Baokang Zhao

Orcid: 0000-0001-9200-9018

According to our database1, Baokang Zhao authored at least 154 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A multi-agent collaboration scheme for energy-efficient task scheduling in a 3D UAV-MEC space.
Frontiers Inf. Technol. Electron. Eng., June, 2024

Why and How Lasagna Works: A New Design of Air-Ground Integrated Infrastructure.
IEEE Netw., March, 2024

Toward identifying malicious encrypted traffic with a causality detection system.
J. Inf. Secur. Appl., February, 2024

ActiveGuardian: An accurate and efficient algorithm for identifying active elephant flows in network traffic.
J. Netw. Comput. Appl., 2024

Toward Intelligent Attack Detection with a Causal Explainable Method for Encrypting Traffic.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Metaheuristics optimization-based ensemble of deep neural networks for Mpox disease detection.
Neural Networks, October, 2023

Towards Intelligent Attack Detection Using DNA Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2023

MetaCity: An Edge Emulator with the Feature of Realistic Geospatial Support for Urban Computing.
Proceedings of the Data Science, 2023

Simulation for urban computing scenarios: An overview and research challenges.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Predictable Track-based Routing in Flying Ad hoc Networks.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

cUPFCard: High-Performance User Plane Function based on FPGA.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023

An edge computing emulator incorporating moving devices and geospatial characteristics.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023

2022
Event-Driven Computation Offloading in IoT With Edge Computing.
IEEE Trans. Wirel. Commun., 2022

Offset-FA: A Uniform Method to Handle Both Unbounded and Bounded Repetitions in Regular Expression Matching.
Sensors, 2022

Technology trends in large-scale high-efficiency network computing.
Frontiers Inf. Technol. Electron. Eng., 2022

An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance.
Comput. Networks, 2022

An Efficient Certificateless Authentication Scheme for Satellite Internet.
Proceedings of the IEEE International Conference on Trust, 2022

Applications of Reinforcement Learning in Virtual Network Function Placement: A Survey.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Robust Packet Classification with Field Missing.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Design and Practice of Virtual Experiments for Internet of Things Class.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

A 100Gbps User Plane Function Prototype Based on Programmable Switch for 5G Network.
Proceedings of the 6th Asia-Pacific Workshop on Networking, 2022

2021
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations.
IEEE Trans. Netw. Sci. Eng., 2021

An Intelligent Load Control-Based Random Access Scheme for Space-Based Internet of Things.
Sensors, 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021

A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

MPICC: Multi-Path INT-Based Congestion Control in Datacenter Networks.
Proceedings of the Network and Parallel Computing, 2021

CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting.
IEEE/ACM Trans. Netw., 2020

Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things.
Symmetry, 2020

A Deep Reinforcement Learning Based Approach for Energy-Efficient Channel Allocation in Satellite Internet of Things.
IEEE Access, 2020

Dynamic Channel Allocation for Satellite Internet of Things via Deep Reinforcement Learning.
Proceedings of the 2020 International Conference on Information Networking, 2020

ERID: A Deep Learning-based Approach Towards Efficient Real-Time Intrusion Detection for IoT.
Proceedings of the Eighth IEEE International Conference on Communications and Networking, 2020

2019
Towards Efficient Data Collection in Space-Based Internet of Things.
Sensors, 2019

Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: A Learning Method.
IEEE Internet Things J., 2019

Toward efficient authentication for space-air-ground integrated Internet of things.
Int. J. Distributed Sens. Networks, 2019

An Approximate Data Collection Algorithm in Space-Based Internet of Things.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

HyFabric: Minimizing FCT in Optical and Electrical Hybrid Data Center Networks.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

Cooperative Sensing in Cognitive Radio Ad Hoc Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Exploring the Gateway-Based Distributed Location Management Schemes in LEO Satellite Networks.
IEICE Trans. Commun., 2018

Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET.
IEEE Access, 2018

DETOUR: A Large-Scale Non-blocking Optical Data Center Fabric.
Proceedings of the Supercomputing Frontiers - 4th Asian Conference, 2018

Layer-weakening feature fusion network for remote sensing detection.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

2017
Supporting location/identity separation in mobility-enhanced satellite networks by virtual attachment point.
Pervasive Mob. Comput., 2017

A Space Information Service Forwarding Mechnism Based on Software Defined Network.
J. Internet Serv. Inf. Secur., 2017

Exploring the Reliable Multicast Transport of BGP in Geostationary Satellite Networks Based on Network Coding.
IEICE Trans. Commun., 2017

HERO: A Hybrid Electrical and Optical Multicast for Accelerating High-Performance Data Center Applications.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Poster: An Efficient Control Framework for Supporting the Future SDN/NFV-enabled Satellite Network.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

iCAST: Accelerating High-Performance Data Center Applications by Hybrid Electrical and Optical Multicast.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Ind. Electron., 2016

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016

P2P Traffic Optimization based on Congestion Distance and DHT.
J. Internet Serv. Inf. Secur., 2016

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics.
Int. J. Data Warehous. Min., 2016

A Real-Time Processing System for Anonymization of Mobile Core Network Traffic.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Novel Hybrid Architecture for High Speed Regular Expression Matching.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Security Analysis Oriented Physical Components Modeling in Quantum Key Distribution.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

MSN: a mobility-enhanced satellite network architecture: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Distributed mobility management in IP/LEO satellite networks.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

QKDFlow: QKD Based Secure Communication Towards the OpenFlow Interface in SDN.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

An Event Grouping Approach for Infinite Stream with Differential Privacy.
Proceedings of the Advances in Services Computing, 2016

2015
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs.
IEEE Trans. Parallel Distributed Syst., 2015

Mix-zones optimal deployment for protecting location privacy in VANET.
Peer-to-Peer Netw. Appl., 2015

Rollback Links Characterization for the Snapshot Routing Algorithm in Polar-Orbit Satellite Networks.
IEICE Trans. Commun., 2015

ISL Reassignment Based Snapshot Routing Optimization for Polar-Orbit LEO Satellite Networks.
IEICE Trans. Commun., 2015

A Quasi-Dynamic Inter-Satellite Link Reassignment Method for LEO Satellite Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

FFDP: A Full-Load File Delivery Protocol in Satellite Network Communication.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

FlyCast: Free-Space Optics Accelerating Multicast Communications in Physical Layer.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Providing adaptive quality of security in quantum networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Rollback Traffic Avoidance for Snapshot routing algorithm in cyclic mobile networks.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Poster: Avoiding Rollback Traffic during the Switch of Snapshot Routing in Cyclic Mobile Networks.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Improving the snapshot routing performance through reassigning the inter-satellite links.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

OpenSRN: A software-defined semantic routing network architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Towards efficient radio resource scheduling in LTE-based satellite mobile communication system.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Efficient Unsavory Data Detection Method for Internet Big Data.
Proceedings of the Information and Communication Technology, 2015

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution - Extended Abstract.
Proceedings of the Information and Communication Technology, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Tutorial on Quantum Key Distribution.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing.
Wirel. Pers. Commun., 2014

A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
J. Networks, 2014

A novel steganography approach for voice over IP.
J. Ambient Intell. Humaniz. Comput., 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014

Link Reassignment based Snapshot Partition for Polar-orbit LEO Satellite Networks.
CoRR, 2014

A Novel Resource-Efficient Privacy Amplification Scheme: Towards Ground-Satellite Quantum Key Distribution Post-processing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

NC-STP: A High Performance Network Coding Based Space Transport Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Time-efficient transient loops avoiding in snapshot routing algorithm.
Proceedings of the International Conference on Smart Computing, 2014

OpenSAN: a software-defined satellite network architecture.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

A Pipeline Optimization Model for QKD Post-processing System.
Proceedings of the Information and Communication Technology, 2014

Improving Availability through Energy-Saving Optimization in LEO Satellite Networks.
Proceedings of the Information and Communication Technology, 2014

A Semantic-Based Malware Detection System Design Based on Channels.
Proceedings of the Information and Communication Technology, 2014

An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources.
Proceedings of the Information and Communication Technology, 2014

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures.
Proceedings of the Information and Communication Technology, 2014

Software defined satellite networks: Benefits and challenges.
Proceedings of the IEEE Computers, 2014

Towards a Key Consuming Detection in QKD-VoIP Systems.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A High-Speed Network Content Filtering System.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A Structure P2P Based Web Services Registry with Access and Control.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Math. Comput. Model., 2013

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Math. Comput. Model., 2013

A Security Real-time Privacy Amplification Scheme in QKD System.
J. Univers. Comput. Sci., 2013

Guest Editorial: Special Issue on Advances in Internet Security and Technology.
J. Internet Serv. Inf. Secur., 2013

PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System.
Int. J. Distributed Sens. Networks, 2013

IBShare: A Novel InfiniBand Network Bandwidth Allocation for Cloud Datacenter.
IEICE Trans. Commun., 2013

Failure Microscope: Precisely Diagnosing Routing Instability.
IEICE Trans. Inf. Syst., 2013

Benefiting from the community structure in opportunistic forwarding.
Comput. Sci. Inf. Syst., 2013

Characterization of OSPF Convergence with Correlated Failures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center.
Proceedings of the 12th IEEE International Conference on Trust, 2013

SMC: A Shared Memory Based SpaceWire Controller Solution.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Location Management Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Qphone: a quantum security VoIP phone.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

A Novel Resource Allocation Heuristic for a Power Constrained Data Center.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Real-Time Privacy Amplification Scheme in Quantum Key Distribution.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Flexible multi-authority attribute-based signature schemes for expressive policy.
Mob. Inf. Syst., 2012

Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing.
IEICE Trans. Inf. Syst., 2012

Privacy aware publishing of successive location information in sensor networks.
Future Gener. Comput. Syst., 2012

ICTree: discovering the underlying connections of your rental virtual machines in the public clouds.
Comput. Syst. Sci. Eng., 2012

Towards efficient and practical network coding in delay tolerant networks.
Comput. Math. Appl., 2012

SARM: A Congestion Control Algorithm for DTN.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

CLIP: A Distributed Emulation Platform for Research on Information Reconciliation.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Following Routing: An Active Congestion Control Approach for Delay-Tolerant Networks.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Routing Algorithm Based on Ant Colony Optimization for DTN Congestion Control.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

CRASP: congestion control routing algorithm against selfish behavior based on pigeonhole principle in DTN.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analytic Goodput Model for TCP Incast.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Authenticating with Attributes in Online Social Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

VISOR: A Pratical VoIP Steganography Platform.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Protecting Router Forwarding Table in Space.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Shrew Attack in Cloud Data Center Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

One Leader at One Time: OLOT Routing in Delay Tolerant Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Multi-authority Attribute-Based Signature.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

NTC: Towards Efficient Network Coding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Building Practical Self Organization Networks on Heterogeneous Wireless Modems.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Formalization of an Emulation Based Co-designed Virtual Machine.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Snail Crawling: An Enhanced Method for DTNs Routing.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Thwarting audio steganography attacks in cloud storage systems.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming.
IEICE Trans. Inf. Syst., 2010

A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Ferry Route Design with Delay Bounds in Delay-Tolerant Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems.
Intell. Autom. Soft Comput., 2009

Automatic correction of non-uniform illumination for 3D surface heightmap reconstruction.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems.
Proceedings of the Fourteenth IEEE Internationl Conference on Embedded and Real-Time Computing Systems and Applications, 2008

Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems.
Proceedings of the Distributed Embedded Systems: Design, 2008

Towards Successive Privacy Protection in Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A Loop-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007


  Loading...