Skip to main content.

This page’s menu:

Research Publications


Internet quality and QoE measurement


    1. Ricky Mok, Rocky K. C. Chang, and Weichao Li, "Detecting low-quality workers in QoE crowdtesting: A worker behavior based approach," To appear in IEEE Trans. Multimedia.
    2. Weichao Li, Daoyuan Wu, Rocky K. C. Chang, and Ricky Mok, "Demystifying and Puncturing the Inflated Delay in Smartphone-based WiFi Network Measurement," Proc. ACM CoNEXT, Dec. 2016.
    3. Peter Membrey, Darryl Veitch, and Rocky K. C. Chang, "Time to Measure the Pi," Proc. ACM IMC, Oct. 2016. [Paper]
    4. Ricky K. P. Mok, Weichao Li, and Rocky K. C. Chang, "IRate: Initial Video Bitrate Selection System for HTTP Streaming," IEEE JSAC (SI on Measuring and Troubleshooting the Internet: Algorithms, Tools and Applications), June 2016. [Paper]
    5. Peng Zhou, Rocky K. C. Chang, Xiaojing Gu, Minrui Fei and Jianying Zhou, "Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks," IEEE Trans. Dependable and Secure Computing, Dec. 2015.
    6. Daoyuan Wu, Weichao Li, Rocky K. C. Chang, and Debin Gao, "MopEye: Monitoring Per-app Network Performance with Zero Measurement Traffic," ACM CoNEXT poster, December 2015. [paper]
    7. Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang, Kwok-Wun Yung, Ching-Ho Chan, Yat-Sing Poon, “An automated testbed for profiling the packet send-time accuracy of embedded devices”, In Proc. TRIDENTCOM (Poster Session), June 2015. [Paper]
    8. Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang, "Detecting low-quality crowdtesting workers", In Proc. IEEE/ACM IWQoS (short paper), June 2015. [Paper]
    9. Weichao Li, Ricky K. P. Mok, Daoyuan Wu, and Rocky K. C. Chang, "On the Accuracy of Smartphone-based Mobile Network Measurement," in Proc. IEEE INFOCOM, Apr. 2015. [Paper]
    10. Ricky K. P. Mok, Weichao Li, and Rocky K. C. Chang, "Improving the packet send-time accuracy in embedded devices," in Proc. PAM, Mar. 2015. [Paper]
    11. Ricky K. P. Mok, Weichao Li, and Rocky K. C. Chang, "A user behavior based cheat detection mechanism for crowdtesting," SIGCOMM'14 poster and demo, Aug. 2014. [Poster]
    12. Weichao Li, Ricky K. P. Mok, Rocky K. C. Chang, and Waiting W. T. Fok, "Appraising the Delay Accuracy in Browser-based Network Measurement," in Proc. ACM/USENIX IMC, Oct. 2013. [Paper]
    13. Lei Xue, Ricky K. P. Mok, and Rocky K. C. Chang. "OMware: An Open Measurement Ware for Stable Residential Broadband Measurement," in SIGCOMM'13 poster and demo, Aug. 2013. [Poster]
    14. Yujing Liu, Xiapu Luo, Rocky K. C. Chang, and Jinshu Su, "Characterizing Inter-domain Rerouting by Betweenness Centrality after Disruptive Events," in IEEE JSAC (special issue on network science), June 2013. [Paper]
    15. Ang Chen, Edmond W. W. Chan, Xiapu Luo, Waiting W. T. Fok, and Rocky K. C. Chang, "An Efficient Approach to Multi-level Route Analytics," in Proc. IFIP/IEEE IM, May 2013. [Paper]
    16. Waiting W. T. Fok, Xiapu Luo, Ricky Mok, Weichao Li, Yujing Liu, Edmond W. W. Chan, and Rocky K. C. Chang, "MonoScope: Automated Network Faults Diagnosis Based on Active Measurements," in Proc. IFIP/IEEE IM, May 2013. [Paper]
    17. Ricky K. P. Mok, Weichao Li, and Rocky K. C. Chang, "IRate: Initial Video Bitrate Selection System for HTTP Streaming," in NSDI'13 poster and demo, April 2013. [Poster]
    18. Matthew Roughan and Rocky K. C. Chang (editors), Passive and Active Measurement (Proc. 14th PAM Conf.), Springer's Lecture Notes in Computer Science, Volume 7799, 2013. [Link]
    19. Yujing Liu, Xiapu Luo, Rocky K. C. Chang, and Jinshu Su, "Characterizing Inter-domain Rerouting after Japan Earthquake," in Proc. IFIP NETWORKING 2012, May 2012. [Paper]
    20. Ricky K. P. Mok, Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang, "QDASH: A QoE-Aware DASH System," in Proc. ACM Multimedia Systems Conf., Feb. 2012. [Paper]
    21. Edmond W. W. Chan, Ang Chen, Xiapu Luo, Ricky K. P. Mok, Weichao Li, and Rocky K. C. Chang, "TRIO: Measuring Asymmetric Capacity with Three Minimum Round-Trip Times," in Proc. ACM CoNEXT Conf., Dec. 2011. [Paper]
    22. Ang Chen, Edmond W. W. Chan, Xiapu Luo, and Rocky K. C. Chang, "An Integrative Multi-level Analysis of Internet Path Changes," Poster in Proc. ACM CoNEXT Conf., Dec. 2011. [Poster]
    23. Ricky K. P. Mok, Edmond W. W. Chan, Xiapu Luo, and Rocky K. C. Chang, "Inferring the QoE of HTTP Video Streaming from User-Viewing Activities," in Proc. ACM SIGCOMM Workshop on Measurements Up the STack (W-MUST), August 2011. [Paper]
    24. Edmond W. W. Chan, Xiapu Luo, Waiting W. T. Fok, Weichao Li, and Rocky K. C. Chang, "Non-cooperative Diagnosis of Submarine Cable Faults," in Proc. PAM, March 2011. [Paper]
    25. Ricky K. P. Mok, Edmond W. W. Chan, and Rocky K. C. Chang, "Improving TCP Video Streaming QoE by Network QoS Management," in Proc. IEEE/IFIP IM (Pre-conf Session), May 2011. [Paper]
    26. Weichao Li, Waiting W. T. Fok, Edmond W. W. Chan, Xiapu Luo, and Rocky K. C. Chang, "Planetopus: A System for Facilitating Collaborative Network Monitoring," in Proc. IEEE/IFIP IM (Application Session), May 2011. [Paper]
    27. Rocky K. C. Chang, Waiting W. T. Fok, Weichao Li, Edmond W. W. Chan, and Xiapu Luo, "Neighbor-Cooperative Measurement of Network Path Quality," in Proc. IEEE GLOBECOM, Dec. 2010. [Paper]
    28. Edmond W. W. Chan, Xiapu Luo, Weichao Li, Waiting W. T. Fok, and Rocky K. C. Chang, "Measurement of Loss Pairs in Network Paths," in Proc. ACM/USENIX IMC, Nov. 2010. [Paper]
    29. Rocky K. C. Chang, Edmond W. W. Chan, Weichao Li, Waiting W. T. Fok, and Xiapu Luo, "Could Ash Cloud or Deep-Sea Current Overwhelm the Internet?" in Proc. USENIX HotDep, Oct. 2010 (a poster). [Paper] [A long version] [poster]
    30. Edmond W. W. Chan, Xiapu Luo, and Rocky K. C. Chang, "A Minimum-Delay-Difference Method for Mitigating Cross-Traffic Impact on Capacity Measurement," in Proc. ACM CoNEXT, December 2009. [Paper]
    31. Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang, "Design and Implementation of TCP Data Probes for Reliable and Metric-rich Network Path Monitoring," in Proc. USENIX Annual Tech. Conf., June 2009. [Paper]
    32. Rocky K. C. Chang, Edmond W. W. Chan, Waiting W. T. Fok, and Xiapu Luo, "Sampling TCP Data-Path Quality with TCP Data Probes," in Proc. PFLDNet, May 2009. [Paper]
    33. Samantha Lo, Rocky K. C. Chang, and Lorenzo Colitti, "An Active Approach to Measuring Routing Dynamics Induced by Autonomous Systems,'' in Proc. ACM Workshop on Experimental Computer Science, June 2007. [Paper]
    34. Samantha Lo and Rocky K. C. Chang, "Measuring the Effects of Route Prepending for Stub Autonomous Systems,'' in Proc. ICC Workshop on Traffic Engineering in Next Generation IP Networks, June 2007. [Paper]
    35. Hui Wang, Dah-Ming Chiu, John Lui, and Rocky K. C. Chang, "Inter-AS Inbound Traffic Engineering via ASPP," IEEE Trans. Network and Service Management, vol. 4, pp. 62-70, June 2007. [Paper]
    36. Xiapu Luo and Rocky K. C. Chang, "Novel Approaches to End-to-End Packet Reordering Measurement," in Proc. ACM/USENIX IMC, October 2005. [Paper]
    37. Hui Wang, Rocky K. C. Chang, Dah-Ming Chiu, and John C. S. Lui, "Characterizing the Performance and Stability Issues of the AS Path Prepending Method: Taxonomy, Measurement Study and Analysis," in Proc. ACM SIGCOMM Asia Conf., April 2005. [Paper]
    38. Rocky K. C. Chang and Michael Lo, "Inbound Traffic Engineering for Multihomed ASs Using AS Path Prepending," IEEE Network, pp. 18-25, March/Apr. 2005. [Paper]
    39. Hang T. Chan and Rocky K. C. Chang, "Strifeshadow Fantasy: A Massive Multi-Player Online Game," in Proc. IEEE Consumer Commun. and Networking Conf., Jan. 2004. [Paper]

      Network privacy and security


      1. Peng Zhou, Xiaojing Gu, and Rocky K.C. Chang, "Harvesting File Download Exploits in the Web: A Hacker's View," The Computer Journal, Sept. 2015. 
      2. Daoyuan Wu and Rocky K. C. Chang, "Indirect File Leaks in Mobile Applications," Proc. Mobile Security Technologies (MoST), May 2015 [Paper]
      3. Daoyuan Wu and Rocky K. C. Chang, "Analyzing Android Browser Apps for file:// Vulnerabilities," Proc. ISC, Oct. 2014. [Paper]
      4. Yajuan Tang, Xiapu Luo, Qing Hui, and Rocky K. C. Chang, “Modeling the Vulnerability of Feedback-control Based Internet Services to Low-rate DoS Attacks,” IEEE Trans. Information Forensics and Security, Mar. 2014. [Paper]
      5. Peng Zhou, Xiapu Luo, and Rocky K. C. Chang, “Inference Attacks against Trust-based Onion Routing: Trust Degree to the Rescue,” Computer & Security, Nov. 2013. [Paper]
      6. Peng Zhou, Xiapu Luo, Ang Chen, and Rocky K. C. Chang, “SGor: Trust Graph based Onion Routing,” Computer Networks, Dec. 2013. [Paper]
      7. Xiapu Luo, Edmond W. W. Chan, Peng Zhou, and Rocky K. C. Chang, "Robust Network Covert Communications Based on TCP and Enumerative Combinatorics,"  IEEE Trans. Dependable and Secure Computing, vol. 9, pp. 890-902, Nov.-Dec. 2012 [Paper] (the journal version of the ESORICS 2007 paper)
      8. Peng Zhou, Xiapu Luo, and Rocky K. C. Chang, "More Anonymity Through Trust Degree in Trust-based Onion Routing," in Proc. SecureComm, Sept. 2012. [Paper]
      9. Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, and Rocky K.C. Chang, "Exposing Invisible Timing-based Traffic Watermarks with BACKLIT," in Proc. ACSAC, Dec. 2011. [Paper]
      10. Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, and Wenke Lee, "A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks," in Proc.  IEEE/IFIP DSN, June 2011. [Paper]
      11. Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci, "HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows," in Proc. Network and Distributed System Security Symp. (NDSS), Feb. 2011. [Paper]
      12. Yajuan Tang, Xiapu Luo, and Rocky K. C. Chang, "On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services," in Proc. IEEE IWQoS (a short paper), July 2009. [Paper]
      13. Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang, "Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals," EURASIP Journal on Advances in Signal Processing (A Special Issue on “Signal Processing Applications in Network Intrusion Detection Systems), 2009. [Paper]
      14. Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang, "CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding," in Proc. IEEE ICC, June 2009. [Paper]
      15. Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang, "TCP Covert Timing Channels: Design and Detection," in Proc. IEEE/IFIP DSN, June 2008. [Paper]
      16. Yajuan Tang, Xiapu Luo and Rocky K. C. Chang, "Protecting Internet Services from Low-Rate DoS Attacks," A book chapter in Critical Infrastructure Protection (editors: E. Goetz and S. Shenoi), Springer, Nov. 2007. [Paper]
      17. Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang, "Cloak: A Ten-fold Way for Reliable Covert Communications," in Proc. ESORICS, Sept. 2007. [Paper]
      18. Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang, "Crafting Web Counters into Covert Channels," in Proc. The 22nd TC-11 IFIP Intl. Information Security Conf., May 2007. (Best Student Paper Award) [Paper]
      19. Jun Gao, Guangmin Hu, Xingmiao Yao, and Rocky K. C. Chang, "Anomaly Detection of Network Traffic based on Wavelet Packet," in Proc. IEEE Asia-Pacific Conf. Communications, August 2006. [Paper]
      20. Xiapu Luo, Edmond W. W. Chan, and Rocky K. C. Chang, "Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-service Attacks," in Proc. IEEE/IFIP NOMS, April 2006. [Paper]
      21. Xiapu Luo, Rocky K. C. Chang, and Edmond W. W. Chan, "Performance Analysis of TCP/AQM Under Denial-of-Service Attacks," in Proc. IEEE MASCOTS, Sept. 2005. [Paper]
      22. Xiapu Luo and Rocky K. C. Chang, "Optimizing the Pulsing Denial-of-Service Attacks," in Proc. IEEE/IFIP DSN, June 2005. [Paper]
      23. Xiapu Luo and Rocky K. C. Chang, "On a New Class of Pulsing Denial-of-Service Attacks and the Defense," in Proc. Network and Distributed System Security Symp. (NDSS), Feb. 2005. [Paper]
      24. Wing W. Y.  Ng, Rocky K. C. Chang, and Daniel S. Yeung, "Dimensionality Reduction for Denial of Service Detection Problems Using RBFNN Output Sensitivity," in Proc. iEEE Intl. Conf. Machine Learning and Cybernetics, November 2003. [Paper]
      25. Rocky K. C. Chang, "Defending Against Flooding-Based, Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communications Magazine (A Special Issue on Telecommunication Network Security), vol. 40, no. 10, pp. 42-51, 2002. [Paper]
      26. Kalman K. K. Wan and Rocky K. C. Chang, "Engineering of a Global Defense Infrastructure for DDoS Attacks," in Proc. IEEE Intl. Conf. Networks , pp. 419-427, Aug. 2002[Paper]
      27. King P. Fung and Rocky K. C. Chang, "A Transport-Level Proxy for Secure Multimedia Streams," IEEE Internet Computing (A Special Issue on Widely Deployed Security Solutions),  pp. 57-67, Nov./Dec., 2000. [Paper]

      Others

      1. Yi Xie, Xiapu Luo and Rocky K. C. Chang, "Centralizing the Power Saving Mode for 802.11 Infrastructure Networks," A book chapter in Energy Technology and Management, Tauseef Aized (Ed.), InTech, Oct. 2011. [Paper] (the journal version of the Sarnoff Symp. 2009 paper)
      2. Yi Xie, Xiapu Luo, and Rocky K. C. Chang. "Centralized PSM: An AP-centric Power Saving Mode for 802.11 Infrastructure Networks," in Proc. IEEE Sarnoff Symposium, March 2009. [Paper
      3. Yi Xie and Rocky K. C. Chang, "Optimizing Energy Efficiency in Polling-Based Wireless Networks with Stability Constraints," in Proc. IEEE GLOBECOM, 2006. [Paper]
      4. Yi Xie and Rocky K. C. Chang, "Stability-Constrained Optimization for Energy Efficiency in Polling-Based Wireless Networks," in Proc. VALUETOOLS, 2006. [Paper]
      5. Sum Lam, Rocky K. C. Chang, and Yi Xie, "Towards a General Framework for Analyzing Stability of Multiple Queues," in Proc. VALUETOOLS, 2006. [Paper]
      6. Rocky K. C. Chang, Ho Y. Chan, and Adam W. Yeung, "Deadlock-Free TCP Over High-Speed Internet," a book chapter in Deadlock Resolution in Computer-intergrated Systems (Editors:  Meng Chu Zhou and Maria Pia Fanti), MARCEL DEKKER Inc. 2005. [Paper]
      7. Rocky K. C. Chang, H. Y. Chan, and A. W. Yeung, "Deadlock-Free TCP Over High-Speed Internet," (invited) in Deadlock Resolution in Computer Integrated Systems (edited by Fanti and Zhou), pp. 531-553, Dec. 2004. [Paper]
      8. Fai Siu and Rocky K. C. Chang, "Effectiveness of Optimal Node Assignments in WDM Networks with Fixed Regular Virtual Topologies," Computer Networks, vol. 38, pp. 61-74, Jan. 2002. [Paper]
      9. Rocky K. C. Chang and Sum Lam, "Per-queue Stability Analysis of a Random Access System," IEEE Trans. Automatic Control, vol. 46, no. 9, pp. 1466-1470 , Sept. 2001. [Paper]
      10. Rocky K. C. Chang and Hong Y. Wang, "Routing Properties of a Recursive Interconnection Network," J. Parallel and Distributed Computing , vol. 61, no. 6,  pp. 838-849, June 2001. [Paper]
      11. Rocky K. C. Chang and Sum Lam, "A Novel Approach to Queue Stability Analysis of Polling Models," Performance Evaluation, vol. 40, issues 1-3, pp. 27-46, March 2000. [Paper]
      12. Rocky K. C. Chang and Ho Y. Chan, "A Throughput Deadlock-free TCP for High-speed Internet," in Proc. IEEE ICON, 2000. [Paper]
      13. A. W. Yeung and Rocky K. C. Chang, "Improving TCP Throughput Performance on High-speed Networks with a Receiver-side Adaptive Acknowledgment Algorithm," in Proc. SPIE’s Intl. Symp. Voice, Video, and Data Commun. (Internet Routing and Quality of Service), December 1998. [Paper]