Dafang Zhang

According to our database1, Dafang Zhang authored at least 92 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach.
IEEE/ACM Trans. Netw., 2018

Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements.
IEEE/ACM Trans. Netw., 2018

On-Line Anomaly Detection With High Accuracy.
IEEE/ACM Trans. Netw., 2018

Cyberspace Security for Future Internet.
Security and Communication Networks, 2018

Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network.
IEEE Access, 2018

Graph based Tensor Recovery for Accurate Internet Anomaly Detection.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Fast Tensor Factorization for Accurate Internet Anomaly Detection.
IEEE/ACM Trans. Netw., 2017

Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion.
Security and Communication Networks, 2017

Energy-efficient fuzzy control model for GPU-accelerated packet classification.
Concurrency and Computation: Practice and Experience, 2017

Accurate traffic matrix completion based on multi-Gaussian models.
Computer Communications, 2017

Simultaneous Wireless Information and Power Transfer for Multi-hop Energy-Constrained Wireless Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Packet Classification Using Community Detection.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Effective and scalable repackaged application detection based on user interface.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
A splitting-after-merging approach to multi-FIB compression and fast refactoring in virtual routers.
Frontiers of IT & EE, 2016

An adaptive fault tolerance strategy for cloud storage.
TIIS, 2016

Mobile traffic identification based on application's network signature.
IJES, 2016

A robust low-overhead watermarking for field authentication of intellectual property cores.
Comput. Sci. Inf. Syst., 2016

Minimizing datacenter flow completion times with server-based flow scheduling.
Computer Networks, 2016

Robust Spatio-temporal Tensor Recovery for Internet Traffic Data.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Deep Learning Approach to Android Malware Feature Learning and Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Rule Selector: A Novel Scalable Model for High-Performance Flow Recognition.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Power-Bandwidth Aware Cooperative Routing in Multi-radio Multi-channel Wireless Network.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Approach of Anti-Eavesdropping Linear Network Coding in Wireless Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Novel Secure Coding-Based Approach for Multi-cast Transmission.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
State-Driven Priority Scheduling Mechanisms for Driverless Vehicles Approaching Intersections.
IEEE Trans. Intelligent Transportation Systems, 2015

Detect repackaged Android application based on HTTP traffic similarity.
Security and Communication Networks, 2015

AndroGenerator: An automated and configurable android app network traffic generation system.
Security and Communication Networks, 2015

Memory-efficient IP lookup using trie merging for scalable virtual routers.
J. Network and Computer Applications, 2015

Signature Restoration for Enhancing Robustness of FPGA IP Designs.
IJISP, 2015

Improving datacenter throughput and robustness with Lazy TCP over packet spraying.
Computer Communications, 2015

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Fest: A feature extraction and selection tool for Android malware detection.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Android app recommendation approach based on network traffic measurement and analysis.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Spatio-temporal tensor completion for imputing missing internet traffic data.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

SFS: Server-based flow scheduling for minimizing datacenter flow completion times.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Intimacy-Based Algorithm for Social Network Community Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Distributed Joint Cooperative Routing and Channel Assignment in Multi-radio Wireless Mesh Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A GPU Based Fast Community Detection Implementation for Social Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Fast and Scalable Regular Expressions Matching with Multi-Stride Index NFA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Completion Time-Aware Flow Scheduling in Heterogenous Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Channel Aware Opportunistic Routing in Multi-Radio Multi-Channel Wireless Mesh Networks.
J. Comput. Sci. Technol., 2014

Opportunistic routing for multiple multicast flows in wireless mesh networks.
IJWMC, 2014

JORCA: joint opportunistic routing and channel assignment.
IJES, 2014

A memory-efficient parallel routing lookup model with fast updates.
Computer Communications, 2014

Network coding overhearing management policies based on data packet switching and sorting algorithm.
Proceedings of the International Conference on Smart Computing, 2014

Accelerate NDN name lookup using FPGA: Challenges and a scalable approach.
Proceedings of the 24th International Conference on Field Programmable Logic and Applications, 2014

From GPU to FPGA: A Pipelined Hierarchical Approach to Fast and Memory-Efficient NDN Name Lookup.
Proceedings of the 22nd IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2014

2013
A Multi-partitioning Approach to Building Fast and Accurate Counting Bloom Filters.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

An Efficient Update Mechanism for GPU-Based IP Lookup Engine Using Threaded Segment Tree.
Proceedings of the Frontiers in Internet Technologies, 2013

Analysis and Modeled Design of One State-Driven Autonomous Passing-Through Algorithm for Driverless Vehicles at Intersections.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

GAMT: A fast and scalable IP lookup engine for GPU-based software routers.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

Scalable TCAM-based regular expression matching with compressed finite automata.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
A Cooperative Routing Algorithm for Maximizing Network Lifetime.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Candidate Forwarder Set Based Channel Assignment for Opportunistic Routing in Multi-radio Wireless Mesh Networks.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
An index-split Bloom filter for deep packet inspection.
SCIENCE CHINA Information Sciences, 2011

A Simple Channel Assignment for Opportunistic Routing in Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2010
DHT-based lightweight broadcast algorithms in large-scale computing infrastructures.
Future Generation Comp. Syst., 2010

Accelerating the bit-split string matching algorithm using Bloom filters.
Computer Communications, 2010

A robust watermarking scheme for 3D point cloud models using self-similarity partition.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Toward accurate and efficient available bandwidth measurement.
Telecommunication Systems, 2009

Trading off logging overhead and coordinating overhead to achieve efficient rollback recovery.
Concurrency and Computation: Practice and Experience, 2009

A Token-based Broadcast Algorithm over DHT for Large-scale Computing Infrastructures.
Proceedings of the WINSYS 2009, 2009

A Regular Expression Matching Algorithm Using Transition Merging.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

An Activeness-Based Seed Choking Algorithm for Enhancing BitTorrent's Robustness.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

A Partition-Based Broadcast Algorithm over DHT for Large-Scale Computing Infrastructures.
Proceedings of the Advances in Grid and Pervasive Computing, 4th International Conference, 2009

2008
On Modeling and Accuracy Analysis of the Available Bandwidth Measurement Based-on Packet-pair Sampling.
IJCNS, 2008

Optimizing the BitTorrent performance using an adaptive peer selection strategy.
Future Generation Comp. Syst., 2008

Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Design and Implementation of a Network Behavior Analysis-Oriented IP Network Measurement System.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Performance Evaluation of End-to-End Path Capacity Measurement Tools in a Controlled Environment.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

Measurement and Evaluation Performance of Stream-Media Service Based on Active Measurement.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

2007
Reliable user-level rollback recovery implementation for multithreaded processes on windows.
Softw., Pract. Exper., 2007

On evaluating the differences of TCP and ICMP in network measurement.
Computer Communications, 2007

Self-Similar Characteristic of Traffic in Current Metro Area Network.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

A Scalable Bloom Filter for Membership Queries.
Proceedings of the Global Communications Conference, 2007

A Dynamic Quota-Based Peer Selection Strategy in BitTorrent.
Proceedings of the Grid and Cooperative Computing, 2007

A Coarse-Grained Pessimistic Message Logging Scheme for Improving Rollback Recovery Efficiency.
Proceedings of the Third IEEE International Symposium on Dependable, 2007

A Prediction-Based Fair Replication Algorithm in Structured P2P Systems.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data.
Proceedings of the SECRYPT 2006, 2006

A Resource Allocating Neural Network Based Approach for Detecting End-to-End Network Performance Anomaly.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

2005
Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

An Improved Scheme of Index-Based Checkpointing.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

TCP and ICMP in Network Measurement: An Experimental Evaluation.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Remote OS Fingerprinting Using BP Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

An Active Measurement Approach for Link Faults Monitoring in ISP Networks.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2004
WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Bounding Rollback-Recovery of Large Distributed Computation in WAN Environment.
Proceedings of the 13th Asian Test Symposium (ATS 2004), 2004

2003
User-Level Implementation of Checkpointing for Multithreaded Applications on Windows NT.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2001
Node Grouping in System-Level Fault Diagnosis.
J. Comput. Sci. Technol., 2001


  Loading...