Da-Fang Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2023
Exploring Brain Connectivity with Spatial-Temporal Graph Neural Networks for Improved EEG Seizure Analysis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

DeepEAG: A deep learning-based hybrid framework for identifying epilepsy-associated genes using a stacking strategy.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2021
Research on the Application of Time and Space Prediction Method in Traffic Flow Prediction.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

2020
Adaptive Image Edge Extraction Based on Discrete Algorithm and Classical Canny Operator.
Symmetry, 2020

A robust error control coding-based watermarking algorithm for FPGA IP protection.
Int. J. Embed. Syst., 2020

V2V Online Data Offloading Method Based on Vehicle Mobility.
Proceedings of the Data Science, 2020

More Space may be Cheaper: Multi-Dimensional Resource Allocation for NVM-based Cloud Cache.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

2018
Cyberspace Security for Future Internet.
Secur. Commun. Networks, 2018

Study on IP Protection Techniques for Integrated Circuit in IOT Environment.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
Effective and scalable repackaged application detection based on user interface.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
An adaptive fault tolerance strategy for cloud storage.
KSII Trans. Internet Inf. Syst., 2016

Mobile traffic identification based on application's network signature.
Int. J. Embed. Syst., 2016

A robust low-overhead watermarking for field authentication of intellectual property cores.
Comput. Sci. Inf. Syst., 2016

A Deep Learning Approach to Android Malware Feature Learning and Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Rule Selector: A Novel Scalable Model for High-Performance Flow Recognition.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
State-Driven Priority Scheduling Mechanisms for Driverless Vehicles Approaching Intersections.
IEEE Trans. Intell. Transp. Syst., 2015

Detect repackaged Android application based on HTTP traffic similarity.
Secur. Commun. Networks, 2015

AndroGenerator: An automated and configurable android app network traffic generation system.
Secur. Commun. Networks, 2015

Signature Restoration for Enhancing Robustness of FPGA IP Designs.
Int. J. Inf. Secur. Priv., 2015

Improving datacenter throughput and robustness with Lazy TCP over packet spraying.
Comput. Commun., 2015

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Fest: A feature extraction and selection tool for Android malware detection.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

SFS: Server-based flow scheduling for minimizing datacenter flow completion times.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2013
Analysis and Modeled Design of One State-Driven Autonomous Passing-Through Algorithm for Driverless Vehicles at Intersections.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2011
An index-split Bloom filter for deep packet inspection.
Sci. China Inf. Sci., 2011

2010
DHT-based lightweight broadcast algorithms in large-scale computing infrastructures.
Future Gener. Comput. Syst., 2010

A robust watermarking scheme for 3D point cloud models using self-similarity partition.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A New Proof for the Undecidability of Context-Sensitive Synchronization-Sensitive Analysis.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
Toward accurate and efficient available bandwidth measurement.
Telecommun. Syst., 2009

Trading off logging overhead and coordinating overhead to achieve efficient rollback recovery.
Concurr. Comput. Pract. Exp., 2009

A Token-based Broadcast Algorithm over DHT for Large-scale Computing Infrastructures.
Proceedings of the WINSYS 2009, 2009

A Regular Expression Matching Algorithm Using Transition Merging.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Minimum Hop Routing Wireless Sensor Networks Based on Ensuring of Data Link Reliability.
Proceedings of the MSN 2009, 2009

An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

A Partition-Based Broadcast Algorithm over DHT for Large-Scale Computing Infrastructures.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

2008
On Modeling and Accuracy Analysis of the Available Bandwidth Measurement Based-on Packet-pair Sampling.
Int. J. Commun. Netw. Syst. Sci., 2008

Optimizing the BitTorrent performance using an adaptive peer selection strategy.
Future Gener. Comput. Syst., 2008

Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Performance Evaluation of End-to-End Path Capacity Measurement Tools in a Controlled Environment.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

2007
Reliable user-level rollback recovery implementation for multithreaded processes on windows.
Softw. Pract. Exp., 2007

A Dynamic Quota-Based Peer Selection Strategy in BitTorrent.
Proceedings of the Grid and Cooperative Computing, 2007

A Coarse-Grained Pessimistic Message Logging Scheme for Improving Rollback Recovery Efficiency.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data.
Proceedings of the SECRYPT 2006, 2006

2005
Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

An Improved Scheme of Index-Based Checkpointing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Remote OS Fingerprinting Using BP Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

2004
Bounding Rollback-Recovery of Large Distributed Computation in WAN Environment.
Proceedings of the 13th Asian Test Symposium (ATS 2004), 2004

2003
User-Level Implementation of Checkpointing for Multithreaded Applications on Windows NT.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003


  Loading...