Zhitang Li

Orcid: 0000-0002-4437-4405

According to our database1, Zhitang Li authored at least 94 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The optimal encroachment strategy of private-label considering the quality effort and platform's e-word-of-mouth.
Electron. Commer. Res., September, 2024

Effectiveness analysis of the data-driven strategy of AI chips supply chain considering blockchain traceability with capacity constraints.
Comput. Ind. Eng., 2024

2023
Who benefits from offline investment: an analysis of strategic interactions between e-book pricing and bookstores' investment.
Electron. Commer. Res., December, 2023

Impact of regulatory intervention on green technology and innovation investment of the NEV automaker.
Comput. Ind. Eng., October, 2023

2022
Manufacturers' integrated strategies for emission reduction and recycling: The role of government regulations.
Comput. Ind. Eng., 2022

The optimal integration strategy and authorization mechanism of AI chip with the architecture design capacity.
Comput. Ind. Eng., 2022

2021
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack.
IT Prof., 2021

2018
Three-dimensional histogram shifting for reversible data hiding.
Multim. Syst., 2018

2016
A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video.
Multim. Tools Appl., 2016

An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
A reversible video steganography algorithm for MVC based on motion vector.
Multim. Tools Appl., 2015

Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack.
Comput. J., 2015

A Steganography Algorithm Using Multidimensional Coefficient Matching for H.264/AVC.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

A Video Steganalysis Algorithm for H.264/AVC Based on the Markov Features.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

A Steganography Algorithm Based on ±1 DCT Coefficients for H.264/AVC.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

2014
Weibo: An Information-Driven Online Social Network.
Trans. Comput. Sci., 2014

A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC.
Multim. Tools Appl., 2014

A novel P2P IPTV system for IPv4/v6 networks.
Multim. Tools Appl., 2014

A Data Hiding Algorithm for 3D Videos Based on Inter-MBs.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

A video steganography algorithm for MVC without distortion drift.
Proceedings of the International Conference on Audio, 2014

A Wav-Audio Steganography Algorithm Based on Amplitude Modifying.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
A robust data hiding algorithm for H.264/AVC video streams.
J. Syst. Softw., 2013

2012
Reversible Data Hiding Scheme Based On H.264/AVC without Distortion Drift.
J. Softw., 2012

A Client/Server Based Mechanism to Prevent ARP Spoofing Attacks.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

Characterizing User Behavior in Weibo.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Forward or ignore: User behavior analysis and prediction on microblogging.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2011

A novel real-time aggregation method on network security events.
Kybernetes, 2011

Application of Singular Spectrum Analysis to the Noise Reduction of Intrusion Detection Alarms.
J. Comput., 2011

An Empirical Study of the Beezone System.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Sina Microblog: An Information-Driven Online Social Network.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift.
IEEE Trans. Circuits Syst. Video Technol., 2010

Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic.
J. Networks, 2010

The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection.
J. Networks, 2010

Measuring the botnet using the second character of bots.
J. Networks, 2010

A novel technique of recognising multi-stage attack behaviour.
Int. J. High Perform. Comput. Netw., 2010

2009
An Efficient Worm Defense System Based Signature Extraction.
Int. J. Distributed Sens. Networks, 2009

Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Security Evaluation Method Based on Host Resource Availability.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Dynamic Forensics Based on Intrusion Tolerance.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Measuring Botnet Size by Using URL and Collaborative MailServers.
Proceedings of the Fifth International Conference on Networking and Services, 2009

Using Simulation to Characterize Topology of Peer to Peer Botnets.
Proceedings of the International Conference on Computer Modeling and Simulation, 2009

A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

Measuring Peer-to-Peer Botnets Using Control Flow Stability.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Design, modeling and simulation of a novel directional MAC protocol for ad hoc networks.
Kybernetes, 2008

A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Methodology of Network Intrusion Detection System Penetration Testing.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A P2P E-commerce Related Network Security Issue: P2P Worm.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Processing Intrusion Detection Alerts in Large-scale Network.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

The Proposition and Certification of P2P Media Streaming Traffic Features.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

Mining Network Traffic for Worm Signature Extraction.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Fault-Tolerant Routing for P2P System with Structured Topology.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Measurement and Modeling Study of P2P IPTV Applications.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Automatic attack plan recognition from intrusion alerts.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Attack scenario construction with a new sequential mining technique.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Modified CCC for More Efficient Keyword Search in DHT-Based Peer-to-Peer Network.
Proceedings of the Third International Conference on Semantics, 2007

Proposion and Analysis of a TCP Feature of P2P Traffic.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Detecting Botnets by Analyzing DNS Traffic.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Towards Identifying True Threat from Network Security Data.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Discovering Novel Multistage Attack Patterns in Alert Streams.
Proceedings of the International Conference on Networking, 2007

Assessing Attack Threat by the Probability of Following Attacks.
Proceedings of the International Conference on Networking, 2007

A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS.
Proceedings of the International Conference on Networking, 2007

A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Learning attack strategies through mining and correlation of security alarms.
Proceedings of the Integrated Network Management, 2007

Real-Time Correlation of Network Security Alerts.
Proceedings of ICEBE 2007, 2007

Mining Attack Correlation Scenarios Based on Multi-agent System.
Proceedings of the Human Interface and the Management of Information. Methods, 2007

The Global Synthetical Processing of Network Security Events.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Reducing False Positives Based on Time Sequence Analysis.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Discovering Novel Multistage Attack Strategies.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

A Secure Routing Protocol for Mobile Ad hoc Networks.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A Fuzzy Anomaly Detection Algorithm for IPv6.
Proceedings of the 2006 International Conference on Semantics, 2006

Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid.
Proceedings of the ACM/IEEE SC2006 Conference on High Performance Networking and Computing, 2006

P2P Traffic Identification by TCP Flow Analysis.
Proceedings of the 2006 International Workshop on Networking, 2006

A novel technique of recognizing multi-stage attack behaviour.
Proceedings of the 2006 International Workshop on Networking, 2006

Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function.
Proceedings of the Intelligent Computing, 2006

A novel algorithm SF for mining attack scenarios model.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

Analysis And Classification of IPSec Security Policy Conflicts.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

State Machine Based CDMA Stress Testing Service System.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

2005
An Image Hiding Method Based on Correlation Analysis and Image Fusion.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Dependable Propagating Routing Information in MANET.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Dynamic immune intrusion detection system for IPv6.
Proceedings of the Data Mining, 2005

An Image Hiding Algorithm Based on Bit Plane.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A wavelet based distributed ID model.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005


  Loading...