Teaching and learning online with wikis NC Augar, R Raitman, W Zhou Deakin University, 2004 | 640 | 2004 |
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures Y Yu, K Li, W Zhou, P Li Journal of Network and computer Applications 35 (3), 867-880, 2012 | 465 | 2012 |
Low-rate DDoS attacks detection and traceback by using new information metrics Y Xiang, K Li, W Zhou IEEE transactions on information forensics and security 6 (2), 426-437, 2011 | 459 | 2011 |
A manifesto for future generation cloud computing: Research directions for the next decade R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ... ACM computing surveys (CSUR) 51 (5), 1-38, 2018 | 432 | 2018 |
Robust network traffic classification J Zhang, X Chen, Y Xiang, W Zhou, J Wu IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014 | 427 | 2014 |
Network traffic classification using correlation information J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013 | 423 | 2013 |
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks A Chonka, Y Xiang, W Zhou, A Bonti Journal of Network and Computer Applications 34 (4), 1097-1107, 2011 | 331 | 2011 |
Differentially private data publishing and analysis: A survey T Zhu, G Li, W Zhou, SY Philip IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017 | 320 | 2017 |
Discriminating DDoS attacks from flash crowds using flow correlation coefficient S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011 | 301 | 2011 |
Security and privacy in 6G networks: New areas and new challenges M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou Digital Communications and Networks 6 (3), 281-291, 2020 | 297 | 2020 |
Traceback of DDoS attacks using entropy variations S Yu, W Zhou, R Doss, W Jia IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010 | 267 | 2010 |
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks Y Xiang, W Zhou, M Guo IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2008 | 240 | 2008 |
Identifying propagation sources in networks: State-of-the-art and comparative studies J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016 | 239 | 2016 |
Internet traffic classification by aggregating correlated naive bayes predictions J Zhang, C Chen, Y Xiang, W Zhou Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013 | 231 | 2013 |
Correlated differential privacy: Hiding information in non-IID data set T Zhu, P Xiong, G Li, W Zhou IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014 | 221 | 2014 |
Employing wikis for online collaboration in the e-learning environment: Case study R Raitman, N Augar, W Zhou Third International Conference on Information Technology and Applications …, 2005 | 214 | 2005 |
Twitter spam detection: Survey of new approaches and comparative study T Wu, S Wen, Y Xiang, W Zhou Computers & Security 76, 265-284, 2018 | 213 | 2018 |
Modeling the propagation of worms in networks: A survey Y Wang, S Wen, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013 | 200 | 2013 |
A blockchain-based location privacy-preserving crowdsensing system M Yang, T Zhu, K Liang, W Zhou, RH Deng Future Generation Computer Systems 94, 408-418, 2019 | 193 | 2019 |
Statistical features-based real-time detection of drifted twitter spam C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016 | 188 | 2016 |