L
Lidong Zhou
Researcher at Microsoft
Publications - 130
Citations - 11566
Lidong Zhou is an academic researcher from Microsoft. The author has contributed to research in topics: Cloud computing & Wireless network. The author has an hindex of 46, co-authored 130 publications receiving 10700 citations. Previous affiliations of Lidong Zhou include Cornell University.
Papers
More filters
Journal ArticleDOI
Securing ad hoc networks
Lidong Zhou,Zygmunt J. Haas +1 more
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Journal ArticleDOI
Vigilante: end-to-end containment of internet worms
Manuel Costa,Jon Crowcroft,Miguel Castro,Antony Rowstron,Lidong Zhou,Lintao Zhang,Paul Barham +6 more
TL;DR: Vigilante, a new end-to-end approach to contain worms automatically that addresses limitations of network-level techniques, can automatically contain fast-spreading worms that exploit unknown vulnerabilities without blocking innocuous traffic.
Proceedings ArticleDOI
A multi-radio unification protocol for IEEE 802.11 wireless networks
TL;DR: In this paper, the authors present a link layer protocol called the multi-radio unification protocol (MUP), which coordinates the operation of multiple wireless network cards tuned to non-overlapping frequency channels.
Proceedings ArticleDOI
Apollo: scalable and coordinated scheduling for cloud-scale computing
Eric Boutin,Jaliya Ekanayake,Wei Lin,Bing Shi,Jingren Zhou,Zhengping Qian,Ming Wu,Lidong Zhou +7 more
TL;DR: Apollo as mentioned in this paper is a highly scalable and coordinated scheduling framework, which has been deployed on production clusters at Microsoft to schedule thousands of computations with millions of tasks efficiently and effectively on tens of thousands of machines daily.
COCA: A Secure Distributed On-line Certification Authority
TL;DR: Traditional techniques, including request authorization, resource management based on segregation and scheduling different classes of requests, as well as caching results of expensive cryptographic operations further reduce COCA''.