The paper, in collaboration with Lin Wang et al., formulates and solves a novel type of service placement in edge computing designed to support collaborative applications (e.g., social VR), which require not only communications between each user and its service entity, but also between the service entities of users. It is an extended version of […]
Congratulations to Yudi on your first paper (with me)! This work, as part of the CAMPR project supported by NSF, revisited the problem of localizing failed links (i.e., transmission lines) in a power grid under joint cyber-physical attack. But unlike previous works that assumed the grid to remain connected after the attack, we consider a […]
Congrats to Daniel on your second paper! This work follows up our INFOCOM’20 paper on “Stealthy DGoS Attack”, a novel insider attack that tries to degrade end-to-end communication performances by adding delays/losses at compromised links while protecting these links from detection by network tomography. Unlike the first paper that implicitly assumes only passive measurements, the […]
The paper, “Network Scheduling and Compute Resource Aware Task Placement in Datacenters“, is the journal version of an earlier conference paper with my intern Ali Munir at CoNEXT’16. It talks about the importance of taking into account how the network schedules flows in placing tasks for data-intensive computation in datacenters.
Hanlin’s preliminary result in exploring the data privacy aspect of coreset-based learning, in comparison with federated learning, is accepted for a long presentation (11 out of 46) at the International Workshop on Federated Learning for User Privacy and Data Confidentiality in Conjunction with ICML 2020 (FL-ICML’20). Congratulations, Hanlin!
Quinn’s paper on “Misreporting Attacks in Software-Defined Networking” is accepted to International Conference on Security and Privacy in Communication Networks (SecureComm 2020). Congratulations, Quinn! The work is supported by a NSF:SaTC grant for which Ting He is the PI. It talks about how a compromised switch can stealthily attract a greater portion of traffic than […]
Our work on supporting diverse machine learning models by collecting a robust coreset was featured in the article “Machine learning algorithms promise better situational awareness“, published by U.S. Army CCDC Army Research Laboratory Public Affairs. The work is part of Hanlin’s thesis research, originally published in Globecom’19 and JSAC’20. We thank our government partner Dr. […]
Sina’s paper “Solving the Divergence Problem in AC-QSS Cascading Failure Model by Introducing the Effect of a Realistic UVLS Scheme” develops a AC-QSS based model which better captures the process of cascading failure in a smart grid by incorporating the effect of a built-in failure mitigation scheme called Under Voltage Load Shedding (UVLS). This is […]
Chronically, this is Hanlin’s second piece of work done during his internship at IBM last summer. The work tries, for the first time, to combine coreset and quantization to jointly reduce two dimensions of the data cube: the number of data points, and the number of bits in representing each feature of each data point. […]
His thesis is on “Flow Table Security” where he formulated a novel inference problem called Adversarial Cache Inference problem about probing, inferring, and attacking a flow table (modeled as a cache) from one or a set of compromised host(s). The work has been accepted to INFOCOM’20 and the long version is under submission to IEEE/ACM […]