Biblio

Export 14 results:
Filters: Author is Kai Chen  [Clear All Filters]
2021
He Y, Meng G, Chen K, Hu X, He J.  2021.  DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks. 30th {USENIX} Security Symposium ({USENIX} Security 21). :1901--1918.
2018
Yuan X, Chen Y, Zhao Y, Long Y, Liu X, Chen K, Zhang S, Huang H, Wang XF, Gunter CA.  2018.  CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 27th {USENIX} Security Symposium ({USENIX} Security 18). :49--64.
Chen L, Xia J, Yi B, Chen K.  2018.  PowerMan: An Out-of-Band Management Network for Datacenters Using Power Line Communication. 15th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). :561--578.
2017
Chen L, Chen K, Zhu Z, Yu M, Porter G, Qiao C, Zhong S.  2017.  Enabling Wide-Spread Communications on Optical Fabric with MegaSwitch. 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). :577--593.
2016
Bai W, Chen L, Chen K, Wu H.  2016.  Enabling ECN in Multi-Service Multi-Queue Data Centers. 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16). :537--549.
2015
Hu S, Chen K, Wu H, Bai W, Lan C, Wang H, Zhao H, Guo C.  2015.  Explicit Path Control in Commodity Data Centers: Design and Applications. 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15). :15--28.
Chen K, Wang P, Lee Y, Wang XF, Zhang N, Huang H, Zou W, Liu P.  2015.  Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale. 24th {USENIX} Security Symposium ({USENIX} Security 15). :659--674.
Bai W, Chen L, Chen K, Han D, Tian C, Wang H.  2015.  Information-Agnostic Flow Scheduling for Commodity Data Centers. 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15). :455--468.
2014
Chen L, Chen K.  2014.  BitBill: Scalable, Robust, Verifiable Peer-to-Peer Billing for Cloud Computing. 6th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 14).