default search action
Peidong Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Wenjie Kang, Qiang Liu, Peidong Zhu, Wei Zhao, Xuchong Liu, Gang Hu:
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids. Wirel. Networks 30(5): 3821-3836 (2024) - 2023
- [j36]Yu Zheng, Zhuxian Zhang, Peidong Zhu, Bo Yang, Peng Wu:
Passive GNSS-based SAR imaging with sub-apertures combination. Signal Image Video Process. 17(5): 2177-2184 (2023) - 2022
- [j35]Xiang Xiao, Fanzi Zeng, Hongbo Jiang, Zhu Xiao, Peidong Zhu:
A Novel Dynamic Channel Assembling Strategy in Cognitive Radio Networks With Fine-Grained Flow Classification. IEEE Internet Things J. 9(20): 19599-19614 (2022) - 2021
- [j34]Yu Zheng, Zhuxian Zhang, Peng Wu, Peidong Zhu:
Decimetre Level Range Resolution for Beidou B3I Signal-Based Passive SAR Imaging - Proof-of-Concept Experimental Demonstrations. IEEE Access 9: 22927-22938 (2021) - [j33]Xiaoxue Liu, Jiexin Zhang, Peidong Zhu, Qingping Tan, Wei Yin:
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. Comput. Secur. 102: 102138 (2021) - [j32]Yifan Hu, Peng Xun, Peidong Zhu, Yinqiao Xiong, Yufei Zhu, Weiheng Shi, Chenxi Hu:
Network-based multidimensional moving target defense against false data injection attack in power system. Comput. Secur. 107: 102283 (2021) - [j31]Yifan Hu, Peidong Zhu, Peng Xun, Bo Liu, Wenjie Kang, Yinqiao Xiong, Weiheng Shi:
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. Comput. Secur. 111: 102465 (2021) - [j30]Liao Wu, Peidong Zhu, Minghua Xie:
A Self-Powered Hybrid SSHI Circuit with a Wide Operation Range for Piezoelectric Energy Harvesting. Sensors 21(2): 615 (2021) - [j29]Peidong Zhu, Peng Xun, Yifan Hu, Yinqiao Xiong:
Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems. Sensors 21(3): 991 (2021) - [c73]Liao Wu, Wenjie Kang, Minghua Xie, Peidong Zhu:
A Self-Powered Multi-Input Bridgeless Series-SSHI Circuit for Piezoelectric Energy Harvesting. ISCAS 2021: 1-4 - 2020
- [j28]Feng Zhou, Peidong Zhu, Yemei Qin, Yu Zheng:
An RBF-ARX Model-Based Variable-Gain Feedback RMPC Algorithm. IEEE Access 8: 107124-107133 (2020) - [j27]Yu Zheng, Zhuxian Zhang, Lu Feng, Peidong Zhu, Feng Zhou:
Enhanced Passive GNSS-Based Radar Imaging Based on Coherent Integrated Multi-Satellite Signals. Sensors 20(3): 842 (2020) - [j26]Yu Zheng, Zhuxian Zhang, Lu Feng, Caixia Huang, Peidong Zhu, Peng Wu:
High resolution for software-defined GPS-based SAR imaging using waveform-modulated range-compressed pulse: field experimental demonstration. Signal Image Video Process. 14(4): 655-663 (2020) - [c72]Wenjie Kang, Jiale Deng, Peidong Zhu, Xuchong Liu, Wei Zhao, Zhi Hang:
Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System. ICCC 2020: 518-523 - [c71]Wenjie Kang, Peidong Zhu, Xuchong Liu:
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid. INFOCOM Workshops 2020: 1027-1032
2010 – 2019
- 2019
- [j25]Hui Yin, Yinqiao Xiong, Tiantian Deng, Hua Deng, Peidong Zhu:
A Privacy-Preserving and Identity-Based Personalized Recommendation Scheme for Encrypted Tasks in Crowdsourcing. IEEE Access 7: 138857-138871 (2019) - [j24]Zhizhu Liu, Yinqiao Xiong, Xin Liu, Wei Xie, Peidong Zhu:
6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space. Comput. Networks 155: 31-46 (2019) - [j23]Yinqiao Xiong, Peidong Zhu, Zhizhu Liu, Hui Yin, Tiantian Deng:
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid. Secur. Commun. Networks 2019: 9637578:1-9637578:14 (2019) - 2018
- [j22]Peng Xun, Peidong Zhu, Sabita Maharjan, Pengshuai Cui:
Successive direct load altering attack in smart grid. Comput. Secur. 77: 79-93 (2018) - [j21]Wenjie Kang, Peidong Zhu, Jiexin Zhang, Junyang Zhang:
Critical Nodes Identification of Power Grids Based on Network Efficiency. IEICE Trans. Inf. Syst. 101-D(11): 2762-2772 (2018) - [j20]Wenjie Kang, Gang Hu, Peidong Zhu, Qiang Liu, Zhi Hang, Xin Liu:
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack. Sensors 18(6): 1699 (2018) - [j19]Baoyao Wang, Peidong Zhu, Yingwen Chen, Peng Xun, Zhenyu Zhang:
False Data Injection Attack Based on Hyperplane Migration of Support Vector Machine in Transmission Network of the Smart Grid. Symmetry 10(5): 165 (2018) - [c70]Wenjie Kang, Peidong Zhu, Gang Hu:
Cascading Failure Based on Load Redistribution of a Smart Grid with Different Coupling Modes. ICCS (1) 2018: 328-340 - [c69]Xiaoxue Liu, Alberto Leon-Garcia, Peidong Zhu:
Context based Detections against Legal False Price Data and Malicious Disconnect Commands in Smart Grid. ICCSA (6) 2018: 1-9 - [c68]Wenjie Kang, Peidong Zhu, Gang Hu, Zhi Hang, Xin Liu:
Cross-Layer Attack Path Exploration for Smart Grid Based on Knowledge of Target Network. KSEM (1) 2018: 433-441 - [c67]Yifan Dong, Peidong Zhu, Qiang Liu, Yingwen Chen, Peng Xun:
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection. WASA 2018: 90-102 - 2017
- [j18]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu, Peng Xun:
Parallelization of group-based skyline computation for multi-core processors. Concurr. Comput. Pract. Exp. 29(18) (2017) - [j17]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu, Peng Xun:
Parallelization of skyline probability computation over uncertain preferences. Concurr. Comput. Pract. Exp. 29(18) (2017) - [j16]Xiaoxue Liu, Jiexin Zhang, Peidong Zhu:
Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory. Int. J. Crit. Infrastructure Prot. 16: 13-25 (2017) - [j15]Ke Wang, Peidong Zhu, Peng Xun, Bowen Shang:
An experimental study: An interpretative division method on principal component analysis. J. Intell. Fuzzy Syst. 33(1): 445-455 (2017) - [j14]Peng Xun, Peidong Zhu, Yi-Fan Hu, Pengshuai Cui, Yan Zhang:
Command Disaggregation Attack and Mitigation in Industrial Internet of Things. Sensors 17(10): 2408 (2017) - [j13]Fangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang:
Trust on the Ratee: A Trust Management System for Social Internet of Vehicles. Wirel. Commun. Mob. Comput. 2017 (2017) - [c66]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu:
Computing skyline groups: an experimental evaluation. ACM TUR-C 2017: 48:1-48:6 - [c65]Xiaofeng Zhang, Peidong Zhu, Jianwei Tian, Jiexin Zhang:
An effective semi-supervised model for intrusion detection using feature selection based LapSVM. CITS 2017: 283-286 - [c64]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu:
Top-k Skyline Groups Queries. EDBT 2017: 442-445 - [c63]Ke Wang, Peidong Zhu, Haoyang Zhu, Pengshuai Cui, Zhenyu Zhang:
An Interweaved Time Series Locally Connected Recurrent Neural Network Model on Crime Forecasting. ICONIP (5) 2017: 466-474 - [c62]Pengshuai Cui, Lu Feng, Peng Xun, Peidong Zhu:
Load Scheduling of Thermostatical House-Hold Appliances Against Abrupt Changes in Smart Grid. ISCID (1) 2017: 470-475 - [c61]Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia:
Enhance the robustness of cyber-physical systems by adding interdependency. ISI 2017: 203 - [c60]Fangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang:
Multidimensional Trust-Based Anomaly Detection System in Internet of Things. WASA 2017: 302-313 - [c59]Fangyu Gai, Jiexin Zhang, Peidong Zhu, Xinwen Jiang:
Ratee-Based Trust Management System for Internet of Vehicles. WASA 2017: 344-355 - 2016
- [j12]Liang Chen, Chengcheng Shao, Peidong Zhu, Haoyang Zhu:
Using Trust of Social Ties for Recommendation. IEICE Trans. Inf. Syst. 99-D(2): 397-405 (2016) - [c58]Peng Xun, Peidong Zhu, Cunlu Li, Haoyang Zhu:
Discovering Multi-type Correlated Events with Time Series for Exception Detection of Complex Systems. ICDM Workshops 2016: 21-28 - [c57]Jiexin Zhang, Shaoduo Gan, Xiaoxue Liu, Peidong Zhu:
Intrusion detection in SCADA systems by traffic periodicity and telemetry analysis. ISCC 2016: 318-325 - [c56]Jiexin Zhang, Xiaoxue Liu, Peidong Zhu:
Cooperation Stimulation and Security in Wireless Ad Hoc Networks - A Power-Efficient Bayesian Game Approach. MASCOTS 2016: 469-474 - [c55]Jiexin Zhang, Xiaoxue Liu, Peidong Zhu:
Securing Power System State Estimation. Trustcom/BigDataSE/ISPA 2016: 699-706 - 2015
- [j11]Kan Chen, Peidong Zhu, Liang Chen, Yueshan Xiong:
Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks. KSII Trans. Internet Inf. Syst. 9(8): 3005-3027 (2015) - [j10]Xiaoxue Liu, Peidong Zhu, Yan Zhang, Kan Chen:
A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure. IEEE Trans. Smart Grid 6(5): 2435-2443 (2015) - [c54]Liang Chen, Peidong Zhu:
Preserving network privacy with a hierarchical structure approach. FSKD 2015: 773-777 - [c53]Liang Chen, Chengcheng Shao, Peidong Zhu:
Social recommendation using quantified social tie strength. ICACI 2015: 84-88 - [c52]Liang Chen, Peidong Zhu:
Matrix Factorization Approach Based on Temporal Hierarchical Dirichlet Process. IScIDE (2) 2015: 204-212 - [c51]Liang Chen, Peidong Zhu:
Preserving the Privacy of Social Recommendation with a Differentially Private Approach. SmartCity 2015: 780-785 - 2014
- [c50]Kan Chen, Peidong Zhu, Yueshan Xiong:
Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems. SecureComm (1) 2014: 183-191 - [c49]Liang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu:
SocAware: A Middleware for Social Applications in Online Social Networks. TrustCom 2014: 611-615 - 2013
- [j9]Xiaoqiang Wang, Peidong Zhu, Xicheng Lu, Kan Chen, Huayang Cao:
Scaling Inter-domain Routing System via Path Exploration Aggregation. KSII Trans. Internet Inf. Syst. 7(3): 490-508 (2013) - [j8]Huayang Cao, Jinjing Zhao, Peidong Zhu, Xicheng Lu, Chonglun Zhao:
Worm Detection without Knowledge Base in Industrial Networks. J. Commun. 8(11): 716-723 (2013) - [j7]Huayang Cao, Peidong Zhu, Xicheng Lu, Andrei V. Gurtov:
A layered encryption mechanism for networked critical infrastructures. IEEE Netw. 27(1): 12-18 (2013) - [c48]Huayang Cao, Peidong Zhu, Jinjing Zhao:
CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms. ICCC 2013: 158 - [c47]Kan Chen, Liang Chen, Peidong Zhu, Yueshan Xiong:
Unveil the Spams in Weibo. GreenCom/iThings/CPScom 2013: 916-922 - [c46]Huayang Cao, Kan Chen, Peidong Zhu:
Secure process control system of industrial networks. ICCT 2013: 15-19 - 2012
- [j6]Peidong Zhu, Huayang Cao, Wenping Deng, Kan Chen, Xiaoqiang Wang:
A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information. IEICE Trans. Inf. Syst. 95-D(1): 20-28 (2012) - [j5]Wenping Deng, Wolfgang Mühlbauer, Yuexiang Yang, Peidong Zhu, Xicheng Lu, Bernhard Plattner:
Shedding light on the use of AS relationships for path inference. J. Commun. Networks 14(3): 336-345 (2012) - [j4]Peidong Zhu, Huayang Cao, Laurence T. Yang, Kan Chen:
AS Alliance based security enhancement for inter-domain routing protocol. Math. Comput. Model. 55(1-2): 241-255 (2012) - 2011
- [j3]Wenping Deng, Merkourios Karaliopoulos, Wolfgang Mühlbauer, Peidong Zhu, Xicheng Lu, Bernhard Plattner:
k-Fault tolerance of the Internet AS graph. Comput. Networks 55(10): 2492-2503 (2011) - 2010
- [j2]Wenping Deng, Peidong Zhu, Xicheng Lu, Bernhard Plattner:
On Evaluating BGP Routing Stress Attack. J. Commun. 5(1): 13-22 (2010) - [c45]Qianbing Zheng, Peidong Zhu, Yongwen Wang, Ming Xu:
EPSP: Enhancing Network Protocol with Social-Aware Plane. GreenCom/CPSCom 2010: 578-583 - [e1]Peidong Zhu, Lizhe Wang, Feng Xia, Huajun Chen, Ian McLoughlin, Shiao-Li Tsao, Mitsuhisa Sato, Sun-Ki Chai, Irwin King:
2010 IEEE/ACM Int'l Conference on Green Computing and Communications, GreenCom 2010, & Int'l Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, December 18-20, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-9779-9 [contents]
2000 – 2009
- 2009
- [c44]Ning Hu, Peidong Zhu, Peng Zou:
Reputation Mechanism for Inter-domain Routing Security Management. CIT (2) 2009: 98-103 - [c43]Peidong Zhu, Huai-Zhou Shi, Xin Liu:
An Enhanced Router Topology Discovery Model. CNSR 2009: 431-433 - [c42]Ning Hu, Peidong Zhu, Huayang Cao, Kan Chen:
Routing Policy Conflict Detection without Violating ISP's Privacy. CSE (3) 2009: 337-342 - [c41]Ning Hu, Peidong Zhu, Peng Zou:
An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation. ISPA 2009: 309-314 - [c40]Huayang Cao, Miao Wang, Xiaoqiang Wang, Peidong Zhu:
A Packet-Based Anomaly Detection Model for Inter-domain Routing. NAS 2009: 192-195 - [c39]Peidong Zhu, Xiangjiang Hu, Huayang Cao, Xiaoqiang Wang:
TTM Based Security Enhancement for Inter-domain Routing Protocol. NCA 2009: 262-265 - 2008
- [j1]Xicheng Lu, Gaofeng Lü, Peidong Zhu, Yijiao Chen:
MASK: An efficient mechanism to extend inter-domain IP spoofing preventions. Sci. China Ser. F Inf. Sci. 51(11): 1745-1760 (2008) - [c38]Xiangjiang Hu, Peidong Zhu, Kaiyu Cai, Zhenghu Gong:
AS Alliance in Inter-Domain Routing. AINA Workshops 2008: 151-156 - [c37]Ning Hu, Peng Zou, Peidong Zhu, Xin Liu:
Cooperative Management Framework for Inter-domain Routing System. ATC 2008: 567-576 - [c36]Wenping Deng, Peidong Zhu, Xicheng Lu:
ROUSSEAU: A Monitoring System for Inter-domain Routing Security. CNSR 2008: 255-262 - [c35]Zhengjian Zhu, Qingping Tan, Peidong Zhu, Qianbing Zheng:
Security Broadcast Based on Linear Network Coding in WSN. CSSE (3) 2008: 919-922 - [c34]Xin Liu, Peidong Zhu, Yuxing Peng:
SEM: A Security Evaluation Model for Inter-domain Routing System in the Internet. IPOM 2008: 142-153 - [c33]Ming Xu, Danlin Yao, Kaiyu Cai, Peidong Zhu, Yingwen Chen:
The progress of the national first-rate course "computer networks" in NUDT. Summit on Computing Education in China 2008: 3 - 2007
- [c32]Zhengjian Zhu, Qingping Tan, Peidong Zhu:
An Effective Secure Routing for False Data Injection Attack in Wireless Sensor Network. APNOMS 2007: 457-465 - [c31]Jinjing Zhao, Peidong Zhu, Xicheng Lu:
Pricing Models of Inter-Domain Multicasting Applications. CCNC 2007: 773-777 - [c30]Xiangjiang Hu, Peidong Zhu, Zhenghu Gong:
Translator Trust for the Internet Inter-domain Routing. FGCN (1) 2007: 453-458 - [c29]Jibo Liu, Chunhua Hu, Peidong Zhu:
Research Algorithm Based on Ant-Cooperation for Grid Service. GCC 2007: 49-58 - [c28]Peidong Zhu, Jinjing Zhao, Yan Wen, Kaiyu Cai:
On the Power-Law of the Internet and the Hierarchy of BGP Convergence. ICA3PP 2007: 470-481 - [c27]Shaoliang Peng, Shan-shan Li, Yuxing Peng, Peidong Zhu, Nong Xiao:
A Delay Sensitive Feedback Control Data Aggregation Approach in Wireless Sensor Network. International Conference on Computational Science (4) 2007: 393-400 - [c26]Jianrong Chen, Peidong Zhu, Zhichang Qi:
PR-MAC: Path-Oriented Real-Time MAC Protocol for Wireless Sensor Network. ICESS 2007: 530-539 - [c25]Jinjing Zhao, Peidong Zhu, Xicheng Lu, Lei Xuan:
Does the Average Path Length Grow in the Internet?. ICOIN 2007: 183-190 - [c24]Shanshan Li, Shaoliang Peng, Xiangke Liao, Peidong Zhu, Yuxing Peng:
A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks. Integrated Network Management 2007: 793-796 - [c23]Zhengjian Zhu, Qingping Tan, Peidong Zhu:
A Stream-Data Oriented Secure Routing Protocol in Wireless Sensor Networks. MSN 2007: 845-853 - [c22]Feng Zhao, Xicheng Lu, Baosheng Wang, Peidong Zhu:
Evaluating Internal BGP Networks from the Data Plane. Networking 2007: 1192-1195 - [c21]Feng Zhao, Peidong Zhu, Meng Wang, Baosheng Wang:
Optimizing Network Configurations Based on Potential Profit Loss. SNPD (1) 2007: 327-332 - [c20]Shanshan Li, Xiangke Liao, Shaoliang Peng, Peidong Zhu, Jie Jiang:
Credit based Fairness Control in Wireless Sensor Network. SNPD (1) 2007: 817-822 - 2006
- [c19]Wenping Deng, Peidong Zhu, Xicheng Lu, Kaiyu Cai:
A Systematic Compression Approach for Route Tables in a BGP Monitor. CIT 2006: 105 - [c18]Yantao Pan, Xicheng Lu, Peidong Zhu, Shen Ma:
A Diversity-Controllable Genetic Algorithm for Optimal Fused Traffic Planning on Sensor Networks. Asia-Pacific Computer Systems Architecture Conference 2006: 430-436 - [c17]Shanshan Li, Peidong Zhu, Xiangke Liao, Wei-Fang Cheng, Shaoliang Peng:
Energy Efficient Multipath Routing Using Network Coding in Wireless Sensor Networks. ADHOC-NOW 2006: 114-127 - [c16]Pan Dong, Peidong Zhu:
Research on Self-Organized Evolution of P2P Network Structure. GCC 2006: 142-148 - [c15]Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao:
BGPSep_D: An Improved Algorithm for Constructing Correct and Scalable IBGP Configurations Based on Vertexes Degree. HPCC 2006: 406-415 - [c14]Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao:
BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility. ICDCN 2006: 379-384 - [c13]Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao:
A practical pricing model of inter-domain multicasting based on game theory. NETGAMES 2006: 40 - [c12]Shanshan Li, Peidong Zhu, Xiangke Liao, Qiang Fu:
Reliable Data Delivery in Wireless Sensor Networks: An Energy-Efficient, Cluster-Based Approach. NEW2AN 2006: 384-395 - [c11]Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao:
The Hierarchy of BGP Convergence on the Self-Organized Internet. PRDC 2006: 391-392 - [c10]Pan Dong, Peidong Zhu, Xicheng Lu:
Brief Announcement: A Synthetic Public Key Management Scheme for Large-Scale MANET. SSS 2006: 570-571 - [c9]Yantao Pan, Wei Peng, Xicheng Lu, Shen Ma, Peidong Zhu:
A Fast Traffic Planning Algorithm in Lifetime Optimization of Sensor Networks. UIC 2006: 457-467 - [c8]Xiangke Liao, Shanshan Li, Peidong Zhu, Shaoliang Peng, Wei-Fang Cheng, Dezun Dong:
Path Selection of Reliable Data Delivery in Wireless Sensor Networks. WASA 2006: 163-174 - 2005
- [c7]Peidong Zhu, Xin Liu, Mingjun Yang, Ming Xu:
Rule-Based Anomaly Detection of Inter-domain Routing System. APPT 2005: 417-426 - [c6]Qianbing Zheng, Xicheng Lu, Peidong Zhu, Wei Peng:
An efficient random walks based approach to reducing file locating delay in unstructured P2P network. GLOBECOM 2005: 5 - [c5]Xiaozhe Zhang, Wei Peng, Peidong Zhu:
ARS: An Synchronization Algorithm Maintaining Single Image Among Nodes' Forwarding Tables of Clustered Router. ICCNMC 2005: 752-761 - [c4]Xiaozhe Zhang, Peidong Zhu, Xicheng Lu:
Fully-Distributed and Highly-Parallelized Implementation Model of BGP4 Based on Clustered Routers. ICN (2) 2005: 433-441 - [c3]Ke Zhu, Peidong Zhu, Xicheng Lu:
A New Price Mechanism Inducing Peers to Achieve Optimal Welfare. ICN (1) 2005: 554-560 - [c2]Xicheng Lu, Qianbing Zheng, Peidong Zhu, Wei Peng:
LQPD: An Efficient Long Query Path Driven Replication Strategy in Unstructured P2P Network. ICN (2) 2005: 793-799 - 2004
- [c1]Lechun Wang, Peidong Zhu, Zhenghu Gong:
Systematic Robustness-Testing RI-Pro of BGP. ISPA 2004: 463-468
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint