Zhou Zhou

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China


According to our database1, Zhou Zhou authored at least 28 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Property graph representation learning for node classification.
Knowl. Inf. Syst., January, 2024

2023
Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

GoGDDoS: A Multi-Classifier for DDoS Attacks Using Graph Neural Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

DarkFT: Automatic Scanning Behavior Analysis with FastText in Darknet Traffic.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4.
Proceedings of the IEEE International Conference on Communications, 2022

GDMD: A Transmission Control Scheme with Block Information-aware for Delay Sensitive Multimedia.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic with Direction Information.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Attributed Heterogeneous Graph Neural Network for Malicious Domain Detection.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
BPA: The Optimal Placement of Interdependent VNFs in Many-Core System.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
SAED: A Self-Adaptive Encryption and Decryption Architecture.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Janus: A User-Level TCP Stack for Processing 40 Million Concurrent TCP Connections.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

SASD: A Self-Adaptive Stateful Decompression Architecture.
Proceedings of the IEEE Global Communications Conference, 2018

2015
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Intraday Volatility Spillovers between Index Futures and Spot Market: Evidence from China.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

GuidedTracker: Track the victims with access logs to finding malicious web pages.
Proceedings of the IEEE Global Communications Conference, 2014

2013
File-aware P2P traffic classification: An aid to network management.
Peer-to-Peer Netw. Appl., 2013

A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching.
Proceedings of the Trustworthy Computing and Services, 2013

2012
RocketTC: A high throughput traffic classification architecture.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Price Discovery in Index Futures Market - Based on Common Factor Models.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
File-aware P2P traffic classification.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

File-Aware P2P Traffic Classification and Management.
Proceedings of the 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), 2011

2010
A High-Performance URL Lookup Engine for URL Filtering Systems.
Proceedings of IEEE International Conference on Communications, 2010


  Loading...