scispace - formally typeset
W

Wing Cheong Lau

Researcher at The Chinese University of Hong Kong

Publications -  143
Citations -  3051

Wing Cheong Lau is an academic researcher from The Chinese University of Hong Kong. The author has contributed to research in topics: Network packet & Scheduling (computing). The author has an hindex of 26, co-authored 136 publications receiving 2774 citations. Previous affiliations of Wing Cheong Lau include Alcatel-Lucent & University of Texas at Austin.

Papers
More filters
Proceedings ArticleDOI

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

TL;DR: A novel automatic fuzzing framework, called IOTFUZZER, which aims at finding memory corruption vulnerabilities in IoT devices without access to their firmware images, and successfully identified 15 memory Corruption vulnerabilities (including 8 previously unknown ones).
Proceedings ArticleDOI

Self-similar traffic generation: the random midpoint displacement algorithm and its properties

TL;DR: An approximate FBM generation method known as the random midpoint displacement (RMD) algorithm is considered and its analysis indicates that (i) RMD is attractive for qualitative studies and (ii) for quantitative studies the parameters of the generated traces may differ from their target values.
Posted Content

A Survey and Taxonomy of Graph Sampling.

TL;DR: This survey discusses both classical text-book type properties and some advanced properties of graph sampling, and provides a taxonomy of different graph sampling objectives and graph sampling approaches.
Proceedings ArticleDOI

Anonymous Tracking Using RFID Tags

TL;DR: A privacy-preserving scheme is proposed that enables anonymous estimation of the cardinality of a dynamic set of RFID tags, while allowing the set membership to vary in both the spatial and temporal domains, and can accurately estimate tag populations across many orders of magnitude.
Proceedings ArticleDOI

Packetscore: statistics-based overload control against distributed denial-of-service attacks

TL;DR: A key idea is to prioritize packets based on a per-packet score which estimates the legitimacy of a packet given the attribute values it carries, and perform score-based selective packet discarding where the dropping threshold is dynamically adjusted based on the score distribution of recent incoming packets.