Zhuoqing Morley Mao
#158,205
Most Influential Person Now
Zhuoqing Morley Mao's AcademicInfluence.com Rankings
Zhuoqing Morley Maocomputer-science Degrees
Computer Science
#8874
World Rank
#9328
Historical Rank
Database
#5868
World Rank
#6086
Historical Rank

Download Badge
Computer Science
Zhuoqing Morley Mao's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Zhuoqing Morley Mao Influential?
(Suggest an Edit or Addition)Zhuoqing Morley Mao's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Accurate online power estimation and automatic battery behavior based power model generation for smartphones (2010) (1240)
- A close examination of performance and power characteristics of 4G LTE networks (2012) (1022)
- Automated Classification and Analysis of Internet Malware (2007) (602)
- Identifying diverse usage behaviors of smartphone apps (2011) (452)
- COMET: Code Offload by Migrating Execution Transparently (2012) (417)
- The Ninja architecture for robust Internet-scale systems and services (2001) (387)
- An in-depth study of LTE: effect of network protocol and application behavior on performance (2013) (387)
- Towards an accurate AS-level traceroute tool (2003) (380)
- Toward Software-Defined Cellular Networks (2012) (372)
- Anatomizing application performance differences on smartphones (2010) (331)
- Profiling resource usage for mobile applications: a cross-layer approach (2011) (311)
- Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware (2008) (305)
- Locating internet routing instabilities (2004) (300)
- Characterizing radio resource allocation for 3G networks (2010) (293)
- Route flap damping exacerbates internet routing convergence (2002) (292)
- Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving (2019) (286)
- ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms (2017) (257)
- An untold story of middleboxes in cellular networks (2011) (256)
- Locating internet bottlenecks: algorithms, measurements, and implications (2004) (241)
- HLP: a next generation inter-domain routing protocol (2005) (211)
- Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks (2014) (205)
- A measurement study on the impact of routing events on end-to-end internet path performance (2006) (203)
- Accurate Real-time Identification of IP Prefix Hijacking (2007) (200)
- iSPY: Detecting IP Prefix Hijacking on My Own (2008) (187)
- Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions (2008) (181)
- Internet Censorship in China: Where Does the Filtering Occur? (2011) (179)
- Enriching Intrusion Alerts Through Multi-Host Causality (2005) (174)
- ICEBERG: an Internet core network architecture for integrated communications (2000) (171)
- A Precise and Efficient Evaluation of the Proximity Between Web Clients and Their Local DNS Servers (2002) (170)
- Finding a needle in a haystack: pinpointing significant BGP routing changes in an IP network (2005) (148)
- TOP: Tail Optimization Protocol For Cellular Radio Resource Allocation (2010) (148)
- On AS-level path inference (2005) (141)
- Toward understanding distributed blackhole placement (2004) (139)
- BGP beacons (2003) (132)
- AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users (2013) (127)
- PROTEUS: network performance forecast for real-time, interactive mobile applications (2013) (124)
- Web caching on smartphones: ideal vs. reality (2012) (123)
- Cache contention and application performance prediction for multi-core systems (2010) (120)
- Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph (2014) (118)
- Periodic transfers in mobile applications: network-wide origin, impact, and optimization (2012) (116)
- An in-depth understanding of multipath TCP on mobile devices: measurement and system design (2016) (115)
- Mobilyzer: An Open Platform for Controllable Mobile Network Measurements (2015) (115)
- Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures (2020) (114)
- The SAHARA Model for Service Composition across Multiple Providers (2002) (113)
- Scalable and accurate identification of AS-level forwarding paths (2004) (108)
- Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security (2012) (101)
- Incremental Deployment of SDN in Hybrid Enterprise and ISP Networks (2016) (101)
- Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis (2014) (100)
- An empirical approach to modeling inter-AS traffic matrices (2005) (97)
- Detecting traffic differentiation in backbone ISPs with NetPolice (2009) (97)
- Cellular data network infrastructure characterization and implication on mobile content placement (2011) (94)
- TCP revisited: a fresh look at TCP in the wild (2009) (93)
- QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis (2014) (93)
- Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing (2007) (90)
- A Measurement Study of Internet Delay Asymmetry (2008) (90)
- Collaborative TCP sequence number inference attack: how to crack sequence number under a second (2012) (89)
- Understanding network delay changes caused by routing events (2007) (89)
- Practical defenses against BGP prefix hijacking (2007) (87)
- SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic (2015) (86)
- Screen-off traffic characterization and optimization in 3G/4G networks (2012) (82)
- Internet routing resilience to failures: analysis and implications (2007) (78)
- Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control (2018) (75)
- SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture (2014) (70)
- Accelerating Mobile Applications through Flip-Flop Replication (2015) (70)
- Automatic generation of mobile app signatures from traffic observations (2015) (68)
- ADEL: an automatic detector of energy leaks for smartphone applications (2012) (67)
- SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks (2018) (66)
- Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework (2016) (66)
- Fault-tolerant, Scalable, Wide-Area Internet Service Composition (2001) (65)
- Declarative configuration management for complex and dynamic networks (2010) (65)
- Analyzing large DDoS attacks using multiple data sources (2006) (65)
- A measurement study of Internet bottlenecks (2005) (63)
- Accelerating Multipath Transport Through Balanced Subflow Completion (2017) (61)
- On Network-level Clusters for Spam Detection (2010) (59)
- Botnet spam campaigns can be long lasting: evidence, implications, and analysis (2009) (57)
- Combining routing and traffic data for detection of IP forwarding anomalies (2004) (56)
- Discovering fine-grained RRC state dynamics and performance impacts in cellular networks (2014) (56)
- AccuLoc: practical localization of performance measurements in 3G networks (2011) (56)
- Differentiated BGP Update Processing for Improved Routing Convergence (2006) (55)
- Performance and power modeling in a multi-programmed multi-core environment (2010) (53)
- CellSDN : Software-Defined Cellular Networks (2012) (52)
- Panappticon: Event-based tracing to measure mobile application and platform performance (2013) (49)
- IP forwarding anomalies and improving their detection using multiple data sources (2004) (47)
- The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities (2014) (47)
- Android UI Deception Revisited: Attacks and Defenses (2016) (47)
- Peeking into Spammer Behavior from a Unique Vantage Point (2008) (46)
- Characterizing Dark DNS Behavior (2007) (46)
- Diagnosing Path Inflation of Mobile Client Traffic (2014) (46)
- On the impact of route monitor selection (2007) (46)
- MCNet: Crowdsourcing wireless performance measurements through the eyes of mobile devices (2014) (45)
- Innocent by association: early recognition of legitimate users (2012) (44)
- BorderGuard: detecting cold potatoes from peers (2004) (43)
- A case for unsupervised-learning-based spam filtering (2010) (41)
- Contrail: Enabling Decentralized Social Networks on Smartphones (2011) (39)
- Categorization of Anomalies in Smart Manufacturing Systems to Support the Selection of Detection Mechanisms (2017) (39)
- Understanding On-device Bufferbloat for Cellular Upload (2016) (39)
- ShadowNet: A Platform for Rapid and Safe Network Evolution (2009) (38)
- Vulnerability of Traffic Control System Under Cyberattacks with Falsified Data (2018) (38)
- Effective Diagnosis of Routing Disruptions from End Systems (2008) (37)
- The Misuse of Android Unix Domain Sockets and Security Implications (2016) (37)
- Push or Request: An Investigation of HTTP/2 Server Push for Improving Mobile Performance (2017) (35)
- Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild (2015) (34)
- Towards Automated Safety Vetting of PLC Code in Real-World Plants (2019) (33)
- How to Reduce Smartphone Traffic Volume by 30%? (2013) (32)
- Network support for mobile multimedia using a self-adaptive distributed proxy (2001) (32)
- Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks (2015) (31)
- SoftBox: A Customizable, Low-Latency, and Scalable 5G Core Network Architecture (2018) (31)
- A software-defined framework for the integrated management of smart manufacturing systems (2018) (30)
- On the impact of research network based testbeds on wide-area experiments (2006) (30)
- Dissecting VOD services for cellular: performance, root causes and best practices (2017) (29)
- On Adversarial Robustness of Trajectory Prediction for Autonomous Vehicles (2022) (29)
- Production as a Service: A Digital Manufacturing Framework for Optimizing Utilization (2018) (29)
- PACMAN: a platform for automated and controlled network operations and configuration management (2009) (28)
- Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications (2017) (27)
- Location, location, location!: modeling data proximity in the cloud (2010) (27)
- MP-H2: A Client-only Multipath Solution for HTTP/2 (2019) (26)
- You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks (2012) (26)
- A Framework for Measuring and Predicting the Impact of Routing Changes (2007) (26)
- Can deterministic replay be an enabling tool for mobile computing? (2011) (26)
- Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs (2008) (25)
- Towards automated network management: network operations using dynamic views (2007) (25)
- Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique (2010) (25)
- SoftMoW: a dynamic and scalable software defined architecture for cellular WANs (2014) (24)
- SocialWatch: detection of online service abuse via large-scale social graphs (2013) (23)
- DECOR: DEClarative network management and OpeRation (2010) (23)
- Performance Characterization and Call Reliability Diagnosis Support for Voice over LTE (2015) (22)
- Wide-Area IP Network Mobility (2008) (21)
- Tango (2015) (21)
- Caesar: high-speed and memory-efficient forwarding engine for future internet architecture (2015) (19)
- Pausing and Resuming Network Flows using Programmable Buffers (2018) (18)
- MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era (2016) (18)
- Leveraging Context-Triggered Measurements to Characterize LTE Handover Performance (2019) (17)
- CSI: inferring mobile ABR video adaptation behavior under HTTPS and QUIC (2020) (17)
- Reval: A Tool for Real-time Evaluation of DDoS Mitigation Strategies (2006) (16)
- Accurate Real-time Identication of IP Prex Hijacking (2007) (15)
- Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication (2015) (15)
- On the Adversarial Robustness of 3D Point Cloud Classification (2020) (14)
- FLOWR: a self-learning system for classifying mobileapplication traffic (2014) (14)
- Proceedings of the third ACM workshop on Mobile cloud computing and services (2012) (13)
- Efficient and robust streaming provisioning in VPNs (2003) (13)
- HC-BGP: A light-weight and flexible scheme for securing prefix ownership (2009) (12)
- QoE Inference Without Application Control (2016) (12)
- CVShield: Guarding Sensor Data in Connected Vehicle with Trusted Execution Environment (2020) (12)
- Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware (2006) (12)
- AVGuardian: Detecting and Mitigating Publish-Subscribe Overprivilege for Autonomous Vehicle Systems (2020) (12)
- Long-term effect of leprosy control in two Prefectures of China, 1955-1993. (1995) (12)
- Achieving service portability using self-adaptive data paths (2002) (11)
- Certified Adversarial Defenses Meet Out-of-Distribution Corruptions: Benchmarking Robustness and Simple Baselines (2021) (11)
- DECOR: DEClaritive network management and OpeRation (2009) (11)
- Accurate Real-time Identification of IP Hijacking (2006) (10)
- Distributing Mobile Music Applications for Audience Participation Using Mobile Ad-hoc Network (MANET) (2014) (9)
- QoE Inference and Improvement Without End-Host Control (2018) (9)
- Production as a service: A centralized framework for small batch manufacturing (2017) (9)
- Using predictable mobility patterns to support scalable and secure MANETs of handheld devices (2011) (9)
- Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf (2014) (9)
- Skycore: Moving Core to the Edge For Untethered and Reliable UAV-Based LTE Networks (2019) (9)
- Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design, CellNet '12, Helsinki, Finland, August 13, 2012 (2012) (8)
- Watching data streams toward a multi-homed sink under routing changes introduced by a BGP beacon (2006) (8)
- Internet-scale malware mitigation: combining intelligence of the control and data plane (2006) (8)
- An Initial Investigation of Protocol Customization (2017) (8)
- Tango: Accelerating Mobile Applications through Flip-Flop Replication (2015) (8)
- Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior (2004) (8)
- Is BGP update storm a sign of trouble: Observing the internet control and data planes during internet worms (2006) (7)
- Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones (2014) (7)
- Demo: DEMS: DEcoupled Multipath Scheduler for Accelerating Multipath Transport (2017) (7)
- No One In The Middle: Enabling Network Access Control Via Transparent Attribution (2018) (7)
- Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study (2017) (7)
- MIDAS: An Impact Scale for DDoS attacks (2007) (7)
- Towards secure and safe appified automated vehicles (2017) (7)
- RENEW: Programmable and Observable Massive MIMO Networks (2018) (7)
- Impact Evaluation of Falsified Data Attacks on Connected Vehicle Based Traffic Signal Control (2020) (7)
- A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software (2021) (7)
- CSI (2020) (7)
- Uncovering Cellular Network Characteristics : Performance , Infrastructure , and Policies (2013) (6)
- RadioProphet: Intelligent Radio Resource Deallocation for Cellular Networks (2014) (6)
- A Lightweight Framework for Fine-Grained Lifecycle Control of Android Applications (2019) (6)
- KnowOps: Towards an Embedded Knowledge Base for Network Management and Operations (2011) (6)
- Understanding the Networking Performance of Wear OS (2019) (6)
- Understanding RRC state dynamics through client measurements with mobilyzer (2014) (6)
- Demo: mobile application resource optimizer (ARO) (2011) (6)
- The Cloud is the Router: Enabling Bandwidth-Efficient and Privacy-Aware Mobile Applications with Contrail (2010) (5)
- Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols (2021) (5)
- A Firewall for Routers: Protecting against Routing Misbehavior (2007) (5)
- Livelyzer: analyzing the first-mile ingest performance of live video streaming (2021) (5)
- Achieving service portability in ICEBERG (2000) (5)
- Trajectory-Based Hierarchical Defense Model to Detect Cyber-Attacks on Transportation Infrastructure (2019) (5)
- Diagnosing Mobile Apps' Quality of Experience: Challenges and Promising Directions (2016) (4)
- Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks (2011) (4)
- Happy Packets: Some Initial Results (2004) (4)
- Production as a Service: Optimizing Utilization in Manufacturing Systems (2016) (4)
- CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts (2018) (4)
- A Framework for Universal Service Access using Device Ensemble (2002) (4)
- Vivisecting mobility management in 5G cellular networks (2022) (4)
- Internet Traffic and Multiresolution Analysis (2008) (3)
- Solving the interdomain routing puzzle: understanding interdomain routing dynamics (2003) (3)
- Ensemble: Community-Based Anomaly Detection for Popular Applications (2009) (3)
- MPBond: efficient network-level collaboration among personal mobile devices (2020) (3)
- On the Effectiveness of Pre-Acceptance Spam Filtering (2007) (3)
- What you see is what you get: measure ABR video streaming QoE via on-device screen recording (2020) (3)
- Mobilyzer: An Open Platform for Principled Mobile Network Measurements (2014) (2)
- Demo: Mobilyzer: Mobile Network Measurement Made Easy (2015) (2)
- CIDS : Causality-based Intrusion Detection System (2)
- Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2014, Bretton Woods, New Hampshire, USA, June 16, 2014, PhD Forum (2014) (2)
- [Roles of alpha-2 adrenoceptor in prefrontal cortical cognitive functions]. (1999) (2)
- PerfProbe: A Systematic, Cross-Layer Performance Diagnosis Framework for Mobile Platforms (2019) (2)
- Developing the Workforce for Next-Generation Smart Manufacturing Systems: A Multidisciplinary Research Team Approach (2021) (2)
- CVShield (2020) (2)
- Single-crystal elasticity of hydrous wadsleyite by Brillouin scattering (2006) (2)
- Poster: Experimental Evaluation of TCP Congestion Control over 60GHz WLAN (2019) (1)
- On the Safety of Enterprise Policy Deployment (2010) (1)
- Characterizing Internet Delay Asymmetry (2007) (1)
- A Systematic Framework to Identify Violations of Scenario-dependent Driving Rules in Autonomous Vehicle Software (2021) (1)
- MPBond: efficient network-level collaboration among personal mobile devices (2020) (1)
- Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet (2022) (1)
- Impact of low rate TCP - targeted DoS attacks on BGP (2006) (1)
- Understanding the Networking Performance of Wear OS (2019) (1)
- ADD: Application and Data-Driven Controller Design (2019) (1)
- Poster : Securing Appified Automated Vehicles With AVG UARD (2017) (0)
- Toward Automated Network Management and Operations (2010) (0)
- Ììì Aeaeòòò Ö Blockinøø Blockinøùöö Óö Êóóù×ø Áòøøöòòø¹ë Blockin Blockinðð Ëý×øøñ× Òò Ëëöúú Blockin Blockin× Ëøøúò º Ööööðð¸ååøø Ïð×׸êóó Úóò Ööò¸öö º Ööûö¸úúú Ùðððö¸aeº Óöö×óú¸ Øøôô»»òòòòòº Blockin׺öööððýºù (2007) (0)
- Bufferbloat Mitigation for Real-time Video Streaming using Adaptive Controlled Delay Mechanism (2020) (0)
- GPS Spoofing Attack Detection on Intersection Movement Assist using One-Class Classification (2023) (0)
- Tussle in Routing : Who Determines Internet Paths ? (0)
- Performance Analysis of Location Profile Routing (2014) (0)
- Poster: Context-Triggered Mobile Network Measurement (2015) (0)
- Automatic Feature Isolation in Network Protocol Software Implementations (2020) (0)
- Egret (2019) (0)
- Program chairs' welcome (2014) (0)
- Happy Packets to You! (2004) (0)
- Poster: Characterizing Performance and Power for mmWave 5G on Commodity Smartphones (2019) (0)
- Earnest Access of Divulging and Aversion of DDOS Attack (2017) (0)
- MIDAS:AnImpactScaleforDDoS attacks (2007) (0)
- Comet Observations [D18 Mt. Guizi Observatory] (2010) (0)
- A study of Calligonum plant communities in Xinjiang. (1990) (0)
- Automated Runtime Mitigation for Misconfiguration Vulnerabilities in Industrial Control Systems (2022) (0)
- Virtual Streams Performance-Robust Parallel I / O (0)
- Triptolide, an Extracted Phytomedicine Attenuates Glomerularsclerosis in Diabetic Nephropathy Rats via Regulation of Akt/AMPK/mTOR and TGF-beta1/Smad Signaling Activities, Compared with Rapamycin (2015) (0)
- Total Flavone Glycosides of Flos Abelmoschus Manihot Ameliorates Renal Fibrosis in Diabetic Nephropathy Rats via Inhibiting Oxidative Stress and p38MAPK Signaling Activity Compared with Alpha-Lipoic Acid (2015) (0)
- CellNet'12 chairs' welcome (2012) (0)
- COVID-19 prevention and control scheme in an ENT endoscopy unit in China (2020) (0)
- AVMaestro: A Centralized Policy Enforcement Framework for Safe Autonomous-driving Environments (2022) (0)
- Research of Jiawei Sini Pulvis on decreasing lipid of fatty liv er patient (2003) (0)
- Embedded and Real-time Systems (2019) (0)
- Routing Research Issues ( Position Statement for WIRED 2003 ) (0)
- Pyoderma gangrenosum, acne, pyogenic arthritis, and suppurative hidradenitis syndrome: a case study (2018) (0)
- [Clinical characteristics of 272 437 patients with different histopathological subtypes of primary esophageal malignant tumors]. (2022) (0)
- WACCO and LOKO: Strong Consistency at Global Scale (2015) (0)
- Ôôðð Blockin Blockinøøóò Ôøøøøóò× Óö Ïïööðð×× Åóóóðð Ðððòø× (2007) (0)
- Solubilization and purification of opioid receptor molecules of rat brain. (1989) (0)
- Egret: simplifying traffic management for physical and virtual network functions (2019) (0)
- Enabling End Host Network Functions – Public Review (2015) (0)
- suMMarY report for the First NSF Workshop on Mobile Community Measurement Infrastructure (2015) (0)
- MCS 2012 chairs' welcome (2012) (0)
- MP-H 2 : A Client-only Multipath Solution for HTTP / 2 Ashkan Nikravesh (2018) (0)
- Guest editorial - Interdomain routing and the border gateway protocol (2005) (0)
- Used by device administration to set the maximum screen off timeout . * (2015) (0)
- Livelyzer (2021) (0)
- Deposition of Complement 3 Influences the Prognosis of Nodular Sclerosis of Diabetic Nephropathy (0)
- Sound Velocity Crossover of Hydrated Olivine at High Pressures (2008) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Zhuoqing Morley Mao?
Zhuoqing Morley Mao is affiliated with the following schools: