Kai Bu

College of Computer Science and Technology
Zhejiang University, Hangzhou, China
Email: kaibu@zju.edu.cn

Publications

Journal Articles
  1. Every Step You Take, I'll Be Watching You: Practical StepAuth-entication of RFID Paths
    Kai Bu and Yingjiu Li
    IEEE Transactions on Information Forensics and Security (TIFS), accepted. October 2017
  2. Editorial: High Performance and Security in Cloud Computing
    Kai Bu, Bin Xiao, and Yi Qian
    Concurrency and Computation: Practice and Experience, accepted for publication. June 2017
    Special Issue on High Performance and Security in Cloud Computing
  3. You Can Clone but You Can't Hide: A Survey of Clone Prevention and Detection for RFID
    Kai Bu, Minyu Weng, Yi Zheng, Bin Xiao, and Xuan Liu
    IEEE Communications Surveys & Tutorials, accepted for publication. March 2017
  4. RuleScope: Inspecting Forwarding Faults for Software-Defined Networking
    Xitao Wen, Kai Bu, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen, Jianfeng Yang, and Xue Leng
    IEEE/ACM Transactions on Networking (ToN), accepted for publication. March 2017
  5. Beating the Artificial Chaos: Fighting OSN Spam using Its Own Templates
    Tiantian Zhu, Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, and Alok Choudhary
    IEEE/ACM Transactions on Networking (ToN), accepted for publication. April 2016
  6. Deterministic Detection of Cloning Attacks for Anonymous RFID Systems
    Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, Shigeng Zhang, and Minyu Weng
    IEEE Transactions on Industrial Informatics (TII), accepted for publication. September 2015
  7. Who Stole My Cheese?: Verifying Intactness of Anonymous RFID Systems
    Kai Bu, Junze Bao, Minyu Weng, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang
    Ad Hoc Networks, accepted for publication. June 2015
  8. A Locality-based Range-Free Localization Algorithm for Anisotropic Wireless Sensor Networks
    Xuan Liu, Shigeng Zhang, and Kai Bu
    Telecommunication Systems, March 2015.
  9. STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
    Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, and Alvin Chan
    IEEE Transactions on Computers (TC), accepted for publication. January 2015
  10. Flexible and Time-Efficient Tag Scanning with Handheld Readers
    Xuan Liu, Shigeng Zhang, Bin Xiao, and Kai Bu
    IEEE Transactions on Mobile Computing (TMC), accepted for publication. December 2014
  11. Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution
    Xuan Liu, Bin Xiao, Shigeng Zhang, and Kai Bu
    IEEE Transactions on Parallel and Distributed Systems (TPDS), accepted for publication. April 2014
  12. Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach
    Qingjun Xiao, Bin Xiao, Kai Bu, and Jiannong Cao
    IEEE/ACM Transactions on Networking (ToN), vol. 22, no. 2, pp. 608-621, 2014.
  13. Approaching the Time Lower Bound on Cloned-tag Identification for Large RFID Systems
    Kai Bu, Xuan Liu, and Bin Xiao
    Ad Hoc Networks, vol. 13, Part B, no. 0, pp. 271-281, 2014.
  14. Understanding and Improving Piece-related Algorithms in the BitTorrent Protocol
    Jiaqing Luo, Bin Xiao, Kai Bu, and Shijie Zhou
    IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 24, no. 12, pp. 2526-2537, 2013.
  15. Efficient Protocol Design for Dynamic Tag Population Monitoring in Large-Scale RFID Systems
    Qingjun Xiao, Kai Bu, Bin Xiao, and Limin Sun
    Concurrency and Computation: Practice and Experience, vol. 25, no. 14, pp. 2080-2097, 2013.
  16. Secure P2P Topology based on a Multidimensional DHT Space Mapping
    Zhixin Sun, Bingqing Luo, Yadang Chen, and Kai Bu
    SCIENCE CHINA Information Science (Science in China Series F), vol. 56, no. 5, pp. 1-14, 2013.
  17. Unreconciled Collisions Uncover Cloning Attacks in Anonymous RFID Systems
    Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, and Guiyi Wei
    IEEE Transactions on Information Forensics and Security (TIFS), vol. 8, no. 3, pp. 429-439, 2013.
  18. Robust Localization against Outliers in Wireless Sensor Networks
    Qingjun Xiao, Kai Bu, Zhijun Wang, and Bin Xiao
    ACM Transactions on Sensor Networks (TOSN), vol. 9, no. 2, pp. 24:1-24:26, 2013.
  19. [in Chinese] Secure P2P topology based on a multidimensional DHT space mapping
    Zhixin Sun, Bingqing Luo, Yadang Chen, and Kai Bu
    SCIENTIA SINICA Informationis (Sci. Sin. Inform.), vol. 43, no. 3, pp. 343-360, 2013.
  20. Efficient Misplaced-Tag Pinpointing in Large RFID Systems
    Kai Bu, Bin Xiao, Qingjun Xiao, and Shigang Chen
    IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 23, no. 11, pp. 2094-2106, 2012.
  21. Toward Collinearity-Aware and Conflict-Friendly Localization for Wireless Sensor Networks
    Kai Bu, Qingjun Xiao, Zhixin Sun, and Bin Xiao
    Computer Communications (COMCOM), vol. 35, no. 13, pp. 1549-1560, 2012.

Conference Papers
  1. Reviving Android Malware with DroidRide: And How Not To
    Min Huang, Kai Bu, Hanlin Wang, and Kaiwen Zhu
    in Proc. of The Fourth International Workshop on Cyber Security and Privacy (CSP)
    Chengdu, China, October 13-15, 2016. Co-located with CyberC 2016. [Slides - PPTX]
  2. RuleTris: Minimizing Rule Update Latency for TCAM-based SDN Switches Best Paper Nominees
    Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, and Chengchen Hu
    in Proc. of The 36th IEEE International Conference on Distributed Computing Systems (ICDCS)
    Nara, Japan, June 27-30, 2016.
  3. Toward Taming Policy Enforcement for SDN in The RIGHT Way: Or Can We?
    Kai Bu, Minyu Weng, Junze Bao, Zhenchao Lin, and Zhikui Xu
    in Proc. of International Workshop of Software-Defined Data Communications and Storage (SDDCS)
    Nara, Japan, June 27, 2016. Co-located with ICDCS 2016. [Slides - PPTX]
  4. One More Hash is Enough: Efficient Tag Stocktaking in Highly Dynamic RFID Systems
    Xuan Liu, Bin Xiao, Shigeng Zhang, and Kai Bu
    in Proc. of IEEE International Conference on Communications (ICC)
    Kuala Lumpur, Malaysia, May 23-27, 2016.
  5. Is Every Flow on The Right Track?: Inspect SDN Forwarding with RuleScope
    Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, and Xiaolin Chen
    in Proc. of the 35th Annual IEEE International Conference on Computer Communications (INFOCOM)
    San Francisco, CA, USA, April 10-15, 2016. [Slides - PPTX]
  6. [Poster] A Range-free Localization of Passive RFID Tags Using Mobile Readers
    Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, and Kai Bu
    in Proc. of the 12th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
    Dallas, TX, USA, October 19-22, 2015.
  7. Gotta Tell You Switches Only Once: Toward Bandwidth-Efficient Flow Setup for SDN
    Kai Bu
    in Proc. of International Workshop of Software-Defined Data Communications and Storage (SDDCS)
    Hong Kong, China, April 27, 2015, pp. 492-497. Co-located with INFOCOM 2015. [Slides - PPTX]
  8. Intactness Verification in Anonymous RFID Systems
    Kai Bu, Jia Liu, Bin Xiao, Xuan Liu, and Shigeng Zhang
    in Proc. of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
    Hsinchu, Taiwan, December 16-19, 2014, pp. 134-141. [Slides - PDF]
  9. Spam ain't as Diverse as It Seems: Throttling OSN Spam with Templates Underneath
    Hongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, and Alok Choudhary
    in Proc. of 2014 Annual Computer Security Applications Conference (ACSAC)
    New Orleans, LA, USA, December 8-12, 2014, pp. 76-85.
  10. Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems
    Kai Bu, Mingjie Xu, Xuan Liu, Jiaqing Luo, and Shigeng Zhang
    in Proc. of the 11th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
    Philadelphia, PA, USA, October 28-30, 2014, pp. 416-424. [Slides - PDF]
  11. Compiling Minimum Incremental Update for Modular SDN Languages
    Xitao Wen, Chunxiao Diao, Xun Zhao,Yan Chen, Li Erran Li, Bo Yang, and Kai Bu
    in Proc. of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)
    Chicago, IL, USA, August 22, 2014, pp. 193-198. Co-located with SIGCOMM 2014.
  12. LOCK: A Fast and Flexible Tag Scanning Mechanism with Handheld Readers
    Xuan Liu, Bin Xiao, Kai Bu, and Shigeng Zhang
    in Proc. of IEEE/ACM International Symposium on Quality of Service (IWQoS)
    Hong Kong, China, May 26-27, 2014, pp. 360-369.
  13. Efficient Distributed Query Processing in Large RFID-enabled Supply Chains
    Jia Liu, Bin Xiao, Kai Bu, and Lijun Chen
    in Proc. of the 33rd Annual IEEE International Conference on Computer Communications (INFOCOM)
    Toronto, Canada, April 27 - May 2, 2014, pp. 163-171.
  14. Less is More: Efficient RFID-based 3D Localization
    Kai Bu, Xuan Liu, Jiwei Li, and Bin Xiao
    in Proc. of the 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS)
    Hangzhou, Zhejiang, China, October 14-16, 2013, pp. 86-94. [Slides - PDF]
  15. ENDA: Embracing Network Inconsistency for Dynamic Application Offloading in Mobile Cloud Computing
    Jiwei Li, Kai Bu, Xuan Liu, and Bin Xiao
    in Proc. of the 2nd Mobile Cloud Computing Workshop (MCC)
    Hong Kong, China, August 12, 2013, pp. 39-44. Co-located with SIGCOMM 2013.
  16. Detect and Identify Blocker Tags in Tree-based RFID Systems
    Fei Wang, Bin Xiao, Kai Bu, and Jinshu Su
    in Proc. of IEEE International Conference on Communications (ICC)
    Budapest, Hungary, June 9-13, 2013, pp. 2133-2137.
  17. Complete and Fast Unknown Tag Identification in Large RFID Systems
    Xuan Liu, Shigeng Zhang, Kai Bu, and Bin Xiao
    in Proc. of the 9th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS)
    Las Vegas, Nevada, USA, October 8-11, 2012, pp. 47-55.
  18. [Poster/Short Paper] Fast Cloned-Tag Identification Protocols for Large-Scale RFID Systems
    Kai Bu, Xuan Liu, and Bin Xiao
    in Proc. of the 20th IEEE/ACM International Workshop on Quality of Service (IWQoS)
    Coimbra, Portugal, June 4-5, 2012, pp. 1-4. [Slides - PDF] [Poster - PDF]
  19. Efficient Monitoring of Dynamic Tag Populations in RFID Systems Best Paper Award
    Qingjun Xiao, Kai Bu, and Bin Xiao
    in Proc. of the 9th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
    Melbourne, Australia, October 24-26, 2011, pp. 106-113.
  20. Efficient Pinpointing of Misplaced Tags in Large RFID Systems
    Kai Bu, Bin Xiao, Qingjun Xiao, and Shigang Chen
    in Proc. of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)
    Salt Lake City, Utah, June 27-30, 2011, pp. 287-295. [Slides - PDF] [Poster - PDF]
  21. A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT
    Zhixin Sun, Kai Bu, and Ke Ding
    in Proc. of the 4th International ICST Conference on Scalable Information Systems (INFOSCALE)
    Hong Kong, China, June 10-11, 2009, pp. 192-205.
  22. A Method Based on AMHI for DDoS Attacks Detection and Defense
    Kai Bu and Zhixin Sun
    in Proc. of the 9th International Conference for Young Computer Scientists (ICYCS)
    Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1571-1576.
    1. Patents
      1. P2P Streaming Traffic Identification based on Traffic Behavior
        Jing Liu, Tingyong Liu, Zhixin Sun, Jing Gong, and Kai Bu
        China Patent Application Number CN200710145490.4, Granted on April 13, 2011.
      2. A Novel Defense Method Against DoS and DDoS Attacks
        Zhixin Sun, Jing Gong, Jing Liu, Tingyong Liu, and Kai Bu
        China Patent Application Number CN200710164224.6, Granted on December 8, 2010.
      3. A Host-Assisted Architecture Defense Against Abnormal Traffic
        Zhixin Sun, Kai Bu, and Songle Chen
        China Patent Application Number  CN200810019664.7, Granted on August 18, 2010.

      Template design by Andreas Viklund.