Junyuan Leng

According to our database1, Junyuan Leng authored at least 3 papers between 2014 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense.
Secur. Commun. Networks, 2018

2015
An Inference Attack Model for Flow Table Capacity and Usage: Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network.
CoRR, 2015

2014
Detecting community structure for undirected big graphs based on random walks.
Proceedings of the 23rd International World Wide Web Conference, 2014


  Loading...