default search action
Zhen Xu 0009
Person information
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Zhen Xu — disambiguation page
- Zhen Xu 0001 — Chinese Academy of Sciences, State Key Laboratory of Remote Sensing Science, Beijing, China
- Zhen Xu 0002 — Hong Kong University of Science and Technology
- Zhen Xu 0003 — Harbin Institute of Technology, School of Computer Science and Technology, China
- Zhen Xu 0004 — National University of Defense Technology, Hunan, China
- Zhen Xu 0005 — Beihang University, School of Electronic and Information Engineering, China
- Zhen Xu 0006 — Google Inc., Mountain View, CA, USA
- Zhen Xu 0007 — 4Paradigm, Beijing, China
- Zhen Xu 0008 — Zhejiang University, State Key Laboratory of CAD&CG, China
- Zhen Xu 0010 — University of Science and Technology Beijing, Department of Civil and Resource Engineering, China (and 1 more)
- Zhen Xu 0011 — Shanghai Jiao Tong University, Department of Electronic Engineering, IWCT, China
- Zhen Xu 0012 — Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c90]Chao Zheng, Liming Wang, Zhen Xu, Hongjia Li:
Optimizing Privacy in Federated Learning with MPC and Differential Privacy. CACML 2024: 165-169 - [c89]Qian Yang, Jiankai Wang, Kai Chen, Hongjia Li, Haihua Gao, Zhen Xu:
A Secure Blockchain-based Reputation Scheme for Data Offloading in Edge Computing. CSCWD 2024: 2858-2863 - [c88]Kai Chen, Qian Yang, Jiankai Wang, Duohe Ma, Liming Wang, Zhen Xu:
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention. CSCWD 2024: 2870-2875 - [c87]Pengwei Zhan, Zhen Xu, Qian Tan, Jie Song, Ru Xie:
Unveiling the Lexical Sensitivity of LLMs: Combinatorial Optimization for Prompt Enhancement. EMNLP 2024: 5128-5154 - [c86]Chao Zheng, Liming Wang, Zhen Xu, Hongjia Li:
Mutual Information Based Noise Scale Optimization for Gradient Leakage Resistant Federated Learning. ICASSP 2024: 7345-7349 - [c85]Yang Wu, Yanqiang Zhang, Zhen Xu, Qian Tan, Yan Zhang, Pengwei Zhan:
Rumor Detection with News Environment Enhanced Propagation Structure. ICIC (13) 2024: 187-198 - [c84]Zhitong Lu, Duohe Ma, Linna Fan, Zhen Xu, Kai Chen:
AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion. IH&MMSec 2024: 165-174 - [c83]Qian Yang, Hongjia Li, Kai Chen, Jiankai Wang, Liming Wang, Zhen Xu:
Runtime Anomaly Detection for MEC Services with Multi-Timescale and Dimensional Feature. WCNC 2024: 1-6 - [i2]Pengwei Zhan, Zhen Xu, Qian Tan, Jie Song, Ru Xie:
Unveiling the Lexical Sensitivity of LLMs: Combinatorial Optimization for Prompt Enhancement. CoRR abs/2405.20701 (2024) - 2023
- [j20]Mingxuan Li, Yazhe Wang, Shuai Ma, Chao Liu, Dongdong Huo, Yu Wang, Zhen Xu:
Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems. Proc. VLDB Endow. 16(5): 1000-1012 (2023) - [j19]Yunjian Zhang, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Liming Wang, Zhen Xu, Xiangyang Ji:
Perspectively Equivariant Keypoint Learning for Omnidirectional Images. IEEE Trans. Image Process. 32: 2552-2567 (2023) - [j18]Hongjia Li, Chang Yang, Liming Wang, Nirwan Ansari, Ding Tang, Xueqing Huang, Zhen Xu, Dan Hu:
A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services. IEEE Trans. Mob. Comput. 22(1): 1-18 (2023) - [c82]Yuqiao Hou, Hongjia Li, Yuxiang Wang, Liming Wang, Zhen Xu:
Satellite Anomaly Detection based on Improved Transformer Method. APNOMS 2023: 322-325 - [c81]Qianbo Wei, Qian Tan, Yan Zhang, Zhen Xu, Hongyan Tan:
CP Decomposition and Set Theory based Root Cause Analysis in Online Service Systems. APSEC 2023: 221-228 - [c80]Qihui Zhou, Qianyun Ruan, Dongdong Huo, Penghui Lv, Yu Wang, Zhen Xu:
The malicious resource consumption detection in permissioned blockchain based on traffic analysis. CSCWD 2023: 510-515 - [c79]Han Sun, Yan Zhang, Zhen Xu, Runmei Zhang, Mingxuan Li:
MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic Encryption. CSCWD 2023: 552-558 - [c78]Yaoyi Deng, Mingxuan Li, Hailong Zhang, Dongdong Huo, Yanqiu Zhang, Shuai Yun, Yu Wang, Zhen Xu:
Building Efficient Parallel Endorsement Node on Blockchain Systems. CSCWD 2023: 941-946 - [c77]Yuqiao Hou, Yuxiang Wang, Jiankai Wang, Liming Wang, Zhen Xu:
GPT Method Based Traffic Anomaly Detection for Space-ground Integrated Network. ICBAR 2023: 452-457 - [c76]Yang Wu, Chen Song, Zhitong Lu, Chunlei Jing, Pengwei Zhan, Zhen Xu, Liming Wang:
Unsupervised Clustering with Contrastive Learning for Rumor Tracking on Social Media. NLPCC (2) 2023: 562-574 - [c75]Yuqiao Hou, Zhen Xu, Liming Wang, Yuxiang Wang, Hongjia Li:
NadGPT: Semi-Supervised Network Anomaly Detection via Auto-Regressive Auxiliary Prediction. SMC 2023: 133-138 - [c74]Jiankai Wang, Hongjia Li, Liming Wang, Zhen Xu:
Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM. WCNC 2023: 1-6 - 2022
- [j17]Mingjiang Huang, Zhen Xu, Liming Wang:
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers. Comput. J. 65(12): 3062-3080 (2022) - [j16]Fengyu Yang, Yanni Han, Ying Ding, Qian Tan, Zhen Xu:
A flexible approach for cyber threat hunting based on kernel audit records. Cybersecur. 5(1): 11 (2022) - [j15]Xiaolin Chang, Yu Shi, Zhenjiang Zhang, Zhen Xu, Kishor S. Trivedi:
Job Completion Time Under Migration-Based Dynamic Platform Technique. IEEE Trans. Serv. Comput. 15(3): 1345-1357 (2022) - [c73]Chaoqun Li, Liang Dai, Delin Kong, Zhen Xu, Yanni Han:
A Byte-level Autoencoder-based Method to Detect Malicious Open Resolver. CSCWD 2022: 317-322 - [c72]Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
Detection of Hardware-Assisted Virtualization Based on Low-Level Feature. CSCWD 2022: 914-919 - [c71]Penghui Lv, Yu Wang, Yazhe Wang, Chao Liu, Qihui Zhou, Zhen Xu:
A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment. CSCWD 2022: 1040-1046 - [c70]Qiqing Deng, Xinrui Tan, Jing Yang, Chao Zheng, Liming Wang, Zhen Xu:
A Secure Container Placement Strategy Using Deep Reinforcement Learning in Cloud. CSCWD 2022: 1299-1304 - [c69]Yunjian Zhang, Yanwei Liu, Jinxia Liu, Jingbo Miao, Antonios Argyriou, Liming Wang, Zhen Xu:
360-Attack: Distortion-Aware Perturbations from Perspective-Views. CVPR 2022: 15015-15024 - [c68]Chang Liu, Yanwei Liu, Zhen Xu, Liang Dai:
RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs. DSN 2022: 319-330 - [c67]Yunjian Zhang, Yanwei Liu, Jinxia Liu, Pengwei Zhan, Liming Wang, Zhen Xu:
SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images. ICASSP 2022: 2475-2479 - [c66]Jingbo Miao, Yanwei Liu, Kan Wang, Jinxia Liu, Zhen Xu:
Variational Depth Estimation on Hypersphere for Panorama. ICIP 2022: 866-870 - [c65]Jingbo Miao, Yanwei Liu, Kan Wang, Jinxia Liu, Antonios Argyriou, Yanni Han, Zhen Xu:
Six-to-one: Cubemap-guided Feature Calibration for Panorama Object Detection. ICTAI 2022: 1320-1327 - [c64]Liang Dai, Wenchao Chen, Yanwei Liu, Antonios Argyriou, Chang Liu, Tao Lin, Penghui Wang, Zhen Xu, Bo Chen:
Switching Gaussian Mixture Variational RNN for Anomaly Detection of Diverse CDN Websites. INFOCOM 2022: 300-309 - [c63]Qihui Zhou, Xianglin Dang, Yazhe Wang, Zhen Xu, Penghui Lv:
An atomic member addition mechanism for permissioned blockchain based on autonomous rollback. MSN 2022: 379-385 - [c62]Qihui Zhou, Xianglin Dang, Dongdong Huo, Qianyun Ruan, Chuang Li, Yu Wang, Zhen Xu:
LogBlock: An Anomaly Detection Method on Permissioned Blockchain based on Log-Block Sequence. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1008-1015 - [i1]Yang Wu, Jing Yang, Xiaojun Zhou, Liming Wang, Zhen Xu:
Exploring Graph-aware Multi-View Fusion for Rumor Detection on Social Media. CoRR abs/2212.02419 (2022) - 2021
- [j14]Xiang Yin, Yanni Han, Hongyu Sun, Zhen Xu, Haibo Yu, Xiaoyu Duan:
Multi-Attention Generative Adversarial Network for Multivariate Time Series Prediction. IEEE Access 9: 57351-57363 (2021) - [j13]Xiang Yin, Yanni Han, Zhen Xu, Jie Liu:
VAECGAN: a generating framework for long-term prediction in multivariate time series. Cybersecur. 4(1) (2021) - [j12]Dongdong Huo, Chen Cao, Peng Liu, Yazhe Wang, Mingxuan Li, Zhen Xu:
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! J. Syst. Archit. 116: 102114 (2021) - [j11]Yanwei Liu, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, Zhen Xu:
360-Degree VR Video Watermarking Based on Spherical Wavelet Transform. ACM Trans. Multim. Comput. Commun. Appl. 17(1): 38:1-38:23 (2021) - [j10]Yanwei Liu, Jinxia Liu, Antonios Argyriou, Liming Wang, Zhen Xu:
Rendering-Aware VR Video Caching Over Multi-Cell MEC Networks. IEEE Trans. Veh. Technol. 70(3): 2728-2742 (2021) - [c61]Xinrui Tan, Hongjia Li, Liming Wang, Xueqing Huang, Zhen Xu:
Empowering Adaptive Early-Exit Inference with Latency Awareness. AAAI 2021: 9825-9833 - [c60]Yang Wu, Pengwei Zhan, Yunjian Zhang, LiMing Wang, Zhen Xu:
Multimodal Fusion with Co-Attention Networks for Fake News Detection. ACL/IJCNLP (Findings) 2021: 2560-2569 - [c59]Mingxuan Li, Xiao Wang, Dongdong Huo, Han Wang, Chao Liu, Yazhe Wang, Yu Wang, Zhen Xu:
A Novel Trojan Attack against Co-learning Based ASR DNN System. CSCWD 2021: 907-912 - [c58]Yixin Li, Xi Luo, Liming Wang, Zhen Xu:
DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs. HPCC/DSS/SmartCity/DependSys 2021: 283-290 - [c57]Chaoqun Li, Liang Dai, Zhen Xu, Ying Ding, Yanni Han:
A Message-Based Malicious Detection Scheme of Public DNS Services. HPCC/DSS/SmartCity/DependSys 2021: 733-740 - [c56]Chen Song, Zhen Xu, Liming Wang:
Distributed Capability Based Dynamic Path Authorization Scheme for SDSIN. ICCBN 2021: 86-93 - [c55]Chaoqun Li, Qian Tan, Zhen Xu, Xi Luo, Liang Dai:
Security Analysis of DNS Open Resolvers by Continuous and Ambulatory Detection. ISCC 2021: 1-7 - [c54]Jingbo Miao, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Zhen Xu, Yanni Han:
Improved Face Detector on Fisheye Images via Spherical-Domain Attention. ISCC 2021: 1-7 - [c53]Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
Secure and Efficient Allocation of Virtual Machines in Cloud Data Center. ISCC 2021: 1-7 - [c52]Fengchao Wang, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Liming Wang, Zhen Xu:
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning. ISCC 2021: 1-7 - [c51]Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud. MILCOM 2021: 329-334 - [c50]Liang Dai, Tao Lin, Chang Liu, Bo Jiang, Yanwei Liu, Zhen Xu, Zhi-Li Zhang:
SDFVAE: Static and Dynamic Factorized VAE for Anomaly Detection of Multivariate CDN KPIs. WWW 2021: 3076-3086 - 2020
- [j9]Jianfeng Xu, Liming Wang, Zhen Xu:
An enhanced saturation attack and its mitigation mechanism in software-defined networking. Comput. Networks 169: 107092 (2020) - [j8]Yixin Li, Liming Wang, Jing Yang, Zhen Xu, Xi Luo:
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. EAI Endorsed Trans. Security Safety 7(26): e1 (2020) - [j7]Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu:
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security". IEEE Trans. Inf. Forensics Secur. 15: 3938-3939 (2020) - [j6]Lihua Yin, Xi Luo, Chunsheng Zhu, Liming Wang, Zhen Xu, Hui Lu:
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries. IEEE Trans. Ind. Informatics 16(2): 1373-1384 (2020) - [c49]Dongdong Huo, Yu Wang, Chao Liu, Mingxuan Li, Yazhe Wang, Zhen Xu:
LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems. HPCC/DSS/SmartCity 2020: 78-86 - [c48]Tong Kong, Liming Wang, Duohe Ma, Zhen Xu, Qian Yang, Zhitong Lu, Yijun Lu:
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud. HPCC/DSS/SmartCity 2020: 483-490 - [c47]Yixin Li, Xi Luo, Liming Wang, Jing Yang, Zhen Xu:
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks. HPCC/DSS/SmartCity 2020: 491-498 - [c46]Tong Kong, Liming Wang, Duohe Ma, Kai Chen, Zhen Xu, Yijun Lu:
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud. HPCC/DSS/SmartCity 2020: 794-801 - [c45]Dongdong Huo, Chao Liu, Xiao Wang, Mingxuan Li, Yu Wang, Yazhe Wang, Peng Liu, Zhen Xu:
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems. ICICS 2020: 20-35 - [c44]Yunjian Zhang, Yanwei Liu, Liming Wang, Zhen Xu, Qiuqing Jin:
RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks. IJCNN 2020: 1-8 - [c43]Zhilei Liu, Tao Lin, Liang Dai, Jiyan Sun, Yanjie Hu, Yan Zhang, Zhen Xu:
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks. ISCC 2020: 1-7 - [c42]Xiang Yin, Yanni Han, Hongyu Sun, Zhen Xu, Haibo Yu, Xiaoyu Duan:
A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network. ISCC 2020: 1-7 - [c41]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
A novel network traffic classification approach via discriminative feature learning. SAC 2020: 1026-1033 - [c40]Chen Tian, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu:
Prihook: Differentiated context-aware hook placement for different owners' smartphones. TrustCom 2020: 615-622 - [c39]Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu:
End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j5]Kai Chen, Chen Song, Liming Wang, Zhen Xu:
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. Comput. Secur. 87 (2019) - [c38]Tong Kong, Liming Wang, Duohe Ma, Zhen Xu, Qian Yang, Kai Chen:
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. HPCC/SmartCity/DSS 2019: 1825-1832 - [c37]Ning Cai, Yanni Han, Yongming Ben, Zhen Xu:
Towards Scalable and Flexible Path Control Schema in Software Defined Networking. ICC 2019: 1-7 - [c36]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
Adaptive SDN Master Controller Assignment for Maximizing Network Throughput. ISCC 2019: 1-6 - [c35]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
Minimizing Multi-Controller Deployment Cost in Software-Defined Networking. ISCC 2019: 1-6 - [c34]Mingxuan Li, Dongdong Huo, Chao Liu, Han Wang, Yazhe Wang, Yu Wang, Ping Zou, Yandong Li, Zhen Xu:
SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS. ISPA/BDCloud/SocialCom/SustainCom 2019: 308-315 - [c33]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
An Effective Table-Overflow Attack and Defense in Software-Defined Networking. LCN Symposium 2019: 10-17 - [c32]Yongming Ben, Yanni Han, Ning Cai, Wei An, Zhen Xu:
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel. MILCOM 2019: 1-6 - [c31]Ning Cai, Yanni Han, Yongming Ben, Wei An, Zhen Xu:
An Effective Load Balanced Controller Placement Approach in Software-Defined WANs. MILCOM 2019: 361-366 - [c30]Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu:
Global Orchestration of Cooperative Defense against DDoS Attacks for MEC. WCNC 2019: 1-6 - [c29]Jianfeng Xu, Liming Wang, Zhen Xu:
EFastLane: Toward Bandwidth-Efficient Flow Setup in Software-Defined Networking. WCNC 2019: 1-7 - 2018
- [c28]Yuan Wang, Liming Wang, Zhen Xu, Wei An:
Understanding User Behavior in Online Banking System. Inscrypt 2018: 637-646 - [c27]Xi Luo, Liming Wang, Zhen Xu, Kai Chen, Jing Yang, Tian Tian:
A Large Scale Analysis of DNS Water Torture Attack. CSAI/ICIMT 2018: 168-173 - [c26]Xi Luo, Liming Wang, Zhen Xu, Wei An:
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. ICICS 2018: 41-56 - [c25]Kai Chen, Ning Zhang, Liming Wang, Zhen Xu:
Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. ICICS 2018: 551-565 - [c24]Yongming Ben, Yanni Han, Ning Cai, Wei An, Zhen Xu:
T-Tracker: Compressing System Audit Log by Taint Tracking. ICPADS 2018: 587-595 - [c23]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
Proactive Mitigation to Table-Overflow in Software-Defined Networking. ISCC 2018: 719-725 - [c22]Ying Ding, Yanwei Liu, Jinxia Liu, Kedong Liu, Liming Wang, Zhen Xu:
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern. PCM (2) 2018: 418-429 - 2017
- [j4]Zejue Wang, Hongjia Li, Zhen Xu:
Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks. Sci. China Inf. Sci. 60(6): 62302 (2017) - [c21]Wen Feng, Hongjia Li, Ding Tang, Liming Wang, Zhen Xu:
A Multi-queue Aggregation Framework for M2M Traffic in LTE-A and Beyond Networks. 5GWN 2017: 609-621 - [c20]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Quantitative Security Assessment Method based on Entropy for Moving Target Defense. AsiaCCS 2017: 920-922 - [c19]Xiaojun Zhou, Zhen Xu, Liming Wang, Kai Chen:
What should we do? A structured review of SCADA system cyber security standards. CoDIT 2017: 605-614 - [c18]Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu:
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone. DSN 2017: 145-156 - [c17]Chang Yang, Hongjia Li, Liming Wang, Zhen Xu:
A game theoretical framework for improving the quality of service in cooperative RAN caching. ICC 2017: 1-7 - [c16]Xi Luo, Liming Wang, Zhen Xu, Jing Yang, Mo Sun, Jing Wang:
DGASensor: Fast Detection for DGA-Based Malwares. ICCBN 2017: 47-53 - [c15]Jing Yang, Liming Wang, Zhen Xu:
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. ICICS 2017: 633-645 - [c14]Jiyan Sun, Yan Zhang, Xin Wang, Shihan Xiao, Zhen Xu, Hongjing Wu, Xin Chen, Yanni Han:
DC2-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network. IPDPS 2017: 419-428 - 2016
- [j3]Hongjia Li, Zejue Wang, Dan Hu, Song Ci, Zhen Xu:
Cross-layer transmission and energy scheduling under full-duplex energy harvesting wireless OFDM joint transmission. Sci. China Inf. Sci. 59(10): 102310 (2016) - [c13]Bing Yu, Yanni Han, Xuemin Wen, Zhen Xu:
SMPA: An Energy-Aware Service Migration Strategy in Cloud Networks. CLOUD 2016: 984-989 - [c12]Bing Yu, Yanni Han, Xuemin Wen, Xin Chen, Zhen Xu:
An Energy-Aware Algorithm for Optimizing Resource Allocation in Software Defined Network. GLOBECOM 2016: 1-7 - [c11]Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li:
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. ICICS 2016: 39-53 - [c10]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Thwart eavesdropping attacks on network communication based on moving target defense. IPCCC 2016: 1-2 - [c9]Zhenjie Deng, Yanwei Liu, Jinxia Liu, Xin Chen, Antonios Argyriou, Zhen Xu, Song Ci:
Cross-network and cross-layer optimized video streaming over LTE and WCDMA downlink. ISCC 2016: 868-873 - [c8]Yanwei Liu, Jinxia Liu, Zhen Xu, Song Ci:
Choquet integral based QoS-to-QoE mapping for mobile VoD applications. IWQoS 2016: 1-6 - [c7]Xuemin Wen, Yanni Han, Bing Yu, Xin Chen, Zhen Xu:
Improving revenue for reliability-aware VDC embedding in a software-defined data center. IWQoS 2016: 1-2 - [c6]Xuemin Wen, Yanni Han, Bing Yu, Xin Chen, Zhen Xu:
Towards reliable virtual data center embedding in software defined networking. MILCOM 2016: 1059-1064 - 2015
- [j2]Shoushou Ren, Tao Lin, Wei An, Guoqiang Zhang, Dalei Wu, Laxmi Narayan Bhuyan, Zhen Xu:
Design and analysis of collaborative EPC and RAN caching for LTE mobile networks. Comput. Networks 93: 80-95 (2015) - [j1]Bing Yu, Yanni Han, Hanning Yuan, Xu Zhou, Zhen Xu:
A cost-effective scheme supporting adaptive service migration in cloud data center. Frontiers Comput. Sci. 9(6): 875-886 (2015) - [c5]Shoushou Ren, Tao Lin, Wei An, Yang Li, Yu Zhang, Zhen Xu:
Collaborative EPC and RAN Caching Algorithms for LTE Mobile Networks. GLOBECOM 2015: 1-6 - [c4]Xuemin Wen, Yanni Han, Hanning Yuan, Xu Zhou, Zhen Xu:
An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center. GLOBECOM 2015: 1-7 - [c3]Jiyan Sun, Yan Zhang, Ding Tang, Shuli Zhang, Zhen Xu, Jingguo Ge:
Improving TCP performance in data center networks with Adaptive Complementary Coding. LCN 2015: 295-302 - [c2]Shuli Zhang, Yan Zhang, Ding Tang, Zhen Xu, Jingguo Ge, Zhijun Zhao:
A partial-decentralized coflow scheduling scheme in data center networks. LCN 2015: 434-437 - 2014
- [c1]Duohe Ma, Zhen Xu, Dongdai Lin:
Defending Blind DDoS Attack on SDN Based on Moving Target Defense. SecureComm (1) 2014: 463-480
Coauthor Index
aka: LiMing Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint