Yujun Zhang

Orcid: 0000-0001-7705-8778

Affiliations:
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (PhD 2004)


According to our database1, Yujun Zhang authored at least 68 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhance Graph Alignment for Large Language Models.
CoRR, 2024

LoWAR: Enhancing RDMA over Lossy WANs with Transparent Error Correction.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

RADD: A Real-Time and Accurate Method for DDoS Detection Based on In-Network Computing.
Proceedings of the IEEE International Conference on Communications, 2024

Spectral-Based Graph Neural Networks for Complementary Item Recommendation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
NetShield: An in-network architecture against byzantine failures in distributed deep learning.
Comput. Networks, December, 2023

Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2023

NetGPT: Generative Pretrained Transformer for Network Traffic.
CoRR, 2023

Multi-Layer Collaborative Bandit for Multivariate Time Series Anomaly Detection.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

A Heuristic Online Algorithm for Routing in Large-Scale Deterministic Networks.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Packet Representation Learning for Traffic Classification.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Dual-track Protocol Reverse Analysis Based on Share Learning.
Proceedings of the IEEE INFOCOM 2022, 2022

Domain-Aware Federated Social Bot Detection with Multi-Relational Graph Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

Accelerating Traffic Engineering in Segment Routing Networks: A Data-driven Approach.
Proceedings of the IEEE International Conference on Communications, 2022

A Safe Training Approach for Deep Reinforcement Learning-based Traffic Engineering.
Proceedings of the IEEE International Conference on Communications, 2022

A High-performance FPGA-based Accelerator for Gradient Compression.
Proceedings of the Data Compression Conference, 2022

2021
Interactive Anomaly Detection in Dynamic Communication Networks.
IEEE/ACM Trans. Netw., 2021

Enforcing Access Control in Information-Centric Edge Networking.
IEEE Trans. Commun., 2021

Semi-supervised anomaly detection in dynamic communication networks.
Inf. Sci., 2021

Towards In-Network Compact Representation: Mergeable Counting Bloom Filter Vis Cuckoo Scheduling.
IEEE Access, 2021

Teaching Path to Improve the Practical Ability of Postgraduates Majored in Data Engineering in Minority Nationality Regions.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2020
Adaptive In-network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge.
CoRR, 2020

PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing.
Comput. Commun., 2020

Adaptive Slide Window-Based Feature Cognition for Deceptive Information Identification.
IEEE Access, 2020

A Secure Session Key Negotiation Scheme in WPA2-PSK Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Towards Efficient Secure Aggregation for Model Update in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Towards privacy preserving social recommendation under personalized privacy settings.
World Wide Web, 2019

A High-Reliability Multi-Faceted Reputation Evaluation Mechanism for Online Services.
IEEE Trans. Serv. Comput., 2019

L-Seg: An end-to-end unified framework for multi-lesion segmentation of fundus images.
Neurocomputing, 2019

BTS-DSN: Deeply supervised neural network with short connections for retinal vessel segmentation.
Int. J. Medical Informatics, 2019

PQ-MAC: Exploiting Bidirectional Transmission Opportunities via Leveraging Peers' Queuing Information for Full-Duplex WLAN.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Dynamic Slide Window-Based Feature Scoring and Extraction for On-Line Rumor Detection with CNN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Enabling Blockchain Applications Over Named Data Networking.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Detection Performance of Packet Arrival under Downclocking for Mobile Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Personalized Privacy-Preserving Social Recommendation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Exploiting Emotion on Reviews for Recommender Systems.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Modeling and performance analysis of RI-MAC under a star topology.
Comput. Commun., 2017

WA-MAC: A weather adaptive MAC protocol in survivability-heterogeneous wireless sensor networks.
Ad Hoc Networks, 2017

CSMA/CQ: A Novel SDN-Based Design to Enable Concurrent Execution of Channel Contention and Data Transmission in IEEE 802.11 Networks.
IEEE Access, 2017

Towards Access Control for Network Coding-Based Named Data Networking.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET.
IEEE Trans. Veh. Technol., 2016

What If Routers Are Malicious? Mitigating Content Poisoning Attack in NDN.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Privacy-Preserving Query Log Sharing Based on Prior N-Word Aggregation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Limited space oriented optimized storage protocol in autonomous mobile cloud.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Adaptively modeling multi-feature preferences for personalized search.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

PacketUsher: A DPDK-based packet I/O engine for commodity PC.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

2015
ELDA: Towards efficient and lightweight detection of cache pollution attacks in NDN.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

2014
Access Points Planning in Urban Area for Data Dissemination to Drivers.
IEEE Trans. Veh. Technol., 2014

TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks.
Ad Hoc Networks, 2014

A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

An Accurate and Multi-faceted Reputation Scheme for Cloud Computing.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
Broadcast-First Service Scheduling Scheme for Vehicle-Roadside Communication.
Wirel. Pers. Commun., 2013

A reputation based incentive mechanism for selfish BitTorrent system.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Design and performance study of a Topology-Hiding Multipath Routing protocol for mobile ad hoc networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Modeling and analysis of PeerTrust-like trust mechanisms in P2P Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
GOT: Grid-Based On-Road Localization through Inter-Vehicle Collaboration.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

A Mobile Agent Fault-Tolerant Method Based on the Ring Detection & Backup Chain for Mobile IPv6 Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Evaluation of Fast PMIPv6 and Transient Binding PMIPv6 in Vertical Handover Environment.
Proceedings of IEEE International Conference on Communications, 2010

Odd for Even: A Selfishness Prevention File Swap Scheme for BitTorrent.
Proceedings of the Global Communications Conference, 2010

Selfishness-Aware Application-Layer Multicast.
Proceedings of the Global Communications Conference, 2010

2009
Selfishness-Aware Data-Driven Overlay Network.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
CPK-based fast authentication method in Mobile IPv6 networks.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Dynamic load balancing among multiple home agents for MIPv6.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Trust-Based Fast Authentication for Mobile IPv6 Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2006
A Fast Handover Solution for SIP-based Mobility.
Proceedings of the 2006 IEEE International Conference on Wireless and Mobile Computing, 2006

Hierarchical Protocol Description and Test Genration Method for Mobile IPv6 Testing.
Proceedings of IEEE International Conference on Communications, 2006

Identity-based Hierarchical Access Authentication in Mobile IPv6 Networks.
Proceedings of IEEE International Conference on Communications, 2006

2005
Formal Description of Mobile IPv6 Protocol.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005

2004
IPV6 Conformance Testing: Theory and Practice.
Proceedings of the Proceedings 2004 International Test Conference (ITC 2004), 2004


  Loading...