Zhiyuan Tan

According to our database1, Zhiyuan Tan authored at least 31 papers between 2009 and 2018.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Virtual Resource Allocation for Heterogeneous Services in Full Duplex-Enabled SCNs With Mobile Edge Computing and Caching.
IEEE Trans. Vehicular Technology, 2018

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
MONET, 2018

Moving Towards Highly Reliable and Effective Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2018

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018

2017
Heterogeneous Services Provisioning in Small Cell Networks with Cache and Mobile Edge Computing.
CoRR, 2017

Joint Access Selection and Resource Allocation in Cache-Enabled HCNs with D2D Communications.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A framework for data security in cloud using collaborative intrusion detection scheme.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Virtual resource allocation for heterogeneous services in full duplex-enabled small cell networks with cache and MEC.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Joint Resource Allocation in Cache-Enabled Small Cell Networks with Massive MIMO and Full Duplex.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.
IEEE Trans. Computers, 2016

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Social-aware peer discovery and resource allocation for device-to-device communication.
Proceedings of the Digital Media Industry & Academic Forum, 2016

2015
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

2014
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
IEEE Trans. Parallel Distrib. Syst., 2014

Intrusion detection method based on nonlinear correlation measure.
IJIPT, 2014

Improving cloud network security using the Tree-Rule firewall.
Future Generation Comp. Syst., 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Computing, 2014

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Stateful Mechanism for the Tree-Rule Firewall.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Novel Feature Selection Approach for Intrusion Detection Data Classification.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.
Computer Networks, 2013

2012
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Intrusion detection using GSAD model for HTTP traffic on web services.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
Web Service Locating Unit in RFID-Centric Anti-counterfeit System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Intrusion Detection Using Geometrical Structure.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009


  Loading...