Guozhen Cheng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Improving 3D Reconstruction with Airborne Array-InSAR Images using a Capon-Based Sidelobe Reduction.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

A Security Containers Placement Algorithm Based on DQN for Microservices to Defend Against Co-Resident Threat.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Cushion: A proactive resource provisioning method to mitigate SLO violations for containerized microservices.
IET Commun., 2022

2020
Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment.
Future Gener. Comput. Syst., 2020

2019
Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional network properties.
Frontiers Inf. Technol. Electron. Eng., 2019

A Diversity Metric Based Study on the Correlation between Diversity and Security.
IEICE Trans. Inf. Syst., 2019

Improving the Routing Security in Software-Defined Networks.
IEEE Commun. Lett., 2019

Improving Resiliency of Software-Defined Networks with Network Coding-based Multipath Routing.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction.
Secur. Commun. Networks, 2018

Security Analysis of Dynamic SDN Architectures Based on Game Theory.
Secur. Commun. Networks, 2018

Scientific workflow execution system based on mimic defense in the cloud environment.
Frontiers Inf. Technol. Electron. Eng., 2018

Mimic defense: a designed-in cybersecurity defense framework.
IET Inf. Secur., 2018

2017
MNOS: a mimic network operating system for software defined networks.
IET Inf. Secur., 2017

Maximizing SDN control resource utilization via switch migration.
Comput. Networks, 2017

Game-Theoretic Analysis for Security of Various Software-Defined Networking (SDN) Architectures.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

The Best Defense Strategy against Session Hijacking Using Security Game in SDN.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
A Mechanism for Configurable Network Service Chaining and Its Implementation.
KSII Trans. Internet Inf. Syst., 2016

Dynamic switch migration towards a scalable SDN control plane.
Int. J. Commun. Syst., 2016

Secure virtual network embedding to mitigate the risk of covert channel attacks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

An intensive security architecture with multi-controller for SDN.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Towards Adaptive Network Nodes via Service Chain Construction.
IEEE Trans. Netw. Serv. Manag., 2015

Enabling network function combination via service chain instantiation.
Comput. Networks, 2015

DHA: Distributed decisions on the switch migration toward a scalable SDN control plane.
Proceedings of the 14th IFIP Networking Conference, 2015

Mutine: A Mutable Virtual Network Embedding with Game-Theoretic Stochastic Routing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
How to Make Network Nodes Adaptive?
IEEE Commun. Lett., 2014

Uncovering network traffic anomalies based on their sparse distributions.
Sci. China Inf. Sci., 2014


  Loading...