Da-Fang Zhang

Orcid: 0000-0003-0765-6857

Affiliations:
  • Hunan University, College of Computer Science and Electronic Engineering, Changsha, China
  • Hunan University, School of Software, Changsha, China
  • Hunan University, Changsha, China (PhD 1997)


According to our database1, Da-Fang Zhang authored at least 137 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Uncovering Malicious Accounts in Open Mobile Social Networks Using a Graph- and Text-Based Attention Fusion Algorithm.
IEEE Internet Things J., October, 2024

A Light-Weight and Robust Tensor Convolutional Autoencoder for Anomaly Detection.
IEEE Trans. Knowl. Data Eng., September, 2024

DMSTG: Dynamic Multiview Spatio-Temporal Networks for Traffic Forecasting.
IEEE Trans. Mob. Comput., June, 2024

DSTGCS: an intelligent dynamic spatial-temporal graph convolutional system for traffic flow prediction in ITS.
Soft Comput., May, 2024

QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS.
IEEE Trans. Computers, March, 2024

M$^{2}$STL: Multi-Range Multi-Level Spatial-Temporal Learning Model for Network Traffic Prediction.
IEEE Trans. Netw. Sci. Eng., 2024

Dynamic multi-scale spatial-temporal graph convolutional network for traffic flow prediction.
Future Gener. Comput. Syst., 2024

MaP: Increasing node capacity of programmable cloud gateways.
Comput. Networks, 2024

2023
Multi-graph fusion based graph convolutional networks for traffic prediction.
Comput. Commun., October, 2023

Spatial-Temporal Aware Inductive Graph Neural Network for C-ITS Data Recovery.
IEEE Trans. Intell. Transp. Syst., August, 2023

Neighbor Graph Based Tensor Recovery For Accurate Internet Anomaly Detection.
IEEE Trans. Parallel Distributed Syst., February, 2023

A Novel Spatial-Temporal Multi-Scale Alignment Graph Neural Network Security Model for Vehicles Prediction.
IEEE Trans. Intell. Transp. Syst., January, 2023

Tripartite Graph Aided Tensor Completion For Sparse Network Measurement.
IEEE Trans. Parallel Distributed Syst., 2023

FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks.
IEEE Access, 2023

LightNestle: Quick and Accurate Neural Sequential Tensor Completion via Meta Learning.
Proceedings of the IEEE INFOCOM 2023, 2023

Exploring Brain Connectivity with Spatial-Temporal Graph Neural Networks for Improved EEG Seizure Analysis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

DeepEAG: A deep learning-based hybrid framework for identifying epilepsy-associated genes using a stacking strategy.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning.
ACM Trans. Internet Techn., 2022

Multi-range bidirectional mask graph convolution based GRU networks for traffic prediction.
J. Syst. Archit., 2022

Multi-View Matrix Factorization for Sparse Mobile Crowdsensing.
IEEE Internet Things J., 2022

Graph learning-based spatial-temporal graph convolutional neural networks for traffic forecasting.
Connect. Sci., 2022

Order-preserved Tensor Completion For Accurate Network-wide Monitoring.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

NMMF-Stream: A Fast and Accurate Stream-Processing Scheme for Network Monitoring Data Recovery.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Efficiently Inferring Top-k Largest Monitoring Data Entries Based on Discrete Tensor Completion.
IEEE/ACM Trans. Netw., 2021

Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection.
IEEE Trans. Emerg. Top. Comput., 2021

Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems.
Inf. Sci., 2021

An efficient and DoS-resilient name lookup for NDN interest forwarding.
Connect. Sci., 2021

Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Research on the Application of Time and Space Prediction Method in Traffic Flow Prediction.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

Multivariate Time Series Forecasting exploiting Tensor Projection Embedding and Gated Memory Network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Low Cost Sparse Network Monitoring Based on Block Matrix Completion.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

CRFST-GCN: A Deeplearning Spatial-Temporal Frame to Predict Traffic Flow.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Secure Data Storage and Recovery in Industrial Blockchain Network Environments.
IEEE Trans. Ind. Informatics, 2020

Singular Spectrum Analysis for Local Differential Privacy of Classifications in the Smart Grid.
IEEE Internet Things J., 2020

Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment.
IEEE Internet Things J., 2020

A novel localised network coding-based overhearing strategy.
Int. J. Embed. Syst., 2020

A robust error control coding-based watermarking algorithm for FPGA IP protection.
Int. J. Embed. Syst., 2020

Neural Tensor Completion for Accurate Network Monitoring.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Accurate Recovery of Missing Network Measurement Data With Localized Tensor Completion.
IEEE/ACM Trans. Netw., 2019

A Hybrid Model for Short-Term Traffic Volume Prediction in Massive Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2019

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments.
Inf. Sci., 2019

RVH: Range-Vector Hash for Fast Online Packet Classification.
CoRR, 2019

A Secure Sign-On Protocol for Smart Homes over Named Data Networking.
IEEE Commun. Mag., 2019

PUF-Based Anonymous Authentication Scheme for Hardware Devices and IPs in Edge Computing Environment.
IEEE Access, 2019

Path Splitted and Energy Efficient Virtual Network Function Chains Embedding.
IEEE Access, 2019

Active Sparse Mobile Crowd Sensing Based on Matrix Completion.
Proceedings of the 2019 International Conference on Management of Data, 2019

Efficiently Inferring Top-k Elephant Flows based on Discrete Tensor Completion.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Longest Name Prefix Match on Multi-Core Processor.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Data Temperature-Aware Bloom Filters for Flash-Based Storage.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Dynamic Spatial-Temporal Graph Convolutional Neural Networks for Traffic Forecasting.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach.
IEEE/ACM Trans. Netw., 2018

Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements.
IEEE/ACM Trans. Netw., 2018

On-Line Anomaly Detection With High Accuracy.
IEEE/ACM Trans. Netw., 2018

Optimizing Multi-Dimensional Packet Classification for Multi-Core Systems.
J. Comput. Sci. Technol., 2018

Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network.
IEEE Access, 2018

A Leakage-Resilient FPGA-Based IP Identity Authentication Protocol.
Proceedings of the 2018 IEEE SmartWorld, 2018

CoDE: Fast Name Lookup and Update using Conflict-driven Encoding.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Graph based Tensor Recovery for Accurate Internet Anomaly Detection.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Local Tensor Completion Based on Locality Sensitive Hashing.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

High-Performance IPv6 Lookup with Real-Time Updates Using Hierarchical-Balanced Search Tree.
Proceedings of the IEEE Global Communications Conference, 2018

Study on IP Protection Techniques for Integrated Circuit in IOT Environment.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
Fast Tensor Factorization for Accurate Internet Anomaly Detection.
IEEE/ACM Trans. Netw., 2017

Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion.
Secur. Commun. Networks, 2017

Energy-efficient fuzzy control model for GPU-accelerated packet classification.
Concurr. Comput. Pract. Exp., 2017

Accurate traffic matrix completion based on multi-Gaussian models.
Comput. Commun., 2017

Simultaneous Wireless Information and Power Transfer for Multi-hop Energy-Constrained Wireless Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Packet Classification Using Community Detection.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Effective and scalable repackaged application detection based on user interface.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
A splitting-after-merging approach to multi-FIB compression and fast refactoring in virtual routers.
Frontiers Inf. Technol. Electron. Eng., 2016

Mobile traffic identification based on application's network signature.
Int. J. Embed. Syst., 2016

Minimizing datacenter flow completion times with server-based flow scheduling.
Comput. Networks, 2016

Robust Spatio-temporal Tensor Recovery for Internet Traffic Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Deep Learning Approach to Android Malware Feature Learning and Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless Network.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Approach of Anti-Eavesdropping Linear Network Coding in Wireless Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Novel Secure Coding-Based Approach for Multi-cast Transmission.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Detect repackaged Android application based on HTTP traffic similarity.
Secur. Commun. Networks, 2015

AndroGenerator: An automated and configurable android app network traffic generation system.
Secur. Commun. Networks, 2015

Memory-efficient IP lookup using trie merging for scalable virtual routers.
J. Netw. Comput. Appl., 2015

Signature Restoration for Enhancing Robustness of FPGA IP Designs.
Int. J. Inf. Secur. Priv., 2015

Improving datacenter throughput and robustness with Lazy TCP over packet spraying.
Comput. Commun., 2015

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Fest: A feature extraction and selection tool for Android malware detection.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Spatio-temporal tensor completion for imputing missing internet traffic data.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

SFS: Server-based flow scheduling for minimizing datacenter flow completion times.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Intimacy-Based Algorithm for Social Network Community Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Distributed Joint Cooperative Routing and Channel Assignment in Multi-radio Wireless Mesh Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A GPU Based Fast Community Detection Implementation for Social Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Completion Time-Aware Flow Scheduling in Heterogenous Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Channel Aware Opportunistic Routing in Multi-Radio Multi-Channel Wireless Mesh Networks.
J. Comput. Sci. Technol., 2014

Opportunistic routing for multiple multicast flows in wireless mesh networks.
Int. J. Wirel. Mob. Comput., 2014

JORCA: joint opportunistic routing and channel assignment.
Int. J. Embed. Syst., 2014

A memory-efficient parallel routing lookup model with fast updates.
Comput. Commun., 2014

Network coding overhearing management policies based on data packet switching and sorting algorithm.
Proceedings of the International Conference on Smart Computing, 2014

Accelerate NDN name lookup using FPGA: Challenges and a scalable approach.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

From GPU to FPGA: A Pipelined Hierarchical Approach to Fast and Memory-Efficient NDN Name Lookup.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

2013
A Multi-partitioning Approach to Building Fast and Accurate Counting Bloom Filters.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree.
Proceedings of the Frontiers in Internet Technologies, 2013

An IP Protection Algorithm by Watermarking Multiple Scan Chains Based on Minimum Correlation Degree of Vectors.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

GAMT: A fast and scalable IP lookup engine for GPU-based software routers.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

Scalable TCAM-based regular expression matching with compressed finite automata.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
A Cooperative Routing Algorithm for Maximizing Network Lifetime.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Candidate Forwarder Set Based Channel Assignment for Opportunistic Routing in Multi-radio Wireless Mesh Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
An index-split Bloom filter for deep packet inspection.
Sci. China Inf. Sci., 2011

A Simple Channel Assignment for Opportunistic Routing in Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2010
DHT-based lightweight broadcast algorithms in large-scale computing infrastructures.
Future Gener. Comput. Syst., 2010

Accelerating the bit-split string matching algorithm using Bloom filters.
Comput. Commun., 2010

A robust watermarking scheme for 3D point cloud models using self-similarity partition.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Toward accurate and efficient available bandwidth measurement.
Telecommun. Syst., 2009

A Token-based Broadcast Algorithm over DHT for Large-scale Computing Infrastructures.
Proceedings of the WINSYS 2009, 2009

A Regular Expression Matching Algorithm Using Transition Merging.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

A Partition-Based Broadcast Algorithm over DHT for Large-Scale Computing Infrastructures.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

2008
Optimizing the BitTorrent performance using an adaptive peer selection strategy.
Future Gener. Comput. Syst., 2008

Design and Implementation of a Network Behavior Analysis-Oriented IP Network Measurement System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Performance Evaluation of End-to-End Path Capacity Measurement Tools in a Controlled Environment.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

Measurement and Evaluation Performance of Stream-Media Service Based on Active Measurement.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

2007
Reliable user-level rollback recovery implementation for multithreaded processes on windows.
Softw. Pract. Exp., 2007

On evaluating the differences of TCP and ICMP in network measurement.
Comput. Commun., 2007

Self-Similar Characteristic of Traffic in Current Metro Area Network.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

A Scalable Bloom Filter for Membership Queries.
Proceedings of the Global Communications Conference, 2007

A Dynamic Quota-Based Peer Selection Strategy in BitTorrent.
Proceedings of the Grid and Cooperative Computing, 2007

A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data.
Proceedings of the SECRYPT 2006, 2006

A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

2005
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

TCP and ICMP in Network Measurement: An Experimental Evaluation.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Remote OS Fingerprinting Using BP Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

An Active Measurement Approach for Link Faults Monitoring in ISP Networks.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2004
WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Bounding Rollback-Recovery of Large Distributed Computation in WAN Environment.
Proceedings of the 13th Asian Test Symposium (ATS 2004), 2004

2003
User-Level Implementation of Checkpointing for Multithreaded Applications on Windows NT.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2001
Node Grouping in System-Level Fault Diagnosis.
J. Comput. Sci. Technol., 2001


  Loading...