Jinshu Su

Orcid: 0000-0001-9273-616X

According to our database1, Jinshu Su authored at least 248 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Realizing Fine-Grained Inference of AS Path With a Generative Measurable Process.
IEEE/ACM Trans. Netw., December, 2023

In Pursuit of Beauty: Aesthetic-Aware and Context-Adaptive Photo Selection in Crowdsensing.
IEEE Trans. Knowl. Data Eng., September, 2023

A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training.
IEEE Trans. Netw. Serv. Manag., June, 2023

Automatic discovery of stateful variables in network protocol software based on replay analysis.
Frontiers Inf. Technol. Electron. Eng., March, 2023

Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023

Adaptive QoS-aware multipath congestion control for live streaming.
Comput. Networks, 2023

2022
Event-Driven Computation Offloading in IoT With Edge Computing.
IEEE Trans. Wirel. Commun., 2022

Technology trends in large-scale high-efficiency network computing.
Frontiers Inf. Technol. Electron. Eng., 2022

Moving direction-based adaptive task migration in MEC.
IET Commun., 2022

An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance.
Comput. Networks, 2022

ACCeSS: Adaptive QoS-aware Congestion Control for Multipath TCP.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

The Extreme Counts: Modeling the Performance Uncertainty of Cloud Resources with Extreme Value Theory.
Proceedings of the Service-Oriented Computing - 20th International Conference, 2022

Multi-Level Text Importance Classification Architecture Based on Deep Learning.
Proceedings of the 6th Asia-Pacific Workshop on Networking, 2022

2021
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations.
IEEE Trans. Netw. Sci. Eng., 2021

APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
IEEE Trans. Inf. Forensics Secur., 2021

DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability.
Secur. Commun. Networks, 2021

A novel blockchain-based privacy-preserving framework for online social networks.
Connect. Sci., 2021

Enforcing trustworthy cloud SLA with witnesses: A game theory-based model using smart contracts.
Concurr. Comput. Pract. Exp., 2021

Balancing anonymity and resilience in anonymous communication networks.
Comput. Secur., 2021

A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

SeqAD: An Unsupervised and Sequential Autoencoder Ensembles based Anomaly Detection Framework for KPI.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

ModelCoder: A Fault Model based Automatic Root Cause Localization Framework for Microservice Systems.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Real Network Traffic Collection and Deep Learning for Mobile App Identification.
Wirel. Commun. Mob. Comput., 2020

Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting.
IEEE/ACM Trans. Netw., 2020

Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things.
Symmetry, 2020

iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy.
IEEE Internet Things J., 2020

ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices.
IEEE Internet Things J., 2020

Security of Auditing Protocols Against Subversion Attacks.
Int. J. Found. Comput. Sci., 2020

Evaluating Deep Learning for Image Classification in Adversarial Environment.
IEICE Trans. Inf. Syst., 2020

Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks.
IEEE Access, 2020

App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Software-Hardware Co-exploration Framework for Optimizing Communication in Neuromorphic Processor.
Proceedings of the Advanced Computer Architecture - 13th Conference, 2020

2019
A Cost-Efficient Router Architecture for HPC Inter-Connection Networks: Design and Implementation.
IEEE Trans. Parallel Distributed Syst., 2019

CloudsStorm: A framework for seamlessly programming and controlling virtual infrastructure functions during the DevOps lifecycle of cloud applications.
Softw. Pract. Exp., 2019

Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier.
Secur. Commun. Networks, 2019

Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: A Learning Method.
IEEE Internet Things J., 2019

Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019

Practical privacy-preserving deep packet inspection outsourcing.
Concurr. Comput. Pract. Exp., 2019

A survey of control consistency in Software-Defined Networking.
CCF Trans. Netw., 2019

iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A Heterogeneous Parallel Packet Processing Architecture for NFV Acceleration.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Cooperative Sensing in Cognitive Radio Ad Hoc Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
CSR: Classified Source Routing in Distributed Networks.
IEEE Trans. Cloud Comput., 2018

FlexMonitor: A Flexible Monitoring Framework in SDN.
Symmetry, 2018

OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN.
Secur. Commun. Networks, 2018

A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised Learning.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Real-Time Aware Routing Strategy in Smart City Environments.
Proceedings of the 2018 IEEE International Conference on Sensing, 2018

Exploring Efficient NFA Data Structures to Accelerate DFA Generation.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

CloudsStorm: An Application-Driven Framework to Enhance the Programmability and Controllability of Cloud Virtual Infrastructures.
Proceedings of the Cloud Computing - CLOUD 2018, 2018

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Empowering Dynamic Task-Based Applications with Agile Virtual Infrastructure Programmability.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices.
Softw. Pract. Exp., 2017

PoweRock: Power Modeling and Flexible Dynamic Power Management for Many-Core Architectures.
IEEE Syst. J., 2017

A systematic review of structured sparse learning.
Frontiers Inf. Technol. Electron. Eng., 2017

Real-time pre-processing system with hardware accelerator for mobile core networks.
Frontiers Inf. Technol. Electron. Eng., 2017

Fast backup and recovery for web protectiuon using trigger and block hash approach.
Comput. Syst. Sci. Eng., 2017

Offset-FA: Detach the Closures and Countings for Efficient Regular Expression Matching.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Boosting The Benefits of Hybrid SDN.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Enhancing the effectiveness of traffic engineering in hybrid SDN.
Proceedings of the IEEE International Conference on Communications, 2017

Automatic privacy leakage detection for massive android apps via a novel hybrid approach.
Proceedings of the IEEE International Conference on Communications, 2017

EffiView: Trigger-Based Monitoring Approach with Low Cost in SDN.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

EffiEye: Application-aware Large Flow Detection in Data Center.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

PriMal: Cloud-Based Privacy-Preserving Malware Detection.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Ind. Electron., 2016

Optimizing link rate assignment and transmission scheduling in WMN through compatible set generation.
Telecommun. Syst., 2016

An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016

An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.
J. Medical Syst., 2016

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics.
Int. J. Data Warehous. Min., 2016

Assessing Resilience of Inter-Domain Routing System under Regional Failures.
KSII Trans. Internet Inf. Syst., 2016

A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor.
IEICE Trans. Inf. Syst., 2016

Comparing Performance of Hierarchical Identity-Based Signature Schemes.
IEICE Trans. Inf. Syst., 2016

A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms.
IEEE Commun. Surv. Tutorials, 2016

BufferBank storage: an economic, scalable and universally usable in-network storage model for streaming data applications.
Sci. China Inf. Sci., 2016

A Real-Time Processing System for Anonymization of Mobile Core Network Traffic.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Achieving Consistent SDN Control With Declarative Applications.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A 60Gbps DPI Prototype based on Memory-Centric FPGA.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Rigidly Self-Expressive Sparse Subspace Clustering.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2016

A Novel Hybrid Architecture for High Speed Regular Expression Matching.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Cupid: Congestion-free consistent data plane update in software defined networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Tendency-based caching in Content-Centric Networking.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Implementation of TCP large receive offload on multi-core NPU platform.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

Redactor: Reconcile network control with declarative control programs In SDN.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

An Efficient Algorithm for Tensor Principal Component Analysis via Proximal Linearized Alternating Direction Method of Multipliers.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

An Event Grouping Approach for Infinite Stream with Differential Privacy.
Proceedings of the Advances in Services Computing, 2016

Linearized Alternating Direction Method of Multipliers for Constrained Nonconvex Regularized Optimization.
Proceedings of The 8th Asian Conference on Machine Learning, 2016

Fast Resource Co-provisioning for Time Critical Applications Based on Networked Infrastructures.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs.
IEEE Trans. Parallel Distributed Syst., 2015

Latency-aware DVFS for efficient power state transitions on many-core architectures.
J. Supercomput., 2015

Truncated differential cryptanalysis of PRINCE.
Secur. Commun. Networks, 2015

Security, trust, and resilience of distributed networks and systems.
Secur. Commun. Networks, 2015

Mix-zones optimal deployment for protecting location privacy in VANET.
Peer-to-Peer Netw. Appl., 2015

Trust Description and Propagation System: Semantics and axiomatization.
Knowl. Based Syst., 2015

Improving application layer multicast forwarding performance by offloading multisend operations.
Comput. Syst. Sci. Eng., 2015

A Two-stage Clustering Sleep Scheduling Algorithm with Particle Swarm Optimization in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

A Novel Location Privacy Mining Threat in Vehicular Internet Access Service.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Design, Implementation and Evaluation of an Application-Layer Virtualized Network.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

RScam: Cloud-Based Anti-Malware via Reversible Sketch.
Proceedings of the Security and Privacy in Communication Networks, 2015

Providing adaptive quality of security in quantum networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

M2SDN: Achieving multipath and multihoming in data centers with software defined networking.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Network intrusion detection and prevention middlebox management in SDN.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Towards efficient radio resource scheduling in LTE-based satellite mobile communication system.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Efficient Pre-filter to Accelerate Regular Expression Matching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Keyword Search over Shared Cloud Data without Secure Channel or Authority.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing.
Wirel. Pers. Commun., 2014

A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2014

A study of IP prefix hijacking in cloud computing networks.
Secur. Commun. Networks, 2014

Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet.
New Gener. Comput., 2014

A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
J. Networks, 2014

A novel steganography approach for voice over IP.
J. Ambient Intell. Humaniz. Comput., 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014

Optimizing compatible sets in wireless networks through integer programming.
EURO J. Comput. Optim., 2014

SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

A Power Modelling Approach for Many-Core Architectures.
Proceedings of the 2014 10th International Conference on Semantics, 2014

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures.
Proceedings of the Information and Communication Technology, 2014

POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A High-Speed Network Content Filtering System.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

A Structure P2P Based Web Services Registry with Access and Control.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Math. Comput. Model., 2013

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Math. Comput. Model., 2013

Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE J. Sel. Areas Commun., 2013

PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System.
Int. J. Distributed Sens. Networks, 2013

Benefiting from the community structure in opportunistic forwarding.
Comput. Sci. Inf. Syst., 2013

Security evaluation of MISTY structure with SPN round function.
Comput. Math. Appl., 2013

Optimal relay node placement for multi-pair cooperative communication in wireless networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Distributed Routing Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Location Management Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Qphone: a quantum security VoIP phone.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

iPanda: A comprehensive malware analysis tool.
Proceedings of the International Conference on Information Networking 2013, 2013

Mining Network Behavior Specifications of Malware Based on Binary Analysis.
Proceedings of the Frontiers in Internet Technologies, 2013

Assessing Survivability of Inter-domain Routing System under Cascading Failures.
Proceedings of the Frontiers in Internet Technologies, 2013

Detect and identify blocker tags in tree-based RFID systems.
Proceedings of IEEE International Conference on Communications, 2013

Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
RLM: A General Model for Trust Representation and Aggregation.
IEEE Trans. Serv. Comput., 2012

An efficient distributed key management scheme for group-signature based anonymous authentication in VANET.
Secur. Commun. Networks, 2012

A Fast Algorithm to Find All-Pairs Shortest Paths in Complex Networks.
Proceedings of the International Conference on Computational Science, 2012

Flexible multi-authority attribute-based signature schemes for expressive policy.
Mob. Inf. Syst., 2012

A new multistage approach to detect subtle DDoS attacks.
Math. Comput. Model., 2012

A complete first-order temporal BDI logic for forest multi-agent systems.
Knowl. Based Syst., 2012

Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks.
IEEE J. Sel. Areas Commun., 2012

Assessing the vulnerability of network topologies under large-scale regional failures.
J. Commun. Networks, 2012

Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing.
IEICE Trans. Inf. Syst., 2012

Privacy aware publishing of successive location information in sensor networks.
Future Gener. Comput. Syst., 2012

Editorial.
Comput. Syst. Sci. Eng., 2012

ICTree: discovering the underlying connections of your rental virtual machines in the public clouds.
Comput. Syst. Sci. Eng., 2012

Towards efficient and practical network coding in delay tolerant networks.
Comput. Math. Appl., 2012

VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Characterizing Inter-domain Rerouting after Japan Earthquake.
Proceedings of the NETWORKING 2012, 2012

A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant Networks.
Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks, 2012

Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

An Automatic Approach to Detect Anti-debugging in Malware Analysis.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

STDN Introduction.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

LDC: Detecting BGP Prefix Hijacking by Load Distribution Change.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

An Analytic Goodput Model for TCP Incast.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
The TianHe-1A Supercomputer: Its Hardware and Software.
J. Comput. Sci. Technol., 2011

Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm.
Future Gener. Comput. Syst., 2011

DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree.
Comput. Syst. Sci. Eng., 2011

Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Analysis of prefix hijacking based on AS hierarchical model.
Proceedings of the 5th International Conference on Network and System Security, 2011

Adaptive VoIP Steganography for Information Hiding within Network Audio Streams.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Authenticating with Attributes in Online Social Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

VISOR: A Pratical VoIP Steganography Platform.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Protecting Router Forwarding Table in Space.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Shrew Attack in Cloud Data Center Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

One Leader at One Time: OLOT Routing in Delay Tolerant Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Self-supported congestion-aware networking for emergency services in WANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Multi-authority Attribute-Based Signature.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

NTC: Towards Efficient Network Coding in Delay Tolerant Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Gregex: GPU Based High Speed Regular Expression Matching Engine.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Snail Crawling: An Enhanced Method for DTNs Routing.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

How Can Multipath Dissemination Help to Detect Prefix Hijacking?
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

SDBGP: A scalable, distributed BGP routing protocol implementation.
Proceedings of the 12th IEEE International Conference on High Performance Switching and Routing, 2011

Thwarting audio steganography attacks in cloud storage systems.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

Evaluation of Topological Vulnerability of the Internet under Regional Failures.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems.
Knowl. Based Syst., 2010

A Scalable Approach to Analyzing Network Security using Compact Attack Graphs.
J. Networks, 2010

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System.
J. Next Gener. Inf. Technol., 2010

An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming.
IEICE Trans. Inf. Syst., 2010

TH-1: China's first petaflop supercomputer.
Frontiers Comput. Sci. China, 2010

A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs.
Proceedings of IEEE International Conference on Communications, 2010

A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2010

Exploring potential vulnerabilities in data center network.
Proceedings of the ACM CoNEXT Student Workshop, 2010

A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split.
Int. J. Commun. Netw. Syst. Sci., 2009

An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems.
Intell. Autom. Soft Comput., 2009

Network Access Control Mechanism Based on Locator/Identifier Split.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

MORT: A Technique to Improve Routing Efficiency in Fault-Tolerant Multipath Routing.
Proceedings of the MSN 2009, 2009

A new Group Key Management Scheme based on DMST for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A new broadcast-Key Management Scheme for Distributed Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

A Scalable Approach to Full Attack Graphs Generation.
Proceedings of the Engineering Secure Software and Systems, 2009

HPC: A Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-agent Systems.
Proceedings of the Advances in Artificial Intelligence, 2009

2008
A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch.
Int. J. Electron. Secur. Digit. Forensics, 2008

Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems.
Proceedings of the Fourteenth IEEE Internationl Conference on Embedded and Real-Time Computing Systems and Applications, 2008

Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

A Flexible Approach to Measuring Network Security Using Attack Graphs.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems.
Proceedings of the Distributed Embedded Systems: Design, 2008

An Entropy Based Algorithm to Find Critical Traffic Matrices.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Analysis and Enhancement of Delay-Based Congestion Control.
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008

Analysis of Reverse Traffic in Delay-Based Congestion Control.
Proceedings of the Second International Conference on the Digital Society (ICDS 2008), 2008

Towards Successive Privacy Protection in Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Modeling and Analyzing the Instantaneous Stability for Application Layer Multicast.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent System Via Extended Mu-Calculus.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

A Loop-Based Key Management Scheme for Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet Reordering in Load-Balanced Switches.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast.
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007

Efficient Congestion Control Based on Awareness of Multistage Resources (CC-AMR).
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

A New Precomputation Scheme for MPLS Traffic Engineering Routing.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

A Routing Optimization Algorithm for BGP Egress Selection.
Proceedings of the Distributed Computing and Internet Technology, 2006

The Impact of Parallel and Multithread Mechanism on Network Processor Performance.
Proceedings of the Grid and Cooperative Computing, 2006

A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic.
Proceedings of the Technologies for Advanced Heterogeneous Networks II, 2006

Personalized Fair Reputation Based Resource Allocation in Grid.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

Spreading Activation Model for Connectivity Based Clustering.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

2005
OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Graph-Theoretic Analysis of Kautz Topology and DHT Schemes.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks.
Proceedings of the Computational Science, 2004

2003
Using Split Queues to Improve the Performance of Parallel Switch.
Proceedings of the Advanced Parallel Programming Technologies, 5th International Workshop, 2003


  Loading...