Zhiliang Wang

Orcid: 0000-0001-6587-820X

According to our database1, Zhiliang Wang authored at least 291 papers between 1983 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Is it a Real CD Mismatch in Interdomain Routing?
CoRR, 2024

Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors.
CoRR, 2024

2023
Achieving High Availability in Inter-DC WAN Traffic Engineering.
IEEE/ACM Trans. Netw., December, 2023

High-order nonnegative blind source separation based on edge features.
Signal Image Video Process., November, 2023

Intelligent Hotel Guidance System via Face Recognition Technology.
Sensors, November, 2023

A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures.
J. Intell. Robotic Syst., November, 2023

AutoIoT: Automatically Updated IoT Device Identification With Semi-Supervised Learning.
IEEE Trans. Mob. Comput., October, 2023

Multimodal Attention Dynamic Fusion Network for Facial Micro-Expression Recognition.
Entropy, September, 2023

Can we realize nonnegative blind source separation with incomplete matrix?
Signal Image Video Process., June, 2023

A General Approach to Generate Test Packets With Network Configurations.
IEEE Trans. Parallel Distributed Syst., April, 2023

Bolt: Scalable and Cost-Efficient Multistring Pattern Matching With Programmable Switches.
IEEE/ACM Trans. Netw., April, 2023

The design of a neural network-based adaptive control method for robotic arm trajectory tracking.
Neural Comput. Appl., April, 2023

Generative Consistency for Semi-Supervised Cerebrovascular Segmentation From TOF-MRA.
IEEE Trans. Medical Imaging, February, 2023

Planning and control of mobile manipulator's operation on objects with restricted motion in intelligent environment.
Pers. Ubiquitous Comput., 2023

ADReFV: Face video dataset based on human-computer interaction for Alzheimer's disease recognition.
Comput. Animat. Virtual Worlds, 2023

Study on the classification problem of the coping stances in the Satir model based on machine learning.
J. Exp. Theor. Artif. Intell., 2023

C3DBed: Facial micro-expression recognition with three-dimensional convolutional neural network embedding in transformer model.
Eng. Appl. Artif. Intell., 2023

All answers are in the images: A review of deep learning for cerebrovascular segmentation.
Comput. Medical Imaging Graph., 2023

Multi-stage Location for Root-Cause Metrics in Online Service Systems.
Proceedings of the NOMS 2023, 2023

Cutting Onions With Others' Hands: A First Measurement of Tor Proxies in the Wild.
Proceedings of the IFIP Networking Conference, 2023

BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

GraphIoT: Accurate IoT Identification based on Heterogeneous Graph.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

Anomaly Detection in Heterogeneous Time Series Data for Server-Monitoring Tasks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Evaluation System and Efficient Improvement of Reverse Logistics for Shared Bicycle.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2023

2022
Fault-Tolerant Control of Nonlinear Systems With Actuator and Sensor Faults Based on T-S Fuzzy Model and Fuzzy Observer.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Efficient and Accurate Flow Record Collection With HashFlow.
IEEE Trans. Parallel Distributed Syst., 2022

DET: Enabling Efficient Probing of IPv6 Active Addresses.
IEEE/ACM Trans. Netw., 2022

ByteIoT: A Practical IoT Device Identification System Based on Packet Length Distribution.
IEEE Trans. Netw. Serv. Manag., 2022

IntStream: Towards Flexible, Expressive, and Scalable Network Telemetry.
IEEE Trans. Netw. Serv. Manag., 2022

THREATRACE: Detecting and Tracing Host-Based Threats in Node Level Through Provenance Graph Learning.
IEEE Trans. Inf. Forensics Secur., 2022

The algorithm for nonnegative blind source separation using edge feature.
Signal Image Video Process., 2022

Stable Gaze Tracking with Filtering Based on Internet of Things.
Sensors, 2022

Plant and Animal Species Recognition Based on Dynamic Vision Transformer Architecture.
Remote. Sens., 2022

Spatio-temporal convolutional emotional attention network for spotting macro- and micro-expression intervals in long video sequences.
Pattern Recognit. Lett., 2022

Registration of Airborne LiDAR Bathymetry and Multibeam Echo Sounder Point Clouds.
IEEE Geosci. Remote. Sens. Lett., 2022

Complex Embedding with Type Constraints for Link Prediction.
Entropy, 2022

Dark-Point Component Analysis: Nonnegative Blind Source Separation Based on Jaccard Index.
Circuits Syst. Signal Process., 2022

Joint prediction on security event and time interval through deep learning.
Comput. Secur., 2022

Path stability in partially deployed secure BGP routing.
Comput. Networks, 2022

<i>EvoIoT</i>: An evolutionary IoT and non-IoT classification model in open environments.
Comput. Networks, 2022

TMSF-Net: Multi-series fusion network with treeconnect for colorectal tumor segmentation.
Comput. Methods Programs Biomed., 2022

Cerebrovascular segmentation in phase-contrast magnetic resonance angiography by multi-feature fusion and vessel completion.
Comput. Medical Imaging Graph., 2022

Robust finite-time H∞ control for Itô stochastic semi-Markovian jump systems with delays.
Appl. Math. Comput., 2022

AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Monitoring Smart Home Traffic under Differential Privacy.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

WebIoT: Classifying Internet of Things Devices at Internet Scale through Web Characteristics.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Centralized Network Utility Maximization with Accelerated Gradient Method.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

What Causes Delay Asymmetry: A Large-scale One-way Delay Measurement and Empirical Study.
Proceedings of the IEEE Global Communications Conference, 2022

Both Efficient and Accurate: A Large-scale One-way Delay Measurement Scheme.
Proceedings of the IEEE Global Communications Conference, 2022

Zoonet: a proactive telemetry system for large-scale cloud networks.
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies, 2022

Towards a Behavioral and Privacy Analysis of ECS for IPv6 DNS Resolvers.
Proceedings of the 18th International Conference on Network and Service Management, 2022

PerfTrace: A New Multi-metric Network Performance Monitoring Tool.
Proceedings of the 18th International Conference on Network and Service Management, 2022

Coordination of Medical Supply Chain Based on Multi-agent Systems.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2022

2021
Review of micro-expression spotting and recognition in video sequences.
Virtual Real. Intell. Hardw., 2021

An Effective Deep Neural Network for Lung Lesions Segmentation From COVID-19 CT Images.
IEEE Trans. Ind. Informatics, 2021

3D Model-Based Gaze Tracking Via Iris Features With a Single Camera and a Single Light Source.
IEEE Trans. Hum. Mach. Syst., 2021

Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors.
IEEE J. Sel. Areas Commun., 2021

Traffic Engineering in Hybrid Software Defined Network via Reinforcement Learning.
J. Netw. Comput. Appl., 2021

Design of industrial internet of things system based on machine learning and artificial intelligence technology.
J. Intell. Fuzzy Syst., 2021

Micro-expression recognition by two-stream difference network.
IET Comput. Vis., 2021

Event-Based Circular Detection for AUV Docking Based on Spiking Neural Network.
Frontiers Neurorobotics, 2021

Routing optimization with path cardinality constraints in a hybrid SDN.
Comput. Commun., 2021

Cerebrovascular segmentation from TOF-MRA based on multiple-U-net with focal loss function.
Comput. Methods Programs Biomed., 2021

Pathological lung segmentation in chest CT images based on improved random walker.
Comput. Methods Programs Biomed., 2021

CSR-Net: Cross-Scale Residual Network for multi-objective scaphoid fracture segmentation.
Comput. Biol. Medicine, 2021

Spatio-temporal Convolutional Attention Network for Spotting Macro- and Micro-expression Intervals.
Proceedings of the FME'21: Proceedings of the 1st Workshop on Facial Micro-Expression: Advanced Techniques for Facial Expressions Generation and Spotting, 2021

Continuous Flow Measurement with SuperFlow.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

STRAD: Network Intrusion Detection Algorithm Based on Zero-Positive Learning in Real Complex Network Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

PINBALL: Universal and Robust Signature Extraction for Smart Home Devices.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

ADSIM: Network Anomaly Detection via Similarity-aware Heterogeneous Ensemble Learning.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Unsupervised IoT Fingerprinting Method via Variational Auto-encoder and K-means.
Proceedings of the ICC 2021, 2021

Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats.
Proceedings of the ICC 2021, 2021

Slider: Towards Precise, Robust and Updatable Sketch-based DDoS Flooding Attack Detection.
Proceedings of the IEEE Global Communications Conference, 2021

Boosting bandwidth availability over inter-DC WAN.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

Traffic Engineering with Segment Routing Considering Probabilistic Failures.
Proceedings of the 17th International Conference on Network and Service Management, 2021

IntStream: An Intent-driven Streaming Network Telemetry Framework.
Proceedings of the 17th International Conference on Network and Service Management, 2021

Cost-Efficient Dynamic Service Function Chain Embedding in Edge Clouds.
Proceedings of the 17th International Conference on Network and Service Management, 2021

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Traffic Engineering in Partially Deployed Segment Routing Over IPv6 Network With Deep Reinforcement Learning.
IEEE/ACM Trans. Netw., 2020

Iris Feature-Based 3-D Gaze Estimation Method Using a One-Camera-One-Light-Source System.
IEEE Trans. Instrum. Meas., 2020

A Novel Multi-Camera Global Calibration Method for Gaze Tracking System.
IEEE Trans. Instrum. Meas., 2020

Hierarchical support vector machine for facial micro-expression recognition.
Multim. Tools Appl., 2020

A novel method to model hepatic vascular network using vessel segmentation, thinning, and completion.
Medical Biol. Eng. Comput., 2020

Efficient computation of loop-free alternates.
J. Netw. Comput. Appl., 2020

A hybrid link protection scheme for ensuring network service availability in link-state routing networks.
J. Commun. Networks, 2020

Genetic algorithm-optimized support vector machine for real-time activity recognition in health smart home.
Int. J. Distributed Sens. Networks, 2020

Detecting stealthy attacks on industrial control systems using a permutation entropy-based method.
Future Gener. Comput. Syst., 2020

Congestion avoidance transmission mechanism based on two-dimensional forwarding.
Future Gener. Comput. Syst., 2020

Practical Traffic-space Adversarial Attacks on Learning-based NIDSs.
CoRR, 2020

Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks.
Comput. Secur., 2020

HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning.
Comput. Networks, 2020

Assisting reachability verification of network configurations updates with NUV.
Comput. Networks, 2020

Multistep Deep System for Multimodal Emotion Detection With Invalid Data in the Internet of Things.
IEEE Access, 2020

Data Logic Attack on Heavy-Duty Industrial Manipulators.
IEEE Access, 2020

Graph-Based Semi-Supervised Learning for Activity Labeling in Health Smart Home.
IEEE Access, 2020

Retinal Vessel Segmentation Combined With Generative Adversarial Networks and Dense U-Net.
IEEE Access, 2020

Cornea Radius Calibration for Remote 3D Gaze Tracking Systems.
IEEE Access, 2020

An Adversarial Learning Model for Intrusion Detection in Real Complex Network Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Accuracy, Scalability, Coverage: A Practical Configuration Verifier on a Global WAN.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

HGDom: Heterogeneous Graph Convolutional Networks for Malicious Domain Detection.
Proceedings of the NOMS 2020, 2020

Towards the Construction of Global IPv6 Hitlist and Efficient Probing of IPv6 Address Space.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

The Understanding and Forecast of AS-Level Anycast Path Inflation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Poster Abstract: An Unsupervised Two-Layer Multi-Step Network Attack Detector.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Poster Abstract: Joint Optimization of Service Function Chain Elastic Scaling and Routing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

TopoScope: Recover AS Relationships From Fragmentary Observations.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Local Bilinear Convolutional Neural Network for Spotting Macro- and Micro-expression Intervals in Long Video Sequences.
Proceedings of the 15th IEEE International Conference on Automatic Face and Gesture Recognition, 2020

An IoT Device Identification Method based on Semi-supervised Learning.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Efficient Scheduling of Weighted Coflows in Data Centers.
IEEE Trans. Parallel Distributed Syst., 2019

DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs.
IEEE/ACM Trans. Netw., 2019

Two-Loop Covert Attacks Against Constant Value Control of Industrial Control Systems.
IEEE Trans. Ind. Informatics, 2019

Compliance Control Using Hydraulic Heavy-Duty Manipulator.
IEEE Trans. Ind. Informatics, 2019

A Transductive Model-based Stress Recognition Method Using Peripheral Physiological Signals.
Sensors, 2019

Joint optimization of tasks placement and routing to minimize Coflow Completion Time.
J. Netw. Comput. Appl., 2019

Detecting stealthy attacks against industrial control systems based on residual skewness analysis.
EURASIP J. Wirel. Commun. Netw., 2019

Extreme Learning Machine-Based Deep Model for Human Activity Recognition With Wearable Sensors.
Comput. Sci. Eng., 2019

Placement and Routing Optimization Problem for Service Function Chain: State of Art and Future Opportunities.
CoRR, 2019

A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges.
IEEE Commun. Surv. Tutorials, 2019

Inter-domain routing bottlenecks and their aggravation.
Comput. Networks, 2019

MSAID: Automated detection of interference in multiple SDN applications.
Comput. Networks, 2019

SOTE: Traffic engineering in hybrid software defined networks.
Comput. Networks, 2019

Neurodynamic programming and tracking control scheme of constrained-input systems via a novel event-triggered PI algorithm.
Appl. Soft Comput., 2019

An Enhanced Multi-Stage Semantic Attack Against Industrial Control Systems.
IEEE Access, 2019

Research Framework for the Future Development of IoT Information Service Technology.
Proceedings of the 28th Wireless and Optical Communications Conference, 2019

Traffic Matrix Prediction Based on Deep Learning for Dynamic Traffic Engineering.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

ALEAP: Attention-based LSTM with Event Embedding for Attack Projection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

HashFlow for Better Flow Record Collection.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A Risk Prediction Model for Type 2 Diabetes Based on Weighted Feature Selection of Random Forest and XGBoost Ensemble Classifier.
Proceedings of the Eleventh International Conference on Advanced Computational Intelligence, 2019

2018
基于有向无环图的互联网域内节能路由算法 (Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph).
计算机科学, 2018

A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression.
J. Electr. Comput. Eng., 2018

An RTT-Aware Virtual Machine Placement Method.
Inf., 2018

Synchronization criterion of complex networks with time-delay under mixed topologies.
Neurocomputing, 2018

A Real-Time Subtask-Assistance Strategy for Adaptive Services Composition.
IEICE Trans. Inf. Syst., 2018

A Novel Two-Layered Reinforcement Learning for Task Offloading with Tradeoff between Physical Machine Utilization Rate and Delay.
Future Internet, 2018

PriMe: Per-Flow Network Measurement by Combining SRAM with DRAM.
CoRR, 2018

HashFlow For Better Flow Record Collection.
CoRR, 2018

Capacity Enhanced Cooperative D2D Systems over Rayleigh Fading Channels with NOMA.
CoRR, 2018

A hop-by-hop dynamic distributed multipath routing mechanism for link state network.
Comput. Commun., 2018

Efficient network configuration verification using optimized datalog.
Proceedings of the IEEE INFOCOM 2018, 2018

Fast Detection of Heavy Hitters in Software Defined Networking Using an Adaptive and Learning Method.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Affective Computing of Childern with Authism Based on Feature Transfer.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

2017
Non-Fragile Exponential H<sub>∞</sub> Control for a Class of Nonlinear Networked Control Systems With Short Time-Varying Delay via Output Feedback Controller.
IEEE Trans. Cybern., 2017

基于逐跳方式的单链路故障保护算法 (Single-link Failure Protection Algorithm Based on Hop-by-Hop Routing).
计算机科学, 2017

Improved results on BIBO stability and stabilization of networked control systems with short time-varying delays.
J. Frankl. Inst., 2017

Algebra and algorithms for multipath QoS routing in link state networks.
J. Commun. Networks, 2017

More load, more differentiation - Let more flows finish before deadline in data center networks.
Comput. Networks, 2017

Traffic engineering in hybrid SDN networks with multiple traffic matrices.
Comput. Networks, 2017

Cognitive-affective regulation process for micro-expressions based on Gaussian cloud distribution.
CAAI Trans. Intell. Technol., 2017

Intrusion detection research of control system based on robot arm.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Testing Black-Box SDN Applications with Formal Behavior Models.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

A Target Tracking Algorithm Using Grey Model Predicting Kalman Filter in Wireless Sensor Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

CEFF: An efficient approach for traffic anomaly detection and classification.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Joint source selection and transfer optimization for erasure coding storage system.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Yosemite: Efficient scheduling of weighted coflows in data centers.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

MSAID: Automated interference detection for multiple SDN applications.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

Joint Optimization of Task Placement and Routing in Minimizing Inter-DC Coflow Completion Time.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Optimize Routing in Hybrid SDN Network with Changing Traffic.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
New Results on Stability and Stabilization of Networked Control Systems With Short Time-Varying Delay.
IEEE Trans. Cybern., 2016

Synchronization of complex dynamical networks via pinning scheme design under hybrid topologies.
Neurocomputing, 2016

False sequential logic attack on SCADA system and its physical impact analysis.
Comput. Secur., 2016

An accurate distributed scheme for detection of prefix interception.
Sci. China Inf. Sci., 2016

Research progress of artificial psychology and artificial emotion in China.
CAAI Trans. Intell. Technol., 2016

The Power of Prefix Hijackings in the Internet Hierarchy.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

FDRC - Flow duration time based rate control in data center networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Connecting Framework of Smart Devices Based on Linux Container Technology.
Proceedings of the International Conference on Identification, 2016

Evaluating the Economic Effect of the Delayed Differentiation in the Customized Product's Supply Chain Network.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2016

2015
Modeling and Testing of Network Protocols with Parallel State Machines.
IEICE Trans. Inf. Syst., 2015

DIMR: Disjoint Interdomain Multipath Routing.
Comput. Networks, 2015

TADOOP: Mining Network Traffic Anomalies with Hadoop.
Proceedings of the Security and Privacy in Communication Networks, 2015

Route Leaks Identification by Detecting Routing Loops.
Proceedings of the Security and Privacy in Communication Networks, 2015

Mining network traffic anomaly based on adjustable piecewise entropy.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Algebra and algorithms for efficient and correct multipath QoS routing in link state networks.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Measuring the internet routing scalability from the perspective of address allocation.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Incremental deployment for traffic engineering in hybrid SDN network.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

More load, more differentiation - A design principle for deadline-aware congestion control.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Adjustable Piecewise Entropy for network traffic anomaly detection.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An efficient link protection scheme for link-state routing networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Humanoid Robot Head Design Based on Uncanny Valley and FACS.
J. Robotics, 2014

Synchronization between two general complex networks with time-delay by adaptive periodically intermittent pinning control.
Neurocomputing, 2014

Observer-based lag synchronization between two different complex networks.
Commun. Nonlinear Sci. Numer. Simul., 2014

Emotional state transfer model based on FSM.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

Test oriented formal model of SDN applications.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A hybrid link protection scheme for link-state routing networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Let more nodes have a second choice.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Formal Modeling and Systematic Black-Box Testing of SDN Data Plane.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Traffic Engineering in SDN/OSPF Hybrid Network.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

HSR: Using hybrid source routing to achieve scalable Internet routing.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Model Based Black-Box Testing of SDN Applications.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

False Logic Attacks on SCADA Control System.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Synchronization in complex dynamical networks based on the feedback of scalar signals.
Neural Comput. Appl., 2013

A fault diagnosis method of Smart Grid based on rough sets combined with genetic algorithm and tabu search.
Neural Comput. Appl., 2013

Indoor Scene Classification Based on the Bag-of-Words Model of Local Feature Information Gain.
IEICE Trans. Inf. Syst., 2013

Sign what you really care about - Secure BGP AS-paths efficiently.
Comput. Networks, 2013

Performance evaluation of software-defined networking with real-life ISP traffic.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

MLSA: A link-state multipath routing algorithm.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

Distributed Access Scheme for body area networks.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

Removing content consumers from mapping system.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Dynamic distributed algorithm for computing multiple next-hops on a tree.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Reachability Graph Based Hierarchical Test Generation for Network Protocols Modeled as Parallel Finite State Machines.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

DIMR: Disjoint Interdomain Multipath Routing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Lip AUs Detection by Boost-SVM and Gabor.
J. Softw., 2012

Affective transfer computing model based on attenuation emotion mechanism.
J. Multimodal User Interfaces, 2012

Detecting prefix hijackings in the internet with argus.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

A simple synchronization criterion for a complex network based on the feedback.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Development of OLED Panel Defect Detection System through Improved Otsu Algorithm.
Proceedings of the Intelligent Robotics and Applications - 5th International Conference, 2012

An Algorithm Model for Gross Cognitive Reappraisal Strategy.
Proceedings of the Intelligent Autonomous Systems 12, 2012

Research on the Personalized Interaction Model Driven by User Behavior.
Proceedings of the Intelligent Autonomous Systems 12, 2012

The management system with emotional virtual human based on smart home.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Research and designed of a structured scalable robot control system based on real-time bus.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Juvenile detection by LBP and SVM.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Cognitive-affective regulation process for micro-expressions in active field state space.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Least frequency-delay-product caching replacement for distributed mapping systems in the core-edge network separation architecture.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012

2011
A formal approach to robustness testing of network protocol with time constraints.
Secur. Commun. Networks, 2011

Individual difference of artificial emotion applied to a service robot.
Frontiers Comput. Sci. China, 2011

Gaze estimation in a gaze tracking system.
Sci. China Inf. Sci., 2011

Neural Network-Based Dynamic Surface Control of Nonlinear Systems with Unknown Virtual Control Coefficient.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

Protocol Security Testing with SPIN and TTCN-3.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Argus: An accurate and agile system to detecting IP prefix hijacking.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Internet Flattening: Monitoring and Analysis of Inter-Domain Routing.
Proceedings of IEEE International Conference on Communications, 2011

Research of Rapid Attention-Information Extraction in Human-Robot Interaction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Testing of a source address validation protocol with parallel parameterized extended finite state machines.
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

2010
Robust Global Exponential Synchronization of Uncertain Chaotic Delayed Neural Networks via Dual-Stage Impulsive Control.
IEEE Trans. Syst. Man Cybern. Part B, 2010

Emotional gait generation for a humanoid robot.
Int. J. Autom. Comput., 2010

Skin Region Tracking Using Hybrid Color Model and Gradient Vector Flow.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Design of emotional Intelligent Tutor System based on HMM.
Proceedings of the Sixth International Conference on Natural Computation, 2010

A neutral layered mapping system with two-stage cache for a scalable Internet.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
Research of Autonomous Active Control for Virtual Human Based on Emotion-Driven Model.
Trans. Edutainment, 2009

TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks.
Proceedings of the Testing of Software and Communication Systems, 2009

Operation of Reservoir Based on Chaos Ant Colony Algorithm.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

New Algorithm for Computing Tolerance Matrix.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

A three-step dynamic threshold method to cluster BGP updates into routing events.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

Measuring IP Address Fragmentation from BGP Routing Dynamics.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

The internet measurement of VoIP on different transport layer rotocols.
Proceedings of the 2009 International Conference on Information Networking, 2009

An Improved Greedy Search Algorithm of Bayesian Network Structures for Facial Action Units Recognition.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Study on Unified Model of Emotional State in HCI.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A Design and Research of Eye Gaze Tracking System Based on Stereovision.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Emotional Particle Swarm Optimization.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

The stability study of biped robot based on GA and neural network.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

A novel LMI approach to global impulsive exponential synchronization of chaotic delayed neural networks.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

H<sub>infinity</sub> control for T-S fuzzy neutral systems with time-varying delays and actuator saturation.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Using Quotient Image and Linear Subspace for Face Recognition under Arbitrary Illumination Conditions.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009

SIP Robustness Testing Based on TTCN-3.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Research on Artificial Psychology Based on Multimodal Interactive Service Robot.
Int. J. Virtual Real., 2008

Affective Model for Intelligent Virtual Agent Based on PFCM.
Int. J. Virtual Real., 2008

The application of a meshless method to consolidation analysis of saturated soils with anisotropic damage.
Comput. Geosci., 2008

A TTCN-3-based protocol testing system and its extension.
Sci. China Ser. F Inf. Sci., 2008

A formal method to real-time protocol interoperability testing.
Sci. China Ser. F Inf. Sci., 2008

A Facial Expression Recognition Algorithm Based on Feature Fusion.
Proceedings of the PACIIA 2008, 2008

A Formal Approach to Robustness Testing of Network Protocol.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

An Affective Model Applied in Playmate Robot for Children.
Proceedings of the Advances in Neural Networks, 2008

Performance testing of Mobile IPv6 protocol.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Facial Action Units Recognition Based on Fuzzy Kernel Clustering.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Mutation Testing of Protocol Messages Based on Extended TTCN-3.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Adaptive Synchronization Between Two Different Chaotic Neural Networks With Time Delay.
IEEE Trans. Neural Networks, 2007

A damage-softening statistical constitutive model considering rock residual strength.
Comput. Geosci., 2007

A Robot that learns and teaches english language to native Chinese children.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Investigating the Uncanny Valley and human desires for interactive robots.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

An Embedded System of Face Recognition Based on ARM and HMM.
Proceedings of the Entertainment Computing, 2007

Application and Research on Affection Model Based on Bayesian Network.
Proceedings of the Entertainment Computing, 2007

Comparative Studies of Fuzzy Genetic Algorithms.
Proceedings of the Advances in Neural Networks, 2007

A Synthetic Streaming Quality Measurement System on IP Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Conversational Model Based VoIP Traffic Generation.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Facial Complex Expression Recognition Based on Fuzzy Kernel Clustering and Support Vector Machines.
Proceedings of the Third International Conference on Natural Computation, 2007

Artificial Psychology.
Proceedings of the Human Interface and the Management of Information. Methods, 2007

2006
Study of stress waves in geomedia and effect of a soil cover layer on wave attenuation using a 1-D finite-difference method.
Comput. Geosci., 2006

Analysis of factors influencing the solution of the consolidation problem by using an element-free Galerkin method.
Comput. Geosci., 2006

Using Timed TTCN-3 in Interoperability Testing for Real-Time Communication Systems.
Proceedings of the Testing of Communicating Systems, 2006

An Improved Genetic Algorithm of Optimum Path Planning for Mobile Robots.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Affective Computing Model Based on Emotional Psychology.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

An Affective Intelligent Tutoring System Based on Artificial Psychology.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

GFHM Model and Control for Uncertain Chaotic System.
Proceedings of the Computational Intelligence, 2006

Expression Animation of Interactive Virtual Humans Based on HMM Emotion Model.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

2005
Chaotifying Fuzzy Hyperbolic Model Using impulsive and Nonlinear Feedback Control Approaches.
Int. J. Bifurc. Chaos, 2005

The Soft Computing on Artificial Psychology.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

Chaotification of nonlinear systems described by the fuzzy hyperbolic model.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A Model That Simulates the Interplay Between Emotion and Internal Need.
Proceedings of the Affective Computing and Intelligent Interaction, 2005

Construction of Virtual Assistant Based on Basic Emotions Theory.
Proceedings of the Affective Computing and Intelligent Interaction, 2005

The Research of a Teaching Assistant System Based on Artificial Psychology.
Proceedings of the Affective Computing and Intelligent Interaction, 2005

Facial Expression Recognition Using HLAC Features and WPCA.
Proceedings of the Affective Computing and Intelligent Interaction, 2005

Real-Time Facial Expression Recognition System Based on HMM and Feature Point Localization.
Proceedings of the Affective Computing and Intelligent Interaction, 2005

2004
Chaotifying Fuzzy Hyperbolic Model Using Adaptive Inverse Optimal Control Approach.
Int. J. Bifurc. Chaos, 2004

Towards interoperability test generation of time dependent protocols: a case study.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Anticontrol of the fuzzy hyperbolic model.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2002
The Modeling of Artificial Psychology.
Proceedings of the International Conference on Artificial Intelligence, 2002

2001
An expert system of commodity choose applied with artificial psychology.
Proceedings of the IEEE International Conference on Systems, 2001

1983
NC-Programmierung: maschinennaher Einsatz von fertigungstechn. orientierten Programmiersystemen.
PhD thesis, 1983


  Loading...