Liumei Zhang

Orcid: 0000-0002-1834-5424

According to our database1, Liumei Zhang authored at least 20 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Ensemble Outlier Detection Method Based on Information Entropy-Weighted Subspaces for High-Dimensional Data.
Entropy, August, 2023

Research on the Security of IPv6 Communication Based on Petri Net under IoT.
Sensors, 2023

Ornaments and Barlines Recognition of Numbered Musical Notation Using YOLOv5.
Proceedings of the 5th International Symposium on Signal Processing Systems, 2023

LMIPv6ATK:A Labeled Dataset Containing Multiple ICMPV6-DDOS Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net.
Sensors, 2022

Petri Net Model of MITM Attack Based on NDP Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
A Fault Diagnosis Model of Pumping Unit Based on BP Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

2018
AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

2016
Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

2015
Autonomous Community Architecture and Construction Technology for City Petrol Supply Management System.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

2014
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

2013
A rational framework for secure communication.
Inf. Sci., 2013

Autonomous fault tolerance technology of emergency community in wireless sensor network.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2011
An Approach for Plotting Reservoir Profile with the Rendering of Material and Texture of OpenGL.
Proceedings of the Advances in Computer Science, 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...