Mingwei Zhang

According to our database1, Mingwei Zhang authored at least 37 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Some extremal results on complete degenerate hypergraphs.
J. Comb. Theory, Ser. A, 2018

PathFinder: Capturing DDoS Traffic Footprints on the Internet.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

Controller Placement in Software-Defined Satellite Networks.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Reputation and Incentive Mechanism for SDN Applications.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Content-Centric Community-Aware Mobile Social Network Routing Scheme.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

SGXElide: enabling enclave code secrecy via self-modification.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
I-Seismograph: Observing, Measuring, and Analyzing Internet Earthquakes.
IEEE/ACM Trans. Netw., 2017

Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

POSTER: Semi-supervised Classification for Dynamic Android Malware Detection.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Shoot for the Moon and You Will Never Miss: Characterizing and Detecting Aimbots in Online Games.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

An expectation-based approach to policy-based security of the Border Gateway Protocol.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Prevention of Fault Propagation in Web Service: a Complex Network Approach.
J. Web Eng., 2015

Harbormaster: Policy Enforcement for Containers.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

A Principled Approach for ROP Defense.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A platform for secure static binary instrumentation.
Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2014

Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Understanding Complex Binary Loading Behaviors.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Game Analysis of Labor Contract Signing Process - From the Perspective of Harmonious Labor Relationship.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

2013
A correlation context-aware approach for composite service selection.
Concurrency and Computation: Practice and Experience, 2013

Control Flow Integrity for COTS Binaries.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Research on Touch as a Means of Interaction in Digital Art.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
Solar irradiance estimated from FY-2 data at some north China sites.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Prediction of change of winter wheat in north China by using IPCC-AR4 model data.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

2010
Web Service Composition Based on QoS Rules.
J. Comput. Sci. Technol., 2010

An Approach for Web Service QoS Prediction Based on Service Using Information.
Proceedings of the International Conference on Service Sciences, 2010

Evolving SaaS based on reflective Petri nets.
Proceedings of the 7th Workshop on Reflection, AOP and Meta-Data for Software Evolution, 2010

2009
Composite Service Selection Based on Dot Pattern Mining.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Web Service Community Discovery Based on Spectrum Clustering.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A composite web services discovery technique based on community mining.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
Crop discrimination in Northern China with double cropping systems using Fourier analysis of time-series MODIS data.
Int. J. Applied Earth Observation and Geoinformation, 2008

2006
Data Mining Application to Syndrome Differentiation in Traditional Chinese Medicine.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

An Effective Hypergraph Clustering in Multi-Stage Data Mining of Traditional Chinese Medicine Syndrome Differentiation.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006


  Loading...