Publications

Students co-authors whom I directed or co-directed are given in Italics.

Refereed Journal Publications

  1. Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong, "A Traceback Attack on Freenet". IEEE Transactions on Dependable and Secure Computing. (Accepted)

  2. Fernando Sanchez, Zhenhai Duan, Yingfei Dong, "Blocking Spam By Separating End-User Machines from Legitimate Mail Server Machines", Security and Communication Networks (Wiley). Volume 9, Issue 4, March 2016. Pages 275 - 365.

  3. Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, and James Barker. "Detecting Spam Zombies by Monitoring Outgoing Messages", IEEE Transactions on Dependable and Secure Computing. Volume 9, Number 2, March/April 2012. Pages 198 - 210.

  4. Zhenhai Duan, Kartik Gopalan, and Xin Yuan, ``An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications". In Computer Communications. Volume 34, Issue 14, September 2011. Pages 1764 - 1176.

  5. Sudhir Aggarwal, Zhenhai Duan, Faye Jones, and Wayne Liu, ``Trust-based Accountability: Requirements and Legal Ramifications''. In Journal of Internet Law. April 2010. pp 3 - 15.

  6. Xin Yuan and Wickus Nienaber Zhenhai Duan, and Rami Melhem, ``Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands''. In IEEE/ACM Transactions on Networking. Volume 17, Number 5, October 2009, pages 1439 - 1452.

  7. Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan, ``Incorporating Accountability into Internet E-mail''. In Journal of Digital Forensic Practice. Volume 2, Issue 4, October 2009 , pages 209 - 220.

  8. Wickus Nienaber, Xin Yuan, Zhenhai Duan, ``LID Assignment in InfiniBand Networks''. In IEEE Transactions on Parallel and Distributed Systems. 20(4). April 2009. pp 484 - 497.
  9. Xin Yuan and Zhenhai Duan, ``Fair Round Robin: A Low Complexity Packet Scheduler with Proportional and Worst-case Fairness''. In IEEE Transactions on Computers. Volume 58, Number 3. March 2009. pp 365 - 379.

  10. Zhenhai Duan, Xin Yuan, and Jaideep Chandrashekar, ``Controlling IP Spoofing Through Inter-Domain Packet Filters''. In IEEE Transactions on Dependable and Secure Computing. Volume 5, Number 1. January-March 2008. pp 22 - 36.

  11. Zhenhai Duan, Jaideep Chandrashekar, Jeffrey Krasky, Kuai Xu, and Zhi-Li Zhang, ``Damping BGP Route Flaps''. Journal of Communications and Networks. Volume 9, Number 4. December 2007. pp 490 - 498.

  12. Xin Yuan, Zhenhai Duan, ``On QoS Routing and Path Establishment in the Presence of Imprecise State Information''. Journal of Communications and Networks. Volume 9, Number 4. December 2007. pp 356 - 367.

  13. Zhenhai Duan, Yingfei Dong, and Kartik Gopalan, ``DMTP: Controlling Spam Through Message Delivery Differentiation''. Computer Networks. Volume 51, Issue 10. July 2007. pp 2616-2630.

  14. Jaideep Chandrashekar, Zhi-Li Zhang, Zhenhai Duan, and Yiwei Thomas Hou, ``Towards a Service Oriented Internet''. In IEICE Transactions on Communications, E89-B (9), September 2006. pp 2292-2299. Invited Paper.

  15. Zhenhai Duan, Zhi-Li Zhang, Yiwei Thomas Hou, ``Fundamental Trade-Offs in Aggregate Packet Scheduling''. In IEEE Transactions on Parallel and Distributed Systems. Volume 16, Number 12. December 2005. pp 1166 - 1177.

  16. Zhenhai Duan, Zhi-Li Zhang, Yiwei Thomas Hou, and L. Gao, ``A Core Stateless Bandwidth Broker Architecture for Scalable Support of Guaranteed Services''. In IEEE Transactions on Parallel and Distributed Systems. Volume 15, Number 2. February 2004. pp 167 - 182.

  17. Zhenhai Duan, Zhi-Li Zhang, and Yiwei Thomas Hou, ``Service Overlay Networks: SLAs, QoS and Bandwidth Provisioning''. In IEEE/ACM Transactions on Networking. December 2003. pp 870 - 883.

  18. Yiwei Thomas Hou, Zhenhai Duan, Zhi-Li Zhang, and Takafumi Chujo, ``Providing Scalable Support for Multiple QoS Guarantees: Architecture and mechanisms''. In IEICE Transaction on Communications, E84-B(10), October 2001.

  19. Zhi-Li Zhang, Zhenhai Duan, and Yiwei Thomas Hou, ``On Scalable Design of Bandwidth Brokers''. In IEICE Transaction on Communications, E84-B(8), August 2001.

  20. Zhi-Li Zhang, Zhenhai Duan, and Yiwei Thomas Hou, ``Virtual Time Reference System: A Unifying Scheduling Framework for Scalable Support of Guaranteed Services''. In IEEE Journal on Selected Areas in Communication, Special Issue on Internet QoS, December 2000. enumerate

Refereed Conference Publications

  1. Wenxin Chen, Zhenhai Duan, Yingfei Dong, "False Data Injection on EKF-Based Navigation Control" In Proc. 2017 International Conference on Unmanned Aircraft Systems (ICUAS 2017), Miami, FL, USA, June 13-16, 2017.

  2. Sangmun Kim, Zhenhai Duan, Fernando Sanchez, "Scalable Name-Based Inter-Domain Routing for Information-Centric Networks" In Proc. IEEE IPCCC 2015, Nanjing, China, December 14 - 16, 2015 (Acceptance Rate: 29% (88/298)).

  3. Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong, "Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks". In Proc. IEEE CNS 2014, San Francisco, CA, USA, October 29 - 31, 2014 (Acceptance Rate: 29% (38/130)).

  4. Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong, "Thrawting Traceback Attack on Freenet". In Proc. IEEE GLOBECOM 2013, Atlanta, USA, December 9 - 13, 2013 (Acceptance Rate: 37% (841/2272)).

  5. Todd Baumeister, Yingfei Dong, Guanyu Tian, Zhenhai Duan, "Using Randomized Routing to Counter Routing Table Insertion Attack on Freenet". In Proc. IEEE GLOBECOM 2013, Atlanta, USA, December 9 - 13, 2013 (Acceptance Rate: 37\% (841/2272)).

  6. Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong, "A Traceback Attack on Freenet". In Proc. IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. (Acceptance Rate: 17% (280/1613))

  7. Todd Baumeister, Yingfei Dong, Zhenhai Duan, and Guanyu Tian, "A Routing Table Insertation Attack on Freenet". In Proc. ASE International Conference on Cyber Security, Washington D.C., USA, December 14-16, 2012. (Acceptance Rate: 9.6% (with 37 accepted papers))

  8. Fernando Sanchez, Zhenhai Duan, "A Sender-Centric Approach to Detecting Phishing Emails". In Proc. ASE International Conference on Cyber Security, Washington D.C., USA, December 14-16, 2012. Best Paper Award(Acceptance Rate: 9.6% (with 37 accepted papers))

  9. Fernando Sanchez, Zhenhai Duan, Yingfei Dong, "Blocking Spam By Separating End-User Machines from Legitimate Mail Server Machines". In Proc. 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Perth, Australia, September 1-2, 2011.

  10. Fernando Sanchez, Zhenhai Duan, Yingfei Dong, "Understanding Forgery Properties of Spam Delivery Path". In Proc. 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, July 13-14, 2010. (Acceptance Rate: 45% (14/31)).

  11. Patrick Dwyer, Zhenhai Duan, "MDMap: Assisting Users in Identifying Phishing Emails". (short paper) In Proc. 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, July 13-14, 2010.

  12. Fernando Sanchez, Zhenhai Duan, ``Region-based BGP Announcement Filtering for Improved BGP Security". In Proc. 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, April 13 - 16, 2010. (Acceptance Rate: 15% (25/166))

  13. Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stepheson, and James Barker, ``Detecting Spam Zombies by Monitoring Outgoing Messages''. In Proc. IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 19 -25, 2009. (Acceptance Rate: 19.65% (282/1435))

  14. Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan, ``Incorporating Accountability into Internet Email''. In Proc. 24th ACM Symposium on Applied Computing (SAC), Waikiki Beach, Honolulu, Hawaii, USA, March 9 - March 12, 2009. (Acceptance Rate: 29.2% (316/1084))

  15. Peng Chen, Woon Cho, Zhenhai Duan, and Xin Yuan, "Traffic-Aware Inter-Domain Routing for Improved Internet Routing Stability". In Proc. IEEE GLOBECOM 2008, New Orleans, LA, Nov. 30 - Dec. 4, 2008. Best Paper Award. (Acceptance Rate: 36.8% (1051/2854))

  16. Sudhir Aggarwal, Zhenhai Duan, Leo Kermes, Breno de Medeiros, `` E-Crime Investigative Technologies''. In the Proc. 41th Hawaii International Conference on System Sciences (HICSS), Waikoloa, Big Island, Hawaii, January 7-10, 2008.

  17. Wickus Nienaber, Xin Yuan, Zhenhai Duan, ``On LID Assignment in InfiniBand Networks'', In Proc. ACM/IEEE Symposium on Architectures for Networking and Communications Systems 2007, Orlando, FL, USA, December 3-4, 2007. (Acceptance Rate: 28.6%(20/70))

  18. Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shashank Sahai, and Zhenghui Zhu, ``The Design and Development of an Undercover Multipurpose Anti-Spoofing Kit (UnMask)''. In the Proc. 23rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, Florida, December 10-14, 2007. (Acceptance Rate: 22% (42/191))

  19. Xin Yuan, Wickus Nienaber, Zhenhai Duan, and Rami Melhem, ``Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands''. In the Proc. ACM SIGMETRICS 2007, San Diego, CA, June 12-16, 2007. (Acceptance Rate: 17.1% (29/170))

  20. Zhenhai Duan, Kartik Gopalan, and Xin Yuan, `` Behavioral Characteristics of Spammers and Their Network Reachability Properties''. In the Proc. IEEE ICC 2007, Glasgow, Scotland, June 24-28, 2007. (Acceptance Rate: 39% (1070/over 2600))

  21. Zhenhai Duan, Karthik Parsha, ``BCSQ: Bin-based Core Stateless Queueing for Scalable Support of Guaranteed Services''. In the Proceedings of IEEE 15th International Conference on Computer Communications and Networks (ICCCN), Arlington, VA, October 9 - 11, 2006. Best Paper Award (Acceptance Rate: 27.8% (66/237))

  22. Zhenhai Duan, Yingfei Dong, Kartik Gopalan, ``DMTP: Controlling Spam Through Message Delivery Differentiation''. In the Proceedings of Networking 2006, Coimbra, Portugal, May 15-19, 2006. (Acceptance Rate: 20.5% (90/440)). Lecture Notes in Computer Science, Volume 3976, Springer, 2006.

  23. Zhenhai Duan, Xin Yuan, Jaideep Chandrashekar, ``Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates''. In the Proc. IEEE INFOCOM 2006, Barcelona, Spain, April 23-29, 2006. (Acceptance Rate: 18% (252/over 1400))

  24. Yingfei Dong, Ewa Kusmierek and Zhenhai Duan, ``Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming''. In the Proceedings of IEEE International Conference on Multimedia and Expo (ICME) , Amsterdam, Netherlands, July 6-8, 2005

  25. Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang, and Jeffrey Krasky, ``Limiting Path Exploration in BGP''. In the Proceedings of IEEE INFOCOM, Miami, Florida, March 13-17, 2005. (Acceptance Rate: 17% (244/1419))

  26. Xin Yuan, Zhenhai Duan, ``FRR: a Proportional and Worst-Case Fair Round Robin Scheduler''. In the Proceedings of IEEE INFOCOM, Miami, Florida, March 13-17, 2005. (Acceptance Rate: 17% (244/1419))

  27. Yingfei Dong, Ewa Kusmierek, Zhenhai Duan, and David Hung-Chang Du, ``A Hybrid Peer-Assisted Streaming Architecture: Modeling and Analysis''. In the Proceedings of the International Conference on Internet Multimedia Systems and Applications (IMSA 2004), Kauai, Hawaii, August 16-18, 2004.

  28. Kuai Xu, Zhenhai Duan, Zhi-Li Zhang, and Jaideep Chandrashekar, ``On Properties of Internet Exchange Points and Their Impact on AS Topology and Relations''. In the Proceedings of Networking 2004, Athens , Greece, May 9-14 2004. (Acceptance Rate: 19% (103/539))

  29. Zhenhai Duan, Jaideep Chandrashekar, Jeffrey Krasky, Kuai Xu, and Zhi-Li Zhang, ``Damping BGP Route Flaps''. In the Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, Phoenix, Arizona, April 14-17, 2004. (Acceptance Rate: 28.0%)

  30. Jaideep Chandrashekar, Zhi-Li Zhang, Zhenhai Duan, Yiwei Thomas Hou, ``Service Oriented Internet''. In the Proceedings of The First International Conference on Service Oriented Computing, Trento, Italy, December 15-18, 2003.

  31. Zhenhai Duan, Zhi-Li Zhang, and Yiwei Thomas Hou, ``Service Overlay Networks: SLAs, QoS and Bandwidth Provisioning''. In the Proceedings of IEEE 10th International Conference on Network Protocols (ICNP), Paris, France, November 2002. Best Paper Award. (Acceptance Rate: 14.7% (32/217))

  32. Zhenhai Duan, Zhi-Li Zhang, and Yiwei Thomas Hou, ``Bandwidth Provisioning for Service Overlay Networks''. In the Proceedings of SPIE ITCOM 2002 (Scalability and Traffic Control in IP Networks), Boston, MA, July 29 - August 1, 2002.

  33. Zhi-Li Zhang, Zhenhai Duan, and Yiwei Thomas Hou, ``On Scalable Network Resource Management Using Bandwidth Brokers''. in Proceedings of 8th IEEE/IFIP Network Operations and Management Symposium, Florence, Italy, April 2002. (Acceptance Rate: 32.9% (57/173))

  34. Zhi-Li Zhang, Zhenhai Duan, and Yiwei Thomas Hou, ``Fundamental Trade-offs in Aggregate Packet Scheduling''. In Proceedings of IEEE 9th International Conference on Network Protocols (ICNP), Riverside, California, November 2001. (Acceptance Rate: 23% (36/157))

  35. Yiwei Thomas Hou, Zhenhai Duan, Zhi-Li Zhang, and Takafumi Chujo, ``Providing Scalable Support for Multiple QoS Guarantees: Architecture and Mechanisms''. In Proceedings of the IEEE International Conference on Communications (ICC), Finland, June 2001. (Acceptance Rate: 54.8% (628/1145))

  36. Zhi-Li Zhang, Zhenhai Duan, Lixin Gao, and Yiwei Thomas Hou, ``Decoupling QoS Control From Core Routers: A Novel Bandwidth Broker Architecture for Scalable Support of Guaranteed Services''. In Proc. ACM SIGCOMM, Sweden, August 2000. (Acceptance Rate: 11% (23/203))

Refereed Workshop Publications

  1. Yingfei Dong, Zhenhai Duan, ``Towards Private Cloud Storage in Public Clouds''. Presented at NSFCloud Workshop on Experimental Support for Cloud Computing, Arlington, VA, December 11-12, 2014. (Acceptance Rate: 13 presented / 76 submitted, 73 accepted)
  2. Fernando Sanchez, Zhenhai Duan, Yingfei Dong, ``An Accurate and Efficient Email Traceback Framework for E-Crime Investigation''. In the Proceedings of 2009 ARO Workshop on Digital Forensics, Arlington, VA, September 10-11, 2009.
  3. Zhenhai Duan, Kartik Gopalan, Yingfei Dong, ``Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic''. In the Proceedings of USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 2005), Cambridge, MA, July 7-8, 2005. (Acceptance Rate: 37% (13/35))
  4. Zhenhai Duan, Yingfei Dong, Kartik Gopalan, ``A Differentiated Message Delivery Architecture to Control Spam''. In the Proceedings of the First International Workshop on Security in Networks and Distributed Systems (SNDS 2005), Fukuoka, Japan, July 20-22, 2005.

  5. Ewa Kusmierek, Baek-Young Choi, Zhenhai Duan, Zhi-Li Zhang, ``An Integrated Network Resource and QoS Management Framework''. In the Proceedings of 2002 IEEE Workshop on IP Operations and Management, Dallas, TX, October 2002.

  6. Zhenhai Duan and Zhi-Li Zhang, ``A Scalable Bandwidth Management Architecture for Supporting VoIP Applications using Bandwidth Broker''. In 11th IEEE Workshop on Local and Metropolitan Area Networks, Boulder, CO, March 2001.

  7. Baek-Young Choi, Zhenhai Duan, Zhi-Li Zhang, David Hung-Chang Du, "Measurement-based Admission Control using Wavelets for Broadband Networks". In 10th IEEE Workshop on Local and Metropolitan Area Networks, Sydney, Australia, November 1999.

Last modified: Thu Jul 10 13:46:45 2014