Shunzheng Yu

Orcid: 0000-0002-7797-9224

Affiliations:
  • Sun Yat-Sen University


According to our database1, Shunzheng Yu authored at least 64 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A two-stage method for doubly resource constrained elementary shortest path problems.
Knowl. Based Syst., 2024

Detecting Cyber Attacks in Industrial Control Systems Using Duration-aware Representation Learning.
Proceedings of the 2024 10th International Conference on Computing and Artificial Intelligence, 2024

2023
Network Traffic Content Identification Based on Time-Scale Signal Modeling.
IEEE Trans. Dependable Secur. Comput., 2023

A Learning-Based Framework for Constrained Shortest Path Problems.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Detecting Cyber Attacks in Industrial Control Systems Using Spatio-Temporal Autoencoder.
Proceedings of the International Joint Conference on Neural Networks, 2023

Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations.
Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023

2022
Explicit Duration Recurrent Networks.
IEEE Trans. Neural Networks Learn. Syst., 2022

2020
SDN/NFV-Based Security Service Function Tree for Cloud.
IEEE Access, 2020

2019
Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62].
J. Netw. Comput. Appl., 2019

Recognizing the content types of network traffic based on a hybrid DNN-HMM model.
J. Netw. Comput. Appl., 2019

Mice flow aggregation approach for Green networking.
IET Commun., 2019

2018
COD: caching on demand in information-centric networking.
Telecommun. Syst., 2018

PESA: a predictive energy-saving approach based on an OSHMM.
IET Commun., 2018

2017
A Distributed Green Networking Approach for Data Center Networks.
IEEE Commun. Lett., 2017

Broadcast-Based Content Delivery in Information-Centric Hybrid Multihop Wireless Networks.
IEEE Commun. Lett., 2017

Information-centric networking with built-in network coding to achieve multisource transmission at network-layer.
Comput. Networks, 2017

2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016

Network coding-based multisource content delivery in Content Centric Networking.
J. Netw. Comput. Appl., 2016

A Collaborative Intrusion Detection System against DDoS for SDN.
IEICE Trans. Inf. Syst., 2016

Keyword Mining for Private Protocols Tunneled Over WebSocket.
IEEE Commun. Lett., 2016

CIPA: A collaborative intrusion prevention architecture for programmable network and SDN.
Comput. Secur., 2016

A spatial HMM approach for green networking.
Comput. Commun., 2016

2015
A Robust Scaling Approach for Implementation of HsMMs.
IEEE Signal Process. Lett., 2015

CSAR: A Content-Scent based Architecture for Information-Centric mobile ad hoc networks.
Comput. Commun., 2015

2014
A fuzzy k-coverage approach for RFID network planning using plant growth simulation algorithm.
J. Netw. Comput. Appl., 2014

2013
Position-based automatic reverse engineering of network protocols.
J. Netw. Comput. Appl., 2013

Caching efficiency of information-centric networking.
IET Networks, 2013

Multisource dissemination in content-centric networking.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012

A novel middleware-based approach for redundant reader elimination using PSO.
Int. J. Secur. Networks, 2012

Internet traffic clustering with constraints.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
The community Analysis of User Behaviors Network for Web Traffic.
J. Softw., 2011

A novel semi-supervised approach for network traffic clustering.
Proceedings of the 5th International Conference on Network and System Security, 2011

A Two-Layer Hidden Markov Model for the Arrival Process of Web Traffic.
Proceedings of the MASCOTS 2011, 2011

Internet Traffic Classification Using Machine Learning: A Token-based Approach.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
An automatic application signature construction system for unknown traffic.
Concurr. Comput. Pract. Exp., 2010

Hidden semi-Markov models.
Artif. Intell., 2010

Learning Automata Representation of Network Protocol by Grammar Induction.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Anycast Routing in Hypercube Multicomputers.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Automatic Application Signature Construction from Unknown Traffic.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors.
IEEE/ACM Trans. Netw., 2009

Monitoring the application-layer DDoS attacks for popular websites.
IEEE/ACM Trans. Netw., 2009

Supervised Learning Real-time Traffic Classifiers.
J. Networks, 2009

The Design of a Wireless Data Acquisition and Transmission System.
J. Networks, 2009

One-way queuing delay measurement and its application on detecting DDoS attack.
J. Netw. Comput. Appl., 2009

Automatic Network Protocol Automaton Extraction.
Proceedings of the Third International Conference on Network and System Security, 2009

Centralized Botnet Detection by Traffic Aggregation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

2008
A note about some properties of BC graphs.
Inf. Process. Lett., 2008

Measuring the Normality of Web Proxies' Behavior Based on Locality Principles.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Detecting Network-Wide Traffic Anomalies Based on Spatial HMM.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Anomaly Detection Based on Available Bandwidth Estimation.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Move Statistics-Based Traffic Classifiers Online.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Assessment of Network Security Policy Based on Security Capability.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Periodic hidden Markov model-based workload clustering and characterization.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Detecting Shrew HTTP Flood Attacks for Flash Crowds.
Proceedings of the Computational Science, 2007

2006
Practical implementation of an efficient forward-backward algorithm for an explicit-duration hidden Markov model.
IEEE Trans. Signal Process., 2006

A Novel Model for Detecting Application Layer DDoS Attacks.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2003
An efficient forward-backward algorithm for an explicit-duration hidden Markov model.
IEEE Signal Process. Lett., 2003

A hidden semi-Markov model with missing data and multiple observation sequences for mobility tracking.
Signal Process., 2003

2000
An integrated mobility and traffic model for resource allocation in wireless networks.
Proceedings of the Third ACM International Workshop on Wireless Mobile Multimedia, 2000

A new prefetch cache scheme.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000


  Loading...