scispace - formally typeset
R

Rocky K. C. Chang

Researcher at Hong Kong Polytechnic University

Publications -  101
Citations -  3173

Rocky K. C. Chang is an academic researcher from Hong Kong Polytechnic University. The author has contributed to research in topics: Network packet & Android (operating system). The author has an hindex of 23, co-authored 101 publications receiving 2964 citations. Previous affiliations of Rocky K. C. Chang include Baylor College of Medicine & Georgia Institute of Technology.

Papers
More filters
Journal ArticleDOI

Defending against flooding-based distributed denial-of-service attacks: a tutorial

TL;DR: Various DDoS attack methods are described, and a longer-term solution that attempts to intercept attack packets in the Internet core, well before reaching the victim is discussed, dubbed the Internet-firewall approach.
Proceedings ArticleDOI

Measuring the quality of experience of HTTP video streaming

TL;DR: Analysis of the relationship among three levels of quality of service (QoS) of HTTP video streaming reveals that the frequency of rebuffering is the main factor responsible for the variations in the QoE.
Proceedings ArticleDOI

QDASH: a QoE-aware DASH system

TL;DR: A QoE-aware DASH system (or QDASH) to improve the user-perceived quality of video watching is proposed and available bandwidth measurement into the video data probes with a measurement proxy architecture facilitates the selection of video quality levels.
Proceedings Article

On a New Class of Pulsing Denial-of-Service Attacks and the Defense.

TL;DR: A novel two-stage scheme to detect PDoS attacks on a victim network based on a wavelet transform used to extract the desired frequency components of the data traffic and ACK traffic and verifies the feasibility and effectiveness of the detection scheme.
Proceedings Article

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.

TL;DR: Extensive evaluation of HTTPOS on live web traffic shows that it can successfully prevent the state-of-the-art attacks from inferring private information from encrypted HTTP flows and offer much better scalability and flexibility.