关注
Wanlei Zhou
Wanlei Zhou
Professor, City University of Macau, Macao
在 cityu.edu.mo 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Teaching and learning online with wikis
NC Augar, R Raitman, W Zhou
Deakin University, 2004
6402004
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Y Yu, K Li, W Zhou, P Li
Journal of Network and computer Applications 35 (3), 867-880, 2012
4652012
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
4592011
A manifesto for future generation cloud computing: Research directions for the next decade
R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ...
ACM computing surveys (CSUR) 51 (5), 1-38, 2018
4322018
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
4272014
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013
4232013
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
3312011
Differentially private data publishing and analysis: A survey
T Zhu, G Li, W Zhou, SY Philip
IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017
3202017
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011
3012011
Security and privacy in 6G networks: New areas and new challenges
M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou
Digital Communications and Networks 6 (3), 281-291, 2020
2972020
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2672010
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
Y Xiang, W Zhou, M Guo
IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2008
2402008
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
2392016
Internet traffic classification by aggregating correlated naive bayes predictions
J Zhang, C Chen, Y Xiang, W Zhou
Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013
2312013
Correlated differential privacy: Hiding information in non-IID data set
T Zhu, P Xiong, G Li, W Zhou
IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014
2212014
Employing wikis for online collaboration in the e-learning environment: Case study
R Raitman, N Augar, W Zhou
Third International Conference on Information Technology and Applications …, 2005
2142005
Twitter spam detection: Survey of new approaches and comparative study
T Wu, S Wen, Y Xiang, W Zhou
Computers & Security 76, 265-284, 2018
2132018
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
2002013
A blockchain-based location privacy-preserving crowdsensing system
M Yang, T Zhu, K Liang, W Zhou, RH Deng
Future Generation Computer Systems 94, 408-418, 2019
1932019
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
1882016
系统目前无法执行此操作,请稍后再试。
文章 1–20