Binxing Fang

According to our database1, Binxing Fang authored at least 250 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network.
IEEE Trans. Knowl. Data Eng., 2022

Improving Anomaly Detection with a Self-Supervised Task Based on Generative Adversarial Network.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things.
Wirel. Commun. Mob. Comput., 2021

Finding Route Hotspots in Large Labeled Networks.
IEEE Trans. Knowl. Data Eng., 2021

Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks.
Proceedings of the MSWiM '21: 24th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 22, 2021

D<sup>2</sup>Graph: An Efficient and Unified Out-of-Core Graph Computing Model.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
Scene text reading based cloud compliance access.
World Wide Web, 2020

Mining top-k sequential patterns in transaction database graphs.
World Wide Web, 2020

AFLPro: Direction sensitive fuzzing.
J. Inf. Secur. Appl., 2020

A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020

Hierarchically defining Internet of Things security: From CIA to CACA.
Int. J. Distributed Sens. Networks, 2020

First Step Towards Modeling Unbreakable Malware.
CoRR, 2020

Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology.
Comput. Commun., 2020

CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020

Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A secure domain name resolution and management architecture based on blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference.
Proceedings of the Computer Security - ESORICS 2020, 2020

QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
IAD: Interaction-Aware Diffusion Framework in Social Networks.
IEEE Trans. Knowl. Data Eng., 2019

Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism.
J. Supercomput., 2019

Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism.
J. Supercomput., 2019

Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Sensors, 2019

Enhancing stock market prediction with extended coupled hidden Markov model over multi-sourced data.
Knowl. Inf. Syst., 2019

Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019

Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things.
IEEE Internet Things J., 2019

DRAV: Detection and repair of data availability violations in Internet of Things.
Int. J. Distributed Sens. Networks, 2019

SAVM: A practical secure external approach for automated in-VM management.
Concurr. Comput. Pract. Exp., 2019

A competitive model of popularity prediction using correlation matrix.
Clust. Comput., 2019

MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction.
IEEE Access, 2019

Efficiently Approximating Top- $k$ Sequential Patterns in Transactional Graphs.
IEEE Access, 2019

IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SignalCookie: Discovering Guard Relays of Hidden Services in Parallel.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Modeling, Measuring, and Analyzing the Resolution Process of Popular Domains.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

EDCleaner: Data Cleaning for Entity Information in Social Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

AutoDE: Automated Vulnerability Discovery and Exploitation.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Understanding Information Diffusion via Heterogeneous Information Network Embeddings.
Proceedings of the Database Systems for Advanced Applications, 2019

PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs.
Proceedings of the Database Systems for Advanced Applications, 2019

FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

CoStock: A DeepFM Model for Stock Market Prediction with Attentional Embeddings.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

2018
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018

Security Measurement for Unknown Threats Based on Attack Preferences.
Secur. Commun. Networks, 2018

Improving stock market prediction via heterogeneous information fusion.
Knowl. Based Syst., 2018

Exploiting investors social network for stock prediction in China's market.
J. Comput. Sci., 2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018

Sapiens Chain: A Blockchain-based Cybersecurity Framework.
CoRR, 2018

Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method.
CoRR, 2018

Stock Market Prediction via Multi-Source Multiple Instance Learning.
IEEE Access, 2018

IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things.
IEEE Access, 2018

Individual Analysis Model and Related Research in Social Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

A flexible and efficient container-based NFV platform for middlebox networking.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Hashing Incomplete and Unordered Network Streams.
Proceedings of the Advances in Digital Forensics XIV, 2018

Insider Threat Detection with Deep Neural Network.
Proceedings of the Computational Science - ICCS 2018, 2018

Identifying the Propagation Sources of Stealth Worms.
Proceedings of the Computational Science - ICCS 2018, 2018

You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse.
Proceedings of the Computational Science - ICCS 2018, 2018

SLBot: A Serverless Botnet Based on Service Flux.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Predicting the Popularity of Online Content Based on the Weak Ties Theory.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Evaluation on Availability of Entity Information in Cyberspace.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Detection of Malicious Domain Names Based on Hidden Markov Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Topic Analysis Model for Online Social Network.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Virtual Community Detection Model and Related Research in Online Social Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Attributed Multi-layer Network Embedding.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Efficient and Private Set Intersection of Human Genomes.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

2017
Big Search in Cyberspace.
IEEE Trans. Knowl. Data Eng., 2017

Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach.
IEICE Trans. Inf. Syst., 2017

RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set.
Concurr. Comput. Pract. Exp., 2017

Succinct and practical greedy embedding for geometric routing.
Comput. Commun., 2017

SafeBox: A scheme for searching and sharing encrypted data in cloud applications.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Cloud Access Security Broker based approach for encrypted data search and sharing.
Proceedings of the 2017 International Conference on Computing, 2017

A closer look at Eclipse attacks against Tor hidden services.
Proceedings of the IEEE International Conference on Communications, 2017

An approximate search framework for big data.
Proceedings of the IEEE International Conference on Communications, 2017

Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Survey on Data Cleaning Methods in Cyberspace.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Predicting the Popularity of News Based on Competitive Matrix.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Efficient Revenue Maximization for Viral Marketing in Social Networks.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective.
Sci. Program., 2016

Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G.
Int. J. Commun. Syst., 2016

SNGR: Scalable Name-Based Geometric Routing for ICN.
IEICE Trans. Commun., 2016

Towards Route Dynamics in AS-Level Path Prediction.
IEICE Trans. Commun., 2016

Understanding information interactions in diffusion: an evolutionary game-theoretic perspective.
Frontiers Comput. Sci., 2016

Community-Based Recommendations: A Solution to the Vulnerability Problem.
Proceedings of the 12th International Conference on Semantics, Knowledge and Grids, 2016

A Recommendation System Based on Multi-attribute.
Proceedings of the 9th International Conference on Service Science, 2016

Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Understanding Information Diffusion under Interactions.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

An ICN-Oriented Name-Based Routing Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

StegoP2P: Oblivious user-driven unobservable communications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Geometric Routing on Flat Names for ICN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Predicting the topic influence trends in social media with multiple models.
Neurocomputing, 2014

A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis.
Appl. Artif. Intell., 2014

Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Online Detection of Concurrent Prefix Hijacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Forward Classification on Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

A Moving Target Framework to Improve Network Service Accessibility.
Proceedings of the 9th IEEE International Conference on Networking, 2014

A fast regular expression matching engine for NIDS applying prediction scheme.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Utility-based cooperative decision in cooperative authentication.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Quantifying AS-level routing policy changes.
Proceedings of the IEEE International Conference on Communications, 2014

EAC: A Framework of Authentication Property for the IOTs.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Detecting the run time attacks in the cloud with an evidence collection based approach.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things.
Proceedings of the Web Technologies and Applications, 2014

Combining Heterogenous Social and Geographical Information for Event Recommendation.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
A Measurement Study on the Topologies of BitTorrent Networks.
IEEE J. Sel. Areas Commun., 2013

T-YUN: Trustworthiness Verification and Audit on the Cloud Providers.
IEICE Trans. Inf. Syst., 2013

Data Spoofing Attacks by IPv6 Tunnels.
IEICE Trans. Commun., 2013

Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Proceedings of the Security and Privacy in Communication Networks, 2013

An empirical analysis of family in the Tor network.
Proceedings of IEEE International Conference on Communications, 2013

2012
An efficient anonymous communication protocol for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2012

A Large Scale Code Resolution Service Network in the Internet of Things.
Sensors, 2012

A novel logic-based automatic approach to constructing compliant security policies.
Sci. China Inf. Sci., 2012

SDFA: Series DFA for Memory-Efficient Regular Expression Matching.
Proceedings of the Implementation and Application of Automata, 2012

Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms.
Proceedings of the NETWORKING 2012, 2012

A Novel Dynamic Self-adaptive Framework for Network Security Evaluation.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Novel Cache Replacement Policy for ISP Merged CDN.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense.
Proceedings of IEEE International Conference on Communications, 2012

Base station location protection in wireless sensor networks: Attacks and defense.
Proceedings of IEEE International Conference on Communications, 2012

Understanding the topologies of BitTorrent networks: A measurement view.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A measurement.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Advanced triple-channel botnets: model and implementation.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Semantic surface representation of physical entity in the WEB of things.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A content delivery strategy based on resource popularity for P4P architecture.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A Prefiltering Approach to Regular Expression Matching for Network Security Systems.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection.
J. Networks, 2011

Exploring Social Relations for Personalized Tag Recommendation in Social Tagging Systems.
IEICE Trans. Inf. Syst., 2011

Parallelizing weighted frequency counting in high-speed network monitoring.
Comput. Commun., 2011

A Bayesian regularized neural network approach to short-term traffic speed prediction.
Proceedings of the IEEE International Conference on Systems, 2011

Improving matching performance of DPI traffic classifier.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

XunleiProbe: A Sensitive and Accurate Probing on a Large-Scale P2SP System.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Andbot: Towards Advanced Mobile Botnets.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Revisiting the swarm evolution: A long term perspective.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Towards Efficient Anonymous Communications in Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Performance evaluation of Xunlei peer-to-peer network: A measurement study.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs.
J. Comput., 2010

Unsupervised Tag Sense Disambiguation in Folksonomies.
J. Comput., 2010

Incorporating Relevance and Importance for Dynamic Ranking in Folksonomies.
J. Convergence Inf. Technol., 2010

Formalization and Quantitative Analysis of Controllability on Internet Information Security.
Int. J. Web Appl., 2010

Identifying High-Rate Flows Based on Sequential Sampling.
IEICE Trans. Inf. Syst., 2010

Exploring Web Partition in DHT-Based Distributed Web Crawling.
IEICE Trans. Inf. Syst., 2010

Efficient Distributed Web Crawling Utilizing Internet Resources.
IEICE Trans. Inf. Syst., 2010

Randomness Testing of Compressed Data
CoRR, 2010

Identifying heavy hitters in high-speed network monitoring.
Sci. China Inf. Sci., 2010

Information content security on the Internet: the control model and its evaluation.
Sci. China Inf. Sci., 2010

Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Speak the same language with your friends: augmenting tag recommenders with social relations.
Proceedings of the HT'10, 2010

A Pseudo-Random Number Generator Based on LZSS.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010

Ontology emergence from folksonomies.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Quantifying Information Leakage for Fully Probabilistic Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing.
IEICE Trans. Inf. Syst., 2009

Structure-independent disaster recovery: Concept, architecture and implementations.
Sci. China Ser. F Inf. Sci., 2009

An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Using Mixed and Hybrid TCP Probe Methods in Forward IP Paths Inference.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

A Novel Approach to Scan Detection on the Backbone.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Optimal Network Security Strengthening Using Attack-Defense Game Model.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Forwarding-Based Task Scheduling Algorithm for Distributed Web Crawling over DHTs.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Combining Similarity and Distribution Features to Match Attributes.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

The Block LZSS Compression Algorithm.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

2008
An Effective Anomaly Detection Method in SMTP Traffic.
Int. J. Netw. Secur., 2008

Incremental web page template detection.
Proceedings of the 17th International Conference on World Wide Web, 2008

Protecting Mobile Codes Using the Decentralized Label Model.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Scalable Framework of Network Traffic Identification.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Autonomic Grid Node Organization and Management in RNMS.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

On Destination Set in IP-Level Topology Measurement.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
How to construct secure proxy cryptosystem.
Inf. Sci., 2007

Towards an analysis of WonGoo performance.
Int. J. Pervasive Comput. Commun., 2007

A User-Habit Property: Haunting of Users in IP Networks.
IEICE Trans. Inf. Syst., 2007

TCM-KNN Algorithm for Supervised Network Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme.
Proceedings of the Advances in Neural Networks, 2007

LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods.
Proceedings of the IEEE International Conference on Network Protocols, 2007

An Email Geographic Path-Based Technique for Spam Filtering.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Network anomaly detection based on TCM-KNN algorithm.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack.
Internet Res., 2006

A parallel programming interface for out-of-core cluster applications.
Clust. Comput., 2006

Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments.
Sci. China Ser. F Inf. Sci., 2006

TTSF: A Novel Two-Tier Spam Filter.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Anomaly Detection in SMTP Traffic.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Model and Estimation of Worm Propagation Under Network Partition.
Proceedings of the Information Security Practice and Experience, 2006

A Counting-Based Method for Massive Spam Mail Classification.
Proceedings of the Information Security Practice and Experience, 2006

Adaptive Method for Monitoring Network and Early Detection of Internet Worms.
Proceedings of the Intelligence and Security Informatics, 2006

A traffic-classified technique for filtering spam from bulk delivery E-mails.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Traffic classification-based spam filter.
Proceedings of IEEE International Conference on Communications, 2006

A User Habit Based Approach to Detect and Quarantine Worms.
Proceedings of IEEE International Conference on Communications, 2006

Experimental Performance Study of a User Intensive and Large-scale Digital Library Framework.
Proceedings of the Second International Workshop on Document Image Analysis for Libraries (DIAL 2006), 2006

Distributed Group Membership Algorithm in Intrusion-Tolerant System.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

Grid Service Based Parallel Debugging Environment.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

User-Perceived Web QoS Measurement and Evaluation System.
Proceedings of the Frontiers of WWW Research and Development, 2006

Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
The wide window string matching algorithm.
Theor. Comput. Sci., 2005

Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement.
J. Comput. Sci. Technol., 2005

Heterogeneous Search in Unstructured Peer-to-Peer Networks.
IEEE Distributed Syst. Online, 2005

Techniques of IP Data Management in Network Address Resource platform.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Worm Detection in Large Scale Network by Traffic.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Distributed Architecture for Network Performance Measurement and Evaluation System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A New Approach to Automatically Detect Worms.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Building Scale-Free Overlay Mix Networks with Small-World Properties.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Biased Support Vector Machine Approach to Web Filtering.
Proceedings of the Pattern Recognition and Data Mining, 2005

A Worm Behavioral Approach to Susceptible Host Detection.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Assessment of Windows System Security Using Vulnerability Relationship Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

A New User-Habit Based Approach for Early Warning of Worms.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

Performance Analysis ofWonGoo System.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Intrusion detection system for high-speed network.
Comput. Commun., 2004

Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Linear Nondeterministic Dawg String Matching Algorithm.
Proceedings of the String Processing and Information Retrieval, 2004

A parallel out-of-core computing system using PVFS for Linux clusters.
Proceedings of the International Workshop on Storage Network Architecture and Parallel I/Os, 2004

Grid-Enabled Parallel Debugging Environment: A Portal Solution.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

WonGoo: A Peer-to-Peer Protocol for Anonymous Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

The Practice of I/O Optimizations for Out-of-Core Computation.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Explaining BitTorrent Traffic Self-Similarity.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Techniques in Mapping Router-Level Internet Topology from Multiple Vantage Points.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Multisite Resource Selection and Scheduling Algorithm on Computational Grid.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Anomaly Detection Using Fast SOFM.
Proceedings of the Grid and Cooperative Computing, 2004

Network Performance Measurement Methodologies in PGMS.
Proceedings of the Grid and Cooperative Computing, 2004

PGMS: A P2P-Based Grid Monitoring System.
Proceedings of the Grid and Cooperative Computing, 2004

Ad Hoc Debugging Environment for Grid Applications.
Proceedings of the Grid and Cooperative Computing, 2004

Measurement and Modeling of Large-Scale Peer-to-Peer Storage System.
Proceedings of the Grid and Cooperative Computing, 2004

Cocktail Search in Unstructured P2P Networks.
Proceedings of the Grid and Cooperative Computing, 2004

Developing a user-level middleware for out-of-core computation on Grids.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004


  Loading...