R
Rocky K. C. Chang
Researcher at Hong Kong Polytechnic University
Publications - 101
Citations - 3173
Rocky K. C. Chang is an academic researcher from Hong Kong Polytechnic University. The author has contributed to research in topics: Network packet & Android (operating system). The author has an hindex of 23, co-authored 101 publications receiving 2964 citations. Previous affiliations of Rocky K. C. Chang include Baylor College of Medicine & Georgia Institute of Technology.
Papers
More filters
Journal ArticleDOI
Defending against flooding-based distributed denial-of-service attacks: a tutorial
TL;DR: Various DDoS attack methods are described, and a longer-term solution that attempts to intercept attack packets in the Internet core, well before reaching the victim is discussed, dubbed the Internet-firewall approach.
Proceedings ArticleDOI
Measuring the quality of experience of HTTP video streaming
TL;DR: Analysis of the relationship among three levels of quality of service (QoS) of HTTP video streaming reveals that the frequency of rebuffering is the main factor responsible for the variations in the QoE.
Proceedings ArticleDOI
QDASH: a QoE-aware DASH system
TL;DR: A QoE-aware DASH system (or QDASH) to improve the user-perceived quality of video watching is proposed and available bandwidth measurement into the video data probes with a measurement proxy architecture facilitates the selection of video quality levels.
Proceedings Article
On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
Xiapu Luo,Rocky K. C. Chang +1 more
TL;DR: A novel two-stage scheme to detect PDoS attacks on a victim network based on a wavelet transform used to extract the desired frequency components of the data traffic and ACK traffic and verifies the feasibility and effectiveness of the detection scheme.
Proceedings Article
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
TL;DR: Extensive evaluation of HTTPOS on live web traffic shows that it can successfully prevent the state-of-the-art attacks from inferring private information from encrypted HTTP flows and offer much better scalability and flexibility.