Biblio

Export 33 results:
Filters: Author is Kai Chen  [Clear All Filters]
2018
Yuan X, Chen Y, Zhao Y, Long Y, Liu X, Chen K, Zhang S, Huang H, Wang XF, Gunter CA.  2018.  CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 27th USENIX Security Symposium (USENIX Security 18). :49--64.
Chen L, Xia J, Yi B, Chen K.  2018.  PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication. 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). :561--578.
2017
Chen L, Chen K, Zhu Z, Yu M, Porter G, Qiao C, Zhong S.  2017.  Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :577--593.
2016
Bai W, Chen L, Chen K, Wu H.  2016.  Enabling ECN in Multi-Service Multi-Queue Data Centers. 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). :537--549.
2015
Hu S, Chen K, Wu H, Bai W, Lan C, Wang H, Zhao H, Guo C.  2015.  Explicit Path Control in Commodity Data Centers: Design and Applications. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :15--28.
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th USENIX Security Symposium (USENIX Security 15). :659--674.
Bai W, Chen L, Chen K, Han D, Tian C, Wang H.  2015.  Information-Agnostic Flow Scheduling for Commodity Data Centers. 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). :455--468.
2014
Chen L, Chen K.  2014.  BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing. 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14).

Pages