Photo of George Kesidis

George Kesidis

Professor

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering
  • Electrical Engineering

W367 Westgate Building

gik2@psu.edu

814-865-9190

Personal or Departmental Website

Research Areas:

Communications, Information Theory, and Coding over Networked Systems; Data Science and Artificial Intelligence

 
 

 

Education

  • B.A.Sc., Electrical Engineering, 1988
  • MS, Electrical Engineering and Computer Science, 1990
  • Ph D, Electrical Engineering and Computer Science, 1992

Publications

Books

  • David J Miller, Zhen Xiang and George Kesidis, 2023, Adversarial Learning and Robust AI., Cambridge University Press
  • , 2011, Encyclopedia of Cryptography and Security, 2nd Ed, Springer
  • George Kesidis, 2010, , Morgan & Claypool Publishers
  • George Kesidis, 2007, An Introduction to Communication Network Analysis, Wiley-IEEE Press, pp. 232

Journal Articles

  • Xi Li, David J Miller, Zhen Xiang and George Kesidis, 2024, "IC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers: A Comprehensive Study", IEEE TKDE
  • George Kesidis, 2023, "Anomaly Detection of Test-Time Evasion Attacks Using Class-Conditional Generative Adversarial Networks", Computers and Security
  • George Kesidis, 2022, "In search of the least age of information.", Queueing Systems Special Issue 100 Views on Queues
  • George Kesidis, 2022, "Age of information using Markov-Renewal Methods", Queueing Systems
  • Zhen Xiang, David Miller and George Kesidis, 2020, "Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs without Access to the Training Set", Neural Computation
  • D. J. Miller, Z. Xiang and George Kesidis, 2020, "Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.", Proceedings of the IEEE, 2020
  • M. H. Lotfi, S. Sarkar and George Kesidis, 2020, "Is Non-Neutrality Profitable for the Stakeholders of the Internet Market?", ACM/IEEE Trans. on Networking (ToN), 2020
  • George Kesidis, T. Konstantopoulos and A. Zazanis, 2020, "The New Age of Information: A Tool for Evaluating the Freshness of Information in Bufferless Processing Systems.", Queuing Systems: Theory and Applications (QUESTA).
  • D. J. Miller, Y. Wang and George Kesidis, 2019, "Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.", Neural Computation, 31, (8)
  • A. Leivadeas, George Kesidis, M. Ibnkahla and I. Lambadaris, 2019, "VNF Placement Optimization at the Edge and Cloud.", Future Internet special issue on SDN and NFV.
  • George Kesidis, T. Konstantopoulos and M. Zazanis, 2018, "The generating functions of Stirling numbers of the second kind derived probabilistically", The Mathematical Scientist
  • J. Khamse-Ashari, George Kesidis, I. Lambadaris, B. Urgaonkar and Y. Zhao, 2018, "An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers", IEEE Trans. Parallel and Distributed Systems (TPDS)
  • C. Wang, Bhuvan Urgaonkar, R. Birke, A. Gupta, L. Y. Chen, K. Wang and George Kesidis, 2018, "Effective Capacity Modulation as an Explicit Control Knob for Public Cloud Profitability", ACM Transactions on Autonomous and Adaptive Systems
  • A. Leivadeas, M. Falkner, Lambadaris and George Kesidis, 2017, "Optimal Virtualized Network Function Allocation for a SDN Enabled Cloud", Computer Standards and Interfaces
  • Neda Nasiriani, C. Wang, George Kesidis and Bhuvan Urgaonkar, 2016, "On Fair Attribution of Costs to Cloud Tenants Under Peak-based Pricing", ACM TOMPECS
  • John R. Keltner, Christine Fennema-Notestine, Florin Vaida, Dongzhe Wang, Donald R. Franklin, Robert H. Dworkin, Chelsea Sanders, J. Allen McCutchan, Sarah L. Archibald, David J Miller, George Kesidis, Clint Cushman, SungMin Kim, Ian Abramson, Michael J. Taylor, Rebecca J. Theilmann, Michelle D. Julaton, Randy J. Notestine, Stephanie Corkran, Mariana Cherner, Nichole A. Duarte, Terry Alexander, Jessica Robinson-Papp, Benjamin B. Gelman, David M. Simpson, Ann C. Collier, Christina M. Marra, Susan Morgello, Greg Brown, Igor Grant, Hampton Hampton Atkinson, Terry L. Jernigan and Ronald J. Ellis, 2016, "HIV Distal Neuropathic Pain is associated with Smaller Ventral Posterior Cingulate Cortex", Journal of Pain Medicine, 18, (3), pp. 428-440
  • V. Shah, G. de Veciana and George Kesidis, 2016, "Routing queries in unstructured P2P networks: achieving throughput optimality subject to query resolution constraints", ACM/IEEE Transactions on Networking
  • Z. Qiu, David J Miller and George Kesidis, 2016, "Semisupervised and active learning with unknown or label-scarce categories", IEEE Transactions on Neural Networks and Learning Systems
  • Z. Qiu, D. Miller and George Kesidis, 2016, "A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes", IEEE Transactions on Neural Networks and Learning Systems
  • Y. Jin, George Kesidis, J. Shin, F. Kocak and Y. Yi, 2015, "Impacts of Selfish Behaviors on the Scalability of Hybrid Client #x2013;Server and Peer-to-Peer Caching Systems", IEEE/ACM Transactions on Networking, 23, (6), pp. 1818-1831
  • Aditya Kurve, David J Miller and George Kesidis, 2015, "Multicategory Crowdsourcing Accounting for Variable Task Difficulty, Worker Skill, and Worker Intention", IEEE Transactions on Knowledge and Data Engineering, 27, (3), pp. 794-809
  • George Kesidis, Bhuvan Urgaonkar, Yuquan Shan, S. Kamarava and Jörg Liebeherr, 2015, "Network calculus for parallel processing", 43, (2), pp. 48-50
  • Aditya Kurve, Christopher Griffin, David J Miller and George Kesidis, 2015, "Optimizing cluster formation in super-peer networks via local incentive design", Peer-to-Peer Networking and Applications, 8, (1), pp. 1-21
  • Yuquan Shan, Jayaram Raghuram, George Kesidis, David J Miller, Anna Scaglione, Jeff Rowe and Karl N. Levitt, 2015, "Generation bidding game with potentially false attestation of flexible demand", EURASIP Journal on Advances in Signal Processing, pp. 29
  • Zhicong Qiu, David J Miller and George Kesidis, 2015, "Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data", CoRR, abs/1511.01047
  • Ashraf Al Daoud, George Kesidis and Jörg Liebeherr, 2014, "Zero-Determinant Strategies: A Game-Theoretic Approach for SharingLicensed Spectrum Bands", IEEE Journal on Selected Areas in Communications, 32, (11), pp. 2297–2308
  • Ashraf Al Daoud, George Kesidis and Jörg Liebeherr, 2014, "A Game of Uncoordinated Sharing of Private Spectrum Commons", SIGMETRICS Performance Evaluation Review, 42, (3), pp. 42
  • M. Alizadeh, A. Scaglione, A. Applebaum, George Kesidis and K. Levitt, 2014, "Reduced-Order Load Models for Large Populations of Flexible Appliances", IEEE Transactions on Power Systems, PP, (99), pp. 1-17
  • JohnR. Keltner, Christine Fennema-Notestine, Florin Vaida, Dongzhe Wang, DonaldR. Franklin, RobertH. Dworkin, Chelsea Sanders, J.Allen McCutchan, SarahL. Archibald, David J Miller, George Kesidis, Clint Cushman, SungMin Kim, Ian Abramson, MichaelJ. Taylor, RebeccaJ. Theilmann, MichelleD. Julaton, RandyJ. Notestine, Stephanie Corkran, Mariana Cherner, NicholeA. Duarte, Terry Alexander, Jessica Robinson-Papp, BenjaminB. Gelman, DavidM. Simpson, AnnC. Collier, ChristinaM. Marra, Susan Morgello, Greg Brown, Igor Grant, J.Hampton Atkinson, TerryL. Jernigan and RonaldJ. Ellis, 2014, "HIV-associated distal neuropathic pain is associated with smaller total cerebral cortical gray matter", Journal of NeuroVirology, 20, (3), pp. 209-218
  • Mohammad Hassan Lotfi, George Kesidis and Saswati Sarkar, 2014, "Network Non-Neutrality on the Internet: Content Provision Under aSubscription Revenue Model", CoRR, abs/1404.1782
  • Mohammad Hassan Lotfi, George Kesidis and Saswati Sarkar, 2014, "Network NonNeutrality on the Internet: Content Provision Under a SubscriptionRevenue Model", SIGMETRICS Performance Evaluation Review, 42, (3), pp. 44
  • George Kesidis, Douglas Mercer, Christopher Griffin and Serge Fdida, 2014, "Roaming charges for customers of cellular-wireless entrant and incumbent providers", CoRR, abs/1409.6281
  • Mahnoosh Alizadeh, Anna Scaglione, Andy Applebaum, George Kesidis and Karl N. Levitt, 2014, "Scalable and Anonymous Modeling of Large Populations of Flexible Appliances", CoRR, abs/1404.1958
  • Ashraf Al Daoud, George Kesidis and Jörg Liebeherr, 2014, "An Iterated Game of Uncoordinated Sharing of Licensed Spectrum UsingZero-Determinant Strategies", CoRR, abs/1401.3373
  • Mahnoosh Alizadeh, Anna Scaglione, Andrea Goldsmith and George Kesidis, 2014, "Capturing Aggregate Flexibility in Demand Response", CoRR, abs/1404.1955
  • Yuquan Shan, Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J Miller, Jeff Rowe and Anna Scaglione, 2014, "Generation bidding game with flexible demand", CoRR, abs/1408.6689
  • George Kesidis and Guodong Pang, 2014, "Golden-rule capacity allocation for distributed delay management inpeer-to-peer networks", CoRR, abs/1402.0214
  • Mohammad Hassan Lotfi, George Kesidis and Saswati Sarkar, 2014, "Market-Based Power Allocation for a Differentially Priced FDMA System", CoRR, abs/1402.3225
  • Ashraf Al Daoud, George Kesidis and Jörg Liebeherr, 2014, "An Iterated Game of Uncoordinated Sharing of Licensed Spectrum Using Zero-Determinant Strategies", CoRR, abs/1401.3373
  • George Kesidis and Guodong Pang, 2014, "Golden-rule capacity allocation for distributed delay management in peer-to-peer networks", CoRR, abs/1402.0214
  • Jayaram Raghuram, David J Miller and George Kesidis, 2014, "Instance-Level Constraint-Based Semisupervised Learning With ImposedSpace-Partitioning", IEEE Transactions on Neural Networks and Learning Systems, 25, (8), pp. 1520–1537
  • Mohammad Hassan Lotfi, George Kesidis and Saswati Sarkar, 2014, "Network Non-Neutrality on the Internet: Content Provision Under a Subscription Revenue Model", CoRR, abs/1404.1782
  • Mohammad Hassan Lotfi, George Kesidis and Saswati Sarkar, 2014, "Network NonNeutrality on the Internet: Content Provision Under a SubscriptionRevenue Model", SIGMETRICS Performance Evaluation Review, 42, (3), pp. 44
  • Ashraf Al Daoud, George Kesidis and Jörg Liebeherr, 2014, "Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands", IEEE Journal on Selected Areas in Communications, 32, (11), pp. 2297–2308
  • B. Urgaonkar, George Kesidis, U. V. Shanbhag and C. Wang, 2013, "Pricing of Service in Clouds: Optimal Response and Strategic Interactions", SIGMETRICS Performance Evaluation Review, 41, (3), pp. 28-30
  • P. Antoniadis, S. Fdida, C. Griffin, Y. Jin and George Kesidis, 2013, "Distributed Medium Access Control with Conditionally Altruistic Users", EURASIP Journal on Wireless Communications and Networking, pp. 12
  • A. Kurve, C. Griffin, D. J. Miller and George Kesidis, 2013, "Optimizing Cluster Formation in Super-Peer Networks via Local Incentive Design", Journal of Peer-to-Peer Networking and Applications, pp. 17
  • A. Kurve, K. Kotobi and George Kesidis, 2013, "An Agent-based Framework for Performance Modeling of an Optimistic Parallel Discrete Event Simulator", Complex Adaptive Systems Modeling, Special Issue on Multidisciplinary Applications and Methods for Agent-based Modeling, pp. 24
  • E. Altman, P. Bernhard, S. Caron, George Kesidis, J. Rojas-Mora and S. Wong, 2013, "A Model of Network Neutrality with Usage-based Prices", Telecommunication Systems, 52, (2), pp. 601-609
  • Y. Jin, J. W. Wang and George Kesidis, 2013, "Diffusion Dynamics of Network Technologies with Bounded Rational Users: Aspiration-based Learning", IEEE/ACM Transactions on Networking, 21, (1), pp. 28-40
  • Mahnoosh Alizadeh, George Kesidis and Anna Scaglione, 2013, "Clustering Consumption in Queues: A Scalable Model for Electric Vehicle Scheduling", CoRR, abs/1304.6753
  • Christopher Griffin and George Kesidis, 2013, "Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players", CoRR, abs/1306.3127
  • Christopher Griffin, George Kesidis, Panayotis Antoniadis and Serge Fdida, 2013, "Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics", CoRR, abs/1306.3160
  • Aditya Kurve, David J Miller and George Kesidis, 2013, "Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity", CoRR, abs/1307.7332
  • David J Miller, Jayaram Raghuram, George Kesidis and Christopher M Collins, 2012, "Improved Generative Semisupervised Learning Based on Finely GrainedComponent-Conditional Class Labeling", Neural Computation, 24, (7), pp. 1926–1966
  • George Kesidis and Youngmi Jin, 2012, "Stochastic Loss Aversion for Random Medium Access", CoRR, abs/1201.1776
  • Youngmi Jin, George Kesidis and Ju Wook Jang, 2012, "A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users", IEEE Journal on Selected Areas in Communications, 30, (1), pp. 128–137
  • Panayotis Antoniadis, Serge Fdida, Christopher Griffin, Youngmi Jin and George Kesidis, 2012, "CSMA Local Area Networking under Dynamic Altruism", CoRR, abs/1204.4847
  • Y. Aksu, D. J. Miller, George Kesidis, D. C. Bigler and Q. X. Yang, 2011, "An MRI-Derived Definition of MCI-to-AD Conversion for Long-Term, Automatic Prognosis of MCI Patients", PLoS ONE Journal, pp. 14
  • Guixi Zou, George Kesidis and David J Miller, 2011, "A Flow Classifier with Tamper-Resistant Features and an Evaluationof Its Portability to New Domains", IEEE Journal on Selected Areas in Communications, 29, (7), pp. 1449–1460
  • Glenn Carl and George Kesidis, 2011, "Modeling a policy-capable path-vector routing protocol using Jacobiiteration over a path algebra", Computer Networks, 55, (10), pp. 2361–2379
  • E. Altman, P. Bernhard, S. Caron, George Kesidis, J. Rojas-Mora and S. Wong, 2011, "A Study of Non-Neural Networks with Usage-based Pricing", Telecommunication Systems Journal, Special Issue on Socio-economic Issues of Next Generation Networks, pp. 7
  • George Kesidis and Aditya Kurve, 2011, "A Study of Unsupervised Adaptive Crowdsourcing", CoRR, abs/1110.1781
  • Aditya Kurve, Christopher Griffin, David J Miller and George Kesidis, 2011, "Game Theoretic Iterative Partitioning for Dynamic Load Balancing in Distributed Network Simulation", CoRR, abs/1111.0875
  • George Kesidis, 2011, "Side-payment profitability and interacting eyeball ISPs under convex demand-response modeling congestion-sensitive applications", CoRR, abs/1110.1779
  • Yaman Aksu, David J Miller, George Kesidis and Qing Yang, 2010, "Margin-maximizing feature elimination methods for linear and nonlinearkernel-based discriminant functions", IEEE Transactions on Neural Networks, 21, (5), pp. 701–717
  • Yoon-Ho Choi, Lunquan Li, Peng Liu and George Kesidis, 2010, "Worm virulence estimation for the containment of local worm outbreak", Computers & Security, 29, (1), pp. 104–123
  • Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing and George Kesidis, 2010, "PWC: a proactive worm containment solution for enterprise networks", Security and Communication Networks, 3, (4), pp. 334–354
  • George Kesidis, Youngmi Jin, Amar Prakash Azad and Eitan Altman, 2010, "Stable Nash equilibria of medium access games under symmetric, sociallyaltruistic behavior", CoRR, abs/1003.5324
  • Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora and Sulan Wong, 2010, "A Study of Non-Neutral Networks with Usage-based Prices", CoRR, abs/1006.3894
  • Eitan Altman, Stéphane Caron and George Kesidis, 2010, "Application Neutrality and a Paradox of Side Payments", CoRR, abs/1008.2267
  • George Kesidis, Athichart Tangpong and Christopher Griffin, 2009, "A sybil-proof referral system based on multiplicative reputation chains", IEEE Communications Letters, 13, (11), pp. 862–864
  • George Kesidis, 2009, "A Quantum Diffusion Network"
  • P. Patankar, G. Nam, George Kesidis, T. Konstantopoulos and C. R. Das, 2009, "Peer-To-Peer Unstructured AnyCasting Using Correlated Swarms"
  • G. Nam, P. Patankar, S. H. Lim, B. Sharma, George Kesidis and C. R. Das, 2009, "A Resilient and Collaborative Replacement Framework for Per-Flow Monitoring"
  • Y.-C. Jhi, P. Liu, L. Li, Q. Jun and George Kesidis, 2009, "A Proactive Worm Containment Solution for Enterprise Networks", Wiley Security and Communication Networks, 2, (3), pp. 457-475
  • George Kesidis, 2009, "A quantum computer network", CoRR, abs/0908.1597
  • T. Konstantopoulos, P. Sousi and George Kesidis, 2008, "A Stochastic Epidemiological Model and a Deterministic Limit for Bit Torrent-Like Peer-to-Peer File Sharing Networks"
  • A. Das and George Kesidis, 2008, "Randomization Data Object Indexing for Structured Search"
  • S. Yi, X. Deng and George Kesidis, 2008, "Technique for Estimating the Number of Active Flows in High-Speed Networks", Electronics and Telecommunications Research Institute Journal (ETRI), 30, (2), pp. 194-204
  • D. J. Miller, Y. Wang and George Kesidis, 2008, "Emergent Unsupervised Clustering Paradigms with Potential Applications to Bioinformatics", Frontiers in Bioscience, 13, pp. 677-690
  • Sungwon Yi, Xidong Deng, George Kesidis and Chitaranjan Das, 2008, "A dynamic quarantine scheme for controlling unresponsive TCP sessions", Telecommunication Systems, 37, (4), pp. 169–189
  • George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat and Milan Vojnovic, 2008, "A model of the spread of randomly scanning Internet worms that saturate access links", ACM Trans. Model. Comput. Simul., 18, (2)
  • David J Miller, Yanxin Zhang and George Kesidis, 2008, "Decision Aggregation in Distributed Classification by a Transductive Extension of Maximum Entropy/Improved Iterative Scaling", EURASIP J. Adv. Sig. Proc., 2008
  • Glenn Carl and George Kesidis, 2008, "Large-scale testing of the Internet’s Border Gateway Protocol (BGP) via topological scale-down", ACM Trans. Model. Comput. Simul., 18, (3)
  • Sungwon Yi, Martin Kappes, Sachin Garg, Xidong Deng, George Kesidis and Chitaranjan Das, 2008, "Proxy-RED: an AQM scheme for wireless local area networks", Wireless Communications and Mobile Computing, 8, (4), pp. 421–434
  • Azin Neishaboori and George Kesidis, 2008, "Wireless mesh networks based on CDMA", Computer Communications, 31, (8), pp. 1513–1528
  • Y. Aksu, George Kesidis and D. Miller, 2007, "Efficient, Stepwise-Optimal Feature Elimination in Support Vector Machines for Huge Feature Spaces"
  • Youngmi Jin and George Kesidis, 2007, "Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs", IEEE Journal on Selected Areas in Communications, 25, (6), pp. 1113–1123
  • Ihab Hamadeh and George Kesidis, 2006, "A taxonomy of internet traceback", IJSN, 1, (1/2), pp. 54–61
  • Youngmi Jin and George Kesidis, 2006, "Charge sensitive and incentive compatible end-to-end window-based control for selfish users", IEEE Journal on Selected Areas in Communications, 24, (5), pp. 952–961
  • Glenn Carl, George Kesidis, Richard R. Brooks and Suresh Rai, 2006, "Denial-of-Service Attack-Detection Techniques", IEEE Internet Computing, 10, (1), pp. 82–89
  • Jisheng Wang, David J Miller and George Kesidis, 2006, "Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification", IEEE Journal on Selected Areas in Communications, 24, (10), pp. 1929–1941
  • J. Wang, D. J. Miller and George Kesidis, 2006, "Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Modeling", IEEE Journal on Selected Areas in Communications, Special Issue on High-Speed Network Security, 24, (10), pp. 1929-1941
  • P. Jeon and George Kesidis, 2006, "A Pheromone-Aided Multipath QoS Routing Protocol and its Applications in MANETs", Journal of Communications Software and Systems (JCOMSS)
  • R. R. Mazumdar, C. A. Courcoubetis, N. Duffield, George Kesidis, A. Odlyzko, R. Srikant, J. Walrand and P. Cosman, 2006, "Guest Editorial Price-Based Access Control and Economics of Networking", IEEE Journal on Selected Areas in Communications, Special Issue on Network Economics and Pricing, 24, (5), pp. 937-941
  • D. Fayek, George Kesidis and A. Vannelli, 2006, "Non-linear Game Models for Large-scale Network Bandwidth Management", Journal of Optimization and Engineering, 7, (4), pp. 421-444
  • J. Wang, I. Hamadeh, George Kesidis and D. Miller, 2006, "Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources"
  • Y. Jin and George Kesidis, 2006, "Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs"
  • S. Yi, X. Deng, George Kesidis and C. R. Das, 2005, "A Dynamic Quarantine Scheme for Controlling Unresponsive TCP Sessions"
  • J. Wang, D. J. Miller and George Kesidis, 2005, "Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification"
  • B. Mortazavi and George Kesidis, 2005, "A Model of a Reputation Service for Incentive Engineering"
  • I. Hamadeh and George Kesidis, 2005, "Forensics of Scanning Worms that Use Pseudo-Random Number Generators"
  • Youngmi Jin and George Kesidis, 2005, "Dynamics of usage-priced communication networks: the case of a single bottleneck resource", IEEE/ACM Trans. Netw., 13, (5), pp. 1041–1053
  • Soranun Jiwasurat and George Kesidis, 2004, "A Class of Shaped Deficit Round-Robin (SDRR) Schedulers", Telecommunication Systems, 25, (3-4), pp. 173–191
  • Hao Zhu, Guohong Cao, George Kesidis and Chitaranjan Das, 2004, "An adaptive power-conserving service discipline for bluetooth (APCB) wireless networks", Computer Communications, 27, (9), pp. 828–839
  • Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne and Shyhtsun Felix Wu, 2004, "Cyber defense technology networking and evaluation", Commun. ACM, 47, (3), pp. 58–61
  • Rajesh N. Rao and George Kesidis, 2004, "Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks", IEEE Trans. Mob. Comput., 3, (3), pp. 225–232
  • Youngmi Jin and George Kesidis, 2002, "Equilibria of a noncooperative game for heterogeneous users of an ALOHA network", IEEE Communications Letters, 6, (7), pp. 282–284
  • George Kesidis and Takis Konstantopoulos, 2000, "Extremal shape-controlled traffic patterns in high-speed networks", IEEE Transactions on Communications, 48, (5), pp. 813–819
  • George Kesidis, Kaushik Chakraborty and Leandros Tassiulas, 2000, "Traffic shaping for a loss system", IEEE Communications Letters, 4, (12), pp. 417–419
  • George Kesidis and Takis Konstantopoulos, 2000, "Worst-case performance of a buffer with independent shaped arrival processes", IEEE Communications Letters, 4, (1), pp. 26–28
  • Anthony Hung, Marie-José Montpetit and George Kesidis, 1998, "ATM via satellite: A framework and implementation", Wireless Networks, 4, (2), pp. 141–153
  • Gustavo de Veciana and George Kesidis, 1996, "Bandwidth allocation for multiple qualities of service using generalized processor sharing", IEEE Transactions on Information Theory, 42, (1), pp. 268–272
  • Anthony Hung and George Kesidis, 1996, "Bandwidth scheduling for wide-area ATM networks using virtual finishing times", IEEE/ACM Trans. Netw., 4, (1), pp. 49–54
  • Costas Courcoubetis, George Kesidis, Ad Ridder, Jean C. Walrand and Richard R. Weber, 1995, "Admission control and routing in ATM networks using inferences from measured buffer occupancy", IEEE Transactions on Communications, 43, (234), pp. 1778–1784
  • George Kesidis, 1995, "Analog optimization with Wong’s stochastic neural network", IEEE Transactions on Neural Networks, 6, (1), pp. 258–260
  • Gustavo de Veciana, George Kesidis and Jean C. Walrand, 1995, "Resource Management in Wide-Area ATM Networks Using Effective Bandwiths", IEEE Journal on Selected Areas in Communications, 13, (6), pp. 1081–1090
  • George Kesidis, Jean C. Walrand and Cheng-Shang Chang, 1993, "Effective bandwidths for multiclass Markov fluids and other ATM sources", IEEE/ACM Trans. Netw., 1, (4), pp. 424–428
  • George Kesidis and Jean C. Walrand, 1993, "Quick Simulation of ATM Buffers with On-Off Multiclass Markov Fluid Sources", ACM Trans. Model. Comput. Simul., 3, (3), pp. 269–276
  • George Kesidis and Jean C. Walrand, 1993, "Relative entropy between Markov transition rate matrices", IEEE Transactions on Information Theory, 39, (3), pp. 1056–1057
  • Jean C. Walrand and George Kesidis, 1991, "Review of ’Large Deviation Techniques in Decision, Simulation, and Estimation’ (Bucklew, J.A.; 1990)", IEEE Transactions on Information Theory, 37, (5), pp. 1493
  • Zhen Xiang, J Miller and George Kesidis, , "Detection of Backdoors in Trained Classifiers Without Access to the Training Set.", IEEE TNNLS
  • Xinyi Hu, George Kesidis, Behdad Heidarpour and Zbigniew Dziong, , "Media delivery competition with edge cloud, remote cloud and networking.", Netnomics
  • J. Khamse-Ashari, I. Lambadaris, George Kesidis, B. Urgaonkar and Y. Zhao, , "A Cost-Aware Fair Allocation Mechanism For Multi-resource Servers", IEEE Network Letters

Conference Proceedings

  • Hang Wang and George Kesidis, 2024, "Universal Post-Training Backdoor Detection."
  • George Kesidis, 2023, "Container Sizing for Microservices with Dynamic Workloads by Online Optimization."
  • George Kesidis, 2023, "Training set cleansing of backdoor poisoning by self-supervised representation learning."
  • Aakash Sharma and George Kesidis, 2023, "Stash: A comprehensive stall-centric cost analysis of distributed deep learning on public cloud."
  • Xi Li, David J Miller, Zhen Xiang and George Kesidis, 2023, "A BIC based Mixture Model Defense against Data Poisoning Attacks on Classifiers"
  • George Kesidis, 2022, "Splice: An Automated Framework for Cost and Performance Aware Blending of Cloud Services."
  • George Kesidis, 2022, "Detecting Backdoor Attacks Against Point Cloud Classifiers", Proc. IEEE ICASSP
  • George Kesidis, 2022, "Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks", Proc. IEEE ICASSP
  • Zhen Xiang and George Kesidis, 2022, "Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios"
  • W. Choi, Bhuvan Urgaonkar, Mahmut T Kandemir and George Kesidis, 2022, "Multi-Resource Fair Allocation for Consolidated Flash-Based Caching Systems"
  • George Kesidis, 2021, "CASH: A Credit Aware Scheduling for Public Cloud Platforms", IEEE/ACM CCGRID
  • George Kesidis, 2021, "L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set", Proc. IEEE ICASSP
  • George Kesidis, 2021, "A Backdoor Attack against 3D Point Cloud Classifiers", International Conference on Computer Vision (ICCV)
  • George Kesidis, 2021, "On Merits and Viability of Multi-Cloud Serverless Model", Proc. ACM SoCC
  • George Kesidis, 2021, "SHOWAR: Right-Sizing And Efficient Scheduling of Microservices", Proc. ACM SoCC
  • Z. Xiang, D. J. Miller and George Kesidis, 2020, "Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducting Group Misclassification."
  • Y. Shan, George Kesidis, Bhuvan Urgaonkar, J. Schad, J. Khamse-Ashari and I Lambadaris, 2020, "Heterogeneous MacroTasking (HeMT) for parallel processing in the cloud.", Proc. ACM/IFIP Workshop on Containers
  • George Kesidis, 2019, "Temporal Overbooking of Lambda Functions in the Cloud."
  • Z. Xiang, D. J. Miller and George Kesidis, 2019, "A Benchmark Study of Backdoor Data Poisoning Defenses for Deep Neural Network Classifiers and A Novel Defense."
  • Y. Wang, D. J. Miller and George Kesidis, 2019, "When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers."
  • J. Raj, Mahmut T Kandemir, Bhuvan Urgaonkar and George Kesidis, 2019, "Exploiting Serverless Functions for SLO and Cost Aware Tenant Orchestration in Public Cloud."
  • A. Jain, A. F. Baarzi, N. Alfares, George Kesidis, Bhuvan Urgaonkar and Mahmut T Kandemir, 2019, "SplitServe: Efficient Splitting Complex Workloads across FaaS and IaaS."
  • J. Khamse-Ashari, I. Lambadaris, George Kesidis, B. Urgaonkar and Y. Zhao, 2018, "A Cost-Aware Fair Allocation Mechanism For Multi-resource Servers"
  • D. Fleck, George Kesidis, N. Nasiriani, Y. Shan and A. Stavrou, 2018, "Moving-target defense against botnet reconnaissance and an adversarial coupon-collection model"
  • X. Hu, George Kesidis, B. Heidarpour and Z. Dziong, 2018, "Media delivery with neutral edge cloud, remote cloud and networking"
  • George Kesidis, Y. Shan, D. Fleck, A. Stavrou and T. Konstantopoulos, 2018, "An Adversarial Coupon-Collector Model of Asynchronous Moving-Target Defense Against Botnet Reconnaissance"
  • D. J. Miller, Z. Qiu and George Kesidis, 2018, "Parsimonious Cluster-based Anomaly Detection (PCAD)"
  • D. J. Miller, Y. Wang and George Kesidis, 2018, "AnomalyDetection of Attacks (ADA) on DNN Classifiers at Test Time"
  • Y. Shan, A. Jain, George Kesidis, B. Urgaonkar, J. Khamse-Ashari and I. Lambadaris, 2018, "Scheduling distributed resources in heterogeneous private clouds"
  • N. Nasiriani, George Kesidis and D. Wang, 2018, "Public Cloud Differential Pricing Design Under Provider and Tenants Joint Demand Response"
  • A. Leivadeas, M. Falkner, I. Lambadaris, M. Ibnkahla and George Kesidis, 2018, "Balancing Delay and Cost in Virtual Network Function Placement and Chaining."
  • A. Leivadeas, C.-H. Lung, M. Falkner, I. Lambadaris, M. Ibnkala and George Kesidis, 2018, "Considerations for a Successful Network Service Chain Deployment"
  • George Kesidis, 2018, "Stationary Distribution of a Generalized LRU-MRU Content Cache"
  • Y. Shan, George Kesidis and G. Fleck, 2017, "Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems"
  • H. Hu, George Kesidis and S.-J. Baek, 2017, "Regulating Wireless Access Costs for Not Vertically Integrated Content Providers"
  • Y. Shan, George Kesidis, D. Fleck and A. Stavrou, 2017, "Preliminary Study of Fission Defenses Against Low-Volume DoS Attacks on Proxied Multiserver Systems"
  • D. J. Miller, X. Hu, Z. Qiu and George Kesidis, 2017, "Adversarial Learning: A Critical Review and Active Lerning Study"
  • George Kesidis, U. V. Shanbhag, N. Nasiriani and B. Urgaonkar, 2017, "Competition and Peak-Demand Pricing in Clouds Under Tenants' Demand Response"
  • N. Nasiriani, George Kesidis and D. Wang, 2017, "Optimal Peak Shaving Using Batteries at Datacenters: Characterizing the Risks and Benefits"
  • George Kesidis, C. Wang, B. Urgaonkar and N. Nasiriani, 2017, "Using Burstable Instances in the Public Cloud: When, How and Why?"
  • Y Shan, C. L. Prete, George Kesidis and D. J. Miller, 2017, "A Simulation framework for Uneconomic Virtual Bidding in Day-ahead Electricity Markets"
  • j. Khamse-Ashari, George Kesidis, I. Lambadaris, B. Urgaonkar and Y. Zhao, 2017, "Efficient and Fair Scheduling of Placement Constrained Threads on Heterogeneous Multi-Processors"
  • George Kesidis, N. Nasiriani, Y. Shan, B. Urgaonkar and I. Lambadaris, 2017, "Multicommodity Games in Public-cloud Markets Considering Subadditive Demands"
  • C. Wang, B. Urgaonkar, A. Gupta, Q. Liang and George Kesidis, 2017, "Exploiting Spot and Burstable Instances for Improving the Cost-Efficacy of In-Memory Caches on the Public Cloud"
  • Z. Qiu, D. J. Miller and George Kesidis, 2017, "Flow Based Botnet Detection through Semi-supervised Active Learning"
  • Jalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar and Y. Zhao, 2016, "Constrained Max-Min Fair Scheduling of Variable-Length Packet-Flows to Multiple Servers", IEEE
  • Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris and George Kesidis, 2016, "Resource Management and Orchestration for a Dynamic Service Chain Steering Model."
  • George Kesidis, Seung Baek and Xinyi Hu, 2016, "CDMA Game between a Vertically Integrated and Third-Party Content Providers"
  • Matthias Falkner, Aris Leivadeas, Ioannis Lambadaris and George Kesidis, 2016, "Performance Analysis of Virtualized Network Functions on Virtualized Systems Architecture", IEEE
  • Aris Leivadeas, Matthias Falkner, Ioannis Lambadaris and George Kesidis, 2016, "Dynamic Traffic Steering of Multi-Tenant Virtualized Network Functions in SDN enabled Data Centers", IEEE
  • Cheng Wang, Bhuvan Urgaonkar, R. Birke, A. Gupta, L. Chen and George Kesidis, 2016, "Effective capacity modulation as an explicit control knob for public cloud profitability", Institute of Electrical and Electronics Engineers Inc., pp. 95-104
  • A. Leivadeas, M. Falkner, I. Lambadaris and George Kesidis, 2016, "Dynamic Virtualized Network Function Allocation in a Multi-Cloud Environment", Institute of Electrical and Electronics Engineers Inc.
  • R Rameshan, R. Birke, L. Navarro, V. Vlassov, Bhuvan Urgaonkar, George Kesidis, M. Schmatz and L. Y. Chen, 2016, "Profiling Memory Vulnerability of Big-data Applications", Institute of Electrical and Electronics Engineers Inc., pp. 258-261
  • George Kesidis, Bhuvan Urgaonkar, N. Nasiriani and C. Wang, 2016, "Neutrality in Future Public Clouds: Implications and Challenges", USENIX Association
  • X. Hu, Y. Shan, George Kesidis, S. Sarkar, R. Dhar and S. Fdida, 2016, "Multiperiod subscription pricing for cellular wireless entrants"
  • M. H. Lotfi, S. Sarkar and George Kesidis, 2016, "Migration to a non-neutral Internet: economics modeling and analysis of impact", Institute of Electrical and Electronics Engineers Inc., pp. 511-516
  • B. Capos, Karl Levitt, Jeff Rowe, Parisa Kianmajd, Chen Nee Chuah and George Kesidis, 2016, "Security and Privacy for Emerging Smart Community Infrastructure"
  • J. Khamse Ashari, George Kesidis, I. Lambadaris and Bhuvan Urgaonkar, 2016, "Max-min fair scheduling of variable-length packet-flows to multiple servers by deficit round-roubin"
  • Y. Shan and George Kesidis, 2016, "Optimal power flow with random wind resources"
  • Neda Nasiriani, Cheng Wang, George Kesidis, Bhuvan Urgaonkar, Lydia Y. Chen and Robert Birke, 2015, "On Fair Attribution of Costs under Peak-Based Pricing to Cloud Tenants", pp. 51–60
  • Zhicong Qiu, David J Miller and George Kesidis, 2015, "Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data", pp. 1–6
  • Cheng Wang, Neda Nasiriani, George Kesidis, Bhuvan Urgaonkar, Qian Wang, Lydia Y. Chen, Aayush Gupta and Robert Birke, 2015, "Recouping Energy Costs From Cloud Tenants: Tenant Demand ResponseAware Pricing Design", pp. 141–150
  • Jianping He, Bin Liu, Xuan Bao, Hongxia Jin and George Kesidis, 2015, "PuPPIes: Privacy Preserving Partial Image Sharing", pp. 758–759
  • George Kesidis, D. Mercer, C. Griffin and S. Fdida, 2015, "Roaming charges for customers of entrant providers"
  • Mahnoosh Alizadeh, Anna Scaglione, Andrea Goldsmith and George Kesidis, 2014, "Capturing Aggregate Flexibility in Demand Response", pp. 6439-6445
  • George Kesidis and Guodong Pang, 2014, "Tit-for-tat capacity allocation for distributed delay management in peer-to-peer networks"
  • Cheng Wang, Bhuvan Urgaonkar, Qian Wang and George Kesidis, 2014, "A hierarchical demand response framework for data center power cost optimization under real-world electricity pricing"
  • Jayaram Raghuram, George Kesidis, Christopher Griffin, Karl N. Levitt, David J Miller, Jeff Rowe and Anna Scaglione, 2014, "A Bidding Game for Generators in the Presence of Flexible Demand"
  • Cheng Wang, Bhuvan Urgaonkar, George Kesidis, Uday V. Shanbhag and Qian Wang, 2014, "A Case for Virtualizing the Electric Utility in Cloud Data Centers", pp. 7 pages
  • Mohammad Hassan Lotfi, George Kesidis and Saswati Sarkar, 2014, "Market-based power allocation for a differentially priced FDMA system", pp. 1011–1015
  • George Kesidis, 2014, "A simple two-sided market model with side-payments and ISP serviceclasses", pp. 595–597
  • Christopher Griffin and George Kesidis, 2014, "Behavior in a shared resource game with cooperative, greedy, and vigilante players", pp. 1–6
  • Fatih Kocak, David J Miller and George Kesidis, 2014, "Detecting anomalous latent classes in a batch of network traffic flows", pp. 1–6
  • C. Wang, B. Urgaonkar, Q. Wang, George Kesidis and A. Sivasubramaniam, 2013, "Data Center Cost Optimization Via Workload Modulation Under Real-World Electricity Pricing", pp. 4
  • A. Kurve, D. J. Miller and George Kesidis, 2013, "Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers", pp. 140-153
  • M. Alizadeh, A. Scaglione and George Kesidis, 2013, "Scalable Model Predictive Control of Demand for Ancillary Services", pp. 684-689
  • H. Lu, G. Pang and George Kesidis, 2013, "Automated Scheduling of Deferrable PEV/PHEV Load by Power-profile Unevenness", pp. 235-240
  • J. He, D. J. Miller and George Kesidis, 2013, "Latent Interest-Group Discovery and Management by Peer-to-Peer Online Social Networks", pp. 162-167
  • F. Kocak, George Kesidis, T.-M. Pham and S. Fdida, 2013, "The Effect of Caching on a Model of Content and Access Provider Revenues in Information-centric Networks", pp. 45-50
  • Y. Jin, Y. Yi, George Kesidis and J. Shin, 2013, "Hybrid Client-Server and Peer-to-Peer Caching Systems with Selfish Peers", pp. 1744-1752
  • Mahnoosh Alizadeh, George Kesidis and Anna Scaglione, 2013, "Clustering consumption in queues: A scalable model for electric vehicle scheduling", pp. 374–378
  • Cheng Wang, Bhuvan Urgaonkar, Qian Wang, George Kesidis and Anand Sivasubramaniam, 2013, "Data Center Power Cost Optimization via Workload Modulation", pp. 260–263
  • Panayotis Antoniadis, Serge Fdida, Christopher Griffin, Youngmi Jin and George Kesidis, 2012, "Distributed Medium Access Control with Dynamic Altruism", pp. 29–42
  • David J Miller, Fatih Kocak and George Kesidis, 2012, "Sequential anomaly detection in a batch with growing number of tests:Application to network intrusion detection", pp. 1–6
  • George Kesidis, 2012, "Side-payment profitability under convex demand-response modeling congestion-sensitiveapplications", pp. 2785–2789
  • George Kesidis and Aditya Kurve, 2012, "A study of unsupervised adaptive crowdsourcing", pp. 1438–1442
  • G. Pang, George Kesidis and T. Konstantopoulos, 2012, "Avoiding Overages by Deferred Aggregate Demand for PEV Charging on the Smart Grid", pp. 3322-3327
  • George Kesidis and Youngmi Jin, 2012, "Stochastic Loss Aversion for Random Medium Access", pp. 236–247
  • Aditya Kurve, Guodong Pang, George Kesidis and Gustavo de Veciana, 2012, "Decentralized capacity reallocation for a loss network", pp. 1–5
  • Virag Shah, Gustavo de Veciana and George Kesidis, 2012, "Learning to route queries in unstructured P2P networks: Achieving throughput optimality subject to query resolution constraints", pp. 2327–2335
  • Jayaram Raghuram, David J Miller and George Kesidis, 2012, "Semisupervised domain adaptation for mixture model based classifiers", pp. 1–6
  • A. Kurve, C. Griffin and George Kesidis, 2011, "A Graph Partitioning Game for Distributed Simulation of Networks", pp. 7
  • Z. Berkay Celik, Jayaram Raghuram, George Kesidis and David J Miller, 2011, "Salting Public Traces with Attack Traffic to Test Flow Classifiers"
  • Aditya Kurve and George Kesidis, 2011, "Sybil Detection via Distributed Sparse Cut Monitoring", pp. 1–6
  • Aditya Kurve, Christopher Griffin and George Kesidis, 2011, "Iterative partitioning scheme for distributed simulation of dynamic networks", pp. 92–96
  • C. Griffin, P. Antoniades, George Kesidis and S. Fdida, 2011, "An Epidemic Model of BitTorrent for Acquisition Performance, Content Availability, and Cooperation Incentive", pp. 6
  • Christopher Griffin, George Kesidis, Panayotis Antoniadis and Serge Fdida, 2011, "An Epidemic Model of Bit Torrent with Control", pp. 1–6
  • David J Miller, Chu-Fang Lin, George Kesidis and Christopher M Collins, 2010, "Improved Fine-Grained Component-Conditional Class Labeling with ActiveLearning", pp. 3–8
  • George Kesidis, Y. Jin, A. P. Azad and E. Altman, 2010, "Stable Nash Equilibria of Medium Access Games under Symmetric, Socially Altruistic Behavior"
  • S. Caron, George Kesidis and E. Altman, 2010, "Application Neutrality and a Paradox of Side Payments", pp. 6
  • Eitan Altman, Pierre Bernhard, Stéphane Caron, George Kesidis, Julio Rojas-Mora and Sulan Wong, 2010, "A Study of Non-neutral Networks with Usage-Based Prices", pp. 76–84
  • George Kesidis, 2010, "Congestion control alternatives for residential broadband access", pp. 874–877
  • , 2010, "44th Annual Conference on Information Sciences and Systems, CISS 2010, Princeton, NJ, USA, 17-19 March 2010", IEEE
  • , 2010, "Incentives, Overlays, and Economic Traffic Control, Third International Workshop, ETM 2010, Amsterdam, The Netherlands, September 6, 2010. Proceedings", Springer, 6236
  • George Kesidis, Youngmi Jin, Amar Prakash Azad and Eitan Altman, 2010, "Stable Nash equilibria of ALOHA medium access games under symmetric, socially altruistic behavior", pp. 1071–1075
  • , 2010, "The Ninth International Conference on Machine Learning and Applications, ICMLA 2010, Washington, DC, USA, 12-14 December 2010", IEEE Computer Society
  • Athichart Tangpong and George Kesidis, 2010, "File-sharing costs and quality-of-service", pp. 1–6
  • , 2010, "IEEE/IFIP Network Operations and Management Symposium, NOMS 2010, 19-23 April 2010, Osaka, Japan", IEEE
  • Y. Zhang, D. J. Miller and George Kesidis, 2009, "Hierarchical Maximum Entropy Modeling for Regression", Proceedings of the IEEE Workshop on Machine Learning for Signal Processing (MLSP 2009), pp. 6
  • D. J. Miller, C.-F. Lin, George Kesidis and C. Collins, 2009, "Semi-supervised Mixture Modeling with Fine-grained Component-conditional Class Labeling and Transductive Inference", Proceedings of the IEEE Workshop on Machine Learning for Signal Processing (MLSP 2009), pp. 6
  • , 2009, "1st International Conference on Game Theory for Networks, GAMENETS 2009, Istanbul, Turkey, May 13-15, 2009", IEEE
  • , 2009, "21st International Teletraffic Congress, ITC 2009, Paris, France, September 15-17, 2009", IEEE
  • , 2009, "29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 22-26 June 2009, Montreal, Québec, Canada", IEEE Computer Society
  • Athichart Tangpong and George Kesidis, 2009, "A simple reputation model for BitTorrent-like incentives", pp. 603–610
  • Gunwoo Nam, Pushkar Patankar, Seung-Hwan Lim, Bikash Sharma, George Kesidis and Chitaranjan Das, 2009, "Clock-like Flow Replacement Schemes for Resilient Flow Monitoring", pp. 129–136
  • Gunwoo Nam, Pushkar Patankar, George Kesidis, Chitaranjan Das and Cetin Seren, 2009, "Mass Purging of Stale TCP Flows in Per-Flow Monitoring Systems", pp. 1–6
  • , 2009, "Network Control and Optimization, Second Euro-NF Workshop, NET-COOP 2008, Paris, France, September 8-10, 2008. Revised Selected Papers", Springer, 5425
  • Pushkar Patankar, Gunwoo Nam, George Kesidis, Takis Konstantopoulos and Chitaranjan Das, 2009, "Peer-to-peer unstructured anycasting using correlated swarms", pp. 1–8
  • , 2009, "Proceedings of the 18th International Conference on Computer Communications and Networks, IEEE ICCCN 2009, San Francisco, California, August 3-6, 2009", IEEE
  • Athichart Tangpong, George Kesidis, Hung-Yuan Hsu and Ali R. Hurson, 2009, "Robust Sybil Detection for MANETs", pp. 1–6
  • Arnab Das, Azin Neishaboori and George Kesidis, 2009, "Wireless mesh networking games", pp. 565–574
  • Y. Zhang, Y. Aksu, George Kesidis and D. J. Miller, 2008, "SVM Feature Selection Applications to Microarray Data", Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing (MLSP 2008), pp. 5
  • Y. Aksu, D. J. Miller and George Kesidis, 2008, "Margin-based Feature Selection Techniques for Support Vector Machines", Proceedings of the 2008 IAPR Workshop on Cognitive Information Processing (CIP 2008), pp. 5
  • C.-F. Lin, C. Collins, D. J. Miller and George Kesidis, 2008, "Towards a New Automated Segmentation Method for Numerous Tissues in Reference to a Whole-Body 3D Anatomical Template", Proceedings of the Sixteenth Scientific Meeting and Exhibition of the International Society for Magnetic Resonance in Medicine (ISMRM 2008)
  • , 2008, "28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China", IEEE Computer Society
  • , 2008, "42nd Annual Conference on Information Sciences and Systems, CISS 2008, Princeton, NJ, USA, 19-21 March 2008", IEEE
  • George Kesidis, Takis Konstantopoulos and Perla Sousi, 2008, "A Stochastic Epidemiological Model and a Deterministic Limit for BitTorrent-Like Peer-to-Peer File-Sharing Networks", pp. 26–36
  • David J Miller, Yanxin Zhang and George Kesidis, 2008, "A transductive extension of maximum entropy/iterative scaling for decision aggregation in distributed classification", pp. 1865–1868
  • Pushkar Patankar, Gunwoo Nam, George Kesidis and Chitaranjan Das, 2008, "Exploring Anti-Spam Models in Large Scale VoIP Systems", pp. 85–92
  • , 2008, "IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, MASS 2008, 29 September - 2 October 2008, Atlanta, Georgia, USA", IEEE Computer Society
  • George Kesidis, Arunangshu Das and Gustavo de Veciana, 2008, "On flat-rate and usage-based pricing for tiered commodity internet services", pp. 304–308
  • , 2008, "Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008", IEEE
  • , 2008, "Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA", IEEE
  • Azin Neishaboori and George Kesidis, 2008, "SINR-sensitive routing in wireless 802.11 mesh networks", pp. 623–628
  • Lunquan Li, Peng Liu and George Kesidis, 2008, "Threshold Smart Walk for the Containment of Local Worm Outbreak", pp. 2124–2128
  • Y. Aksu, George Kesidis and D. J. Miller, 2007, "Efficient, Step-wise Optimal Feature Elimination in Support Vector Machines for Huge Features Spaces", Proceedings of the 2007 IEEE International Workshop on Machine Learning for Signal Processing (MLSP 2007)
  • J. Wang, D. J. Miller and George Kesidis, 2007, "New Directions in Covert Worm Modeling Exploiting White-Listing", Proceedings of the 2007 IEEE Sarnoff Symposium
  • Arnab Das, George Kesidis and Venkat Pothamsetty, 2007, "Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution", pp. 444–448
  • , 2007, "DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, August 6-7, 2007", USENIX Association
  • George Kesidis and Azin Neishaboori, 2007, "Distributed Power Control in Multihop Ad Hoc CDMA Networks", pp. 96–101
  • Lunquan Li, Peng Liu, Yoon-chan Jhi and George Kesidis, 2007, "Evaluation of Collaborative Worm Containments on DETER Testbed"
  • , 2007, "Fourth International Conference on Broadband Communications, Networks and Systems, (BROADNETS 2007), 10-14 September 2007, Raleigh, North-Carolina, USA", IEEE
  • Paul Barom Jeon and George Kesidis, 2007, "GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks", pp. 10
  • Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis and Chitaranjan Das, 2007, "Memory-efficient content filtering hardware for high-speed intrusion detection systems", pp. 264–269
  • George Kesidis, Takis Konstantopoulos and Perla Sousi, 2007, "Modeling file-sharing with BitTorrent-like incentives", pp. 1333–1336
  • , 2007, "Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, 24-28 June 2007", IEEE
  • , 2007, "Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007", ACM
  • , 2007, "Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2007, Honolulu, Hawaii, USA, April 15-20, 2007", IEEE
  • Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing and George Kesidis, 2007, "PWC: A proactive worm containment solution for enterprise networks", pp. 433–442
  • , 2007, "Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France", IEEE Computer Society
  • , 2007, "Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007", IEEE
  • , 2006, "3rd Workshop on Visualization for Computer Security (VizSEC 2006), 3 November 2006, Alexandria, Virginia, USA", ACM
  • George Kesidis, Youngmi Jin, B. Mortazavi and T. Konstopoulos, 2006, "An Epidemiological Model for File-Sharing with BitTorrent-like Incentives: The Case of a Fixed Peer Population"
  • , 2006, "Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings", Springer, 3995
  • Rajesh N. Rao and George Kesidis, 2006, "On the Relation Between Capacity and Number of Sinks in an Sensor Network"
  • Glenn Carl, Shashi Phoha, George Kesidis and Bharat Madan, 2006, "Path preserving scale down for validation of internet inter-domain routing protocols", pp. 2210–2218
  • , 2006, "Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006", IEEE
  • , 2006, "Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM ’06, San Francisco, CA, USA, 27 November - 1 December 2006", IEEE
  • , 2006, "Proceedings of the Winter Simulation Conference WSC 2006, Monterey, California, USA, December 3-6, 2006", WSC
  • Azin Neishaboori and George Kesidis, 2006, "Routing and Uplink-Downlink Scheduling in Ad Hoc CDMA Networks", pp. 926–931
  • Ihab Hamadeh and George Kesidis, 2006, "Toward a Framework for Forensic Analysis of Scanning Worms", pp. 282–297
  • Lunquan Li, Peng Liu and George Kesidis, 2006, "Visual toolkit for network security experiment specification and data analysis", pp. 7–14
  • L. Li, P. Liu and George Kesidis, 2006, "Visual Studio for Network Security Experiment Specification and Data Analysis", Proceedings of the Third International Workshop on Visualization for Computer Security (VizSEC'06), pp. 5
  • J. Wang, I. Hamadeh, D. J. Miller and George Kesidis, 2006, "Polymorphic Worm Detection and Defense: System Design, Experimental Methodology, and Data Resources", Proceedings of ACM Workshop on Large Scale Attack Defense (LSAD 2006), pp. 8
  • P. Jeon, R. Rao and George Kesidis, 2006, "An Overlay Framework for QoS Management in Mobile Ad-hoc Networks", Proceedings of the IEEE Sarnoff Symposium on Advances in Wired and Wireless Communications, pp. 5
  • B. Mortazavi and George Kesidis, 2006, "Cumulative Reputation Systems for Peer-to-Peer Content Distribution", Proceedings of the IEEE Conference on Information Sciences and Systems (CISS-2006), pp. 1546-1552
  • L. Li, S. Jiwasurat, I. Hamadeh, George Kesidis, P. Liu and C. Newmann, 2006, "Emulating Sequential Scanning Worms on the DETER Testbed", Proceedings of the Second Annual International IEEE/Create-Net Conference on Testbeds and Research Infrastructures - Tridentcom 2006, pp. 5
  • B. Mortazavi and George Kesidis, 2006, "A Peer-to-peer Content-distribution Game with a Reputation-based Incentive Mechanism", Proceedings of the IEEE Workshop on Information Theory and its Applications
  • P. B. Jeon and George Kesidis, 2005, "Avoiding Malicious Packet Dropping in Ad Hoc Networks using Multipath Routing", Proceedings of the Forty-Third Allerton Conference on Communication, Control, and Computing, pp. 5
  • S. Jiwasurat, George Kesidis and D. Miller, 2005, "Hierarchical Shaped Deficit Round-Robin (HSDRR) Scheduling", Proceedings of IEEE GLOBECOM 2005, 6
  • L. Li, S. Jiwasurat, P. Liu and George Kesidis, 2005, "Emulation of Single-packet UDP Scanning Worms in Large Enterprises", Proceedings of the International Teletraffic Congress (ITC-19), pp. 10
  • , 2005, "19th Workshop on Parallel and Distributed Simulation, PADS 20055, Monterey, CA, USA, June 1-3, 2005", IEEE Computer Society
  • Ihab Hamadeh, Jason Hart, George Kesidis and Venkat Pothamsetty, 2005, "A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast", pp. 191–198
  • John W. Lockwood, George Kesidis and Changcheng Huang, 2005, "Advances for networks & internet"
  • George Kesidis, Ihab Hamadeh and Soranun Jiwasurat, 2005, "Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms", pp. 101–109
  • Soranun Jiwasurat, George Kesidis and David J Miller, 2005, "Hierarchical shaped deficit round-robin scheduling", pp. 6
  • Paul Barom Jeon and George Kesidis, 2005, "Pheromone-aided robust multipath and multipriority routing in wireless MANETs", pp. 106–113
  • , 2005, "Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, PE-WASUN 2005, Montreal, Quebec, Canada, October 10-13, 2005", ACM
  • , 2005, "Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM ’05, St. Louis, Missouri, USA, 28 November - 2 December 2005", IEEE
  • , 2005, "Quality of Service in Multiservice IP Networks, Third International Workshop, QoS-IP 2005, Catania, Italy, February 2-4, 2005, Proceedings", Springer, 3375
  • Xiang Ji, Hongyuan Zha, John Metzner and George Kesidis, 2004, "Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks", pp. 3807–3811
  • , 2004, "IASTED International Conference on Communications, Internet, and Information Technology, November 22 - 24, 2004, St. Thomas, US Virgin Islands", IASTED/ACTA Press
  • Nicholas Weaver, Ihab Hamadeh, George Kesidis and Vern Paxson, 2004, "Preliminary results using scale-down to explore worm dynamics", pp. 65–72
  • , 2004, "Proceedings of IEEE International Conference on Communications, ICC 2004, Paris, France, 20-24 June 2004", IEEE
  • , 2004, "Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004", ACM Press
  • Xidong Deng, Sungwon Yi, George Kesidis and Chitaranjan Das, 2004, "RL-RED: A flowcontrol mechanism for 802.11-basedwireless ad hoc networks", pp. 369–374
  • Youngmi Jin and George Kesidis, 2004, "TCP windowcontrol in a priced network", pp. 596–600
  • Xidong Deng, Sungwon Yi, George Kesidis and Chitaranjan Das, 2003, "A control theoretic approach for designing adaptive AQM schemes", pp. 2947–2951
  • Rajesh N. Rao and George Kesidis, 2003, "Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited", pp. 2957–2961
  • Youngmi Jin and George Kesidis, 2003, "Nash equilibria of a generic networking game with applications to circuit-switched networks"
  • , 2003, "Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30 - April 3, 2003", IEEE
  • , 2003, "Proceedings of the Global Telecommunications Conference, 2003. GLOBECOM ’03, San Francisco, CA, USA, 1-5 December 2003", IEEE
  • , 2002, "10th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2002), 11-16 October 2002, Fort Worth, Texas, USA", IEEE Computer Society
  • Bobby M. Ninan, George Kesidis and Michael Devetsikiotis, 2002, "A Simulation Study of Non-Cooperative Pricing Strategies for Circuit-Switched Optical Networks", pp. 257
  • Hao Zhu, Guohong Cao, George Kesidis and Chitaranjan Das, 2002, "An adaptive power-conserving service discipline for Bluetooth", pp. 303–307
  • , 2002, "IEEE International Conference on Communications, ICC 2002, April 28 - May 2, 2002, New York City, NY, USA", IEEE
  • , 2002, "Proceedings of the Global Telecommunications Conference, 2002. GLOBECOM ’02, Taipei, Taiwan, 17-21 November, 2002", IEEE
  • Sungwon Yi, Xidong Deng, George Kesidis and Chitaranjan Das, 2002, "Providing fairness in DiffServ architecture", pp. 1435–1439
  • Xidong Deng, Sungwon Yi, George Kesidis and Chitaranjan Das, 2002, "Stabilized virtual buffer (SVB) - an active queue management scheme for Internet quality-of-service", pp. 1628–1632
  • George Kesidis and Leandros Tassiulas, 2001, "General Connection Blocking Bounds and an Implication of Billing for Provisioned Label-Switched Routes in an MPLS Internet Cloud", pp. 339–347
  • , 2001, "Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2", Springer, 2094
  • Anthony Hung, George Kesidis and Nick McKeown, 1998, "ATM input-buffered switches with the guaranteed-rate property", pp. 331–335
  • , 1998, "Proceedings of the Third IEEE Symposium on Computers and Communications (ISCC 1998), June 30 - July 2, 1998, Athens, Greece", IEEE Computer Society
  • George Kesidis and Nick McKeown, 1997, "Output-Buffer ATM Packet Switching for Integrated-Services Communication Networks", pp. 1684–1688
  • , 1994, "MASCOTS ’94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31 - February 2, 1994, Durham, North Carolina, USA", IEEE Computer Society
  • George Kesidis, 1994, "Modeling to Obtain the Effective Bandwidth of a Traffic Source in an ATM Network", pp. 318–322
  • George Kesidis and Jean C. Walrand, 1993, "A Review of Quick Simulation Methods for Queues", pp. 17–21
  • , 1993, "MASCOTS ’93, Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 17-20, 1993, La Jolla, San Diego, CA, USA", The Society for Computer Simulation
  • Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin and George Kesidis, , "PuPPIeS: Privacy Preserving Partial Image Sharing", Institute of Electrical and Electronics Engineers Inc., pp. 359-370
  • George Kesidis, , "Temporal-Distributed Backdoor Attack Against Video Based Action Recognition"
  • Nader Alfares and George Kesidis, , "On a caching system with Object Sharing. Proc. Int'l Workshop on Middleware and", Workshop on Middleware & Applications for Internet of Things
  • Jain and George Kesidis, , "SplitServe: Efficiently Splitting Apache Spark Jobs Across FaaS and IaaS.", ACM/IFIP Middleware
  • Xi Li and George Kesidis, , "A Scalable Mixture-Model Based Defense Against Data-Poisoning Attacks on Classifiers.", Proc. DDDAS Conference
  • Zhen Xiang and George Kesidis, , "Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.", IEEE MLSP
  • Ata F Baarzi and George Kesidis, , "Microservices Made Attack-Resilient Using Unsupervised Service Fissioning.", ACM EuroSec

Encyclopedia Entries

  • George Kesidis, 2011, "Denial-of-Service Defence",, Encyclopedia of Cryptography and Security, 2nd Ed., 323–328, Springer, Berlin

Other

  • George Kesidis, 2021, "Backdoor Attack and Defense for Deep Regression", arxiv.org
  • George Kesidis, 2021, "Robust and active learning for deep neural network regression", arxiv.org
  • George Kesidis, D. J. Miller and Z. Xiang, 2019, "Notes on Margin Training and Margin p-Values for Deep Neural Network Classifiers."
  • George Kesidis, C. Griffin and D. Miller, 2013, "A Marketplace Game with Neither Distribution Costs Nor Distribution-capacity Constraints"
  • C. Wang, B. Urgaonkar, Q. Wang, George Kesidis and A. Sivasubramaniam, 2013, "Data Center Cost Optimization via Workload Modulation Under Real-world Electricity Pricing"
  • George Kesidis, K. Kotobi and C. Griffin, 2013, "Distributed ALOHA Game with Partially Rule-based Cooperative, Greedy, and Vigilante Players"
  • F. Kocak, George Kesidis and S. Fdida, 2013, "Network Neutrality with Content Caching and its Effect on Access Pricing", pp. 528
  • J. He, D. Miller and George Kesidis, 2013, "Interest-group Discovery and Management by Peer-to-Peer Online Social Networks"
  • G. Pang and George Kesidis, 2013, "Avoiding Overages by Deferred Aggregate Demand for PEV Charging on the Smart Grid"
  • Y. Aksu, D. J. Miller, George Kesidis, D. Bigler and Q. Yang, 2011, "An MRI-Derived Definition of MCI-to-AD Conversion for Long-Term, Automatic Prognosis of MCI Patients"
  • X. Zang, A. Tangpong, George Kesidis and D. J. Miller, 2011, "Botnet Detection Through Fine Flow Classification"
  • S. Caron and George Kesidis, 2010, "Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid"
  • D. Miller, C.-F. Lin, George Kesidis and C. M. Collins, 2010, "Improved Generative Semisupervised Learning Based on Fine-Grained Component-Conditional Class Labeling"

Research Projects

Honors and Awards

Service

Service to Penn State:

Service to External Organizations:

 


 

About

The School of Electrical Engineering and Computer Science was created in the spring of 2015 to allow greater access to courses offered by both departments for undergraduate and graduate students in exciting collaborative research fields.

We offer B.S. degrees in electrical engineering, computer science, computer engineering and data science and graduate degrees (master's degrees and Ph.D.'s) in electrical engineering and computer science and engineering. EECS focuses on the convergence of technologies and disciplines to meet today’s industrial demands.

School of Electrical Engineering and Computer Science

The Pennsylvania State University

207 Electrical Engineering West

University Park, PA 16802

814-863-6740

Department of Computer Science and Engineering

814-865-9505

Department of Electrical Engineering

814-865-7667