Kai Bu
Kai Bu
Verified email at zju.edu.cn - Homepage
Cited by
Cited by
Enda: Embracing network inconsistency for dynamic application offloading in mobile cloud computing
J Li, K Bu, X Liu, B Xiao
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 39-44, 2013
Unknown tag identification in large RFID systems: An efficient and complete solution
X Liu, B Xiao, S Zhang, K Bu
IEEE Transactions on Parallel and Distributed Systems 26 (6), 1775-1788, 2014
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
K Bu, X Wen, B Yang, Y Chen, LE Li, X Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Efficient distributed query processing in large RFID-enabled supply chains
J Liu, B Xiao, K Bu, L Chen
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 163-171, 2014
A locality-based range-free localization algorithm for anisotropic wireless sensor networks
X Liu, S Zhang, K Bu
Telecommunication Systems 62 (1), 3-13, 2016
RuleTris: Minimizing rule update latency for TCAM-based SDN switches
X Wen, B Yang, Y Chen, LE Li, K Bu, P Zheng, Y Yang, C Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Compiling minimum incremental update for modular SDN languages
X Wen, C Diao, X Zhao, Y Chen, LE Li, B Yang, K Bu
Proceedings of the third workshop on Hot topics in software defined …, 2014
Efficient Misplaced-Tag Pinpointing in Large RFID Systems
K Bu, B Xiao, Q Xiao, S Chen
IEEE, 2012
Flexible and time-efficient tag scanning with handheld readers
X Liu, S Zhang, B Xiao, K Bu
IEEE Transactions on Mobile Computing 15 (4), 840-852, 2015
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath
H Gao, Y Yang, K Bu, Y Chen, D Downey, K Lee, A Choudhary
Proceedings of the 30th Annual Computer Security Applications Conference, 76-85, 2014
Complete and Fast Unknown Tag Identification in Large RFID Systems
X Liu, S Zhang, K Bu, B Xiao
Unreconciled collisions uncover cloning attacks in anonymous RFID systems
K Bu, X Liu, J Luo, B Xiao, G Wei
IEEE Transactions on Information Forensics and Security 8 (3), 429-439, 2013
STEP: A time-efficient tag searching protocol in large RFID systems
X Liu, B Xiao, S Zhang, K Bu, A Chan
IEEE Transactions on Computers 64 (11), 3265-3277, 2015
Iterative localization of wireless sensor networks: an accurate and robust approach
Q Xiao, B Xiao, K Bu, J Cao
IEEE/ACM transactions on networking 22 (2), 608-621, 2013
Efficient pinpointing of misplaced tags in large RFID systems
K Bu, B Xiao, Q Xiao, S Chen
Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual …, 2011
Deterministic detection of cloning attacks for anonymous RFID systems
K Bu, M Xu, X Liu, J Luo, S Zhang, M Weng
IEEE Transactions on Industrial Informatics 11 (6), 1255-1266, 2015
Fault management in software-defined networking: A survey
Y Yu, X Li, X Leng, L Song, K Bu, Y Chen, J Yang, L Zhang, K Cheng, ...
IEEE Communications Surveys & Tutorials 21 (1), 349-392, 2018
Robust localization against outliers in wireless sensor networks
Q Xiao, K Bu, Z Wang, B Xiao
ACM Transactions on Sensor Networks (TOSN) 9 (2), 1-26, 2013
You can clone but you cannot hide: A survey of clone prevention and detection for RFID
K Bu, M Weng, Y Zheng, B Xiao, X Liu
IEEE Communications Surveys & Tutorials 19 (3), 1682-1700, 2017
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks
K Bu, Q Xiao, Z Sun, B Xiao
Computer Communications 35 (13), 1549-1560, 2012
The system can't perform the operation now. Try again later.
Articles 1–20