Haiting Zhu

Orcid: 0000-0002-5840-2251

According to our database1, Haiting Zhu authored at least 20 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Sketch-Based Fine-Grained Proportional Integral Queue Management Method.
Axioms, September, 2024

2022
Introducing Additional Network Measurements into Active Queue Management.
Proceedings of the IEEE International Conference on Communications, 2022

Secure and Efficient Traffic Obfuscation for Smart Home.
Proceedings of the IEEE Global Communications Conference, 2022

One-Shot Detection of Malicious TLS Traffic.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
ME-Box: A reliable method to detect malicious encrypted traffic.
J. Inf. Secur. Appl., 2021

Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

Finding Collusive Spam in Community Question Answering Platforms: A Pattern and Burstiness Based Method.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

2020
On-Device Detection of Repackaged Android Malware via Traffic Clustering.
Secur. Commun. Networks, 2020

SA Sketch: A self-adaption sketch framework for high-speed network.
Concurr. Comput. Pract. Exp., 2020

OEBSA-Sketch: a Combination of Sketch and Hash Table for the Measurement of Stream Data.
Proceedings of the Eighth International Conference on Advanced Cloud and Big Data, 2020

2019
A Data Forwarding Approach for Fire-Rescue Scenario with Multi-Type Mobile Nodes.
Wirel. Commun. Mob. Comput., 2019

CBFSketch: A Scalable Sketch Framework for High Speed Network.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

Performance Analysis of BBR Congestion Control Protocol Based on NS3.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network.
Secur. Commun. Networks, 2018

Mobile app identification for encrypted network flows by traffic correlation.
Int. J. Distributed Sens. Networks, 2018

Spotting review spammer groups: A cosine pattern and network based method.
Concurr. Comput. Pract. Exp., 2018

A Data Forwarding Approach for Opportunistic Mobile Sensor Networks in Fire-Rescue Scenario.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
Identifying Mobile Applications for Encrypted Network Traffic.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2012
Extracting Internet Background Radiation from raw traffic using greynet.
Proceedings of the 18th IEEE International Conference on Networks, 2012


  Loading...