Zhaohui Ma

Orcid: 0000-0001-8374-1557

According to our database1, Zhaohui Ma authored at least 13 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Optimized Random Forest for DDoS Attack Detection in SDN Environment.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

2022
CIR-Net: Automatic Classification of Human Chromosome Based on Inception-ResNet Architecture.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

2021
A novel chromosome cluster types identification method using ResNeXt WSL model.
Medical Image Anal., 2021

Blockchain Model Testing and Implementation Based on Improved PBFT Consensus.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2020
A DDoS attack detection method based on SVM and K-nearest neighbour in SDN environment.
Int. J. Comput. Sci. Eng., 2020

Joint Optimization of Anchor Deployment and Power Allocation in Wireless Network Localization.
IEEE Commun. Lett., 2020

2019
On standardization of basic datasets of electronic medical records in traditional Chinese medicine.
Comput. Methods Programs Biomed., 2019

Research on DDoS Abnormal Traffic Detection Under SDN Network.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

Research on Strategy Optimization of OpenFlow Switch Flow Table Based on "Bus Route" Idea.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

The Research and Implementation of SDN Switch's Flow Table Optimization.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

Research and Implementation of Flow Table Optimization Strategy for SDN Switches Based on the Idea of "Main Road".
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

Optimization Strategy of OpenFlow Flow Table Storage Based on the Idea of "Betweenness Centrality".
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2017
A Unified Model for Detecting Privacy Leakage on Android.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017


  Loading...