Wanlei. Zhou
#109,158
Most Influential Person Now
Wanlei. Zhou's AcademicInfluence.com Rankings
Wanlei. Zhoucomputer-science Degrees
Computer Science
#4071
World Rank
#4284
Historical Rank
Data Mining
#57
World Rank
#57
Historical Rank
Algorithms
#123
World Rank
#124
Historical Rank
Computational Linguistics
#320
World Rank
#325
Historical Rank

Download Badge
Computer Science
Why Is Wanlei. Zhou Influential?
(Suggest an Edit or Addition)Wanlei. Zhou's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- The Computer Journal (1958) (1263)
- Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures (2012) (387)
- Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics (2011) (369)
- Teaching and learning online with wikis (2004) (323)
- Network Traffic Classification Using Correlation Information (2013) (316)
- Robust Network Traffic Classification (2015) (305)
- Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks (2011) (270)
- Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient (2012) (264)
- Traceback of DDoS Attacks Using Entropy Variations (2011) (221)
- Differentially Private Data Publishing and Analysis: A Survey (2017) (212)
- Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks (2009) (202)
- Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions (2013) (170)
- Modeling the Propagation of Worms in Networks: A Survey (2014) (161)
- Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies (2017) (154)
- Correlated Differential Privacy: Hiding Information in Non-IID Data Set (2015) (153)
- A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks (2015) (149)
- Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study (2005) (145)
- Twitter spam detection: Survey of new approaches and comparative study (2017) (131)
- A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade (2017) (130)
- 6 million spam tweets: A large ground truth for timely Twitter spam detection (2015) (125)
- A Manifesto for Future Generation Cloud Computing (2017) (121)
- An Effective Network Traffic Classification Method with Unknown Flow Detection (2013) (115)
- Modeling Propagation Dynamics of Social Network Worms (2013) (114)
- Detection and defense of application-layer DDoS attacks in backbone web traffic (2014) (112)
- Security and privacy in 6G networks: New areas and new challenges (2020) (111)
- A blockchain-based location privacy-preserving crowdsensing system (2019) (109)
- Statistical Features-Based Real-Time Detection of Drifted Twitter Spam (2017) (108)
- Chaos theory based detection against network mimicking DDoS attacks (2009) (107)
- Robust Histogram Shape-Based Method for Image Watermarking (2015) (105)
- Algorithms and Architectures for Parallel Processing (2011) (105)
- A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection (2015) (104)
- A Dual-Channel Time-Spread Echo Method for Audio Watermarking (2012) (102)
- Discriminating DDoS attack traffic from flash crowd through packet arrival patterns (2011) (97)
- Replication Techniques in Distributed Systems (1999) (96)
- Information theory based detection against network behavior mimicking DDoS attacks (2008) (91)
- Control Flow-Based Malware VariantDetection (2014) (90)
- Internet Traffic Classification Using Constrained Clustering (2014) (90)
- To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks (2014) (88)
- Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking (2011) (85)
- Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks (2014) (84)
- Discriminating DDoS Flows from Flash Crowds Using Information Distance (2009) (84)
- Security in the online e-learning environment (2005) (84)
- Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics (2009) (82)
- E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT (2019) (76)
- Location Privacy and Its Applications: A Systematic Study (2018) (74)
- PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance (2016) (74)
- A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems (2013) (73)
- Using the k-core decomposition to analyze the static structure of large-scale software systems (2010) (72)
- Unsupervised traffic classification using flow statistical properties and IP packet payload (2013) (72)
- Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking (2012) (67)
- Rumor Source Identification in Social Networks with Time-Varying Topology (2018) (67)
- Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware (2013) (66)
- Generating regular expression signatures for network traffic classification in trusted network management (2012) (66)
- Modeling and Analysis on the Propagation Dynamics of Modern Email Malware (2014) (64)
- Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things (2018) (64)
- FogRoute: DTN-Based Data Dissemination Model in Fog Computing (2017) (62)
- An effective privacy preserving algorithm for neighborhood-based collaborative filtering (2014) (61)
- A Mobile Learning Model for Universities -Re-blending the Current Learning Environment (2009) (60)
- Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks (2008) (59)
- Differential privacy for neighborhood-based Collaborative Filtering (2013) (56)
- Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach (2019) (56)
- A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking (2016) (53)
- Proceedings fifth International Conference on algorithms and architectures for parallel processing (2002) (53)
- On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks (2016) (51)
- Secure Tag Search in RFID Systems Using Mobile Readers (2015) (50)
- Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture (2018) (49)
- A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks (2018) (48)
- Modeling malicious activities in cyber space (2015) (47)
- Differential Privacy and Applications (2017) (47)
- CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd (2010) (46)
- Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning (2017) (46)
- K-Center: An Approach on the Multi-Source Identification of Information Diffusion (2015) (44)
- More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence (2020) (44)
- Distributed Denial of Service (DDoS) detection by traffic pattern analysis (2014) (44)
- Secure RFID Tag Ownership Transfer Based on Quadratic Residues (2013) (43)
- Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks (2016) (43)
- Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning (2020) (43)
- Cultural Issues in Online Learning - Is Blended Learning a Possible Solution? (2003) (42)
- Lazy Collaborative Filtering for Data Sets With Missing Values (2013) (41)
- Asymmetric self-learning for tackling Twitter Spam Drift (2015) (40)
- An Innovative Spam Filtering Model Based on Support Vector Machine (2005) (40)
- A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags (2014) (39)
- Delay Tolerant Networks (2015) (39)
- Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models (2017) (38)
- Distributed network systems - from concepts to implementations (2004) (38)
- Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks (2013) (37)
- Understanding Transition towards Information Security Culture Change (2005) (36)
- A minimum disclosure approach to authentication and privacy in RFID systems (2012) (36)
- Locating Defense Positions for Thwarting the Propagation of Topological Worms (2012) (35)
- Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy (2015) (35)
- The efficient imputation method for neighborhood-based collaborative filtering (2012) (35)
- Mark-aided distributed filtering by using neural network for DDoS defense (2005) (34)
- Internet traffic clustering with side information (2014) (34)
- Correlated Differential Privacy: Feature Selection in Machine Learning (2020) (34)
- Source-based filtering scheme against DDOS attacks (2008) (31)
- GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems (2020) (30)
- Using epidemic betweenness to measure the influence of users in complex networks (2017) (30)
- A general cloud firewall framework with dynamic resource allocation (2013) (30)
- Trace IP packets by flexible deterministic packet marking (FDPM) (2004) (30)
- Spammers Are Becoming "Smarter" on Twitter (2016) (29)
- Frequency distribution of TATA Box and extension sequences on human promoters (2006) (28)
- Privacy-preserving topic model for tagging recommender systems (2015) (28)
- The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks (2022) (28)
- Defending Grid Web Services from XDoS attacks by SOTA (2009) (28)
- Differentially private model publishing in cyber physical systems (2020) (27)
- Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy (2018) (27)
- A Defense System against DDoS Attacks by Large-Scale IP Traceback (2005) (27)
- From distributed machine learning to federated learning: In the view of data privacy and security (2020) (27)
- Efficient algorithm for mobile multicast using anycast group (2001) (26)
- Malware Propagations in Wireless Ad Hoc Networks (2018) (26)
- Fog Computing and Its Applications in 5G (2017) (26)
- Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks (2003) (26)
- From e-Learning to Virtual Learning Community: Bridging the Gap (2004) (26)
- Network and system security (2009) (25)
- An innovative analyser for multi-classifier e-mail classification based on grey list analysis (2009) (25)
- On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment (2017) (25)
- Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning (2020) (25)
- Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype (2008) (24)
- Effective DDoS Attacks Detection Using Generalized Entropy Metric (2009) (24)
- Blockchain for secure location verification (2020) (24)
- A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries (2020) (23)
- Fairness in Semi-Supervised Learning: Unlabeled Data Help to Reduce Discrimination (2020) (22)
- An analysis of update ordering in distributed replication systems (2004) (22)
- DDoS discrimination by Linear Discriminant Analysis (LDA) (2012) (22)
- Improving Data Utility Through Game Theory in Personalized Differential Privacy (2019) (21)
- Dynamic Feature Selection for Spam Filtering Using Support Vector Machine (2007) (21)
- Adversaries or allies? Privacy and deep learning in big data era (2018) (21)
- A Hard Real-Time Communication Control Protocol Based on the Ethernet (2000) (20)
- Protecting web services with Service Oriented Traceback Architecture (2008) (20)
- A secure search protocol for low cost passive RFID tags (2017) (20)
- Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms (2007) (19)
- Secure Balance Planning of Off-blockchain Payment Channel Networks (2020) (19)
- An Analytical Model for DDoS Attacks and Defense (2006) (19)
- Eliminating Errors in Worm Propagation Models (2011) (19)
- Mining streams of short text for analysis of world-wide event evolutions (2015) (18)
- A dynamical Deterministic Packet Marking scheme for DDoS traceback (2013) (18)
- Email Categorization Using Multi-stage Classification Technique (2007) (18)
- Managing Replicated Remote Procedure Call Transactions (1999) (18)
- Null Model and Community Structure in Multiplex Networks (2018) (17)
- Using Multi-Core Processors to Support Network Security Applications (2008) (17)
- Wikis: Collaborative Virtual Learning Environments (2006) (17)
- Protecting Information Systems from DDoS Attack Using Multicore Methodology (2008) (17)
- GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing (2019) (16)
- A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning (2018) (16)
- Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags (2015) (16)
- Research on network anycast (2002) (16)
- Are the popular users always important for information dissemination in online social networks? (2014) (16)
- Robust network traffic identification with unknown applications (2013) (16)
- Efficient Web Browsing with Perfect Anonymity Using Page Prefetching (2010) (15)
- Top-N Recommendations by Learning User Preference Dynamics (2013) (15)
- Spam filtering for network traffic security on a multi-core environment (2009) (15)
- An Innovative Analyser for Email Classification Based on Grey List Analysis (2007) (15)
- Traffic Flow Prediction for Road Intersection Safety (2018) (15)
- Spam Filtering based on Preference Ranking (2005) (14)
- Secure Image Retrieval Based on Visual Content and Watermarking Protocol (2011) (14)
- Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks (2021) (14)
- Protecting information infrastructure from DDoS attacks by MADF (2006) (14)
- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing (2016) (14)
- A survey of recommendation techniques based on offline data processing (2015) (14)
- Semi-supervised and Compound Classification of Network Traffic (2012) (14)
- Answering differentially private queries for continual datasets release (2017) (14)
- Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics (2012) (14)
- M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models (2012) (13)
- Discovery of stop regions for understanding repeat travel behaviors of moving objects (2016) (13)
- Email Categorization Using (2+1)-Tier Classification Algorithms (2008) (13)
- Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks (2008) (13)
- Distributed Defense Against Distributed Denial-of-Service Attacks (2005) (13)
- An Active Distributed Defense System to Protect Web Applications from DDOS Attacks (2004) (13)
- Private collaborative filtering under untrusted recommender server (2020) (13)
- Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture (2008) (12)
- Learning Rating Patterns for Top-N Recommendations (2012) (12)
- A learning method for Top-N recommendations with incomplete data (2013) (12)
- The structure of communities in scale‐free networks (2017) (12)
- Static malware clustering using enhanced deep embedding method (2019) (12)
- An Efficient Algorithm for Application-Layer Anycasting (2002) (12)
- The Microcosmic Model of Worm Propagation (2011) (12)
- An Identity-Based and Revocable Data-Sharing Scheme in VANETs (2020) (12)
- Using Adversarial Noises to Protect Privacy in Deep Learning Era (2018) (12)
- Secure ownership transfer in multi-tag/multi-owner passive RFID systems (2013) (11)
- A Composite Descriptor for Shape Retrieval (2007) (11)
- Protecting web services from DDoS attacks by SOTA (2008) (11)
- Improving Fake News Detection Using K-means and Support Vector Machine Approaches (2020) (11)
- Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat (2021) (11)
- Ubiquitous Multicore (UM) Methodology for Multimedia (2008) (11)
- Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing (2022) (11)
- Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks (2017) (11)
- An Effective Deferentially Private Data Releasing Algorithm for Decision Tree (2013) (11)
- AdaM: Adaptive-Maximum imputation for neighborhood-based collaborative filtering (2013) (11)
- Visual privacy attacks and defenses in deep learning: a survey (2022) (11)
- Effective metric for detecting distributed denial-of-service attacks based on information divergence (2009) (11)
- Preliminary of Differential Privacy (2017) (10)
- Classifying DDoS packets in high-speed networks (2006) (10)
- A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification (2019) (10)
- A Lightweight Intrusion Alert Fusion System (2010) (10)
- DP-Image: Differential Privacy for Image Data in Feature Space (2021) (10)
- Fault-tolerant servers for the RHODOS system (1997) (10)
- Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection (2010) (10)
- The Development of a Mobile Decision Support System (2001) (10)
- Toward Pervasive Computing in Restaurant (2004) (10)
- Assessing the level of I.T. security culture improvement: Results from three Australian SMEs (2009) (10)
- OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security (2010) (9)
- Building Virtual Learning Communities (2006) (9)
- Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases (2018) (9)
- Authenticated Medical Documents Releasing with Privacy Protection and Release Control (2021) (9)
- Protecting web applications from DDoS attacks by an active distributed defense system (2006) (9)
- Differential Advising in Multiagent Reinforcement Learning (2020) (9)
- GHIRS: Integration of Hotel Management Systems by Web Services (2003) (9)
- An Adaptive Information Grid Architecture for Recommendation System (2003) (9)
- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification (2014) (9)
- Sharable file searching in unstructured Peer-to-peer systems (2010) (9)
- RFID tags - Grouping proof with forward security (2013) (8)
- A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy (2023) (8)
- Classification of Correlated Internet Traffic Flows (2012) (8)
- A rapid prototyping system for distributed information system applications (1994) (8)
- The design and simulation of a hybrid replication control protocol (1999) (8)
- A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags (2012) (8)
- Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms (2020) (8)
- Personalized Privacy Preserving Collaborative Filtering (2017) (8)
- Defending against Distributed Denial of Service (2007) (8)
- Learning User Preference Patterns for Top-N Recommendations (2012) (8)
- Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper) (2017) (8)
- A system for managing remote procedure call transactions (1996) (8)
- Java Sensors and Their Applications (1998) (8)
- Human-Driven Edge Computing and Communication: Part 1 (2017) (8)
- A Differential Game Approach to Patch Injection (2018) (8)
- Primary-backup object replications in Java (1998) (8)
- Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform (2017) (8)
- A secure tag ownership transfer scheme in a closed loop RFID system (2012) (8)
- Offline grouping proof protocol for RFID systems (2013) (8)
- PM: a system for prototyping and monitoring remote procedure call programs (1990) (7)
- Protect Grids from DDoS Attacks (2004) (7)
- Differentially Private Multi-Agent Planning for Logistic-Like Problems (2020) (7)
- Distributed Network Systems: From Concepts to Implementations (Network Theory and Applications) (2006) (7)
- Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks (2007) (7)
- Lease Based Addressing for Event-Driven Wireless Sensor Networks (2006) (7)
- Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification (2021) (7)
- RFID in Healthcare – Current Trends and the Future (2015) (7)
- K-Source: Multiple source selection for traffic offloading in mobile social networks (2016) (7)
- Novel Multi-Keyword Search on Encrypted Data in the Cloud (2019) (7)
- An iteration-based differentially private social network data release (2018) (7)
- Human-Driven Edge Computing and Communication: Part 2 (2018) (7)
- A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags (2012) (7)
- Keynote: Detection of and Defense Against Distributed Denial-of-Service (DDoS) Attacks (2012) (7)
- Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing (2021) (7)
- Game Theoretical Adversarial Deep Learning With Variational Adversaries (2020) (7)
- A reactive system architecture for building fault-tolerant distributed applications (2004) (7)
- Adversarial Attacks Against Deep Generative Models on Data: A Survey (2021) (7)
- Constructing wikis as a platform for online collaboration in an e-learning environment (2004) (6)
- Breast Cancer Prognosis Risk Estimation Using Integrated Gene Expression and Clinical Data (2014) (6)
- Correlated data in differential privacy: Definition and analysis (2020) (6)
- Deferentially Private Tagging Recommendation Based on Topic Model (2014) (6)
- Developing wikis to foster web-based learning communities: an iterative approach (2006) (6)
- Energy-Aware Collaborative Service Caching in a 5G-Enabled MEC With Uncertain Payoffs (2022) (6)
- A Resource-Search and Routing Algorithm within PCDN Autonomy Area (2007) (6)
- A parallel Euler approach for large-scale biological sequence assembly (2005) (6)
- Privacy preserving collaborative filtering for KNN attack resisting (2014) (6)
- The design and implementation of a distributed program monitor (1993) (6)
- Trust, security and privacy for pervasive applications (2013) (6)
- A Resource Allocation Method for Computational Grids Based on On-line Reverse Auction (2009) (6)
- Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks (2013) (6)
- An analysis of spam and its classification techniques based on statistical learning algorithms (2005) (6)
- On the Effectiveness of Flexible Deterministic Packet Marking for DDoS Defense (2007) (6)
- Detecting and tolerating failures in a loosely integrated heterogeneous database system (1999) (6)
- A Data-driven Attack against Support Vectors of SVM (2018) (6)
- Supporting fault-tolerant and open distributed processing using RPC (1996) (6)
- Privacy Intelligence: A Survey on Image Sharing on Online Social Networks (2020) (6)
- Robust image retrieval with hidden classes (2013) (5)
- A Data as a Product Model for Future Consumption of Big Stream Data in Clouds (2015) (5)
- Recognizing Very Small Face Images Using Convolution Neural Networks (2022) (5)
- Improving Recommender Systems Accuracy in Social Networks Using Popularity (2019) (5)
- Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals (2021) (5)
- Blended Learning for Cross-Cultural E-Learning (2003) (5)
- Managing Email Overload with an Automatic Nonparametric Clustering Approach (2007) (5)
- Why it is Hard to Fight against Cyber Criminals? (2012) (5)
- A microscopic competition model and its dynamics analysis on network attacks (2010) (5)
- Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing (2021) (5)
- Malicious Attack Propagation and Source Identification (2018) (5)
- An Object-oriented Design Pattern for Distributed Replication Systems (5)
- Hiding RFID in the Image Matching Based Access Control to a Smart Building (2018) (5)
- FBI: Friendship Learning-Based User Identification in Multiple Social Networks (2018) (5)
- Client–Server Systems (1999) (5)
- RRHGE: A Novel Approach to Classify the Estrogen Receptor Based Breast Cancer Subtypes (2014) (5)
- Edge-based stochastic network model reveals structural complexity of edges (2019) (5)
- Image retrieval based on semantics of intra-region color properties (2008) (4)
- Prediction Model Students' Performance in Online Discussion Forum (2017) (4)
- Identifying cis-regulatory elements by statistical analysis and phylogenetic footprinting and analyzing their coexistence and related gene ontology. (2007) (4)
- Zero-Day Traffic Identification (2013) (4)
- Keynote III: Detection and traceback of DDoS attacks (2008) (4)
- Traffic Identification in Semi-known Network Environment (2013) (4)
- Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks (2021) (4)
- Intelligent DDoS Packet Filtering in High-Speed Networks (2005) (4)
- Location Privacy-Preserving Mechanisms (2018) (4)
- Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow (2004) (4)
- Optimal multicast tree routing for cluster computing in hypercube interconnection networks (2002) (4)
- Privacy Intelligence: A Survey on Image Privacy in Online Social Networks (2020) (4)
- Special issue on recent advances in network and information security - security and communication networks journal (2015) (4)
- Creating a Blended learning model for Cross-cultural E-learning: Putting theory into practice (2005) (4)
- Virtual backbone routing structures in wireless ad-hoc networks (2010) (4)
- Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models (2023) (4)
- Self-adaptive clock synchronization for computational grid (2003) (4)
- An IT Bachelor Degree Using Modern Technologies to Illustrate Core Concepts and Principles and Building Generic Skills (2005) (4)
- Analysis of a patchwork-based audio watermarking scheme (2013) (4)
- 2009 Third International Conference on Network and System Security (2009) (4)
- Dynamic Addressing in Wireless Sensor Networks without Location Awareness (2010) (4)
- Dealing with Network Partitioning: a Case Study (1999) (4)
- The Design and Evaluation of A Token-Based Independent Update Protocol (1999) (4)
- CAFS: a novel lightweight cache‐based scheme for large‐scale intrusion alert fusion (2012) (4)
- Exploring the Foundations of Practicing Online Collaboration (2003) (4)
- Spectral shape descriptor using spherical harmonics (2010) (4)
- A novel mutual authentication scheme with minimum disclosure for RFID systems (2011) (4)
- Reducing the bandwidth requirements of P2P keyword indexing (2005) (4)
- An effective non-parametric method for globally clustering genes from expression profiles (2007) (4)
- Differentially Private Deep Learning (2017) (4)
- Detecting unauthorized RFID tag carrier for secure access control to a smart building (2018) (4)
- Channel Correlation Based Robust Audio Watermarking Mechanism for Stereo Signals (2020) (4)
- Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks (2017) (4)
- Flow Entry Sharing in Protection Design for Software Defined Networks (2017) (4)
- A Model of Execution Time Estimating for RPC-Oriented Programs (1991) (4)
- The design and implementation of an active replication scheme for distributing services in a cluster of workstations (2001) (4)
- Differentially Private Social Network Data Publishing (2017) (4)
- 2010 Fourth International Conference on Network and System Security (2010) (3)
- Differential Private POI Queries via Johnson-Lindenstrauss Transform (2018) (3)
- The Design and Implementation of a Traffic Accident Analysis System (2001) (3)
- Performance evaluation of nested transactions on locally distributed database systems (1996) (3)
- Multi-core Security Defense System (MSDS) (2008) (3)
- A Co-Recommendation Algorithm for Web searching (2002) (3)
- Chapter 43 An Analysis of the Web-Based Client-Server Computing Models (1998) (3)
- Address reuse in wireless sensor networks (2006) (3)
- Hub-Based Reliable Gene Expression Algorithm to Classify ER+ and ER- Breast Cancer Subtypes (2013) (3)
- S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks (2010) (3)
- Fairness Constraints in Semi-supervised Learning (2020) (3)
- Mobility Increases the Risk of Malware Propagations in Wireless Networks (2015) (3)
- Students Reflect on their Learning Community: Survey Results (2004) (3)
- String matching query verification on cloud-hosted databases (2016) (3)
- An architecture of Internet based data processing based on multicast and anycast protocols (2003) (3)
- Privacy Preserving for Tagging Recommender Systems (2013) (3)
- The Multifaceted and Ever-Changing Directions of Information Security — Australia Get Ready! (2005) (3)
- Security in next generation wireless networks (2009) (3)
- A Fault-Tolerant Remote Procedure Call System for Open Distributed Processing (1995) (3)
- Delay Tolerant Networks Based Applications (2015) (3)
- Self-Adaptive Clock Synchronization Based on Clock Precision Difference (2003) (3)
- Network sparse representation: Decomposition, dimensionality-reduction and reconstruction (2020) (3)
- Differentially private query learning: From data publishing to model publishing (2017) (3)
- How using a Wiki can help break the Ice Between Cultures. (2005) (3)
- Differentially Private Recommender System (2017) (3)
- Model-Based Self-Advising for Multi-Agent Learning. (2022) (3)
- Differential Advising in Multi-Agent Reinforcement Learning (2020) (3)
- Private‐encoder: Enforcing privacy in latent space for human face images (2021) (3)
- Corners-Based Composite Descriptor for Shapes (2008) (3)
- Multi‐agent reinforcement learning via knowledge transfer with differentially private noise (2021) (3)
- Identifying Propagation Source in Time-Varying Networks (2018) (3)
- Query verification schemes for cloud-hosted databases: a brief survey (2016) (3)
- The Probability Model of Peer-to-Peer Botnet Propagation (2011) (3)
- Simultaneously Advising via Differential Privacy in Cloud Servers Environment (2019) (2)
- MVGL Analyser for Multi-classifier Based Spam Filtering System (2009) (2)
- Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing (2020) (2)
- Mobile phones as a learning device : is it time to stop the ban? (2009) (2)
- Biological Sequence Assembly and Alignment (2005) (2)
- Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control (2020) (2)
- A Parallel Downloading Algorithm for Redundant Networks (2007) (2)
- Application of fast and robust equalization in communication technology (2003) (2)
- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks (2018) (2)
- Building reliable distributed systems (2001) (2)
- IP spoofing attack and its countermeasures (2004) (2)
- Data Authentication with Privacy Protection (2018) (2)
- Routing Protocols in Delay Tolerant Networks (2015) (2)
- My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media (2017) (2)
- Analysis of the Spreading Influence Variations for Online Social Users under Attacks (2016) (2)
- Speedup of big data transfer on the internet (2016) (2)
- Managing Transactions in a Mobile and Replicated Environment (2)
- An Intrusion Surveillance System to Detect IRC-based DDoS Attacks (2006) (2)
- MAR: Message-aware routing for opportunistic wireless ad hoc networks (2011) (2)
- Improving Top-N Recommendations with User Consuming Profiles (2012) (2)
- A parallel information retrieval method for e-commerce (2009) (2)
- Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels (2021) (2)
- I/O scheduling and performance analysis on multi‐core platforms (2009) (2)
- An Analytical Model on the Propagation of Modern Email Worms (2012) (2)
- A Novel Middleware Based Web Database Model (2004) (2)
- On the Management of Remote Procedure Call Transactions (1991) (2)
- Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching (2008) (2)
- The maximum imputation framework for neighborhood-based collaborative filtering (2014) (2)
- Modeling and Analysis for Thwarting Worm Propagation in Email Networks (2013) (2)
- A token-based independent update protocol for managing replicated objects (2002) (2)
- Quality-of-service routing for web-based multimedia servers (2003) (2)
- Who Spread to Whom? Inferring Online Social Networks with User Features (2018) (2)
- A solution for fault tolerance in replicated database systems (2006) (2)
- Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study (2023) (2)
- Location Privacy in Mobile Applications (2018) (2)
- Pervasive computing at tableside: a wireless web-based ordering system (2007) (2)
- Towards an Interactive Architecture for Web-Based Databases (2003) (2)
- A Load Balancing Algorithm for Web Based Server Grids (2003) (2)
- A tool for assisting the understanding of distributed programs (1996) (1)
- A Solution for Fault-Tolerance in Replicated Database Systems (2003) (1)
- Parallel Recovery in a Replicated Object Environment (1996) (1)
- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling (2005) (1)
- A Mesh Based Anycast Routing Protocol for Ad Hoc Networks (2005) (1)
- Null Model and Community Structure in Heterogeneous Networks (2019) (1)
- Future Directions and Conclusion (2018) (1)
- An architecture for building reliable distributed object-based systems (1997) (1)
- A layered distributed program debugger (1993) (1)
- A Quick-Response Real-Time Stepping Stone Detection Scheme (2010) (1)
- E-Learning over Mobile Phone Technology: Best Practices and Guidelines (2009) (1)
- An Efficient Reliable Architecture for Application Layer Anycast Service (2005) (1)
- Object-oriented finite element analysis: a distributed approach to mesh generation (2002) (1)
- Adjacency Cache: Fast Web Cache Indexing and Lookup (2007) (1)
- Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings (2005) (1)
- Modelling personal preferences for Top-N movie recommendations (2014) (1)
- Traceback of DDoS Attacks Using (2011) (1)
- STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation (2019) (1)
- Fault-Tolerant Servers for Anycast Communication (2003) (1)
- Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing (2005) (1)
- IPA: Integrated predictive gene signature from gene expression based breast cancer patient samples (2014) (1)
- Anonymous Data Forwarding in Human Associated Delay Tolerant Networks (2013) (1)
- Fault Tolerant Computing: An Improved Recursive Algorithm (1990) (1)
- Correlated Differential Privacy for Non-IID Datasets (2017) (1)
- Special Issue on ‘Recent Advances in Network and Information Security’ (2012) (1)
- THE DESIGN OF A MOBILE DECISION SUPPORT SYSTEM (2000) (1)
- A proposed blended mobile learning model for application in higher education (2009) (1)
- Advances in network and system security (2012) (1)
- Update ordering in distributed replication systems (2001) (1)
- W3 - IoT-ET 2012: WCNC 2012 Workshop on Internet of Things Enabling Technologies, Embracing Machine-to- Machine Communications and Beyond - Program (2012) (1)
- Special issue: Building secure parallel and distributed networks and systems (2011) (1)
- Reliable Downloading Algorithms for BitTorrent-like Systems (2009) (1)
- Differentially private data publishing: Non-interactive setting (2017) (1)
- Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial (2005) (1)
- Non‐catalyst synthesis and thermal behaviors of three‐arm star aliphatic polycarbonates (2015) (1)
- Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings (2012) (1)
- Future Directions and Conclusions (2018) (1)
- A tool for constructing service replication systems (1999) (1)
- Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions (2019) (1)
- Comparative Study and Numerical Analysis (2018) (1)
- The cost of recovery protocols in Web-based database systems (2004) (1)
- Identifying Transcription Factor Binding Sites in Promoters of Human Genes (2006) (1)
- Giving lectures a voice for a cross-cultural audience (2004) (1)
- An analysis of update ordering in a cluster of replicated servers (2002) (1)
- A mobile agent-based routing algorithm and some theoretical analysis (2011) (1)
- Differentially private spatial crowdsourcing (2017) (1)
- Network attacks and defense systems (2008) (1)
- An abnormal‐based approach to effectively detect DDoS attacks (2009) (1)
- A locality aware cache diffusion system (2010) (1)
- Anycast Group Algorithms for Mobile Multicast Communications (1999) (1)
- Minimizing the Limitations of GL Analyser of Fusion Based Email Classification (2009) (1)
- Load Balance Algorithms for Anycast (2004) (1)
- Network services for distributed computing (1990) (1)
- Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned (2003) (1)
- Video lectures for cross-cultural use: a three phase model (2004) (1)
- Privacy Protected Routing in Delay Tolerant Networks (2015) (1)
- Keynote Speech VI (2015) (1)
- Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid (2003) (1)
- Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks (2018) (1)
- AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs (2012) (1)
- Special Issue: Multi‐core Supported Network and System Security (2009) (0)
- Sparse representation for heterogeneous information networks (2023) (0)
- Message from the CSS 2009 workshop chairs (2009) (0)
- 1997 3rd International Conference on Algorithms & Architectures for Parallel Processing, ICA[3]PP '97, Melbourne, Australia Decsmber 10-12 1997 (1997) (0)
- Guest Editors' Introduction (2003) (0)
- Proceedings of the 4th international conference on Cyberspace Safety and Security (2012) (0)
- TrustCom2015 Organization Committee (2015) (0)
- Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems (2004) (0)
- Malicious Attack Propagation and Source Identification (series: Advances in Information Security, vol. 73) (2019) (0)
- Algorithm for estimating the execution time of nested transactions on a locally distributed database system (1996) (0)
- Social Characteristics Based Multiple Dimensional Routing Protocol in Human Associated Delay Tolerant Networks (2015) (0)
- A Web-DB model on multicast and anycast (2002) (0)
- Current status of mobile learning technologies in universities: the need to re-blend! (2008) (0)
- IUCC 2013: Message from the general chairs (2013) (0)
- The design and development of an integrated system for object-oriented finite element computing (2002) (0)
- Trust, security and privacy for pervasive applications (2013) (0)
- More than Privacy (2021) (0)
- A Hybrid Protocol for Managing Replicated Data (0)
- A New Hybrid IP Traceback Scheme (2018) (0)
- Message from the WCC 2011 General Chairs (2012) (0)
- Spam filtering for network traffic security on a multi‐core environment (2009) (0)
- A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET (2020) (0)
- Adjacency cache: an efficient P2P web cache indexing and lookup system (2009) (0)
- Algorithms and Architectures for Parallel Processing (2014) (0)
- Fault detection and fault tolerance in a loosely integrated heterogeneous database system (1997) (0)
- A parallel DNA fragment assembly algorithm based on eulerian superpath approach (2004) (0)
- GRB 060210 : xinglong and lulin optical limit. (2006) (0)
- Special Section: Trusted computing (2011) (0)
- Source Identification Under Sensor Observations: A Gaussian Source Estimator (2018) (0)
- Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator (2018) (0)
- The maximum imputation framework for neighborhood-based collaborative filtering (2014) (0)
- EUC 2011: Message from the general chairs (2011) (0)
- Location Privacy in Mobile Social Network Applications (2018) (0)
- ICA3PP 2002 : Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing (2002) (0)
- Tips for e-learning developers (2003) (0)
- Web services in hotel industry (2016) (0)
- Statistical Analysis of TATA Box and Its Extensions in the Promoters of Human Genes (2006) (0)
- Using phylogenetic footprinting to discover putative Cis-regulatory elements and analysing their coexistence and related gene ontology (2006) (0)
- An automatic generation model for web-based database applications (2001) (0)
- Using Multi-core to Support Security-Related Applications (2008) (0)
- A reactive architecture for web-based information systems (2001) (0)
- Preliminary of Identifying Propagation Sources (2018) (0)
- I-O scheduling and performance analysis on multi-core platforms (2009) (0)
- Eulerian superpath approach to correct sequencing error in shotgun assembly (2005) (0)
- SWNT Alignment: Methods, Characterization and Properties (2002) (0)
- Special Issue: Network Attacks and Defense Systems (2008) (0)
- Greedily assemble tandem repeats for next generation sequences (2019) (0)
- Connectivity-Based Shape Descriptors (2010) (0)
- Introduction (2018) (0)
- User Influence in the Propagation of Malicious Attacks (2018) (0)
- Providing fault-tolerant services in an open client/service paradigm (1995) (0)
- Clock Synchronization State Graphs Based on Clock Precision Difference (2005) (0)
- Comments and Corrections (2016) (0)
- A Self-Learning System for Identifying Harmful Network Information (2004) (0)
- Proceedings - 2010 4th International Conference on Network and System Security, NSS 2010: Message from the NSS 2010 general chairs (2010) (0)
- Special Issue: Securing Distributed Networks and Systems (2011) (0)
- The 2008 international symposium on trust, security and privacy for pervasive applications (TSP-08) (2008) (0)
- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control (2018) (0)
- Message from the ISPA 2018 Chairs (2018) (0)
- IEEE UIC/ATC Joint Panel on Smart Planet Challenges: Impediments and Enablers (2012) (0)
- Lectures display and presentation for mobile phone retrieval (2009) (0)
- The Relation Between Local and Global Influence of Individuals in Scale-Free Networks (2015) (0)
- Proceedings of the 2005 International Conference on Grid Computing and Applications, GCA'05: Foreword (2005) (0)
- Distributed and Parallel Computing: 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, ... (Lecture Notes in Computer Science) (2005) (0)
- This paper contains a lot of material that appeared in the following earlier work (2016) (0)
- Advances in Network and System Security: Editorial Statement (2012) (0)
- Guest Editorial (2019) (0)
- TrustCom 2013: Message from the general chairs (2013) (0)
- Technological considerations for mobile learning design (2009) (0)
- A Conceptual Matrix Model for Biological Data Processing (2007) (0)
- Evolution of cooperation in malicious social networks with differential privacy mechanisms (2020) (0)
- Proceedings of the 4th International Symposium on Cyberspace Safety and Security (CSS 2012) (2012) (0)
- Message from the general and program committee chairs (2007) (0)
- Proceeding of the 3rd International Conference on Network and System Security (NSS 2009) (2009) (0)
- TRA: tandem repeat assembler for next generation sequences (2017) (0)
- Advances in Web-Based Learning -- ICWL 2003: Second International Conference, Melbourne, Australia, August 18-20, 2003, Proceedings (2003) (0)
- Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks (2022) (0)
- Message from the IUCC 2014 general chairs (2015) (0)
- An architecture for resolving networking partitioning (2000) (0)
- A tool for layered analysing and understanding of distributed programs (1997) (0)
- A Replication Strategy for Surviving Network Failures in a Web-Based Sales System (2000) (0)
- Restrain Malicious Attack Propagation (2018) (0)
- Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks (2016) (0)
- Automating the construction of replicated objects in a cluster of workstations (2001) (0)
- An Operational Approach to Validate the Path of BGP (2008) (0)
- Keynote Talk 3 (2012) (0)
- String matching query verification on the cloud with suffix arrays (2014) (0)
- An intelligent user interface for email categorisation (2008) (0)
- Detecting Stepping Stones by Abnormal Causality Probability (2013) (0)
- A generic recursive algorithm for fault-tolerant computing (1995) (0)
- Special Issue: Multi-core Supported Network and System Security (2009) (0)
- Message from NSS 2008 chairs (2008) (0)
- NSS 2009 - Network and System Security: Message from the general chair (2009) (0)
- Source Identification Under Snapshots: A Sample Path Based Source Estimator (2018) (0)
- Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing (2016) (0)
- Advanced services for Clusters and Internet computing (2004) (0)
- The 4th International Symposium on Security and Multimodality in Pervasive Environments (SMPE 2010): Welcome message from workshop organizers (2010) (0)
- Differentially Private Data Analysis (2017) (0)
- Data Dissemination in Delay Tolerant Networks with Geographic Information (2020) (0)
- A Sensor Enabled Multi-Agent Infrastructure for Applications Integration (2005) (0)
- The Design and Implementation of a Model for Database Publishing on the WWW (2000) (0)
- Improving the performance of the LMS and RLS algorithms for adaptive equalizer (2003) (0)
- Minicast: A Multicast-Anycast Protocol for Message Delivery (2004) (0)
- Novel dynamic routing algorithms in autonomous system (2007) (0)
- Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey (2013) (0)
- Message from the ADCN 2011 chairs (2011) (0)
- A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks (2017) (0)
- A Fast and Robust Method Applied in Telecommunication Systems (2004) (0)
- Location Privacy in Mobile Crowd Sensing Applications (2018) (0)
- Differentially Private Applications: Where to Start? (2017) (0)
- 13th Pacific Rim International Symposium on Dependable Computing : PRDC 2007 : proceedings : 17-19 December, 2007, Melbourne, Victoria, Australia (2007) (0)
- Comparison of the LMS with RLS for communication technology (2002) (0)
- Building reliable programs in a replicated environment using remote procedure calls (1999) (0)
- A Reactive Framework for Supporting Knowledge Management (2005) (0)
- Identifying Multiple Propagation Sources (2018) (0)
- Automating the Construction of Service Replication systems (0)
- A new approach for defeating DDoS attack (2004) (0)
- The Design and Application of Sensors Implemented in Java (1999) (0)
- Introduction : Location Privacy in Mobile Applications (2018) (0)
- Preface: 6th IFIP International Conference on Network and Parallel Computing (2009) (0)
- Complementing a region descriptor for shape retrieval (2008) (0)
- Deakin Research Online Deakin University ’ s institutional research repository DDeakin Research Online Research Online (2008) (0)
- Light-Powered Molecular Shuttle (2007) (0)
- Current technologies and development of web-based databases : a survey (2001) (0)
- Algorithms and Architectures for Parallel Processing (2014) (0)
- An Enhanced Parallel Downloading Algorithm for BT (2007) (0)
- Image Indexing for Learning Content via a Mobile Phone (2010) (0)
- Editorial: Advances in network and system security (2011) (0)
- International Conference on Network and Parallel Computing: Preface (2009) (0)
- Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009 (2009) (0)
- MODELLING AND SIMULATION OF REACTIVE SYSTEMS (2000) (0)
- Combating DDoS Attacks in Web-based Services (2004) (0)
- Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System (1997) (0)
- Identifying Propagation Source in Large-Scale Networks (2018) (0)
- Preliminary of Modeling Malicious Attack Propagation (2018) (0)
- Location privacy in wireless vehicular networks (2018) (0)
- Editorial : Network attacks and defense systems (2008) (0)
- Differentially Location Privacy (2017) (0)
- Toward the building of component-based electronic commerce systems (2001) (0)
- Object Replication in a Cluster of Workstations (2000) (0)
- Improving the Performance of Equalization in Communication Systems (2003) (0)
- Differentially Private Data Publishing: Settings and Mechanisms (2017) (0)
- Privacy preserving data release for tagging recommender systems (2015) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Wanlei. Zhou?
Wanlei. Zhou is affiliated with the following schools: