default search action
Wu-chang Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c43]Zhe Li, Bo Chen, Wu-chang Feng, Fei Xie:
Concolic Execution of NMap Scripts for Honeyfarm Generation. MTD@CCS 2021: 33-42 - [c42]Wenjing Wu, Wu-chang Feng:
Game to Dethrone: A Least Privilege CTF. SmartCloud 2021: 132-137 - [i1]Nicholas Springer, Wu-chang Feng:
Thunder CTF: Learning Cloud Security on a Dime. CoRR abs/2107.12566 (2021) - 2020
- [c41]Daniel Connelly, Wu-chang Feng:
Have I Been Exploited? - A Registry of Vulnerable Ethereum Smart Contracts. ICBC 2020: 221-228 - [c40]Ellie Harmon, Veronica Hotton, Robert Liebman, Michael Lupro, Wu-chang Feng, Lois M. L. Delcambre, David Pouliot:
CyberPDX: An Interdisciplinary Professional Development Program for Middle and High School Teachers. SIGCSE 2020: 1335 - [c39]Wu-chang Feng, Robert Liebman, Ellie Harmon, Veronica Hotton, Michael Lupro, Lois M. L. Delcambre:
Securing the Next Generation. SIGCSE 2020: 1384
2010 – 2019
- 2018
- [c38]Jacob Springer, Wu-chang Feng:
Teaching with angr: A Symbolic Execution Curriculum and CTF. ASE @ USENIX Security Symposium 2018 - [e2]Wu-chang Feng, Ashley L. Podhradsky:
2018 USENIX Workshop on Advances in Security Education, ASE 2018, Baltimore, MD, USA, August 13, 2018. USENIX Association 2018 [contents] - 2017
- [c37]Wu-chang Feng, Robert Liebman, Lois M. L. Delcambre, Michael Lupro, Tim Sheard, Scott Britell, Gerald Recktenwald:
CyberPDX: A Camp for Broadening Participation in Cybersecurity. ASE @ USENIX Security Symposium 2017 - 2016
- [c36]Wu-chang Feng:
A "Divergent"-Themed CTF and Urban Race for Introducing Security and Cryptography. ASE @ USENIX Security Symposium 2016 - 2014
- [j14]Akshay Dua, Nirupama Bulusu, Wu-chang Feng, Wen Hu:
Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems. ACM Trans. Embed. Comput. Syst. 13(5s): 154:1-154:19 (2014) - [c35]Akshay Dua, Thai Bui, Tien Le, Nhan Huynh, Wu-chang Feng:
MetaCAPTCHA: A Metamorphic Throttling Service for the Web. ICNP 2014: 665-670 - 2012
- [c34]Tien Le, Akshay Dua, Wu-chang Feng:
kaPoW plugins: protecting web applications using reputation-based proof-of-work. WebQuality@WWW 2012: 60-63 - 2011
- [c33]Sam Moffatt, Akshay Dua, Wu-chang Feng:
SpotCheck: An efficient defense against information exposure cheats. NETGAMES 2011: 1-6 - [c32]Akshay Dua, Nirupama Bulusu, Wu-chang Feng:
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data. SecureComm 2011: 470-479 - 2010
- [j13]Chris Chambers, Wu-chang Feng, Sambit Sahu, Debanjan Saha, David Brandt:
Characterizing Online Games. IEEE/ACM Trans. Netw. 18(3): 899-910 (2010)
2000 – 2009
- 2009
- [c31]Edward C. Kaiser, Wu-chang Feng, Travis Schluessler:
Fides: remote anomaly-based cheat detection using client emulation. CCS 2009: 269-279 - [c30]Edward C. Kaiser, Wu-chang Feng:
PlayerRating: A reputation system for multiplayer online games. NETGAMES 2009: 1-6 - 2008
- [c29]Wu-chang Feng, Edward C. Kaiser, Travis Schluessler:
Stealth measurements for cheat detection in on-line games. NETGAMES 2008: 15-20 - 2007
- [j12]Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Maier:
Automatic high-performance reconstruction and recovery. Comput. Networks 51(5): 1361-1377 (2007) - [c28]Edward C. Kaiser, Wu-chang Feng:
mod_kaPoW: mitigating DoS with transparent proof-of-work. CoNEXT 2007: 74 - [c27]Wu-chang Feng, David Brandt, Debanjan Saha:
A long-term study of a popular MMORPG. NETGAMES 2007: 19-24 - 2006
- [c26]Chris Chambers, Wu-chang Feng, Wu-chi Feng:
Towards public server MMOs. NETGAMES 2006: 3 - [c25]Jie Huang, Wu-chi Feng, Wu-chang Feng, David Romano:
Multi-hop buffering and adaptation for video-based sensor networking applications. NOSSDAV 2006: 8 - 2005
- [j11]Deepa Srinivasan, Wu-chang Feng:
Performance analysis of multi-dimensional packet classification on programmable network processors. Comput. Commun. 28(15): 1752-1760 (2005) - [j10]Wu-chi Feng, Edward C. Kaiser, Wu-chang Feng, Mikael Le Baillif:
Panoptes: scalable low-power video sensor networking technologies. ACM Trans. Multim. Comput. Commun. Appl. 1(2): 151-167 (2005) - [j9]Wu-chang Feng, Francis Chang, Wu-chi Feng, Jonathan Walpole:
A traffic characterization of popular on-line games. IEEE/ACM Trans. Netw. 13(3): 488-500 (2005) - [c24]Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Feng, Jonathan Walpole:
Forensix: A Robust, High-Performance Reconstruction System. ICDCS Workshops 2005: 155-162 - [c23]Chris Chambers, Wu-chang Feng, Sambit Sahu, Debanjan Saha:
Measurement-based Characterization of a Collection of On-line Games (Awarded Best Student Paper!). Internet Measurement Conference 2005: 1-14 - [c22]Chris Chambers, Wu-chang Feng:
Patch scheduling for on-line games. NETGAMES 2005: 1-6 - [c21]Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanjan Saha:
Mitigating information exposure to cheaters in real-time strategy games. NOSSDAV 2005: 7-12 - [c20]Wu-chi Feng, Nirupama Bulusu, Wu-chang Feng:
Dissecting the video sensing landscape. NOSSDAV 2005: 135-140 - [c19]Jim Snow, Wu-chi Feng, Wu-chang Feng:
Implementing a low power TDMA protocol over 802.11. WCNC 2005: 75-80 - 2004
- [c18]Francis Chang, Kang Li, Wu-chang Feng:
Approximate Caches for Packet Classification. INFOCOM 2004: 2196-2207 - [c17]Deepa Srinivasan, Wu-chang Feng:
Performance Analysis of Multi-dimensional Packet Classification on Programmable Network Processors. LCN 2004: 360-367 - [e1]Wu-chang Feng:
Proceedings of the 3rd Workshop on Network and System Support for Games, NETGAMES 2004, Portland, Oregon, USA, August 30, 2004. ACM 2004, ISBN 1-58113-942-X [contents] - 2003
- [j8]Wu-chang Feng:
The case for TCP/IP puzzles. Comput. Commun. Rev. 33(4): 322-327 (2003) - [c16]Kang Li, Francis Chang, Damien Berger, Wu-chang Feng:
Architectures for packet classification caching. ICON 2003: 111-117 - [c15]Wu-chi Feng, Brian Code, Edward C. Kaiser, Mike Shea, Wu-chang Feng:
Panoptes: scalable low-power video sensor networking technologies. ACM Multimedia 2003: 90-91 - [c14]Chris Chambers, Wu-chi Feng, Wu-chang Feng, Debanjan Saha:
A geographic redirection service for on-line games. ACM Multimedia 2003: 227-230 - [c13]Wu-chi Feng, Brian Code, Edward C. Kaiser, Mike Shea, Wu-chang Feng, Louis Bavoil:
Panoptes: scalable low-power video sensor networking technologies. ACM Multimedia 2003: 562-571 - [c12]Wu-chang Feng, Ashvin Goel, Abdelmajid Bezzaz, Wu-chi Feng, Jonathan Walpole:
TCPivo: a high-performance packet replay engine. MoMeTools@SIGCOMM 2003: 57-64 - [c11]Francis Chang, Wu-chang Feng:
Modeling player session times of on-line games. NETGAMES 2003: 23-26 - [c10]Wu-chang Feng, Wu-chi Feng:
On the geographic distribution of on-line game servers and players. NETGAMES 2003: 173-179 - 2002
- [j7]Francis Chang, Wu-chang Feng, Wu-chi Feng, Jonathan Walpole:
Provisioning on-line games: a traffic analysis of a busy counter-strike server. Comput. Commun. Rev. 32(3): 18 (2002) - [j6]Wu-chang Feng, Kang G. Shin, Dilip D. Kandlur, Debanjan Saha:
The BLUE active queue management algorithms. IEEE/ACM Trans. Netw. 10(4): 513-528 (2002) - [c9]Wu-chang Feng, Francis Chang, Wu-chi Feng, Jonathan Walpole:
Provisioning on-line games: a traffic analysis of a busy counter-strike server. Internet Measurement Workshop 2002: 151-156 - 2001
- [c8]Wu-chang Feng, Dilip D. Kandlur, Debanjan Saha, Kang G. Shin:
Stochastic Fair Blue: A Queue Management Algorithm for Enforcing Fairness. INFOCOM 2001: 1520-1529 - [c7]Wu-chang Feng, Dilip D. Kandlur, Debanjan Saha, Kang G. Shin:
BLUE: an alternative approach to active queue management. NOSSDAV 2001: 41-50
1990 – 1999
- 1999
- [b1]Wu-chang Feng:
Improving Internet congestion control and queue management algorithms. University of Michigan, USA, 1999 - [j5]Tarek F. Abdelzaher, Scott Dawson, Wu-chang Feng, Farnam Jahanian, Scott Johnson, Ashish Mehra, Todd Mitton, Anees Shaikh, Kang G. Shin, Zhiqun Wang, Hengming Zou, M. Bjorkland, P. Marron:
ARMADA Middleware and Communication Services. Real Time Syst. 16(2-3): 127-153 (1999) - [j4]Wu-chang Feng, Jennifer Rexford:
Performance Evaluation of Smoothing Algorithms for Transmitting Prerecorded Variable-Bit-Rate Video. IEEE Trans. Multim. 1(3): 302-313 (1999) - [j3]Wu-chang Feng, Dilip D. Kandlur, Debanjan Saha, Kang G. Shin:
Understanding and improving TCP performance over networks with minimum rate guarantees. IEEE/ACM Trans. Netw. 7(2): 173-187 (1999) - [j2]Wu-chang Feng, Dilip D. Kandlur:
Adaptive packet marking for maintaining end-to-end throughput in a differentiated-services internet. IEEE/ACM Trans. Netw. 7(5): 685-697 (1999) - [c6]Wu-chang Feng, Dilip D. Kandlur, Debanjan Saha, Kang G. Shin:
A Self-Configuring RED Gateway. INFOCOM 1999: 1320-1328 - 1998
- [c5]Wu-chi Feng, Wu-chang Feng:
The Impact of Active Queue Management on Multimedia Congestion Control. ICCCN 1998: 214-218 - [c4]Wu-chang Feng, Dilip D. Kandlur, Debanjan Saha, Kang G. Shin:
Adaptive Packet Marking for Providing Differentiated Services in the Internet. ICNP 1998: 108- - 1997
- [j1]Jennifer Rexford, Wu-chang Feng, James W. Dolter, Kang G. Shin:
PP-MESS-SIM: A Flexible and Extensible Simulator for Evaluating Multicomputer Networks. IEEE Trans. Parallel Distributed Syst. 8(1): 25-40 (1997) - [c3]Wu-chang Feng, Kang G. Shin:
Impact of Selection Functions on Routing Algorithm Performance in Multicomputer Networks. International Conference on Supercomputing 1997: 132-139 - 1995
- [c2]Jennifer Rexford, James W. Dolter, Wu-chang Feng, Kang G. Shin:
PP-MEss-SIM: a simulator for evaluating multicomputer interconnection networks. Annual Simulation Symposium 1995: 84- - 1994
- [c1]James W. Dolter, Stuart W. Daniel, Ashish Mehra, Jennifer Rexford, Wu-chang Feng, Kang G. Shin:
SPIDER: Flexible and Efficient Communication Support for Point-to-Point Distributed Systems. ICDCS 1994: 574-580
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint