H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 33 Citations 6,287 235 World Ranking 6725 National Ranking 3188

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Statistics

His primary areas of investigation include Computer network, Asynchronous Transfer Mode, Computer security, Wireless sensor network and Quality of service. His Computer network research is multidisciplinary, incorporating perspectives in Equilibrium point and Game theory. His work deals with themes such as Resource allocation, Packet switching, Asynchronous communication, Markov chain and Scheduling, which intersect with Asynchronous Transfer Mode.

His studies deal with areas such as Telecommunications, Adversarial machine learning and Denial-of-service attack as well as Computer security. His Denial-of-service attack course of study focuses on Flooding and The Internet. His study in Quality of service is interdisciplinary in nature, drawing from both Access network, Queueing theory, Throughput and Generalized processor sharing.

His most cited work include:

  • Effective bandwidths for multiclass Markov fluids and other ATM sources (510 citations)
  • Denial-of-service attack-detection techniques (306 citations)
  • Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid (255 citations)

What are the main themes of his work throughout his whole career to date?

George Kesidis focuses on Computer network, Distributed computing, Cloud computing, Artificial intelligence and Computer security. His Computer network research includes elements of Wireless ad hoc network and The Internet. His research integrates issues of Link-state routing protocol, Scheduling, Scalability and Dynamic Source Routing in his study of Distributed computing.

His Cloud computing study combines topics in areas such as Virtual machine, Resource allocation, Workload, Service provider and Server. The various areas that he examines in his Artificial intelligence study include Backdoor, Machine learning and Pattern recognition. His Computer security research is multidisciplinary, incorporating elements of Denial-of-service attack and Botnet.

He most often published in these fields:

  • Computer network (39.28%)
  • Distributed computing (18.94%)
  • Cloud computing (13.93%)

What were the highlights of his more recent work (between 2015-2021)?

  • Cloud computing (13.93%)
  • Server (8.91%)
  • Computer network (39.28%)

In recent papers he was focusing on the following fields of study:

George Kesidis mainly focuses on Cloud computing, Server, Computer network, Artificial intelligence and Distributed computing. His work carried out in the field of Cloud computing brings together such families of science as Virtual machine, Resource allocation, Computer security and Denial-of-service attack, The Internet. When carried out as part of a general The Internet research project, his work on Net neutrality is frequently linked to work in Neutrality, therefore connecting diverse disciplines of study.

George Kesidis interconnects Service provider, End user and Shared memory in the investigation of issues within Computer network. He has included themes like Machine learning, Backdoor and Pattern recognition in his Artificial intelligence study. His research in Distributed computing intersects with topics in Data center, Network topology, Scheduling and Proportionally fair.

Between 2015 and 2021, his most popular works were:

  • Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks (34 citations)
  • Exploiting Spot and Burstable Instances for Improving the Cost-efficacy of In-Memory Caches on the Public Cloud (29 citations)
  • PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing (25 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Statistics

His main research concerns Cloud computing, Artificial intelligence, Distributed computing, Classifier and Computer network. His Cloud computing research incorporates elements of Virtual machine, Resource allocation, Game theory and Backup. His biological study spans a wide range of topics, including Exploit, Machine learning and Pattern recognition.

His Distributed computing research integrates issues from Network topology, Latency, Data center and Cost efficacy. His Computer network research is mostly focused on the topic Server. The study incorporates disciplines such as Artificial neural network and Backdoor in addition to Anomaly detection.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Effective bandwidths for multiclass Markov fluids and other ATM sources

George Kesidis;Jean Walrand;Cheng-Shang Chang.
IEEE ACM Transactions on Networking (1993)

839 Citations

Denial-of-service attack-detection techniques

G. Carl;G. Kesidis;R.R. Brooks;Suresh Rai.
IEEE Internet Computing (2006)

486 Citations

Incentive-Based Energy Consumption Scheduling Algorithms for the Smart Grid

Stephane Caron;George Kesidis.
international conference on smart grid communications (2010)

337 Citations

Robust anomaly detection and regularized domain adaptation of classifiers with application to internet packet-flows

David J. Miller;George Kesidis;Jayaram Raghuram.
(2012)

249 Citations

Resource management in wide-area ATM networks using effective bandwidths

G. de Veciana;G. Kesidis;J. Walrand.
IEEE Journal on Selected Areas in Communications (1995)

219 Citations

Real-time packet traceback and associated packet marking strategies

Ihab Hamadeh;George Kesidis.
(2003)

182 Citations

Equilibria of a noncooperative game for heterogeneous users of an ALOHA network

Youngmi Jin;G. Kesidis.
IEEE Communications Letters (2002)

172 Citations

Admission control and routing in ATM networks using inferences from measured buffer occupancy

C. Courcoubetis;G. Kesidis;A. Ridder;A. Ridder;J. Walrand.
IEEE Transactions on Communications (1995)

165 Citations

Feasibility of fluid event-driven simulation for ATM networks

G. Kesidis;A. Singh;D. Cheung;W.W. Kwok.
global communications conference (1996)

147 Citations

Dynamic cluster structure for object detection and tracking in wireless ad-hoc sensor networks

Xiang ji;Hongyuan Zha;J.J. Metzner;G. Kesidis.
international conference on communications (2004)

140 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing George Kesidis

Massoud Pedram

Massoud Pedram

University of Southern California

Publications: 21

Don Towsley

Don Towsley

University of Massachusetts Amherst

Publications: 19

Yang Xiao

Yang Xiao

University of Alabama

Publications: 19

Cheng-Shang Chang

Cheng-Shang Chang

National Tsing Hua University

Publications: 19

Yanzhi Wang

Yanzhi Wang

Northeastern University

Publications: 18

Saswati Sarkar

Saswati Sarkar

University of Pennsylvania

Publications: 16

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 15

Nick Duffield

Nick Duffield

Texas A&M University

Publications: 14

Danny H. K. Tsang

Danny H. K. Tsang

Hong Kong University of Science and Technology

Publications: 14

Christos G. Panayiotou

Christos G. Panayiotou

University of Cyprus

Publications: 14

Kai Hwang

Kai Hwang

Chinese University of Hong Kong, Shenzhen

Publications: 13

Mung Chiang

Mung Chiang

Purdue University West Lafayette

Publications: 13

Christos G. Cassandras

Christos G. Cassandras

Boston University

Publications: 13

Wanlei Zhou

Wanlei Zhou

City University of Macau

Publications: 12

Zhu Han

Zhu Han

University of Houston

Publications: 12

Something went wrong. Please try again later.