Shigang Chen
#97,914
Most Influential Person Now
Shigang Chen's AcademicInfluence.com Rankings
Shigang Chencomputer-science Degrees
Computer Science
#5761
World Rank
#6081
Historical Rank
Network Security
#10
World Rank
#10
Historical Rank
Database
#5243
World Rank
#5443
Historical Rank

Download Badge
Computer Science
Shigang Chen's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of Science and Technology of China
Similar Degrees You Can Earn
Why Is Shigang Chen Influential?
(Suggest an Edit or Addition)According to Wikipedia, Shigang Chen from the University of Florida in Gainesville was named Fellow of the Institute of Electrical and Electronics Engineers in 2016 for contributions to quality of service provisioning and policy-based security management in computer networks.
Shigang Chen's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A key management scheme for wireless sensor networks using deployment knowledge (2004) (1071)
- An overview of quality of service routing for next-generation high-speed networks: problems and solutions (1998) (977)
- Distributed quality-of-service routing in ad hoc networks (1999) (950)
- Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification (2004) (397)
- On finding multi-constrained paths (1998) (385)
- Congestion Avoidance Based on Lightweight Buffer Management in Sensor Networks (2006) (196)
- Protecting Receiver-Location Privacy in Wireless Sensor Networks (2007) (179)
- Efficient Protocols for Identifying the Missing Tags in a Large RFID System (2010) (165)
- Defending against Internet worms: a signature-based approach (2005) (153)
- Routing support for providing guaranteed end-to-end quality-of-service (1999) (142)
- Distributed QoS routing with imprecise state information (1998) (132)
- Slowing down Internet worms (2004) (122)
- Distributed quality-of-service routing in high-speed networks based on selective probing (1998) (114)
- Efficient information collection protocols for sensor-augmented RFID networks (2011) (112)
- Robust signal timing optimization with environmental concerns (2013) (110)
- A QoS-aware multicast routing protocol (2000) (104)
- Perimeter-based defense against high bandwidth DDoS attacks (2005) (98)
- Routing with topology aggregation in delay-bandwidth sensitive networks (2004) (96)
- Two techniques for fast computation of constrained shortest paths (2004) (92)
- Energy Efficient Algorithms for the RFID Estimation Problem (2010) (91)
- Energy-efficient polling protocols in RFID systems (2011) (88)
- A QoS-aware multicast routing protocol (2000) (88)
- A novel scheme for protecting receiver's location privacy in wireless sensor networks (2008) (88)
- Localized algorithm for aggregate fairness in wireless sensor networks (2006) (85)
- Memory Efficient Protocols for Detecting Node replication attacks in wireless sensor networks (2009) (79)
- Probabilistic missing-tag detection and energy-time tradeoff in large-scale RFID systems (2012) (77)
- Avoid 'void' in geographic routing for data aggregation in sensor networks (2006) (73)
- Efficient missing tag detection in RFID systems (2011) (71)
- Pyramid Sketch: a Sketch Framework for Frequency Estimation of Data Streams (2017) (70)
- Lexicographic Maxmin Fairness for Data Collection in Wireless Sensor Networks (2007) (70)
- Per-Flow Traffic Measurement Through Randomized Counter Sharing (2012) (69)
- A time-efficient information collection protocol for large-scale RFID systems (2012) (68)
- One memory access bloom filters and their generalization (2011) (67)
- Fit a Compact Spread Estimator in Small High-Speed Memory (2011) (66)
- HeavyKeeper: An Accurate Algorithm for Finding Top- $k$ Elephant Flows (2019) (64)
- A Scalable Overlay Multicast Architecture for Large-Scale Applications (2007) (63)
- Fast and compact per-flow traffic measurement through randomized counter sharing (2011) (58)
- Fit a Spread Estimator in Small Memory (2009) (57)
- An efficient tag search protocol in large-scale RFID systems (2016) (57)
- Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement (2017) (54)
- Missing-Tag Detection and Energy–Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels (2014) (51)
- Can CSMA/CA networks be made fair? (2008) (50)
- A dynamic Proof of Retrievability (PoR) scheme with O(logn) complexity (2012) (49)
- An Automated Signature-Based Approach against Polymorphic Internet Worms (2007) (48)
- An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel (2013) (45)
- Fast RFID grouping protocols (2015) (45)
- Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing (2015) (43)
- Differential estimation in dynamic RFID systems (2013) (43)
- Fast Bloom Filters and Their Generalization (2014) (43)
- Efficient protocols for identifying the missing tags in a large RFID system (2013) (43)
- Privacy-preserving RFID authentication based on cryptographical encoding (2012) (43)
- Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls (2010) (42)
- Optimal deadlock detection in distributed systems based on locally constructed wait-for graphs (1996) (42)
- Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems (2016) (42)
- Efficient Misplaced-Tag Pinpointing in Large RFID Systems (2012) (42)
- Hierarchical QoS routing in delay-bandwidth sensitive networks (2000) (41)
- Generalized Energy-Efficient Algorithms for the RFID Estimation Problem (2012) (39)
- MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks (2007) (38)
- Tag-compass: Determining the spatial direction of an object with small dimensions (2017) (36)
- Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets (2015) (34)
- TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag Matrix (2019) (34)
- Scalable software-defined networking through hybrid switching (2017) (34)
- QoS information approximation for aggregated networks (2004) (32)
- Estimating the Persistent Spreads in High-Speed Networks (2014) (31)
- Better with fewer bits: Improving the performance of cardinality estimation of large data streams (2017) (31)
- Cardinality Estimation for Elephant Flows: A Compact Solution Based on Virtual Register Sharing (2017) (31)
- Maxmin Fair Routing in Connection-Oriented Networks (1998) (28)
- Differentiated congestion pricing of urban transportation networks with vehicle-tracking technologies ☆ (2013) (28)
- Coexistence of QoS and Best-Effort Flows - Routing and Scheduling (1998) (27)
- Achieving High Scalability Through Hybrid Switching in Software-Defined Networking (2018) (26)
- Stateful DDoS attacks and targeted filtering (2007) (25)
- On Deletion of Outsourced Data in Cloud Computing (2014) (25)
- Tag-Ordering Polling Protocols in RFID Systems (2016) (25)
- Efficient file search in non-DHT P2P networks (2008) (24)
- Trajectory similarity clustering based on multi-feature distance measurement (2019) (24)
- Generalized Sketch Families for Network Traffic Measurement (2019) (23)
- ACOM: Any-source Capacity-constrained Overlay Multicast in Non-DHT P2P Networks (2007) (23)
- An Energy-Efficient Strategy for Secondary Users in Cooperative Cognitive Radio Networks for Green Communications (2016) (23)
- An efficient protocol for RFID multigroup threshold-based classification (2016) (23)
- Efficient pinpointing of misplaced tags in large RFID systems (2011) (23)
- DAW: A Distributed Antiworm System (2007) (22)
- Efficient RFID Grouping Protocols (2016) (22)
- Algorithms and performance of load-balancing with multiple hash functions in massive content distribution (2009) (22)
- Using Analog Network Coding to Improve the RFID Reading Throughput (2010) (21)
- Persistent Spread Measurement for Big Network Data Based on Register Intersection (2017) (20)
- An Internet-worm early warning system (2004) (20)
- Capacity-aware multicast algorithms on heterogeneous overlay networks (2006) (20)
- Two-Party Fine-Grained Assured Deletion of Outsourced Data in Cloud Systems (2014) (20)
- Distributed QoS Routing (1997) (20)
- An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens (2015) (19)
- Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis (2010) (19)
- Temporally or Spatially Dispersed Joint RFID Estimation Using Snapshots of Variable Lengths (2015) (19)
- On Optimal Deadlock Detection Scheduling (2006) (19)
- Joint Optimization of Flow Table and Group Table for Default Paths in SDNs (2018) (19)
- Lightweight Anonymous Authentication Protocols for RFID Systems (2017) (19)
- Detecting Internet worms at early stage (2005) (18)
- ETAP: Enable Lightweight Anonymous RFID Authentication with O(1) Overhead (2015) (18)
- Efficient Information Sampling in Multi-Category RFID Systems (2019) (18)
- Reducing the Size of Rule Set in a Firewall (2007) (18)
- Privacy-Preserving Multi-Point Traffic Volume Measurement Through Vehicle-to-Infrastructure Communications (2015) (18)
- Pandaka: A lightweight cipher for RFID systems (2014) (18)
- You Can Drop but You Can't Hide: $K$-persistent Spread Estimation in High-speed Networks (2018) (18)
- Maximizing Lifetime Vector in Wireless Sensor Networks (2013) (17)
- Spreader Classification Based on Optimal Dynamic Bit Sharing (2013) (17)
- Achieving MAC-Layer Fairness in CSMA/CA Networks (2011) (17)
- Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems (2015) (17)
- An Efficient Protocol for RFID Multigroup Threshold-Based Classification Based on Sampling and Logical Bitmap (2013) (16)
- Exact Modeling of Propagation for Permutation-Scanning Worms (2008) (16)
- Randomized Error Removal for Online Spread Estimation in Data Streaming (2021) (16)
- Estimating Cardinality for Arbitrarily Large Data Stream With Improved Memory Efficiency (2020) (16)
- Resilient Capacity-Aware Multicast Based on Overlay Networks (2005) (16)
- Per-flow counting for big network data stream over sliding windows (2017) (16)
- A new perspective in defending against DDoS (2004) (16)
- A scalable distributed QoS multicast routing protocol (2004) (16)
- Origin-destination flow measurement in high-speed networks (2012) (16)
- SoMR: A scalable distributed QoS multicast routing protocol (2008) (15)
- State aggregation of large network domains (2007) (15)
- Estimating the Cardinality of a Mobile Peer-to-Peer Network (2013) (14)
- Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement (2015) (14)
- Privacy-Preserving Point-to-Point Transportation Traffic Measurement through Bit Array Masking in Intelligent Cyber-physical Road Systems (2013) (14)
- Load balancing with multiple hash functions in peer-to-peer networks (2006) (14)
- An Efficient K-Persistent Spread Estimator for Traffic Measurement in High-Speed Networks (2020) (14)
- Enabling Non-repudiable Data Possession Verification in Cloud Storage Systems (2014) (14)
- Identifying State-Free Networked Tags (2015) (13)
- Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring (2015) (13)
- Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks (2019) (13)
- Monitoring Bodily Oscillation With RFID Tags (2019) (13)
- Survey on key security technologies for space information networks (2016) (13)
- Persistent Traffic Measurement through Vehicle-to-Infrastructure Communications in Cyber-Physical Road Systems (2019) (13)
- Unknown-Target Information Collection in Sensor-Enabled RFID Systems (2014) (13)
- When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications (2016) (13)
- Joint property estimation for multiple RFID tag sets using snapshots of variable lengths (2016) (13)
- Category Information Collection in RFID Systems (2017) (12)
- A New Data Collection Technique for Preserving Privacy (2018) (12)
- Scan detection in high-speed networks based on optimal dynamic bit sharing (2011) (12)
- Highly Compact Virtual Active Counters for Per-flow Traffic Measurement (2018) (12)
- A UHF RFID-Based System for Children Tracking (2018) (12)
- Large-Scale VM Placement with Disk Anti-Colocation Constraints Using Hierarchical Decomposition and Mixed Integer Programming (2017) (12)
- SPATH: Finding the Safest Walking Path in Smart Cities (2019) (11)
- Privacy preserving origin-destination flow measurement in vehicular cyber-physical systems (2013) (11)
- Universal Online Sketch for Tracking Heavy Hitters and Estimating Moments of Data Streams (2020) (11)
- Hierarchical scheduling for multiple classes of applications in connection-oriented integrated-service networks (1999) (10)
- End-to-end maxmin fairness in multihop wireless networks: Theory and protocol (2012) (10)
- Missing-Tag Detection with Presence of Unknown Tags (2018) (10)
- Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones (2019) (10)
- Thermotag: item-level temperature sensing with a passive RFID tag (2021) (10)
- Highly Compact Virtual Counters for Per-Flow Traffic Measurement through Register Sharing (2016) (10)
- Deploying default paths by joint optimization of flow table and group table in SDNs (2017) (9)
- Detecting Stealthy Spreaders by Random Aging Streaming Filters (2011) (9)
- Session-Based Cooperation in Cognitive Radio Networks: A Network-Level Approach (2017) (9)
- RFID Technologies for Internet of Things (2016) (9)
- Coexistence of QoS and Best-Effort Flows (1999) (9)
- Online Spread Estimation with Non-duplicate Sampling (2020) (8)
- Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup (2011) (8)
- DBF: A general framework for anomaly detection in RFID systems (2017) (8)
- Defending against internet worms (2006) (8)
- Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications (2017) (8)
- EPIQ QoS Characterization Draft Version (1997) (8)
- Spread Estimation With Non-Duplicate Sampling in High-Speed Networks (2021) (8)
- MVP: An Efficient Anonymous E-Voting Protocol (2016) (7)
- Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets (2018) (7)
- Achieving Global End-to-End Maxmin in Multihop Wireless Networks (2008) (7)
- Collision-Aware Churn Estimation in Large-Scale Dynamic RFID Systems (2017) (7)
- Using Integer Programming for Workflow Scheduling in the Cloud (2017) (7)
- Traffic Measurement for Big Network Data (2016) (7)
- Collusion Resistant Multi-Matrix Masking for Privacy-Preserving Data Collection (2017) (7)
- Fast routing table lookup based on deterministic multi-hashing (2010) (7)
- RFID as an Infrastructure (2012) (7)
- Self-Adaptive Sampling for Network Traffic Measurement (2021) (7)
- Fair End-to-End Bandwidth Distribution in Wireless Sensor Networks (2010) (7)
- Efficient anonymous category-level joint Tag estimation (2016) (6)
- LIMITING SELF -PROPAGATING MALWARE BASED ON CONNECTION FAILURE BEHAVIOR (2015) (6)
- A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System (2019) (6)
- Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System (2019) (6)
- AID: A global anti-DoS service (2007) (6)
- MAC-layer Time Fairness across Multiple Wireless LANs (2010) (6)
- Missing-Tag Detection With Unknown Tags (2020) (6)
- ABC: A practicable sketch framework for non-uniform multisets (2017) (6)
- Toward Hierarchical Mixed Integer Programming for Pack-to-Swad Placement in Datacenters (2015) (6)
- New adaptive protocols for fine-level end-to-end rate control in wireless networks (2008) (5)
- Robust Task Offloading in Dynamic Edge Computing (2023) (5)
- Privacy-Preserving Estimation of $k$ -Persistent Traffic in Vehicular Cyber-Physical Systems (2019) (5)
- Traffic Measurement on the Internet (2012) (5)
- Persistent Spread Measurement for Big Network Data Based on Register Intersection (2017) (5)
- An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks (2012) (5)
- Wireless Quality-of-Service support (2006) (5)
- Towards better performance measurement of Web servers (2003) (5)
- A Distributed Hybrid Scheme for Unstructured Peer-to-Peer Networks (2006) (5)
- Stochastic analysis of distributed deadlock scheduling (2005) (5)
- Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System (2017) (5)
- Collision-resistant Communication Model for State-free Networked Tags (2019) (4)
- ActiveKeeper: An Accurate and Efficient Algorithm for Finding Top-k Elephant Flows (2021) (4)
- Distributed Progressive Algorithm for Maximizing Lifetime Vector in Wireless Sensor Networks (2009) (4)
- Network management based on policies (2000) (4)
- Generalized Sketch Families for Network Traffic Measurement (2020) (4)
- Noise Measurement and Removal for Data Streaming Algorithms with Network Applications (2021) (3)
- Super Spreader Identification Using Geometric-Min Filter (2022) (3)
- Guided multiple hashing: Achieving near perfect balance for fast routing lookup (2013) (3)
- Efficient Hierarchical Traffic Measurement in Software-Defined Datacenter Networks (2017) (3)
- Differentiated Congestion Pricing of Urban Transportation Networks with Vehicle-Tracking Technologies (2013) (3)
- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks (2004) (3)
- Using Wireless Tags to Monitor Bodily Oscillation (2018) (3)
- Data Locality Exploitation in Cache Compression (2018) (3)
- Analysis of power-aware buffering schemes in wireless sensor networks (2010) (3)
- PSON: A Scalable Peer-to-Peer File Sharing System Supporting Complex Queries (2005) (3)
- Pose Sensing With a Single RFID Tag (2020) (3)
- Dependable Policy Enforcement in Traditional Non-SDN Networks (2019) (3)
- Spiral-based data dissemination in sensor networks (2006) (3)
- Highly compact virtual maximum likelihood sketches for counting big network data (2014) (3)
- On the Performance Regularity of Web Servers (2004) (3)
- A Novel Solution for End-to-End Fairness Problem in Wireless Mesh Networks (2008) (3)
- Building a Scalable P2P Network with Small Routing Delay (2008) (2)
- On Outsourcing Artificial Neural Network Learning of Privacy-Sensitive Medical Data to the Cloud (2021) (2)
- Accurate Hierarchical Traffic Measurement in Datacenters Through Differentiated Memory Allocation (2020) (2)
- Efficient algorithms for detection and resolution of distributed deadlocks (1995) (2)
- Digital Twin with a Perspective from Manufacturing Industry (2020) (2)
- A User-Friendly Multimedia System for Querying and Visualizing of Geographic Data (2000) (2)
- Demonstrating Scalability and Efficiency of Pack-centric Resource Management for Cloud (2016) (2)
- Anonymous category-level joint tag estimation: poster (2016) (2)
- Routing by distributed recursive computation and information reuse (1999) (2)
- Limiting Self-Propagating Malware Based on Connection Failure Behavior through Hyper-Compact Estimators (2016) (2)
- DAWN: A Novel Strategy for Detecting ASCII Worms in Networks (2008) (2)
- Is LoRaWAN Really Wide? Fine-grained LoRa Link-level Measurement in An Urban Environment (2022) (2)
- An incrementally deployable path address scheme (2012) (2)
- Speed Up Queries in Unstructured Peer-to-Peer Networks (2007) (2)
- A Probabilistic Approach for Improving TCP Fairness across Multiple Contending WLANs (2010) (2)
- Real-Time Detection of Invisible Spreaders (2008) (1)
- Privacy-Preserving Methods to Retrieve Origin-Destination Information from Connected Vehicles (2013) (1)
- A New Routing Architecture for DiffServ Domains (2003) (1)
- Securing computer networks: access control management and attack source identification (2008) (1)
- Idle-Slot Recycling in a Collision-Free Real-Time MAC Protocol (2008) (1)
- Efficient Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets With Unreliable Channels (2020) (1)
- DAW : A Distributed Anti-Worm System (2006) (1)
- Toward the Next-Generation Peer-to-Peer Services (2007) (1)
- Virtual Filter for Non-duplicate Sampling (2021) (1)
- Online identification of multi-attribute high-volume traffic aggregates through sampling (2005) (1)
- Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching (2021) (1)
- A Hybrid Query Scheme to Speed Up Queries in Unstructured Peer-to-Peer Networks (2007) (1)
- A Survey on Mainstream Dimensions of Edge Computing (2021) (1)
- Quality Of Service In Heterogeneous Environments (1997) (1)
- Pyramid Family: Generic Frameworks for Accurate and Fast Flow Size Measurement (2022) (1)
- Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps (2022) (1)
- Achieving Strong Privacy in Online Survey (2017) (1)
- Hierarchical Mixed Integer Programming for Pack-to-Swad Placement in Datacenters : Concept and Analysis (2015) (1)
- Virtual Filter for Non-Duplicate Sampling With Network Applications (2022) (1)
- Per-Flow Cardinality Measurement (2017) (1)
- Short-Term Memory Sampling for Spread Measurement in High-Speed Networks (2022) (1)
- Per-Flow Size Measurement (2017) (1)
- Retwork: Exploring Reader Network with COTS RFID Systems (2020) (1)
- Applying Triple-Matrix Masking for Privacy Preserving Data Collection and Sharing in HIV Studies. (2016) (1)
- Supporting Flow-Cardinality Queries with O(1) Time Complexity in High-speed Networks (2021) (1)
- Probabilistic Data Prefetching for Data Transportation in Smart Cities (2022) (1)
- A Full Mirror Computation Model for Edge-Cloud Computing (2021) (1)
- An Experimental Study on the Impact of Execution Location in Edge-Cloud Computing (2020) (1)
- Trajectory similarity clustering based on multi-feature distance measurement (2019) (1)
- Threshold-Based Widespread Event Detection (2019) (0)
- RETRIEVE ORIGIN-DESTINATION INFORMATION FROM CONNECTED VEHICLES (2013) (0)
- Efficient statistical measurement methods in wired and wireless systems (2012) (0)
- CENTER FOR MULTIMODAL SOLUTIONS FOR CONGESTION MITIGATION (CMS) (2010) (0)
- Comparative Analysis of Behavioral Classification of Computer Networks and Early Warning System for Worm Detection (2019) (0)
- Coupon Filter: A Lightweight Filter Framework with Accuracy For Data Stream Processing (2022) (0)
- Online Cardinality Estimation by Self-morphing Bitmaps (2022) (0)
- Thermotag (2021) (0)
- An Efficient Dynamic Proof of Retrievability ( PoR ) Scheme (2013) (0)
- Efficient Tag Search in Large RFID Systems (2016) (0)
- Supporting Real-Time ${T}$-Queries on Network Traffic with a Cloud-Based Offloading Model (2021) (0)
- Modeling the Propagation and Detection of Smart Worms (2007) (0)
- CONTENT-AWARE SPIN-TRANSFER TORQUE MAGNETORESISTIVE RANDOM-ACCESS MEMORY (STT-MRAM) CACHE DESIGNS By QI ZENG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA (2017) (0)
- Self-Adaptive Sampling Based Per-Flow Traffic Measurement (2022) (0)
- Routing with Topology Aggregation in Bandwidth-Delay Sensitive Networks (2007) (0)
- Coupon Filter: A universal and lightweight filter framework for more accurate data stream processing (2023) (0)
- A communication model for stateless networked tags (2016) (0)
- Bloom Filter and Its Variants (2018) (0)
- Eecient Deadlock Detection in Distributed Systems (2007) (0)
- Toward Differential Privacy for Traffic Measurement in Vehicular Cyber-Physical Systems (2022) (0)
- Supporting Real-time Networkwide T-Queries in High-speed Networks (2022) (0)
- Fair packet scheduling and bandwidth management in wireless networks (2008) (0)
- Achieving Differential Privacy with Matrix Masking in Big Data (2022) (0)
- PSON: A scalable P2P file sharing system with efficient complex query support (2011) (0)
- Lightweight Anonymous RFID Authentication (2016) (0)
- Cardinality Estimation for Elephant Flows (2017) (0)
- Hierarchical Virtual Bitmaps for Spread Estimation in Traffic Measurement (2021) (0)
- Origin–Destination Flow Measurement (2012) (0)
- Scalable and energy efficient data dissemination in wireless sensor networks (2006) (0)
- Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing (2015) (0)
- New Technologies for Privacy Protection in Data Collection and Analysis (2014) (0)
- Universal and Accurate Sketch for Estimating Heavy Hitters and Moments in Data Streams (2023) (0)
- Generalized Sketch Families for Network Traffic Measurement (2020) (0)
- Chen RFID Technologies for Internet of Things (2016) (0)
- Shigang Chen Traffic Measurement on the Internet (2012) (0)
- Tag Estimation in RFID Systems (2013) (0)
- HeavyTracker: An Efficient Algorithm for Heavy-Hitter Detection in High-Speed Networks (2023) (0)
- Collecting Information from Sensor-augmented RFID Systems (2013) (0)
- Session-Based Cooperation in Cognitive Radio Networks (2018) (0)
- ResearchArticle A Hybrid Query Scheme to Speed Up Queries in Unstructured Peer-to-Peer Networks (2007) (0)
- Dynamic Edge-Twin Computing for Vehicle Tracking (2021) (0)
- ChopTags: An Accurate and Low-cost Interface to Identify User/Item Interactions (2022) (0)
- Randomized Error Removal for Online Spread Estimation in High-Speed Networks (2023) (0)
- Persistent Spread Measurement (2017) (0)
- Accurate and O(1)-Time Query of Per-Flow Cardinality in High-Speed Networks (2023) (0)
- Scalable and Balanced Policy Enforcement through Hybrid SDN-Label Switching (2019) (0)
- Random P2P network with O(d) routing distance (2008) (0)
- A peer-to-peer network positioning architecture (2004) (0)
- Pack Up Cloud: Recursive Datacenter Resource Management and Experimental Studies (2015) (0)
- An Efficient Adaptive Denoising Sketch for Per-flow Traffic Measurement (2022) (0)
- Understanding the Impact of Pseudo Randomness on Internet Worm Propagation (2008) (0)
- Per-Flow Size Estimators (2012) (0)
- Policy enforcement in traditional non-SDN networks (2023) (0)
- Rumor Remove Order Strategy on Social Networks (2021) (0)
- Analysis of Maximum Executable Length for Detecting Text-Based Malware (2008) (0)
- Training Medical-Diagnosis Neural Networks on the Cloud with Privacy-Sensitive Patient Data from Multiple Clients (2022) (0)
- Inside the Permutation-Scanning Worm: Propagation Modeling and Threat Analysis (2008) (0)
- Statistical Properties of a Class of Randomized Binary Search Algorithms (2006) (0)
- Indirect Multi-Mapping for Burstiness Management in Software Defined Networks (2021) (0)
This paper list is powered by the following services:
Other Resources About Shigang Chen
What Schools Are Affiliated With Shigang Chen?
Shigang Chen is affiliated with the following schools: