Li, Kuai Xu:
A RCP-Based Congestion Control Protocol in Named Data Networking. CyberC 2015: 538-541 - [c36]Kuai Xu, Feng Wang, Xiaohua Jia:
Secure the Internet, One Home at a Time. GLOBECOM 2015: 1-6 - [c35]Kuai Xu, Feng Wang, Xiaohua Jia, Haiyan Wang:
The Impact of Sampling on Big Data Analysis of Social Media: A Case Study on Flu and Ebola. GLOBECOM 2015: 1-6 - [c34]Huiyu Wang, Kai Lei, Kuai Xu:
Profiling the followers of the most influential and verified users on Sina Weibo. ICC 2015: 1158-1163 - [c33]Kai Lei, Weiyang Zhang, Kai Zhang, Kuai Xu:
Extracting unknown words from Sina Weibo via data clustering. ICC 2015: 1182-1187 - [c32]Kai Lei, Fangxing Zhu, Cheng Peng, Kuai Xu:
Network Coding for Effective NDN Content Delivery: Models, Experiments, and Applications. ICPP 2015: 101-110 - [e1]Kuai Xu, Haojin Zhu:
Wireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9204, Springer 2015, ISBN 978-3-319-21836-6 [contents] - 2014
- [j11]Kuai Xu, Feng Wang, Lin Gu, Jianhua Gao, Yaohui Jin:
Characterizing home network traffic: an inside view. Pers. Ubiquitous Comput. 18(4): 967-975 (2014) - [j10]Kuai Xu, Feng Wang, Lin Gu:
Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections. IEEE/ACM Trans. Netw. 22(3): 931-942 (2014) - [c31]Tao Chen, Kai Lei, Kuai Xu:
An encryption and probability based access control model for named data networking. IPCCC 2014: 1-8 - [c30]Timothy Matti, Yuntao Zhu, Kuai Xu:
Financial fraud detection using social media crowdsourcing. IPCCC 2014: 1-2 - [c29]Qian Yu, WeiTao Weng, Kai Zhang, Kai Lei, Kuai Xu:
Hot topic analysis and content mining in social media. IPCCC 2014: 1-8 - [c28]Kai Zhang, Qian Yu, Kai Lei, Kuai Xu:
Characterizing Tweeting Behaviors of Sina Weibo Users via Public Data Streaming. WAIM 2014: 294-297 - [c27]Kuai Xu, Feng Wang, Richard Egli, Aaron Fives, Russell Howell, Odayne Mcintyre:
Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic. WASA 2014: 313-323 - 2013
- [j9]Linwei Niu, Kuai Xu:
Improving schedulability and energy efficiency for real-time systems with (m, k)-guarantee. SIGBED Rev. 10(2): 17 (2013) - [c26]Kuai Xu, Lin Gu, Feng Wang:
Monitoring home network traffic via programmable routers. GLOBECOM 2013: 605-610 - [c25]Kai Lei, Kai Zhang, Kuai Xu:
Understanding Sina Weibo online social network: A community approach. GLOBECOM 2013: 3114-3119 - [c24]Feng Wang, Haiyan Wang, Kuai Xu, Jianhong Wu, Xiaohua Jia:
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model. ICDCS 2013: 307-316 - [c23]Yu Wang, Kuai Xu:
Message from the IPCCC 2013 general chairs. IPCCC 2013: 1 - [i2]Haiyan Wang, Feng Wang, Kuai Xu:
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations. CoRR abs/1310.0505 (2013) - 2012
- [j8]Kuai Xu, Feng Wang, Haiyan Wang:
Lightweight and Informative Traffic Metrics for Data Center Monitoring. J. Netw. Syst. Manag. 20(2): 226-243 (2012) - [j7]Wei Zhang, Weili Wu, Feng Wang, Kuai Xu:
Positive influence dominating sets in power-law graphs. Soc. Netw. Anal. Min. 2(1): 31-37 (2012) - [c22]Kuai Xu, Feng Wang, Michael Lee:
HomeTPS: Uncovering what is happening in home networks. CCNC 2012: 40-41 - [c21]Feng Wang, Haiyan Wang, Kuai Xu:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. ICDCS Workshops 2012: 133-139 - [c20]Feng Wang, Kuai Xu, Haiyan Wang:
Discovering Shared Interests in Online Social Networks. ICDCS Workshops 2012: 163-168 - [c19]Kuai Xu, Feng Wang, Lin Gu:
Profiling-as-a-Service in Multi-tenant Cloud Computing Environments. ICDCS Workshops 2012: 461-465 - [c18]Kuai Xu, Feng Wang, Lin Gu, Jianhua Gao, Yaohui Jin:
Characterizing Home Network Traffic: An Inside View. WASA 2012: 60-71 - 2011
- [j6]Feng Wang, David Hongwei Du, Erika Camacho, Kuai Xu, Wonjun Lee, Yan Shi, Shan Shan:
On positive influence dominating sets in social networks. Theor. Comput. Sci. 412(3): 265-269 (2011) - [c17]Kuai Xu, Feng Wang:
Behavioral Graph Analysis of Internet Applications. GLOBECOM 2011: 1-5 - [c16]Yingying Chen, Sourabh Jain, Vijay Kumar Adhikari, Zhi-Li Zhang, Kuai Xu:
A first look at inter-data center traffic characteristics via Yahoo! datasets. INFOCOM 2011: 1620-1628 - [c15]Kuai Xu, Feng Wang, Lin Gu:
Network-aware behavior clustering of Internet end hosts. INFOCOM 2011: 2078-2086 - [i1]Feng Wang, Haiyang Wang, Kuai Xu:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. CoRR abs/1108.0442 (2011) - 2010
- [j5]Kuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang:
Real-time behaviour profiling for network monitoring. Int. J. Internet Protoc. Technol. 5(1/2): 65-80 (2010) - [j4]Kuai Xu, Jaideep Chandrashekar, Zhi-Li Zhang:
Principal component analysis of BGP update streams. J. Commun. Networks 12(2): 191-197 (2010) - [c14]Kuai Xu, Feng Wang, Bin Wang:
Behavior Profiling and Analysis in Wireless Home Networks. CCNC 2010: 1-2 - [c13]Ang Li, Lin Gu, Kuai Xu:
Fast Anomaly Detection for Large Data Centers. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [c12]Feng Wang, Erika Camacho, Kuai Xu:
Positive Influence Dominating Set in Online Social Networks. COCOA 2009: 313-321 - 2008
- [j3]Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya:
Internet traffic behavior profiling for network security monitoring. IEEE/ACM Trans. Netw. 16(6): 1241-1252 (2008) - [c11]Kuai Xu, Feng Wang:
Cooperative Monitoring for Internet Data Centers. IPCCC 2008: 111-118 - 2007
- [j2]Feng Wang, Kuai Xu, My T. Thai, Ding-Zhu Du:
Fault tolerant topology control for one-to-all communications in symmetric wireless networks. Int. J. Sens. Networks 2(3/4): 163-168 (2007) - [j1]Zhenhai Duan, Jaideep Chandrashekar, Jeffrey Krasky, Kuai Xu, Zhi-Li Zhang:
Damping BGP route flaps. J. Commun. Networks 9(4): 490-498 (2007) - [c10]Kuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang:
A Real-Time Network Traffic Profiling System. DSN 2007: 595-605 - [c9]Yu Jin, Zhi-Li Zhang, Kuai Xu, Feng Cao, Sambit Sahu:
Identifying and tracking suspicious activities through IP gray space analysis. MineNet 2007: 7-12 - 2005
- [c8]Shu Tao, Kuai Xu, Antonio Jose Estepa, Teng Fei, Lixin Gao, Roch Guérin, James F. Kurose, Donald F. Towsley, Zhi-Li Zhang:
Improving VoIP quality through path switching. INFOCOM 2005: 2268-2278 - [c7]Kuai Xu, Jaideep Chandrashekar, Zhi-Li Zhang:
A first step toward understanding inter-domain routing dynamics. MineNet 2005: 207-212 - [c6]Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya:
Profiling internet backbone traffic: behavior models and applications. SIGCOMM 2005: 169-180 - [c5]Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya:
Reducing Unwanted Traffic in a Backbone Network. SRUTI 2005 - 2004
- [c4]Shu Tao, Kuai Xu, Ying Xu, Teng Fei, Lixin Gao, Roch Guérin, James F. Kurose, Donald F. Towsley, Zhi-Li Zhang:
Exploring the Performance Benefits of End-to-End Path Switching. ICNP 2004: 304-315 - [c3]Zhenhai Duan, Jaideep Chandrashekar, Jeffrey Krasky, Kuai Xu, Zhi-Li Zhang:
Damping BGP route flaps. IPCCC 2004: 131-138 - [c2]Kuai Xu, Zhenhai Duan, Zhi-Li Zhang, Jaideep Chandrashekar:
On Properties of Internet Exchange Points and Their Impact on AS Topology and Relationship. NETWORKING 2004: 284-295 - [c1]Shu Tao, Kuai Xu, Ying Xu, Teng Fei, Lixin Gao, Roch Guérin, James F. Kurose, Donald F. Towsley, Zhi-Li Zhang:
Exploring the performance benefits of end-to-end path switching. SIGMETRICS 2004: 418-419
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint