Houdini's escape: Breaking the resource rein of linux control groups X Gao, Z Gu, Z Li, H Jamjoom, C Wang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 63 | 2019 |
DoS vulnerabilities and mitigation strategies in software-defined networks S Deng, X Gao, Z Lu, Z Li, X Gao Journal of Network and Computer Applications 125, 209-219, 2019 | 53 | 2019 |
A self-adaptive virtual network embedding algorithm based on software-defined networks Z Li, Z Lu, S Deng, X Gao IEEE Transactions on Network and Service Management 16 (1), 362-373, 2018 | 49 | 2018 |
Energy optimization for Software-Defined data center networks based on flow allocation strategies Z Lu, J Lei, Y He, Z Li, S Deng, X Gao Electronics 8 (9), 1014, 2019 | 6 | 2019 |
A soft actor-critic reinforcement learning algorithm for network intrusion detection Z Li, C Huang, S Deng, W Qiu, X Gao Computers & Security 135, 103502, 2023 | 3 | 2023 |
A contract-based energy harvesting mechanism in UAV communication network W Qiu, C Huang, Y Chen, S Huang, H Bao, Z Li Computer Communications 199, 50-61, 2023 | 3 | 2023 |
An intrusion detection method combining variational auto-encoder and generative adversarial networks Z Li, C Huang, W Qiu Computer Networks 253, 110724, 2024 | | 2024 |
Traffic offloading for postdisaster rescue in UAV‐assisted networks: A coalition formation game approach W Qiu, C Huang, Z Li, MWA Ashraf, D Wang Concurrency and Computation: Practice and Experience 36 (10), e7998, 2024 | | 2024 |