Liancheng Zhang

Orcid: 0009-0009-2064-1167

According to our database1, Liancheng Zhang authored at least 30 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluating and Correcting Temperature and Precipitation Grid Products in the Arid Region of Altay, China.
Remote. Sens., January, 2024

2023
Effects of Land Cover Change on Vegetation Carbon Source/Sink in Arid Terrestrial Ecosystems of Northwest China, 2001-2018.
Remote. Sens., May, 2023

ATTRM6: A Distributed IPv6 Address Traceback and Threatener Restriction Mechanism Based on Smart Contract.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023

LLMNR6: A Hostname Query based IPv6 Address Fast Scanning Technology for Dual-Stack Windows Nodes.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023

2022
A Packet Fields Authenticity Check Based Detection Technology of IPv6 Spoofing Behaviors.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

6FloodDetector: An IPv6 Flooding Behaviors Detection Technology Based on Eigenvalues and Thresholds.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

CGA Configuration Detection Method of IPv6 Nodes by Combining Active Probing with Passive Sniffing.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

Bisers: An Efficient DHCPv6 Bounding Solution.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

Hostname Correlation Based IPv6 Address Fast Scanning Technology of Windows Nodes.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

CC-Guard: An IPv6 Covert Channel Detection Method Based on Field Matching.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

FACA: An effective method for detecting the survivability of large-scale IPv6 addresses.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Auto-Tracking Frequency Regulation Based Energy Saving Technology for Motor Systems With Dynamic and Potential Energy Load.
IEEE Access, 2021

Electromechanical Based Energy Saving Control Strategy for Beam Pumping Motor Systems in Oil Production Industry.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2021

2019
一种数据流相关过滤器自动插入的注入入侵避免方案 (SQL Injection Intrusion Avoidance Scheme Based on Automatic Insertion of Dataflow-relevant Filters).
计算机科学, 2019

CATH: an effective method for detecting denial-of-service attacks in software defined networks.
Sci. China Inf. Sci., 2019

2018
Survey on network flow watermarking: model, interferences, applications, technologies and security.
IET Commun., 2018

A Covert Communication Model Based on IPv6 Multicast.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

PN Code Diversification Based Spread Spectrum Flow Watermarking Technology.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
一种基于AS安全联盟的域间路由系统拟态防护机制 (AS Security Alliance Mechanism for Inter-domain Routing System Based on Mimicry Protection).
计算机科学, 2017

Delay Normalization Interference Resistance Packet Order Based Flow Watermarking Technology.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Comparative studies of IPv6 tunnel security.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
A SDN Proactive Defense Scheme Based on IP and MAC Address Mutation.
Proceedings of the Wireless Internet - 9th International Conference, 2016

Path hopping based SDN network defense technology.
Proceedings of the 12th International Conference on Natural Computation, 2016

A Port Hopping Based DoS Mitigation Scheme in SDN Network.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

A Security Threats Taxonomy for Routing System Intrusion Detection.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Network Proactive Defense Model Based on Immune Danger Theory.
Comput. Informatics, 2015

2014
Situation assessment model for inter-domain routing system.
IET Softw., 2014

2013
IRSR: Recover Inter-Domain Routing System from a Higher View Beyond Internet.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

An Epidemic-Dynamics-Based Model for CXPST Spreading in Inter-Domain Routing System.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2010
An Anonymous Multiplexing Communication Protocol Based on IPv6.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...