George Kesidis - Publications

Affiliations: 
Pennsylvania State University, State College, PA, United States 
Area:
Computer Science

95 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Miller D, Wang Y, Kesidis G. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time. Neural Computation. 1-47. PMID 31260390 DOI: 10.1162/Neco_A_01209  0.313
2019 Leivadeas A, Kesidis G, Ibnkahla M, Lambadaris I. VNF Placement Optimization at the Edge and Cloud † Future Internet. 11: 69. DOI: 10.3390/Fi11030069  0.462
2018 Wang C, Urgaonkar B, Kesidis G, Gupta A, Chen LY, Birke R. Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability Acm Transactions On Autonomous and Adaptive Systems. 13: 1-25. DOI: 10.1145/3139291  0.305
2018 Khamse-Ashari J, Lambadaris I, Kesidis G, Urgaonkar B, Zhao Y. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers Ieee Transactions On Parallel and Distributed Systems. 29: 2686-2699. DOI: 10.1109/Tpds.2018.2841915  0.369
2017 Barom Jeon P, Kesidis G. A Pheromone-Aided Multipath QoS Routing Protocol and its Applications in MANETs Journal of Communications Software and Systems. 2: 108. DOI: 10.24138/Jcomss.V2I2.294  0.452
2017 Leivadeas A, Kesidis G, Falkner M, Lambadaris I. A Graph Partitioning Game Theoretical Approach for the VNF Service Chaining Problem Ieee Transactions On Network and Service Management. 14: 890-903. DOI: 10.1109/Tnsm.2017.2732699  0.393
2017 Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Optimal virtualized network function allocation for an SDN enabled cloud Computer Standards & Interfaces. 54: 266-278. DOI: 10.1016/J.Csi.2017.01.001  0.442
2017 Khamse-Ashari J, Kesidis G, Lambadaris I, Urgaonkar B, Zhao Y. Constrained max-min fair scheduling of variable-length packet-flows to multiple servers Annals of Telecommunications. 73: 219-237. DOI: 10.1007/S12243-017-0599-Y  0.405
2016 Shah V, de Veciana G, Kesidis G. A Stable Approach for Routing Queries in Unstructured P2P Networks Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2015.2509967  0.436
2016 Leivadeas A, Falkner M, Lambadaris I, Kesidis G. Dynamic virtualized network function allocation in a multi-cloud environment 2016 23rd International Conference On Telecommunications, Ict 2016. DOI: 10.1109/ICT.2016.7500394  0.316
2015 Kurve A, Miller DJ, Kesidis G. Multicategory crowdsourcing accounting for variable task difficulty, worker skill, and worker intention Ieee Transactions On Knowledge and Data Engineering. 27: 794-809. DOI: 10.1109/Tkde.2014.2327026  0.763
2014 Raghuram J, Miller DJ, Kesidis G. Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling. Journal of Advanced Research. 5: 423-33. PMID 25685511 DOI: 10.1016/J.Jare.2014.01.001  0.335
2014 Lotfi MH, Kesidis G, Sarkar S. Network non neutrality on the internet: Content provision under a subscription revenue model Performance Evaluation Review. 42: 44. DOI: 10.1145/2695533.2695552  0.34
2014 Jin Y, Kesidis G, Shin J, Kocak F, Yi Y. Impacts of Selfish Behaviors on the Scalability of Hybrid Client-Server and Peer-to-Peer Caching Systems Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2014.2347035  0.572
2014 Daoud AA, Kesidis G, Liebeherr J. Zero-determinant strategies: A game-theoretic approach for sharing licensed spectrum bands Ieee Journal On Selected Areas in Communications. 32: 2297-2308. DOI: 10.1109/Jsac.2014.141126  0.338
2014 Kocak F, Kesidis G, Fdida S. Network Neutrality with Content Caching and Its Effect on Access Pricing Smart Data Pricing. 47-66. DOI: 10.1002/9781118899250.ch3  0.318
2013 Kurve A, Kotobi K, Kesidis G. An agent-based framework for performance modeling of an optimistic parallel discrete event simulator Complex Adaptive Systems Modeling. 1. DOI: 10.1186/2194-3206-1-12  0.78
2013 Antoniadis P, Fdida S, Griffin C, Jin Y, Kesidis G. Distributed medium access control with conditionally altruistic users Eurasip Journal On Wireless Communications and Networking. 2013. DOI: 10.1186/1687-1499-2013-202  0.65
2013 Jin Y, Kesidis G, Jang JW. Diffusion dynamics of network technologies with bounded rational users: Aspiration-based learning Ieee/Acm Transactions On Networking. 21: 28-40. DOI: 10.1109/Tnet.2012.2189891  0.597
2013 He J, Miller DJ, Kesidis G. Latent interest-group discovery and management by peer-to-peer online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 162-167. DOI: 10.1109/SocialCom.2013.31  0.308
2013 Kocak F, Kesidis G, Pham TM, Fdida S. The effect of caching on a model of content and access provider revenues in Information-Centric Networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 45-50. DOI: 10.1109/SocialCom.2013.13  0.344
2013 Kurve A, Griffin C, Miller DJ, Kesidis G. Optimizing cluster formation in super-peer networks via local incentive design Peer-to-Peer Networking and Applications. 8: 1-21. DOI: 10.1007/S12083-013-0206-6  0.804
2013 Altman E, Bernhard P, Caron S, Kesidis G, Rojas-Mora J, Wong S. A model of network neutrality with usage-based prices Telecommunication Systems. 52: 601-609. DOI: 10.1007/S11235-011-9504-6  0.424
2013 Kurve A, Miller DJ, Kesidis G. Defeating tyranny of the masses in crowdsourcing: Accounting for low-skilled and adversarial workers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8252: 140-153. DOI: 10.1007/978-3-319-02786-9_9  0.731
2012 Jin Y, Kesidis G, Jang JW. A channel aware MAC protocol in an ALOHA network with selfish users Ieee Journal On Selected Areas in Communications. 30: 128-137. DOI: 10.1109/Jsac.2012.120112  0.58
2012 Shah V, De Veciana G, Kesidis G. Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints Proceedings - Ieee Infocom. 2327-2335. DOI: 10.1109/INFCOM.2012.6195620  0.315
2012 Kesidis G, Kurve A. A study of unsupervised adaptive crowdsourcing Ieee International Conference On Communications. 1438-1442. DOI: 10.1109/ICC.2012.6364014  0.768
2012 Kurve A, Pang G, Kesidis G, De Veciana G. Decentralized capacity reallocation for a loss network 2012 46th Annual Conference On Information Sciences and Systems, Ciss 2012. DOI: 10.1109/CISS.2012.6310748  0.812
2011 Zou G, Kesidis G, Miller DJ. A flow classifier with tamper-resistant features and an evaluation of its portability to new domains Ieee Journal On Selected Areas in Communications. 29: 1449-1460. DOI: 10.1109/Jsac.2011.110810  0.349
2011 Kurve A, Kesidis G. Sybil detection via distributed sparse cut monitoring Ieee International Conference On Communications. DOI: 10.1109/icc.2011.5963402  0.785
2011 Kurve A, Griffin C, Kesidis G. Iterative partitioning scheme for distributed simulation of dynamic networks 2011 Ieee 16th International Workshop On Computer Aided Modeling and Design of Communication Links and Networks, Camad 2011. 92-96. DOI: 10.1109/CAMAD.2011.5941125  0.804
2011 Carl G, Kesidis G. Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra Computer Networks. 55: 2361-2379. DOI: 10.1016/J.Comnet.2011.03.013  0.46
2010 Neishaboori A, Das A, Kesidis G. A relaying enticement mechanism for wireless CDMA mesh networks 33rd Ieee Sarnoff Symposium 2010, Conference Proceedings. DOI: 10.1109/SARNOF.2010.5469707  0.809
2010 Tangpong A, Kesidis G. File-sharing costs and quality-of-service 2010 44th Annual Conference On Information Sciences and Systems, Ciss 2010. DOI: 10.1109/CISS.2010.5464800  0.752
2010 Choi YH, Li L, Liu P, Kesidis G. Worm virulence estimation for the containment of local worm outbreak Computers and Security. 29: 104-123. DOI: 10.1016/J.Cose.2009.07.002  0.384
2009 Kesidis G, Tangpong A, Griffin C. A sybil-proof referral system based on multiplicative reputation chains Ieee Communications Letters. 13: 862-864. DOI: 10.1109/Lcomm.2009.091400  0.776
2009 Tangpong A, Kesidis G, Hsu HY, Hurson A. Robust sybil detection for MANETs Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235387  0.806
2009 Tangpong A, Kesidis G. A simple reputation model for BitTorrent-like incentives Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 603-610. DOI: 10.1109/GAMENETS.2009.5137450  0.763
2009 Das A, Neishaboori A, Kesidis G. Wireless mesh networking games Proceedings of the 2009 International Conference On Game Theory For Networks, Gamenets '09. 565-574. DOI: 10.1109/GAMENETS.2009.5137446  0.793
2009 Kesidis G, Konstantopoulos T, Sousi P. A stochastic epidemiological model and a deterministic limit for bitTorrent-like peer-to-peer file-sharing networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5425: 26-36. DOI: 10.1007/978-3-642-00393-6_4  0.323
2008 Yi S, Deng X, Kesidis G, Das CR. Technique for Estimating the Number of Active Flows in High-Speed Networks Etri Journal. 30: 194-204. DOI: 10.4218/Etrij.08.1107.0001  0.328
2008 Carl G, Kesidis G. Large-scale testing of the Internet's Border Gateway Protocol (BGP) via topological scale-down Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1371574.1371577  0.409
2008 Kesidis G, Hamadeh I, Jin Y, Jiwasurat S, Vojnovì M. A model of the spread of randomly scanning Internet worms that saturate access links Acm Transactions On Modeling and Computer Simulation. 18. DOI: 10.1145/1346325.1346327  0.781
2008 Neishaboori A, Kesidis G. SINR-sensitive routing in wireless 802.11 mesh networks 2008 5th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2008. 623-628. DOI: 10.1109/MAHSS.2008.4660103  0.82
2008 Patankar P, Nam G, Kesidis G, Das CR. Exploring anti-spam models in large scale VoIP systems Proceedings - the 28th International Conference On Distributed Computing Systems, Icdcs 2008. 85-92. DOI: 10.1109/ICDCS.2008.71  0.318
2008 Kesidis G, Das A, De Veciana G. On flat-rate and usage-based pricing for tiered commodity Internet services Ciss 2008, the 42nd Annual Conference On Information Sciences and Systems. 304-308. DOI: 10.1109/CISS.2008.4558540  0.303
2008 Neishaboori A, Kesidis G. Wireless mesh networks based on CDMA Computer Communications. 31: 1513-1528. DOI: 10.1016/J.Comcom.2008.01.020  0.804
2008 Yi S, Deng X, Kesidis G, Das CR. A dynamic quarantine scheme for controlling unresponsive TCP sessions Telecommunication Systems. 37: 169-189. DOI: 10.1007/S11235-008-9104-2  0.339
2008 Sungwon Y, Kappes M, Garg S, Xidong D, Kesidis G, Das CR. Proxy-RED: An AQM scheme for wireless local area networks Wireless Communications and Mobile Computing. 8: 421-434. DOI: 10.1002/wcm.460  0.378
2007 Jin Y, Kesidis G. Distributed contention window control for selfish users in IEEE 802.11 wireless LANs Ieee Journal On Selected Areas in Communications. 25: 1113-1123. DOI: 10.1109/Jsac.2007.070806  0.626
2007 Jeon PB, Kesidis G. GeoPPRA: An energy-efficient geocasting protocol in mobile ad hoc networks Proceedings of the Sixth International Conference On Networking, Icn'07. DOI: 10.1109/ICN.2007.43  0.786
2007 Kesidis G, Neishaboori A. Distributed power control in multihop ad hoc CDMA networks Ieee International Conference On Communications. 96-101. DOI: 10.1109/ICC.2007.25  0.786
2007 Kesidis G, Konstantopoulos T, Sousi P. Modeling file-sharing with BitTorrent-like incentives Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: IV1333-IV1336. DOI: 10.1109/ICASSP.2007.367324  0.302
2007 Jhi YC, Liu P, Li L, Gu Q, Jing J, Kesidis G. PWC: A proactive worm containment solution for enterprise networks Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 433-442. DOI: 10.1002/Sec.112  0.782
2006 Hamadeh I, Kesidis G. A taxonomy of internet traceback International Journal of Security and Networks. 1: 54-61. DOI: 10.1504/Ijsn.2006.010823  0.73
2006 Jeon PB, Rao RN, Kesidis G. An overlay framework for QoS management in mobile ad hoc networks 2006 Ieee Sarnoff Symposium. DOI: 10.1109/SARNOF.2006.4534721  0.792
2006 Carl G, Kesidis G, Brooks RR, Rai S. Denial-of-service attack-detection techniques Ieee Internet Computing. 10: 82-89. DOI: 10.1109/Mic.2006.5  0.352
2006 Wang J, Miller DJ, Kesidis G. Efficient mining of the multidimensional traffic cluster hierarchy for digesting, visualization, and anomaly identification Ieee Journal On Selected Areas in Communications. 24: 1929-1941. DOI: 10.1109/Jsac.2006.877216  0.308
2006 Jin Y, Kesidis G. Charge sensitive and incentive compatible end-to-end window-based control for selfish users Ieee Journal On Selected Areas in Communications. 24: 952-960. DOI: 10.1109/Jsac.2006.872876  0.576
2006 Mazumdar RR, Courcoubetis CA, Duffield N, Kesidis G, Odlyzko A, Srikant R, Walrand J. Guest Editorial price-based access control and economics of networking Ieee Journal On Selected Areas in Communications. 24: 937-938. DOI: 10.1109/Jsac.2006.872874  0.654
2006 Neishaboori A, Kesidis G. Routing and uplink-downlink scheduling in ad hoc CDMA networks Ieee International Conference On Communications. 2: 926-931. DOI: 10.1109/ICC.2006.254826  0.814
2006 Fayek D, Kesidis G, Vannelli A. Non-linear game models for large-scale network bandwidth management Optimization and Engineering. 7: 421-444. DOI: 10.1007/S11081-006-0348-Y  0.436
2006 Hamadeh I, Kesidis G. Toward a framework for forensic analysis of scanning worms Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3995: 282-297. DOI: 10.1007/11766155_20  0.724
2005 Jeon PB, Kesidis G. Pheromone-aided robust multipath and multipriority routing in wireless MANETs Pe-Wasun'05 - Proceedings of the Second Acm International Workshop On Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks. 106-113. DOI: 10.1145/1089803.1089974  0.789
2005 Jin Y, Kesidis G. Dynamics of usage-priced communication networks: The case of a single bottleneck resource Ieee/Acm Transactions On Networking. 13: 1041-1053. DOI: 10.1109/Tnet.2005.857120  0.658
2005 Hamadeh I, Hart J, Kesidis G, Pothamsetty V. A preliminary simulation of the effect of scanning worm activity on multicast Proceedings - Workshop On Principles of Advanced and Distributed Simulation, Pads. 191-198. DOI: 10.1109/PADS.2005.2  0.765
2005 Jiwasurat S, Kesidis G, Miller DJ. Hierarchical shaped deficit round-robin scheduling Globecom - Ieee Global Telecommunications Conference. 2: 688-693. DOI: 10.1109/GLOCOM.2005.1577729  0.798
2005 Kesidis G, Hamadeh I, Jiwasurat S. Coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms Lecture Notes in Computer Science. 3375: 101-109.  0.768
2005 Jeon PB, Kesidis G. Avoiding malicious packet dropping in ad hoc wireless networks using multipath routing 43rd Annual Allerton Conference On Communication, Control and Computing 2005. 3: 1656-1665.  0.802
2004 Bajcsy R, Kesidis G, Levitt K, Lindell B, Liu P, Miller D, Mundy R, Neuman C, Ostrenga R, Paxson V, Porras P, Benzel T, Rosenberg C, Tygar JD, Sastry S, et al. Cyber defense technology networking and evaluation Communications of the Acm. 47: 58. DOI: 10.1145/971617.971646  0.32
2004 Rao R, Kesidis G. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks Ieee Transactions On Mobile Computing. 3: 225-232. DOI: 10.1109/Tmc.2004.26  0.369
2004 Jiwasurat S, Kesidis G. A class of shaped deficit round-robin (SDRR) schedulers Telecommunication Systems. 25: 173-191. DOI: 10.1023/B:Tels.0000014780.33289.Ad  0.779
2004 Zhu H, Cao G, Kesidis G, Das C. An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks Computer Communications. 27: 828-839. DOI: 10.1016/J.Comcom.2004.01.027  0.348
2004 Weaver N, Hamadeh I, Kesidis G, Paxson V. Preliminary results using scale-down to explore worm dynamics Worm'04 - Proceedings of the 2004 Acm Workshop On Rapid Malcode. 65-72.  0.687
2004 Deng X, Yi S, Kesidis G, Das CR. RL-RED: A flow control mechanism for 802.11-based wireless AD HOC networks Proceedings of the Third Iasted International Conference On Communications, Internet, and Information Technology. 369-374.  0.368
2003 Hamadeh I, Kesidis G. Performance of IP address fragmentation strategies for DDoS traceback Proceedings of the 3rd Ieee Workshop On Ip Operations and Management, Ipom 2003. 1-7. DOI: 10.1109/IPOM.2003.1251217  0.712
2003 Deng X, Yi S, Kesidis G, Das CR. Class-based stabilized virtual buffer-an AQM scheme with stability, fairness and QoS assurance* Teletraffic Science and Engineering. 5: 1281-1290. DOI: 10.1016/S1388-3437(03)80277-9  0.333
2003 Zhang W, Rao R, Cao G, Kesidis G. Secure routing in ad hoc networks and a related intrusion detection problem Proceedings - Ieee Military Communications Conference Milcom. 2: 735-740.  0.305
2003 Jin Y, Kesidis G. Nash equilibria of a generic networking game with applications to circuit-switched networks Proceedings - Ieee Infocom. 2: 1242-1249.  0.334
2003 Rao R, Kesidis G. Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited Globecom - Ieee Global Telecommunications Conference. 5: 2957-2961.  0.36
2002 Jin Y, Kesidis G. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network Ieee Communications Letters. 6: 282-284. DOI: 10.1109/Lcomm.2002.801326  0.574
2000 Kesidis G, Chakraborty K, Tassiulas L. Traffic shaping for a loss system Ieee Communications Letters. 4: 417-419. DOI: 10.1109/4234.898726  0.321
2000 Kesidis G, Konstantopoulos T. Worst-case performance of a buffer with independent shaped arrival processes Ieee Communications Letters. 4: 26-28. DOI: 10.1109/4234.823539  0.392
2000 Kesidis G, Konstantopoulos T. Extremal shape-controlled traffic patterns in high-speed networks Ieee Transactions On Communications. 48: 813-819. DOI: 10.1109/26.843194  0.4
1999 Kesidis G. Bandwidth adjustments using online packet-level measurements Proceedings of Spie. 3841: 230-238. DOI: 10.1117/12.360374  0.46
1998 Hung A, Montpetit MJ, Kesidis G. ATM via satellite: A framework and implementation Wireless Networks. 4: 141-153. DOI: 10.1023/A:1019191619926  0.463
1996 Hung A, Kesidis G. Bandwidth scheduling for wide-area ATM networks using virtual finishing times Ieee/Acm Transactions On Networking. 4: 49-54. DOI: 10.1109/90.503761  0.419
1996 De Veciana G, Kesidis G. Bandwidth allocation for multiple qualities of service using generalized processor sharing Ieee Transactions On Information Theory. 42: 268-272. DOI: 10.1109/18.481801  0.408
1996 de Veciana G, Kesidis G. Approach to provisioning for real-time VBR video teleconferencing via end-to-end virtual path connections Ieee International Conference On Communications. 2: 632-636.  0.381
1995 Kesidis G. Analog Optimization with Wong's Stochastic Neural Network Ieee Transactions On Neural Networks. 6: 258-260. DOI: 10.1109/72.363429  0.358
1995 de Veciana G, Kesidis G, Walrand J. Resource Management in Wide-Area ATM Networks Using Effective Bandwidths Ieee Journal On Selected Areas in Communications. 13: 1081-1090. DOI: 10.1109/49.400663  0.699
1995 Courcoubetis C, Kesidis G, Ridder A, Walrand J, Weber R. Admission Control and Routing in ATM Networks using Inferences from Measured Buffer Occupancy Ieee Transactions On Communications. 43: 1778-1784. DOI: 10.1109/26.380228  0.644
1994 Kesidis G, Walrand J. Conservation Relations for Fully Shared Atm Buffers Probability in the Engineering and Informational Sciences. 8: 147-151. DOI: 10.1017/S0269964800003272  0.647
1993 Kesidis G, Walrand J, Chang CS. Effective Bandwidths for Multiclass Markov Fluids and Other ATM Sources Ieee/Acm Transactions On Networking. 1: 424-428. DOI: 10.1109/90.251894  0.626
1993 Kesidis G, Walrand J. Relative entropy between Markov transition rate matrices Ieee Transactions On Information Theory. 39: 1056-1057. DOI: 10.1109/18.256516  0.567
Show low-probability matches.