Zhiping Cai

According to our database1, Zhiping Cai authored at least 101 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier.
Security and Communication Networks, 2019

A Survey on Edge Computing Systems and Tools.
Proceedings of the IEEE, 2019

Adaptive duty cycle control-based opportunistic routing scheme to reduce delay in cyber physical systems.
IJDSN, 2019

A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities.
Future Generation Comp. Syst., 2019

Optimizing the Coverage via the UAVs With Lower Costs for Information-Centric Internet of Things.
IEEE Access, 2019

Fuzzy Clustering: A New Clustering Method in Heterogeneous Medical Records Searching.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Discovering New Sensitive Words Based on Sensitive Information Categorization.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks.
Sensors, 2018

Adding Active Slot Joint Larger Broadcast Radius for Fast Code Dissemination in WSNs.
Sensors, 2018

A Cross-Layer Optimized Opportunistic Routing Scheme for Loss-and-Delay Sensitive WSNs.
Sensors, 2018

An Effective Delay Reduction Approach through a Portion of Nodes with a Larger Duty Cycle for Industrial WSNs.
Sensors, 2018

Minimizing Delay and Transmission Times with Long Lifetime in Code Dissemination Scheme for High Loss Ratio and Low Duty Cycle Wireless Sensor Networks.
Sensors, 2018

Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks.
Sensors, 2018

An Energy Conserving and Transmission Radius Adaptive Scheme to Optimize Performance of Energy Harvesting Sensor Networks.
Sensors, 2018

Caching Joint Shortcut Routing to Improve Quality of Service for Information-Centric Networking.
Sensors, 2018

Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.
Sensors, 2018

A Survey on Security-Aware Measurement in SDN.
Security and Communication Networks, 2018

Security and Privacy in the Medical Internet of Things: A Review.
Security and Communication Networks, 2018

Network Security and Management in SDN.
Security and Communication Networks, 2018

Minimum-cost mobile crowdsourcing with QoS guarantee using matrix completion technique.
Pervasive and Mobile Computing, 2018

Location Privacy-Preserving Data Recovery for Mobile Crowdsensing.
IMWUT, 2018

Reliable Code Disseminations Through Opportunistic Communication in Vehicular Wireless Networks.
IEEE Access, 2018

Privacy-Preserving Protocol for Sink Node Location in Telemedicine Networks.
IEEE Access, 2018

Orchestrating Data as a Services-Based Computing and Communication Model for Information-Centric Internet of Things.
IEEE Access, 2018

From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Localized Incomplete Multiple Kernel k-means.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Genetic Algorithm Based Method of Early Warning Rule Mining for Student Performance Prediction.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

JSPRE: A Large-Scale Detection of Malicious JavaScript Code Based on Pre-filter.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System.
IEEE/ACM Trans. Netw., 2017

Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement.
IEEE/ACM Trans. Netw., 2017

Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders.
Security and Communication Networks, 2017

FIDC: A framework for improving data credibility in mobile crowdsensing.
Computer Networks, 2017

Edge-based Content-aware Crowdsourcing Approach for Image Sensing in Disaster Environment.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Session-Based Network Intrusion Detection Using a Deep Learning Architecture.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017

Detecting Rogue AP with the Crowd Wisdom.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A survey of data mining technology on electronic medical records.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks.
Wireless Networks, 2016

Providing flexible services for heterogeneous vehicles: an NFV-based approach.
IEEE Network, 2016

A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard.
IEEE Network, 2016

Applying a new localized generalization error model to design neural networks trained with extreme learning machine.
Neural Computing and Applications, 2016

A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks.
IJAACS, 2016

Machine Learning Combining with Visualization for Intrusion Detection: A Survey.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2016

Leveraging Crowd to improve data credibility for mobile crowdsensing.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Optimized Virtual Network Functions Migration for NFV.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Improving Data Credibility for Mobile Crowdsensing with Clustering and Logical Reasoning.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Efficient Distributed Joint Detection of Widespread Events in Large Networked Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Reasonably Migrating Virtual Machine in NFV-Featured Networks.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Algorithms to speedup pattern matching for network intrusion detection systems.
Computer Communications, 2015

Towards security-aware virtual network embedding.
Computer Networks, 2015

WAlloc: An efficient wear-aware allocator for non-volatile main memory.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Real-time micro-vibration measurement with laser phase modulation.
Proceedings of the International Conference on Communications, 2015

2014
RepFlow on node.js: Cutting Tail Latency in Data Center Networks at the Applications Layer.
CoRR, 2014

Using multiple unmanned aerial vehicles to maintain connectivity of MANETs.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Security-aware virtual network embedding.
Proceedings of the IEEE International Conference on Communications, 2014

2013
FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs.
IEEE Trans. Wireless Communications, 2013

A demand-driven virtual disk prefetch mechanism for seamless mobility of personal computing environments.
The Journal of Supercomputing, 2013

A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering.
IEEE Trans. Computers, 2013

Extreme Learning Machines.
IEEE Intelligent Systems, 2013

Low Latency Datacenter Networking: A Short Survey.
CoRR, 2013

2012
Fiber Sensor Systems Based on Fiber Laser and Microwave Photonic Technologies.
Sensors, 2012

Multicast Service-Oriented Virtual Network Embedding in Wireless Mesh Networks.
IEEE Communications Letters, 2012

ISAR: Improved Situation-Aware Routing Method for Wireless Mesh Backbones.
IEEE Communications Letters, 2012

Flow level detection and filtering of low-rate DDoS.
Computer Networks, 2012

Sampling Attack against Active Learning in Adversarial Environment.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2012

2011
Active Learning to Defend Poisoning Attack against Semi-Supervised Intrusion Detection Classifier.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2011

Novel L-band multiwavelength raman fiber laser based on three-stage mixed-cascaded phosphor-silicate Raman process.
Proceedings of the 2011 International Conference on Advanced Infocom Technology, 2011

2010
RRED: robust RED algorithm to counter low-rate denial-of-service attacks.
IEEE Communications Letters, 2010

A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Misleading Attack against Semi-supervised Learning for Intrusion Detection.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Distributed TCAM Coprocessor Architecture for Integrated Policy Filtering and Content Filtering.
Proceedings of IEEE International Conference on Communications, 2010

Virtual Network Embedding for Evolving Networks.
Proceedings of the Global Communications Conference, 2010

2009
DPM: A Demand-driven Virtual Disk Prefetch Mechanism for Mobile Personal Computing Environments.
Proceedings of the NPC 2009, 2009

Virtual Disk Image Reclamation for Software Updates in Virtual Machine Environments.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

DDoS Attack Detection Using IP Address Feature Interaction.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

Fast, On-Demand Software Deployment with Lightweight, Independent Virtual Disk Images.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
Proceedings of the Security Technology, 2009

Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.
Proceedings of the Security Technology, 2009

DDoS Attack Detection Algorithm Using IP Address Features.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU.
Proceedings of the Advanced Parallel Processing Technologies, 8th International Symposium, 2009

2008
Efficient disk encryption and verification through trusted nonce.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Distributed Algorithm to Approximate Node-Weighted Minimum alpha-Connected (Theta, k)-Coverage in Dense Sensor Networks.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software Deployment.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Directed filter for dominant direction fuzzy set in content-based image retrieval.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Texture Analysis Using Modified Computational Model of Grating Cells in Content-Based Medical Image Retrieval.
Proceedings of the Medical Imaging and Informatics, 2nd International Conference, 2007

2005
Research on Risk Probability Estimating Using Fuzzy Clustering for Dynamic Security Assessment.
Proceedings of the Rough Sets, 2005

Distributed Active Measuring Link Bandwidth in IP Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Efficiently Passive Monitoring Flow Bandwidth.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Using Passive Measuring to Calibrate Active Measuring Latency.
Proceedings of the Information Networking, 2005

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Algorithm.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Passive Calibration of Active Measuring Latency.
Proceedings of the Networking, 2005

On the Placement of Active Monitor in IP Network.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Efficiently monitoring link bandwidth in IP networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

On a Novel Methodology for Estimating Available Bandwidth Along Network Paths.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On a Novel Filtering Mechanism for Capacity Estimation: Extended Version.
Proceedings of the Technologies for Advanced Heterogeneous Networks, 2005

An Approximation Algorithm for Weak Vertex Cover Problem in Network Management.
Proceedings of the Algorithmic Applications in Management, First International Conference, 2005

2004
The Analysis of Efficient Monitoring Grid Traffic with Flow Conservation Equation.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...