Zhiping Cai

Orcid: 0000-0001-5726-833X

According to our database1, Zhiping Cai authored at least 211 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
STEdge: Self-Training Edge Detection With Multilayer Teaching and Regularization.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

Hierarchically Contrastive Hard Sample Mining for Graph Self-Supervised Pretraining.
IEEE Trans. Neural Networks Learn. Syst., November, 2024

RARE: Robust Masked Graph Autoencoder.
IEEE Trans. Knowl. Data Eng., October, 2024

Query-Adaptive Late Fusion for Hierarchical Fine-Grained Video-Text Retrieval.
IEEE Trans. Neural Networks Learn. Syst., May, 2024

Fixing the Double Agent Vulnerability of Deep Watermarking: A Patch-Level Solution Against Artwork Plagiarism.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Generative adversarial minority enlargement - A local linear over-sampling synthetic method.
Expert Syst. Appl., March, 2024

Multidocument Aspect Classification for Aspect-Based Abstractive Summarization.
IEEE Trans. Comput. Soc. Syst., February, 2024

FedSH: Towards Privacy-Preserving Text-Based Person Re-Identification.
IEEE Trans. Multim., 2024

SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing.
IEEE Trans. Inf. Forensics Secur., 2024

Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services.
Future Gener. Comput. Syst., 2024

A Sketch Framework for Fast, Accurate and Fine-Grained Analysis of Application Traffic.
Comput. J., 2024

DRL-Tomo: a deep reinforcement learning-based approach to augmented data generation for network tomography.
Comput. J., 2024

One-shot-but-not-degraded Federated Learning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Efficient IPv6 Router Interface Discovery.
Proceedings of the IEEE INFOCOM 2024, 2024

DiffusionEdge: Diffusion Probabilistic Model for Crisp Edge Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Text-Based Occluded Person Re-identification via Multi-Granularity Contrastive Consistency Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Attribute-Missing Graph Clustering Network.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Realizing Fine-Grained Inference of AS Path With a Generative Measurable Process.
IEEE/ACM Trans. Netw., December, 2023

RayMVSNet++: Learning Ray-Based 1D Implicit Fields for Accurate Multi-View Stereo.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery.
Comput. Networks, November, 2023

Using Multimodal Contrastive Knowledge Distillation for Video-Text Retrieval.
IEEE Trans. Circuits Syst. Video Technol., October, 2023

In Pursuit of Beauty: Aesthetic-Aware and Context-Adaptive Photo Selection in Crowdsensing.
IEEE Trans. Knowl. Data Eng., September, 2023

Turning backdoors for efficient privacy protection against image retrieval violations.
Inf. Process. Manag., September, 2023

6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding.
IEEE/ACM Trans. Netw., August, 2023

Enhancing Chinese Character Representation With Lattice-Aligned Attention.
IEEE Trans. Neural Networks Learn. Syst., July, 2023

A Game-Based Incentive-Driven Offloading Framework for Dispersed Computing.
IEEE Trans. Commun., July, 2023

Leveraging heuristic client selection for enhanced secure federated submodel learning.
Inf. Process. Manag., May, 2023

Privacy vs. Efficiency: Achieving Both Through Adaptive Hierarchical Federated Learning.
IEEE Trans. Parallel Distributed Syst., April, 2023

Dynamic Modeling Cross-Modal Interactions in Two-Phase Prediction for Entity-Relation Extraction.
IEEE Trans. Neural Networks Learn. Syst., March, 2023

Delving Into Crispness: Guided Label Refinement for Crisp Edge Detection.
IEEE Trans. Image Process., 2023

Inspecting End-to-End Encrypted Communication Differentially for the Efficient Identification of Harmful Media.
IEEE Trans. Inf. Forensics Secur., 2023

Video Anomaly Detection via Visual Cloze Tests.
IEEE Trans. Inf. Forensics Secur., 2023

Time2State: An Unsupervised Framework for Inferring the Latent States in Time Series Data.
Proc. ACM Manag. Data, 2023

Adaptive multi-feature fusion via cross-entropy normalization for effective image retrieval.
Inf. Process. Manag., 2023

Seeing is believing: Towards interactive visual exploration of data privacy in federated learning.
Inf. Process. Manag., 2023

From Eye to Brain: A Proactive and Distributed Crowdsensing Framework for Federated Learning.
IEEE Internet Things J., 2023

RARE: Robust Masked Graph Autoencoder.
CoRR, 2023

Revisiting Initializing Then Refining: An Incomplete and Missing Graph Imputation Network.
CoRR, 2023

IRWArt: Levering Watermarking Performance for Protecting High-quality Artwork Images.
Proceedings of the ACM Web Conference 2023, 2023

Region-SMOTE: A New Over-Sampling Method in Imbalanced Data Sets Learning.
Proceedings of the Theoretical Computer Science - 41st National Conference, 2023

Search in the Expanse: Towards Active and Global IPv6 Hitlists.
Proceedings of the IEEE INFOCOM 2023, 2023

Consensus One-step Multi-view Subspace Clustering (Extended abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Tracking Targets in Hyper-Scale Cameras Using Movement Predication.
Proceedings of the IEEE International Conference on Acoustics, 2023

Efficient Personalized Federated Learning on Selective Model Training.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Critical Server Security Protection Strategy Based on Traffic Log Analysis.
IAIC (3), 2023

The Security and Privacy Concerns on Metaverse.
IAIC (3), 2023

NEF: Neural Edge Fields for 3D Parametric Curve Reconstruction from Multi-View Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

A Comparison Study of the Compatibility Approaches for SGX Enclaves.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
A privacy-preserving content-based image retrieval method based on deep learning in cloud computing.
Expert Syst. Appl., October, 2022

TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection.
IEEE Trans. Netw. Serv. Manag., 2022

Consensus One-Step Multi-View Subspace Clustering.
IEEE Trans. Knowl. Data Eng., 2022

Multi-View Spectral Clustering With High-Order Optimal Neighborhood Laplacian Matrix.
IEEE Trans. Knowl. Data Eng., 2022

Joint-attention feature fusion network and dual-adaptive NMS for object detection.
Knowl. Based Syst., 2022

EviChain: A scalable blockchain for accountable intelligent surveillance systems.
Int. J. Intell. Syst., 2022

PARA: Performability-aware resource allocation on the edges for cloud-native services.
Int. J. Intell. Syst., 2022

Partial Selfish Mining for More Profits.
CoRR, 2022

STEdge: Self-training Edge Detection with Multi-layer Teaching and Regularization.
CoRR, 2022

Towards differential access control and privacy-preserving for secure media data sharing in the cloud.
Comput. Secur., 2022

6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning.
Comput. Networks, 2022

Never Too Late: Tracing and Mitigating Backdoor Attacks in Federated Learning.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Deep Transfer Learning Based Risk Prediction Model for Infectious Disease.
Proceedings of the Theoretical Computer Science - 40th National Conference, 2022

Effective Video Abnormal Event Detection by Learning A Consistency-Aware High-Level Feature Extractor.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Opportunistic Backdoor Attacks: Exploring Human-imperceptible Vulnerabilities on Speech Recognition Systems.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

6Forest: An Ensemble Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the IEEE INFOCOM 2022, 2022

Initializing Then Refining: A Simple Graph Attribute Imputation Network.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Detecting Anomalous Events from Unlabeled Videos via Temporal Masked Auto-Encoding.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

A Survey on IPv6 Security Threats and Defense Mechanisms.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Discovering Truth in Mobile Crowdsensing with Differential Location Privacy.
Proceedings of the IEEE Global Communications Conference, 2022

Guiding Abstractive Dialogue Summarization with Content Planning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Deep Anomaly Discovery from Unlabeled Videos via Normality Advantage and Self-Paced Refinement.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
RepNet: Cutting Latency with Flow Replication in Data Center Networks.
IEEE Trans. Serv. Comput., 2021

Detection and Characterization of Network Anomalies in Large-Scale RTT Time Series.
IEEE Trans. Netw. Serv. Manag., 2021

A Utility Model for Photo Selection in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

Centipede: Leveraging the Distributed Camera Crowd for Cooperative Video Data Storage.
IEEE Internet Things J., 2021

Resolving Multitask Competition for Constrained Resources in Dispersed Computing: A Bilateral Matching Game.
IEEE Internet Things J., 2021

The Crowd Wisdom for Location Privacy of Crowdsensing Photos: Spear or Shield?
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

PREFER: Point-of-interest REcommendation with efficiency and privacy-preservation via Federated Edge leaRning.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain.
Int. J. Intell. Syst., 2021

SmartStore: A blockchain and clustering based intelligent edge storage system with fairness and resilience.
Int. J. Intell. Syst., 2021

Video Abnormal Event Detection by Learning to Complete Visual Cloze Tests.
CoRR, 2021

Sensing Anomalies like Humans: A Hominine Framework to Detect Abnormal Events from Unlabeled Videos.
CoRR, 2021

DMatrix: Toward fast and accurate queries in graph stream.
Comput. Networks, 2021

2prong: Adaptive Video Streaming with DNN and MPC.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Leveraging blockchain for cross-institution data sharing and authentication in mobile healthcare.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

FedCav: Contribution-aware Model Aggregation on Distributed Heterogeneous Data in Federated Learning.
Proceedings of the ICPP 2021: 50th International Conference on Parallel Processing, Lemont, IL, USA, August 9, 2021

Leveraging Multi-granularity Heterogeneous Graph for Chinese Electronic Medical Records Summarization.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

TSAEns: Ensemble Learning for KPI Anomaly Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

SmashEx: Smashing SGX Enclaves Using Exceptions.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Deep Fusion Clustering Network.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Dynamic Modeling Cross- and Self-Lattice Attention Network for Chinese NER.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Computation-Efficient Offloading and Trajectory Scheduling for Multi-UAV Assisted Mobile Edge Computing.
IEEE Trans. Veh. Technol., 2020

Unsupervised Online Anomaly Detection With Parameter Adaptation for KPI Abrupt Changes.
IEEE Trans. Netw. Serv. Manag., 2020

Adaptive Weighted Graph Fusion Incomplete Multi-View Subspace Clustering.
Sensors, 2020

Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks.
J. Parallel Distributed Comput., 2020

Toward Energy-Aware Caching for Intelligent Connected Vehicles.
IEEE Internet Things J., 2020

Archipelago: A Medical Distributed Storage System for Interconnected Health.
IEEE Internet Comput., 2020

ProbInfer: Probability-based AS path inference from multigraph perspective.
Comput. Networks, 2020

Application of Graph Neural Network in Automatic Text Summarization.
Proceedings of the Theoretical Computer Science - 38th National Conference, 2020

A Survey on the Classic Active Measurement Methods for IPv6.
Proceedings of the Theoretical Computer Science - 38th National Conference, 2020

Cloze Test Helps: Effective Video Anomaly Detection via Learning to Complete Video Events.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Modeling Dense Cross-Modal Interactions for Joint Entity-Relation Extraction.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

FEEL: A Federated Edge Learning System for Efficient and Privacy-Preserving Mobile Healthcare.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

A Distributed Storage System for Robust, Privacy-Preserving Surveillance Cameras.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Edge-enabled Disaster Rescue: A Case Study of Searching for Missing People.
ACM Trans. Intell. Syst. Technol., 2019

Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier.
Secur. Commun. Networks, 2019

LTE Phone Number Catcher: A Practical Attack against Mobile Privacy.
Secur. Commun. Networks, 2019

A Survey on Edge Computing Systems and Tools.
Proc. IEEE, 2019

Adversarial training based lattice LSTM for Chinese clinical named entity recognition.
J. Biomed. Informatics, 2019

Adaptive duty cycle control-based opportunistic routing scheme to reduce delay in cyber physical systems.
Int. J. Distributed Sens. Networks, 2019

A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities.
Future Gener. Comput. Syst., 2019

Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things.
IEEE Access, 2019

Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Discovering New Sensitive Words Based on Sensitive Information Categorization.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks.
Sensors, 2018

Adding Active Slot Joint Larger Broadcast Radius for Fast Code Dissemination in WSNs.
Sensors, 2018

A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs.
Sensors, 2018

An Effective Delay Reduction Approach through a Portion of Nodes with a Larger Duty Cycle for Industrial WSNs.
Sensors, 2018

Minimizing Delay and Transmission Times with Long Lifetime in Code Dissemination Scheme for High Loss Ratio and Low Duty Cycle Wireless Sensor Networks.
Sensors, 2018

Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks.
Sensors, 2018

An Energy Conserving and Transmission Radius Adaptive Scheme to Optimize Performance of Energy Harvesting Sensor Networks.
Sensors, 2018

Caching Joint Shortcut Routing to Improve Quality of Service for Information-Centric Networking.
Sensors, 2018

Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.
Sensors, 2018

A Survey on Security-Aware Measurement in SDN.
Secur. Commun. Networks, 2018

Security and Privacy in the Medical Internet of Things: A Review.
Secur. Commun. Networks, 2018

Network Security and Management in SDN.
Secur. Commun. Networks, 2018

Minimum-cost mobile crowdsourcing with QoS guarantee using matrix completion technique.
Pervasive Mob. Comput., 2018

LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks.
J. Comput. Sci. Technol., 2018

Location Privacy-Preserving Data Recovery for Mobile Crowdsensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Reliable Code Disseminations Through Opportunistic Communication in Vehicular Wireless Networks.
IEEE Access, 2018

Privacy-Preserving Protocol for Sink Node Location in Telemedicine Networks.
IEEE Access, 2018

Orchestrating Data as a Services-Based Computing and Communication Model for Information-Centric Internet of Things.
IEEE Access, 2018

From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Localized Incomplete Multiple Kernel k-means.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Genetic Algorithm Based Method of Early Warning Rule Mining for Student Performance Prediction.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System.
IEEE/ACM Trans. Netw., 2017

Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement.
IEEE/ACM Trans. Netw., 2017

Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders.
Secur. Commun. Networks, 2017

一种SDN网络路径异常监控方法 (Method of Software Defined Network Path Abnormity Monitoring).
计算机科学, 2017

FIDC: A framework for improving data credibility in mobile crowdsensing.
Comput. Networks, 2017

Edge-based Content-aware Crowdsourcing Approach for Image Sensing in Disaster Environment.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Session-Based Network Intrusion Detection Using a Deep Learning Architecture.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

Detecting Rogue AP with the Crowd Wisdom.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A survey of data mining technology on electronic medical records.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks.
Wirel. Networks, 2016

Providing flexible services for heterogeneous vehicles: an NFV-based approach.
IEEE Netw., 2016

A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard.
IEEE Netw., 2016

Applying a new localized generalization error model to design neural networks trained with extreme learning machine.
Neural Comput. Appl., 2016

A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks.
Int. J. Auton. Adapt. Commun. Syst., 2016

Machine Learning Combining with Visualization for Intrusion Detection: A Survey.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

Leveraging Crowd to improve data credibility for mobile crowdsensing.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Optimized Virtual Network Functions Migration for NFV.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Improving Data Credibility for Mobile Crowdsensing with Clustering and Logical Reasoning.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Efficient Distributed Joint Detection of Widespread Events in Large Networked Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Reasonably Migrating Virtual Machine in NFV-Featured Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Algorithms to speedup pattern matching for network intrusion detection systems.
Comput. Commun., 2015

Towards security-aware virtual network embedding.
Comput. Networks, 2015

WAlloc: An efficient wear-aware allocator for non-volatile main memory.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Real-time micro-vibration measurement with laser phase modulation.
Proceedings of the International Conference on Communications, 2015

2014
RepFlow on node.js: Cutting Tail Latency in Data Center Networks at the Applications Layer.
CoRR, 2014

Using multiple unmanned aerial vehicles to maintain connectivity of MANETs.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Security-aware virtual network embedding.
Proceedings of the IEEE International Conference on Communications, 2014

2013
FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs.
IEEE Trans. Wirel. Commun., 2013

A demand-driven virtual disk prefetch mechanism for seamless mobility of personal computing environments.
J. Supercomput., 2013

A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering.
IEEE Trans. Computers, 2013

Extreme Learning Machines.
IEEE Intell. Syst., 2013

Low Latency Datacenter Networking: A Short Survey.
CoRR, 2013

2012
Fiber Sensor Systems Based on Fiber Laser and Microwave Photonic Technologies.
Sensors, 2012

Multicast Service-Oriented Virtual Network Embedding in Wireless Mesh Networks.
IEEE Commun. Lett., 2012

ISAR: Improved Situation-Aware Routing Method for Wireless Mesh Backbones.
IEEE Commun. Lett., 2012

Flow level detection and filtering of low-rate DDoS.
Comput. Networks, 2012

Sampling Attack against Active Learning in Adversarial Environment.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

2011
Active Learning to Defend Poisoning Attack against Semi-Supervised Intrusion Detection Classifier.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2011

Novel L-band multiwavelength raman fiber laser based on three-stage mixed-cascaded phosphor-silicate Raman process.
Proceedings of the 2011 International Conference on Advanced Infocom Technology, 2011

2010
RRED: robust RED algorithm to counter low-rate denial-of-service attacks.
IEEE Commun. Lett., 2010

A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Misleading Attack against Semi-supervised Learning for Intrusion Detection.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Distributed TCAM Coprocessor Architecture for Integrated Policy Filtering and Content Filtering.
Proceedings of IEEE International Conference on Communications, 2010

Virtual Network Embedding for Evolving Networks.
Proceedings of the Global Communications Conference, 2010

2009
DPM: A Demand-driven Virtual Disk Prefetch Mechanism for Mobile Personal Computing Environments.
Proceedings of the NPC 2009, 2009

Virtual Disk Image Reclamation for Software Updates in Virtual Machine Environments.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

DDoS Attack Detection Using IP Address Feature Interaction.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

Fast, On-Demand Software Deployment with Lightweight, Independent Virtual Disk Images.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
Proceedings of the Security Technology, 2009

Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Algorithm Using IP Address Features.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

2008
Efficient disk encryption and verification through trusted nonce.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Distributed Algorithm to Approximate Node-Weighted Minimum alpha-Connected (Theta, k)-Coverage in Dense Sensor Networks.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Directed filter for dominant direction fuzzy set in content-based image retrieval.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Texture Analysis Using Modified Computational Model of Grating Cells in Content-Based Medical Image Retrieval.
Proceedings of the Medical Imaging and Informatics, 2nd International Conference, 2007

2005
Research on Risk Probability Estimating Using Fuzzy Clustering for Dynamic Security Assessment.
Proceedings of the Rough Sets, 2005

Distributed Active Measuring Link Bandwidth in IP Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Efficiently Passive Monitoring Flow Bandwidth.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Using Passive Measuring to Calibrate Active Measuring Latency.
Proceedings of the Information Networking, 2005

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Algorithm.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Passive Calibration of Active Measuring Latency.
Proceedings of the Networking, 2005

On the Placement of Active Monitor in IP Network.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Efficiently monitoring link bandwidth in IP networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

On a Novel Methodology for Estimating Available Bandwidth Along Network Paths.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On a Novel Filtering Mechanism for Capacity Estimation: Extended Version.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

An Approximation Algorithm for Weak Vertex Cover Problem in Network Management.
Proceedings of the Algorithmic Applications in Management, First International Conference, 2005

2004
The Analysis of Efficient Monitoring Grid Traffic with Flow Conservation Equation.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...