Bingnan Hou

Orcid: 0000-0001-5862-7883

Affiliations:
  • National University of Defense Technology, Changsha, Hunan, China


According to our database1, Bingnan Hou authored at least 16 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
6Search: A reinforcement learning-based traceroute approach for efficient IPv6 topology discovery.
Comput. Networks, November, 2023

6Scan: A High-Efficiency Dynamic Internet-Wide IPv6 Scanner With Regional Encoding.
IEEE/ACM Trans. Netw., August, 2023

Search in the Expanse: Towards Active and Global IPv6 Hitlists.
Proceedings of the IEEE INFOCOM 2023, 2023

A Critical Server Security Protection Strategy Based on Traffic Log Analysis.
IAIC (3), 2023

2022
WiFi Indoor Location Based on Area Segmentation.
Sensors, 2022

6Graph: A graph-theoretic approach to address pattern mining for Internet-wide IPv6 scanning.
Comput. Networks, 2022

6Forest: An Ensemble Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the IEEE INFOCOM 2022, 2022

A Survey on IPv6 Security Threats and Defense Mechanisms.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Detection and Characterization of Network Anomalies in Large-Scale RTT Time Series.
IEEE Trans. Netw. Serv. Manag., 2021

DMatrix: Toward fast and accurate queries in graph stream.
Comput. Networks, 2021

2prong: Adaptive Video Streaming with DNN and MPC.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
ProbInfer: Probability-based AS path inference from multigraph perspective.
Comput. Networks, 2020

A Survey on the Classic Active Measurement Methods for IPv6.
Proceedings of the Theoretical Computer Science - 38th National Conference, 2020

2018
Survey on IMD and Wearable Devices Security Threats and Protection Methods.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018


  Loading...