Wanlei Zhou

According to our database1, Wanlei Zhou authored at least 315 papers between 1990 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

2018
Malware Propagations in Wireless Ad Hoc Networks.
IEEE Trans. Dependable Sec. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Sec. Comput., 2018

A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks.
IEEE Trans. Comput. Social Systems, 2018

Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Science, 2018

Answering differentially private queries for continual datasets release.
Future Generation Comp. Syst., 2018

An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018

Twitter spam detection: Survey of new approaches and comparative study.
Computers & Security, 2018

Human-Driven Edge Computing and Communication: Part 2.
IEEE Communications Magazine, 2018

Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018

Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018

A Differential Game Approach to Patch Injection.
IEEE Access, 2018

Location Privacy and Its Applications: A Systematic Study.
IEEE Access, 2018

Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Improving Data Utility through Game Theory in Personalized Differential Privacy.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases.
Proceedings of the Computer Security, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Location Privacy in Mobile Applications
Springer, ISBN: 978-981-13-1704-0, 2018

2017
Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017

Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Vehicular Technology, 2017

Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017

Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Information Forensics and Security, 2017

Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Systems, 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Network and Computer Applications, 2017

FogRoute: DTN-Based Data Dissemination Model in Fog Computing.
IEEE Internet of Things Journal, 2017

A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
CoRR, 2017

Differentially Private Query Learning: from Data Publishing to Model Publishing.
CoRR, 2017

The structure of communities in scale-free networks.
Concurrency and Computation: Practice and Experience, 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Communications Surveys and Tutorials, 2017

A secure search protocol for low cost passive RFID tags.
Computer Networks, 2017

Human-Driven Edge Computing and Communication: Part 1.
IEEE Communications Magazine, 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Flow Entry Sharing in Protection Design for Software Defined Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

TRA: tandem repeat assembler for next generation sequences.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Vehicular Technology, 2016

PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance.
IEEE Trans. Information Forensics and Security, 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2016

Comments and Corrections.
IEEE Trans. Comput. Social Systems, 2016

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking.
IEEE Trans. Computers, 2016

Query verification schemes for cloud-hosted databases: a brief survey.
IJPEDS, 2016

Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016

Discovery of stop regions for understanding repeat travel behaviors of moving objects.
J. Comput. Syst. Sci., 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Professional, 2016

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016

K-Source: Multiple source selection for traffic offloading in mobile social networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016

String matching query verification on cloud-hosted databases.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Delay Tolerant Networks
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-18108-0, 2015

Mining streams of short text for analysis of world-wide event evolutions.
World Wide Web, 2015

Privacy preserving data release for tagging recommender systems.
Web Intelligence, 2015

Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Information Forensics and Security, 2015

K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Information Forensics and Security, 2015

Secure Tag Search in RFID Systems Using Mobile Readers.
IEEE Trans. Dependable Sec. Comput., 2015

Robust Histogram Shape-Based Method for Image Watermarking.
IEEE Trans. Circuits Syst. Video Techn., 2015

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Social Systems, 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Computers, 2015

Detecting stepping stones by abnormal causality probability.
Security and Communication Networks, 2015

Special issue on recent advances in network and information security - security and communication networks journal.
Security and Communication Networks, 2015

Modeling malicious activities in cyber space.
IEEE Network, 2015

A survey of recommendation techniques based on offline data processing.
Concurrency and Computation: Practice and Experience, 2015

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy.
Computer Communications, 2015

Mobility Increases the Risk of Malware Propagations in Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Data as a Product Model for Future Consumption of Big Stream Data in Clouds.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Modelling personal preferences for Top-N movie recommendations.
Web Intelligence and Agent Systems, 2014

To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distrib. Syst., 2014

A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags.
IEEE Trans. Information Forensics and Security, 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Sec. Comput., 2014

Control Flow-Based Malware VariantDetection.
IEEE Trans. Dependable Sec. Comput., 2014

Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks.
IEEE/ACM Trans. Audio, Speech & Language Processing, 2014

Privacy preserving collaborative filtering for KNN attack resisting.
Social Netw. Analys. Mining, 2014

The maximum imputation framework for neighborhood-based collaborative filtering.
Social Netw. Analys. Mining, 2014

Distributed Denial of Service (DDoS) detection by traffic pattern analysis.
Peer-to-Peer Networking and Applications, 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Network, 2014

Guest Editorial.
Journal of Multimedia, 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Generation Comp. Syst., 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Generation Comp. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2014

Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distrib. Syst., 2013

An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Network and Service Management, 2013

Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks.
IEEE Trans. Mob. Comput., 2013

Trust, security and privacy for pervasive applications.
The Journal of Supercomputing, 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Information Forensics and Security, 2013

Secure RFID Tag Ownership Transfer Based on Quadratic Residues.
IEEE Trans. Information Forensics and Security, 2013

Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybernetics, 2013

Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware.
IEEE Trans. Computers, 2013

A learning method for Top-N recommendations with incomplete data.
Social Netw. Analys. Mining, 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

Robust image retrieval with hidden classes.
Computer Vision and Image Understanding, 2013

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems.
Ad Hoc Networks, 2013

Offline grouping proof protocol for RFID systems.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey.
Proceedings of the Ninth International Conference on Semantics, Knowledge and Grids, 2013

RFID tags - Grouping proof with forward security.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Anonymous Data Forwarding in Human Associated Delay Tolerant Networks.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

A general cloud firewall framework with dynamic resource allocation.
Proceedings of IEEE International Conference on Communications, 2013

A dynamical Deterministic Packet Marking scheme for DDoS traceback.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Secure ownership transfer in multi-tag/multi-owner passive RFID systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient.
IEEE Trans. Parallel Distrib. Syst., 2012

A Dual-Channel Time-Spread Echo Method for Audio Watermarking.
IEEE Trans. Information Forensics and Security, 2012

Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking.
IEEE Trans. Audio, Speech & Language Processing, 2012

Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures.
J. Network and Computer Applications, 2012

Generating regular expression signatures for network traffic classification in trusted network management.
J. Network and Computer Applications, 2012

M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models.
J. Network and Computer Applications, 2012

Semi-supervised and compound classification of network traffic.
IJSN, 2012

Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Communications Letters, 2012

Advances in network and system security.
Concurrency and Computation: Practice and Experience, 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurrency and Computation: Practice and Experience, 2012

A minimum disclosure approach to authentication and privacy in RFID systems.
Computer Networks, 2012

Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
Comput. J., 2012

Advances in Network and System Security: Editorial Statement.
Comput. J., 2012

Learning User Preference Patterns for Top-N Recommendations.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

A secure tag ownership transfer scheme in a closed loop RFID system.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012

AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Improving Top-N Recommendations with User Consuming Profiles.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Semi-supervised and Compound Classification of Network Traffic.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Why it is Hard to Fight against Cyber Criminals?
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

DDoS discrimination by Linear Discriminant Analysis (LDA).
Proceedings of the International Conference on Computing, Networking and Communications, 2012

The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Learning Rating Patterns for Top-N Recommendations.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Traceback of DDoS Attacks Using Entropy Variations.
IEEE Trans. Parallel Distrib. Syst., 2011

Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking.
IEEE Trans. Multimedia, 2011

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks.
J. Network and Computer Applications, 2011

Eliminating Errors in Worm Propagation Models.
IEEE Communications Letters, 2011

Special Section: Trusted computing.
Future Generation Comp. Syst., 2011

A mobile agent-based routing algorithm and some theoretical analysis.
Comput. Syst. Sci. Eng., 2011

Special Issue: Securing Distributed Networks and Systems.
Concurrency and Computation: Practice and Experience, 2011

Editorial: Advances in network and system security.
Computers & Security, 2011

Special issue: Building secure parallel and distributed networks and systems.
Computer Communications, 2011

Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

MAR: Message-aware routing for opportunistic wireless ad hoc networks.
Proceedings of the Australasian Telecommunication Networks and Applications Conference, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
Using the k-core decomposition to analyze the static structure of large-scale software systems.
The Journal of Supercomputing, 2010

Sharable file searching in unstructured Peer-to-peer systems.
The Journal of Supercomputing, 2010

A locality aware cache diffusion system.
The Journal of Supercomputing, 2010

Security in next generation wireless networks.
Security and Communication Networks, 2010

Dynamic Addressing in Wireless Sensor Networks without Location Awareness.
J. Inf. Sci. Eng., 2010

Spectral shape descriptor using spherical harmonics.
Integrated Computer-Aided Engineering, 2010

A microscopic competition model and its dynamics analysis on network attacks.
Concurrency and Computation: Practice and Experience, 2010

CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Efficient Web Browsing with Perfect Anonymity Using Page Prefetching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

A Quick-Response Real-Time Stepping Stone Detection Scheme.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks.
IEEE Trans. Parallel Distrib. Syst., 2009

Network and system security.
J. Network and Computer Applications, 2009

An innovative analyser for multi-classifier e-mail classification based on grey list analysis.
J. Network and Computer Applications, 2009

A Mobile Learning Model for Universities -Re-blending the Current Learning Environment.
iJIM, 2009

E-Learning over Mobile Phone Technology: Best Practices and Guidelines.
iJIM, 2009

Reducing the bandwidth requirements of P2P keyword indexing.
IJHPCN, 2009

Effective metric for detecting distributed denial-of-service attacks based on information divergence.
IET Communications, 2009

Chaos theory based detection against network mimicking DDoS attacks.
IEEE Communications Letters, 2009

A parallel information retrieval method for e-commerce.
Comput. Syst. Sci. Eng., 2009

Adjacency cache: an efficient P2P web cache indexing and lookup system.
Comput. Syst. Sci. Eng., 2009

Special Issue: Multi-core Supported Network and System Security.
Concurrency and Computation: Practice and Experience, 2009

I/O scheduling and performance analysis on multi-core platforms.
Concurrency and Computation: Practice and Experience, 2009

Spam filtering for network traffic security on a multi-core environment.
Concurrency and Computation: Practice and Experience, 2009

Defending Grid Web Services from XDoS Attacks by SOTA.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Discriminating DDoS Flows from Flash Crowds Using Information Distance.
Proceedings of the Third International Conference on Network and System Security, 2009

Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics.
Proceedings of the Third International Conference on Network and System Security, 2009

Reliable Downloading Algorithms for BitTorrent-like Systems.
Proceedings of the NPC 2009, 2009

Effective DDoS Attacks Detection Using Generalized Entropy Metric.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

Minimizing the Limitations of GL Analyser of Fusion Based Email Classification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

A Resource Allocation Method for Computational Grids Based on On-line Reverse Auction.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

MVGL Analyser for Multi-classifier Based Spam Filtering System.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Information theory based detection against network behavior mimicking DDoS attacks.
IEEE Communications Letters, 2008

Special Issue: Network Attacks and Defense Systems.
Comput. Syst. Sci. Eng., 2008

Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008

Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Using Multi-core to Support Security-Related Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008

An Operational Approach to Validate the Path of BGP.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2008

Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Using Multi-Core Processors to Support Network Security Applications.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Keynote III: Detection and traceback of DDoS attacks.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Image retrieval based on semantics of intra-region color properties.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Protecting web services with Service Oriented Traceback Architecture.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

Email Categorization Using (2+1)-Tier Classification Algorithms.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Defending against Distributed Denial of Service.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

An effective non-parametric method for globally clustering genes from expression profiles.
Med. Biol. Engineering and Computing, 2007

Pervasive computing at tableside: a wireless web-based ordering system.
Int. J. Pervasive Computing and Communications, 2007

An Enhanced Parallel Downloading Algorithm for BT.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

A Resource-Search and Routing Algorithm within PCDN Autonomy Area.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Email Categorization Using Multi-stage Classification Technique.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

Managing Email Overload with an Automatic Nonparametric Clustering Approach.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks.
Proceedings of the Knowledge Science, 2007

Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

A Parallel Downloading Algorithm for Redundant Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

A Composite Descriptor for Shape Retrieval.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Adjacency Cache: Fast Web Cache Indexing and Lookup.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Protecting web applications from DDoS attacks by an active distributed defense system.
IJWIS, 2006

Developing wikis to foster web-based learning communities: an iterative approach.
IJWBC, 2006

Protecting information infrastructure from DDoS attacks by MADF.
IJHPCN, 2006

A solution for fault tolerance in replicated database systems.
IJCSE, 2006

Frequency distribution of TATA Box and extension sequences on human promoters.
BMC Bioinformatics, 2006

Lease Based Addressing for Event-Driven Wireless Sensor Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Frequency Distribution of TATA Box and Extension Sequences on Human Promoters.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
An IT Bachelor Degree Using Modern Technologies to Illustrate Core Concepts and Principles and Building Generic Skills.
EAIT, 2005

A Sensor Enabled Multi-Agent Infrastructure for Applications Integration.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

A Reactive Framework for Supporting Knowledge Management.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Mesh Based Anycast Routing Protocol for Ad Hoc Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Intelligent DDoS Packet Filtering in High-Speed Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Defense System against DDoS Attacks by Large-Scale IP Traceback.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

A Parallel Euler Approach for Large-Scale Biological Sequence Assembly.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready!
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Security in the Online E-Learning Environment.
Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, 2005

Clock Synchronization State Graphs Based on Clock Precision Difference.
Proceedings of the Distributed and Parallel Computing, 2005

An Efficient Reliable Architecture for Application Layer Anycast Service.
Proceedings of the Distributed and Parallel Computing, 2005

Distributed Defense Against Distributed Denial-of-Service Attacks.
Proceedings of the Distributed and Parallel Computing, 2005

Reducing the Bandwidth Requirements of P2P Keyword Indexing.
Proceedings of the Distributed and Parallel Computing, 2005

Mark-aided distributed filtering by using neural network for DDoS defense.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An Innovative Spam Filtering Model Based on Support Vector Machine.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Understanding Transition towards Information Security Culture Change.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

Spam Filtering based on Preference Ranking.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow.
The Journal of Supercomputing, 2004

A reactive system architecture for building fault-tolerant distributed applications.
Journal of Systems and Software, 2004

Guest Editors' Introduction.
Int. J. Comput. Proc. Oriental Lang., 2004

Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
IEICE Transactions, 2004

An analysis of update ordering in distributed replication systems.
Future Generation Comp. Syst., 2004

Advanced services for Clusters and Internet computing.
Future Generation Comp. Syst., 2004

A Novel Middleware Based Web Database Model.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Minicast: A Multicast-Anycast Protocol for Message Delivery.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

Combating DDoS Attacks in Web-based Services.
Proceedings of the iiWAS'2004, 2004

Load Balance Algorithms for Anycast.
Proceedings of the iiWAS'2004, 2004

An Active Distributed Defense System to Protect Web Applications from DDOS Attacks.
Proceedings of the iiWAS'2004, 2004

A Self-Learning System for Identifying Harmful Network Information.
Proceedings of the iiWAS'2004, 2004

From e-Learning to Virtual Learning Community: Bridging the Gap.
Proceedings of the Advances in Web-Based Learning, 2004

Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems.
Proceedings of the ICETE 2004, 2004

Toward Pervasive Computing in Restaurant.
Proceedings of the ICETE 2004, 2004

A Fast and Robust Method Applied in Telecommunication Systems.
Proceedings of the International Conference on Artificial Intelligence, 2004

Protect Grids from DDoS Attacks.
Proceedings of the Grid and Cooperative Computing, 2004

The Cost of Recovery Protocols in Web-based Database Systems.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Self-Adaptive Clock Synchronization for Computational Grid.
J. Comput. Sci. Technol., 2003

Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks.
International Journal of Information Technology and Decision Making, 2003

Cultural Issues in Online Learning - Is Blended Learning a Possible Solution?
Int. J. Comput. Proc. Oriental Lang., 2003

Guest Editors' Introduction.
Int. J. Comput. Proc. Oriental Lang., 2003

Fault-Tolerant Servers for Anycast Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

A Solution for Fault-Tolerance in Replicated Database Systems.
Proceedings of the Parallel and Distributed Processing and Applications, 2003

Exploring the Foundations of Practicing Online Collaboration.
Proceedings of the Advances in Web-Based Learning, 2003

Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned.
Proceedings of the Advances in Web-Based Learning, 2003

Improving the Performance of Equalization in Communication Systems.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

A Load Balancing Algorithm for Web Based Server Grids.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

GHIRS: Integration of Hotel Management Systems by Web Services.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

An Adaptive Information Grid Architecture for Recommendation System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Towards an Interactive Architecture for Web-Based Databases.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Self-Adaptive Clock Synchronization Based on Clock Precision Difference.
Proceedings of the Computer Science 2003, 2003

2002
A token-based independent update protocol for managing replicated objects.
Comput. Syst. Sci. Eng., 2002

Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks.
Proceedings of the International Symposium on Parallel Architectures, 2002

An Efficient Algorithm for Application-Layer Anycasting.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002

2001
The design and implementation of an active replication scheme for distributing services in a cluster of workstations.
Journal of Systems and Software, 2001

The Development of a Mobile Decision Support System.
Journal of Interconnection Networks, 2001

The Design and Implementation of a Traffic Accident Analysis System.
Proceedings of the Engineering of Intelligent Systems, 2001

Automating the Construction of Replicated Objects in a Cluster of Workstations.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
An architecture for resolving networking partitioning.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
Replication Techniques in Distributed Systems.
Scalable Computing: Practice and Experience, 1999

Detecting and tolerating failures in a loosely integrated heterogeneous database system.
Computer Communications, 1999

Managing Replicated Remote Procedure Call Transactions.
Comput. J., 1999

A Tool for Constructing Service Replication Systems.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

The Design and Simulation of a Hybrid Replication Control Protocol.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

The Design and Application of Sensors Implemented in Java.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Primary-Backup Object Replications in Java.
Proceedings of the TOOLS 1998: 27th International Conference on Technology of Object-Oriented Languages and Systems, 1998

1997
Fault-tolerant servers for the RHODOS system.
Journal of Systems and Software, 1997

A tool for layered analysing and understanding of distributed programs.
Computer Communications, 1997

An Architecture for Building Reliable Distributed Object-Based Systems.
Proceedings of the TOOLS 1997: 24th International Conference on Technology of Object-Oriented Languages and Systems, 1997

Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

1996
A system for managing remote procedure call transactions.
Journal of Systems and Software, 1996

Supporting fault-tolerant and open distributed processing using RPC.
Computer Communications, 1996

A tool for assisting the understanding of distributed programs.
Proceedings of the ACM SIGCSE 1st Australasian Conference on Computer Science Education, 1996

1994
A rapid prototyping system for distributed information system applications.
Journal of Systems and Software, 1994

1993
The design and implementation of a distributed program monitor.
Journal of Systems and Software, 1993

A Layered Distributed Program Debugger.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

1991
On the Management of Remote Procedure Call Transactions.
Proceedings of the Advances in Computing and Information, 1991

1990
A Model of Execution Time Estimating for RPC-Oriented Programs.
Proceedings of the Advances in Computing and Information, 1990


  Loading...