Zhenhai Duan

Orcid: 0000-0003-2291-675X

According to our database1, Zhenhai Duan authored at least 50 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
DPM: Towards Accurate Drone Position Manipulation.
IEEE Trans. Dependable Secur. Comput., 2023

Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
IoT Device Identification Based on Network Traffic Characteristics.
Proceedings of the IEEE Global Communications Conference, 2022

Accurately Redirecting a Malicious Drone.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Network Traffic Characteristics of IoT Devices in Smart Homes.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2019
Manipulating Drone Position Control.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Attacking altitude estimation in drone navigation.
Proceedings of the IEEE INFOCOM 2018, 2018

Manipulating Drone Dynamic State Estimation to Compromise Navigation.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A Traceback Attack on Freenet.
IEEE Trans. Dependable Secur. Comput., 2017

2016
Blocking spam by separating end-user machines from legitimate mail server machines.
Secur. Commun. Networks, 2016

2015
Scalable name-based inter-domain routing for information-centric networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

2014
Reroute on loop in anonymous peer-to-peer content sharing networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Thwarting traceback attack on Freenet.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Using randomized routing to counter routing table insertion attack on Freenet.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Detecting Spam Zombies by Monitoring Outgoing Messages.
IEEE Trans. Dependable Secur. Comput., 2012

A Sender-Centric Approach to Detecting Phishing Emails.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

A Routing Table Insertion (RTI) Attack on Freenet.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Special Issue on Measurement Based Network Management.
J. Netw. Syst. Manag., 2011

An empirical study of behavioral characteristics of spammers: Findings and implications.
Comput. Commun., 2011

2010
Region-based BGP announcement filtering for improved BGP security.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
LID Assignment in InfiniBand Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Oblivious routing in fat-tree based system area networks with uncertain traffic demands.
IEEE/ACM Trans. Netw., 2009

Fair Round-Robin: A Low Complexity Packet Schduler with Proportional and Worst-Case Fairness.
IEEE Trans. Computers, 2009

Incorporating accountability into internet email.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Controlling IP Spoofing through Interdomain Packet Filters.
IEEE Trans. Dependable Secur. Comput., 2008

Incorporating Accountability into Internet E-mail.
J. Digit. Forensic Pract., 2008

E-Crime Investigative Technologies.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Traffic-Aware Inter-Domain Routing for Improved Internet Routing Stability.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
On QoS routing and path establishment in the presence of imprecise state information.
J. Commun. Networks, 2007

Damping BGP route flaps.
J. Commun. Networks, 2007

DMTP: Controlling spam through message delivery differentiation.
Comput. Networks, 2007

Behavioral Characteristics of Spammers and Their Network Reachability Properties.
Proceedings of IEEE International Conference on Communications, 2007

The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask).
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Towards a Service Oriented Internet.
IEICE Trans. Commun., 2006

Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

BCSQ: Bin-based Core Stateless Queueing for Scalable Support of Guaranteed Services.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2005
Fundamental Trade-Offs in Aggregate Packet Scheduling.
IEEE Trans. Parallel Distributed Syst., 2005

Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

FRR: a proportional and worst-case fair round robin scheduler.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Limiting path exploration in BGP.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

A Differentiated Message Delivery Architecture to Control Spam.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
A Core Stateless Bandwidth Broker Architecture for Scalable Support of Guaranteed Services.
IEEE Trans. Parallel Distributed Syst., 2004

On Properties of Internet Exchange Points and Their Impact on AS Topology and Relationship.
Proceedings of the NETWORKING 2004, 2004

2003
Service overlay networks: SLAs, QoS, and bandwidth provisioning.
IEEE/ACM Trans. Netw., 2003

Service Oriented Internet.
Proceedings of the Service-Oriented Computing, 2003

2002
On scalable network resource management using bandwidth brokers.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Providing scalable support for multiple QoS guarantees: architecture and mechanisms.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Virtual time reference system: a unifying scheduling framework for scalable support of guaranteed services.
IEEE J. Sel. Areas Commun., 2000


  Loading...