default search action
Wanlei Zhou 0001
Person information
- affiliation: City University of Macau, Institute of Data Science, Macau
- affiliation: University of Technology Sydney, School of Computer Science, NSW, Australia
- affiliation (1994 - 2018): Deakin University, Melbourne Burwood Campus, VIC, Australia
- affiliation (1992 - 1994): National University of Singapore, Singapore
- affiliation (PhD 1991): Australian National University, Canberra, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j261]Faqian Guan, Tianqing Zhu, Wanlei Zhou, Kim-Kwang Raymond Choo:
Graph neural networks: a survey on the links between privacy and security. Artif. Intell. Rev. 57(2): 40 (2024) - [j260]Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou:
A two-stage model extraction attack on GANs with a small collected dataset. Comput. Secur. 137: 103634 (2024) - [j259]Chi Liu, Tianqing Zhu, Yuan Zhao, Jun Zhang, Wanlei Zhou:
Disentangling different levels of GAN fingerprints for task-specific forensics. Comput. Stand. Interfaces 89: 103825 (2024) - [j258]Huajie Chen, Chi Liu, Tianqing Zhu, Wanlei Zhou:
When deep learning meets watermarking: A survey of application, attacks and defenses. Comput. Stand. Interfaces 89: 103830 (2024) - [j257]Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu:
Machine Unlearning: A Survey. ACM Comput. Surv. 56(1): 9:1-9:36 (2024) - [j256]Huiqiang Chen, Tianqing Zhu, Tao Zhang, Wanlei Zhou, Philip S. Yu:
Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff. ACM Comput. Surv. 56(2): 39:1-39:37 (2024) - [j255]Yunjiao Lei, Dayong Ye, Congcong Zhu, Sheng Shen, Wanlei Zhou, Tianqing Zhu:
A GNN-based teacher-student framework with multi-advice. Expert Syst. Appl. 250: 123887 (2024) - [j254]Yuan Zhao, Bo Liu, Tianqing Zhu, Ming Ding, Xin Yu, Wanlei Zhou:
Proactive image manipulation detection via deep semi-fragile watermark. Neurocomputing 585: 127593 (2024) - [j253]Qiong Li, Wanlei Zhou, James Xi Zheng:
Distributed Learning in Intelligent Transportation Systems: A Survey. Inf. 15(9): 550 (2024) - [j252]Minghao Wang, Tianqing Zhu, Xuhan Zuo, Dayong Ye, Shui Yu, Wanlei Zhou:
Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency. IEEE Internet Things J. 11(7): 11217-11231 (2024) - [j251]Congcong Zhu, Dayong Ye, Tianqing Zhu, Wanlei Zhou:
Location-Based Real-Time Updated Advising Method for Traffic Signal Control. IEEE Internet Things J. 11(8): 14551-14562 (2024) - [j250]Minghao Wang, Tianqing Zhu, Xuhan Zuo, Dayong Ye, Shui Yu, Wanlei Zhou:
Blockchain-Based Gradient Inversion and Poisoning Defense for Federated Learning. IEEE Internet Things J. 11(9): 15667-15681 (2024) - [j249]Minghao Wang, Tianqing Zhu, Xuhan Zuo, Dayong Ye, Shui Yu, Wanlei Zhou:
Public and Private Blockchain Infusion: A Novel Approach to Federated Learning. IEEE Internet Things J. 11(10): 17525-17537 (2024) - [j248]Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou:
PPFed: A Privacy-Preserving and Personalized Federated Learning Framework. IEEE Internet Things J. 11(11): 19380-19393 (2024) - [j247]Xiaoya Wang, Tianqing Zhu, Wanlei Zhou:
Supplement data in federated learning with a generator transparent to clients. Inf. Sci. 666: 120437 (2024) - [j246]Congcong Zhu, Dayong Ye, Huan Huo, Wanlei Zhou, Tianqing Zhu:
A location-based advising method in teacher-student frameworks. Knowl. Based Syst. 285: 111333 (2024) - [j245]Mengde Han, Tianqing Zhu, Wanlei Zhou:
Fair Federated Learning with Opposite GAN. Knowl. Based Syst. 287: 111420 (2024) - [j244]Kun Gao, Tianqing Zhu, Dayong Ye, Wanlei Zhou:
Defending against gradient inversion attacks in federated learning via statistical machine unlearning. Knowl. Based Syst. 299: 111983 (2024) - [j243]Faqian Guan, Tianqing Zhu, Hanjin Tong, Wanlei Zhou:
A realistic model extraction attack against graph neural networks. Knowl. Based Syst. 300: 112144 (2024) - [j242]Sheng Shen, Dayong Ye, Tianqing Zhu, Wanlei Zhou:
Privacy preservation in deep reinforcement learning: A training perspective. Knowl. Based Syst. 304: 112558 (2024) - [j241]Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou:
Boosting Model Inversion Attacks With Adversarial Examples. IEEE Trans. Dependable Secur. Comput. 21(3): 1451-1468 (2024) - [j240]Hui Sun, Tianqing Zhu, Jie Li, Shouling Ji, Wanlei Zhou:
Attribute-Based Membership Inference Attacks and Defenses on GANs. IEEE Trans. Dependable Secur. Comput. 21(4): 2376-2393 (2024) - [j239]Dayong Ye, Tianqing Zhu, Kun Gao, Wanlei Zhou:
Defending Against Label-Only Attacks via Meta-Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 19: 3295-3308 (2024) - [j238]Shuai Zhou, Tianqing Zhu, Dayong Ye, Wanlei Zhou, Wei Zhao:
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. IEEE Trans. Inf. Forensics Secur. 19: 4130-4145 (2024) - [j237]Yajie Wang, Yi Wu, Shangbo Wu, Ximeng Liu, Wanlei Zhou, Liehuang Zhu, Chuan Zhang:
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation. IEEE Trans. Inf. Forensics Secur. 19: 6293-6304 (2024) - [c176]Huiqiang Chen, Tianqing Zhu, Xin Yu, Wanlei Zhou:
Machine Unlearning via Null Space Calibration. IJCAI 2024: 358-366 - [c175]Huan Tian, Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou:
When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks. IJCAI 2024: 512-520 - [c174]Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou:
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers. USENIX Security Symposium 2024 - [i46]Huiqiang Chen, Tianqing Zhu, Xin Yu, Wanlei Zhou:
Machine Unlearning via Null Space Calibration. CoRR abs/2404.13588 (2024) - [i45]Wenhan Chang, Tianqing Zhu, Heng Xu, Wenjian Liu, Wanlei Zhou:
Class Machine Unlearning for Complex Data via Concepts Inference and Data Poisoning. CoRR abs/2405.15662 (2024) - [i44]Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Shui Yu, Wanlei Zhou:
Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach. CoRR abs/2405.20776 (2024) - [i43]Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou:
Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning. CoRR abs/2406.04076 (2024) - [i42]Shang Wang, Tianqing Zhu, Bo Liu, Ming Ding, Xu Guo, Dayong Ye, Wanlei Zhou, Philip S. Yu:
Unique Security and Privacy Threats of Large Language Model: A Comprehensive Survey. CoRR abs/2406.07973 (2024) - [i41]Laiqiao Qin, Tianqing Zhu, Wanlei Zhou, Philip S. Yu:
Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions. CoRR abs/2406.10861 (2024) - [i40]Linlin Wang, Tianqing Zhu, Wanlei Zhou, Philip S. Yu:
Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives. CoRR abs/2406.10884 (2024) - [i39]Heng Xu, Tianqing Zhu, Wanlei Zhou, Wei Zhao:
Don't Forget Too Much: Towards Machine Unlearning on Feature Level. CoRR abs/2406.10951 (2024) - [i38]Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou:
Really Unlearned? Verifying Machine Unlearning via Influential Sample Pairs. CoRR abs/2406.10953 (2024) - [i37]Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Wei Zhao:
Towards Efficient Target-Level Machine Unlearning Based on Essential Graph. CoRR abs/2406.10954 (2024) - [i36]Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu:
Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation. CoRR abs/2406.12516 (2024) - [i35]Faqian Guan, Tianqing Zhu, Hui Sun, Wanlei Zhou, Philip S. Yu:
Large Language Models for Link Stealing Attacks Against Graph Neural Networks. CoRR abs/2406.16963 (2024) - [i34]Huajie Chen, Tianqing Zhu, Lefeng Zhang, Bo Liu, Derui Wang, Wanlei Zhou, Minhui Xue:
QUEEN: Query Unlearning against Model Extraction. CoRR abs/2407.01251 (2024) - [i33]Feng He, Tianqing Zhu, Dayong Ye, Bo Liu, Wanlei Zhou, Philip S. Yu:
The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies. CoRR abs/2407.19354 (2024) - 2023
- [j236]Yunjiao Lei, Dayong Ye, Sheng Shen, Yulei Sui, Tianqing Zhu, Wanlei Zhou:
New challenges in reinforcement learning: a survey of security and privacy. Artif. Intell. Rev. 56(7): 7195-7236 (2023) - [j235]Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks. ACM Comput. Surv. 55(8): 161:1-161:35 (2023) - [j234]Shuai Zhou, Chi Liu, Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu:
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity. ACM Comput. Surv. 55(8): 163:1-163:39 (2023) - [j233]Xuemeng Zhai, Zhiwei Tang, Zhiwei Liu, Wanlei Zhou, Hangyu Hu, Gaolei Fei, Guangmin Hu:
Sparse representation for heterogeneous information networks. Neurocomputing 525: 111-122 (2023) - [j232]Minghao Wang, Tianqing Zhu, Xuhan Zuo, Mengmeng Yang, Shui Yu, Wanlei Zhou:
Differentially Private Crowdsourcing With the Public and Private Blockchain. IEEE Internet Things J. 10(10): 8918-8930 (2023) - [j231]Tao Zhang, Tianqing Zhu, Mengde Han, Fengwen Chen, Jing Li, Wanlei Zhou, Philip S. Yu:
Fairness in graph-based semi-supervised learning. Knowl. Inf. Syst. 65(2): 543-570 (2023) - [j230]Huan Tian, Bo Liu, Tianqing Zhu, Wanlei Zhou, Philip S. Yu:
CIFair: Constructing continuous domains of invariant features for image fair classifications. Knowl. Based Syst. 268: 110417 (2023) - [j229]Tao Zhang, Tianqing Zhu, Jing Li, Wanlei Zhou, Philip S. Yu:
Revisiting model fairness via adversarial examples. Knowl. Based Syst. 277: 110777 (2023) - [j228]Zishuo Cheng, Tianqing Zhu, Congcong Zhu, Dayong Ye, Wanlei Zhou, Philip S. Yu:
Privacy and evolutionary cooperation in neural-network-based game theory. Knowl. Based Syst. 282: 111076 (2023) - [j227]Tao Zhang, Dayong Ye, Tianqing Zhu, Tingting Liao, Wanlei Zhou:
Evolution of cooperation in malicious social networks with differential privacy mechanisms. Neural Comput. Appl. 35(18): 12979-12994 (2023) - [j226]Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou:
Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models. IEEE Trans. Dependable Secur. Comput. 20(2): 1435-1449 (2023) - [j225]Chi Liu, Huajie Chen, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack. IEEE Trans. Dependable Secur. Comput. 20(6): 5182-5196 (2023) - [j224]Tianqing Zhu, Dayong Ye, Shuai Zhou, Bo Liu, Wanlei Zhou:
Label-Only Model Inversion Attacks: Attack With the Least Information. IEEE Trans. Inf. Forensics Secur. 18: 991-1005 (2023) - [j223]Lefeng Zhang, Tianqing Zhu, Farookh Khadeer Hussain, Dayong Ye, Wanlei Zhou:
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems. IEEE Trans. Inf. Forensics Secur. 18: 1349-1364 (2023) - [j222]Lefeng Zhang, Tianqing Zhu, Haibin Zhang, Ping Xiong, Wanlei Zhou:
FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks. IEEE Trans. Inf. Forensics Secur. 18: 4732-4746 (2023) - [j221]Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou, Philip S. Yu:
A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy. IEEE Trans. Knowl. Data Eng. 35(4): 3333-3346 (2023) - [j220]Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin, Ping Xiong, Wanlei Zhou:
Adversarial Attacks Against Deep Generative Models on Data: A Survey. IEEE Trans. Knowl. Data Eng. 35(4): 3367-3388 (2023) - [j219]Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Wanlei Zhou, Wei Zhao:
Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study. IEEE Trans. Knowl. Data Eng. 35(4): 4137-4150 (2023) - [j218]Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Hengming Wang, Wanlei Zhou, Wei Zhao:
Privacy Data Diffusion Modeling and Preserving in Online Social Network. IEEE Trans. Knowl. Data Eng. 35(6): 6224-6237 (2023) - [j217]Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou, Philip S. Yu:
A Game-Theoretic Federated Learning Framework for Data Quality Improvement. IEEE Trans. Knowl. Data Eng. 35(11): 10952-10966 (2023) - [j216]Tao Zhang, Tianqing Zhu, Kun Gao, Wanlei Zhou, Philip S. Yu:
Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria. IEEE Trans. Neural Networks Learn. Syst. 34(9): 5557-5569 (2023) - [j215]Dayong Ye, Tianqing Zhu, Congcong Zhu, Wanlei Zhou, Philip S. Yu:
Model-Based Self-Advising for Multi-Agent Learning. IEEE Trans. Neural Networks Learn. Syst. 34(10): 7934-7945 (2023) - [j214]Tianqing Zhu, Dayong Ye, Zishuo Cheng, Wanlei Zhou, Philip S. Yu:
Learning Games for Defending Advanced Persistent Threats in Cyber Systems. IEEE Trans. Syst. Man Cybern. Syst. 53(4): 2410-2422 (2023) - [j213]Congcong Zhu, Zishuo Cheng, Dayong Ye, Farookh Khadeer Hussain, Tianqing Zhu, Wanlei Zhou:
Time-Driven and Privacy-Preserving Navigation Model for Vehicle-to-Vehicle Communication Systems. IEEE Trans. Veh. Technol. 72(7): 8459-8470 (2023) - [c173]Suleiman Abahussein, Tianqing Zhu, Dayong Ye, Zishuo Cheng, Wanlei Zhou:
Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning. AINA (3) 2023: 48-59 - [c172]Chi Liu, Tianqing Zhu, Sheng Shen, Wanlei Zhou:
Towards Robust Gan-Generated Image Detection: A Multi-View Completion Representation. IJCAI 2023: 464-472 - [c171]Penghui Wen, Kun Hu, Wenxi Yue, Sen Zhang, Wanlei Zhou, Zhiyong Wang:
Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms. INTERSPEECH 2023: 271-275 - [i32]Yunjiao Lei, Dayong Ye, Sheng Shen, Yulei Sui, Tianqing Zhu, Wanlei Zhou:
New Challenges in Reinforcement Learning: A Survey of Security and Privacy. CoRR abs/2301.00188 (2023) - [i31]Huajie Chen, Tianqing Zhu, Chi Liu, Shui Yu, Wanlei Zhou:
High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking. CoRR abs/2302.08637 (2023) - [i30]Huajie Chen, Tianqing Zhu, Yuan Zhao, Bo Liu, Xin Yu, Wanlei Zhou:
Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness. CoRR abs/2303.13713 (2023) - [i29]Chi Liu, Tianqing Zhu, Sheng Shen, Wanlei Zhou:
Towards Robust GAN-generated Image Detection: a Multi-view Completion Representation. CoRR abs/2306.01364 (2023) - [i28]Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu:
Machine Unlearning: A Survey. CoRR abs/2306.03558 (2023) - [i27]Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou:
Boosting Model Inversion Attacks with Adversarial Examples. CoRR abs/2306.13965 (2023) - [i26]Huiqiang Chen, Tianqing Zhu, Tao Zhang, Wanlei Zhou, Philip S. Yu:
Privacy and Fairness in Federated Learning: on the Perspective of Trade-off. CoRR abs/2306.14123 (2023) - [i25]Penghui Wen, Kun Hu, Wenxi Yue, Sen Zhang, Wanlei Zhou, Zhiyong Wang:
Robust Audio Anti-Spoofing with Fusion-Reconstruction Learning on Multi-Order Spectrograms. CoRR abs/2308.09302 (2023) - [i24]Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou:
Generative Adversarial Networks Unlearning. CoRR abs/2308.09881 (2023) - [i23]Huan Tian, Guangsheng Zhang, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou:
FD-MIA: Efficient Attacks on Fairness-enhanced Models. CoRR abs/2311.03865 (2023) - [i22]Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Jason Xue, Sheng Shen, Wanlei Zhou:
Reinforcement Unlearning. CoRR abs/2312.15910 (2023) - 2022
- [j212]Guangsheng Zhang, Bo Liu, Tianqing Zhu, Andi Zhou, Wanlei Zhou:
Visual privacy attacks and defenses in deep learning: a survey. Artif. Intell. Rev. 55(6): 4347-4401 (2022) - [j211]Huan Tian, Tianqing Zhu, Wanlei Zhou:
Fairness and privacy preservation for facial images: GAN-based methods. Comput. Secur. 122: 102902 (2022) - [j210]Yuan Zhao, Bo Liu, Tianqing Zhu, Ming Ding, Wanlei Zhou:
Private-encoder: Enforcing privacy in latent space for human face images. Concurr. Comput. Pract. Exp. 34(3) (2022) - [j209]Tao Zhang, Tianqing Zhu, Renping Liu, Wanlei Zhou:
Correlated data in differential privacy: Definition and analysis. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j208]Sheng Shen, Tianqing Zhu, Di Wu, Wei Wang, Wanlei Zhou:
From distributed machine learning to federated learning: In the view of data privacy and security. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j207]Lefeng Zhang, Tianqing Zhu, Ping Xiong, Wanlei Zhou, Philip S. Yu:
More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design. ACM Comput. Surv. 54(7): 136:1-136:37 (2022) - [j206]Zishuo Cheng, Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu, Congcong Zhu:
Multi-agent reinforcement learning via knowledge transfer with differentially private noise. Int. J. Intell. Syst. 37(1): 799-828 (2022) - [j205]Kasra Majbouri Yazdi, Jingyu Hou, Saeid Khodayi, Adel Majbouri Yazdi, Saeed Saedi, Wanlei Zhou:
Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks. J. High Speed Networks 28(4): 275-285 (2022) - [j204]Huan Tian, Tianqing Zhu, Wei Liu, Wanlei Zhou:
Image fairness in deep learning: problems, models, and challenges. Neural Comput. Appl. 34(15): 12875-12893 (2022) - [j203]Zichuan Xu, Lizhen Zhou, Haipeng Dai, Weifa Liang, Wanlei Zhou, Pan Zhou, Wenzheng Xu, Guowei Wu:
Energy-Aware Collaborative Service Caching in a 5G-Enabled MEC With Uncertain Payoffs. IEEE Trans. Commun. 70(2): 1058-1071 (2022) - [j202]Dayong Ye, Tianqing Zhu, Zishuo Cheng, Wanlei Zhou, Philip S. Yu:
Differential Advising in Multiagent Reinforcement Learning. IEEE Trans. Cybern. 52(6): 5508-5521 (2022) - [j201]Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou, Philip S. Yu:
Differentially Private Multi-Agent Planning for Logistic-Like Problems. IEEE Trans. Dependable Secur. Comput. 19(2): 1212-1226 (2022) - [j200]Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou:
One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy. IEEE Trans. Inf. Forensics Secur. 17: 1466-1480 (2022) - [j199]Shi-Jinn Horng, Dinh-Trung Vu, Thi-Van Nguyen, Wanlei Zhou, Chin-Teng Lin:
Recognizing Palm Vein in Smartphones Using RGB Images. IEEE Trans. Ind. Informatics 18(9): 5992-6002 (2022) - [j198]Shi-Jinn Horng, Julian Supardi, Wanlei Zhou, Chin-Teng Lin, Bin Jiang:
Recognizing Very Small Face Images Using Convolution Neural Networks. IEEE Trans. Intell. Transp. Syst. 23(3): 2103-2115 (2022) - [j197]Tao Zhang, Tianqing Zhu, Jing Li, Mengde Han, Wanlei Zhou, Philip S. Yu:
Fairness in Semi-Supervised Learning: Unlabeled Data Help to Reduce Discrimination. IEEE Trans. Knowl. Data Eng. 34(4): 1763-1774 (2022) - [j196]Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu:
More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence. IEEE Trans. Knowl. Data Eng. 34(6): 2824-2843 (2022) - [j195]Tianqing Zhu, Jin Li, Xiangyu Hu, Ping Xiong, Wanlei Zhou:
The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks. IEEE Trans. Knowl. Data Eng. 34(6): 2962-2974 (2022) - [j194]Weifa Liang, Yu Ma, Wenzheng Xu, Zichuan Xu, Xiaohua Jia, Wanlei Zhou:
Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing. IEEE Trans. Mob. Comput. 21(12): 4541-4554 (2022) - [j193]Zichuan Xu, Haozhe Ren, Weifa Liang, Qiufen Xia, Wanlei Zhou, Pan Zhou, Wenzheng Xu, Guowei Wu, Mingchu Li:
Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks. IEEE/ACM Trans. Netw. 30(6): 2601-2615 (2022) - [j192]Jing Li, Weifa Liang, Zichuan Xu, Xiaohua Jia, Wanlei Zhou:
Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing. ACM Trans. Sens. Networks 18(2): 17:1-17:25 (2022) - [j191]Jing Li, Weifa Liang, Wenzheng Xu, Zichuan Xu, Xiaohua Jia, Wanlei Zhou, Jin Zhao:
Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing. IEEE Trans. Parallel Distributed Syst. 33(5): 1199-1212 (2022) - [j190]Tianrui Zong, Juan Zhao, Yong Xiang, Iynkaran Natgunanathan, Longxiang Gao, Wanlei Zhou:
Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels. World Wide Web 25(1): 357-379 (2022) - [j189]Congcong Zhu, Dayong Ye, Tianqing Zhu, Wanlei Zhou:
Time-optimal and privacy preserving route planning for carpool policy. World Wide Web 25(3): 1151-1168 (2022) - [c170]Suleiman Abahussein, Zishuo Cheng, Tianqing Zhu, Dayong Ye, Wanlei Zhou:
Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces. AI 2022: 15-26 - [i21]Dayong Ye, Tianqing Zhu, Shuai Zhou, Bo Liu, Wanlei Zhou:
Label-only Model Inversion Attack: The Attack that Requires the Least Information. CoRR abs/2203.06555 (2022) - [i20]Dayong Ye, Huiqiang Chen, Shuai Zhou, Tianqing Zhu, Wanlei Zhou, Shouling Ji:
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It. CoRR abs/2203.06570 (2022) - [i19]Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou:
One Parameter Defense - Defending against Data Inference Attacks via Differential Privacy. CoRR abs/2203.06580 (2022) - [i18]Chi Liu, Huajie Chen, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack. CoRR abs/2203.11433 (2022) - [i17]Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou:
How Does a Deep Learning Model Architecture Impact Its Privacy? CoRR abs/2210.11049 (2022) - 2021
- [j188]Tianrui Zong, Yong Xiang, Iynkaran Natgunanathan, Longxiang Gao, Guang Hua, Wanlei Zhou:
Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals. IEEE ACM Trans. Audio Speech Lang. Process. 29: 969-984 (2021) - [j187]Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Wanlei Zhou, Gleb Beliakov:
Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification. IEEE ACM Trans. Audio Speech Lang. Process. 29: 2282-2295 (2021) - [j186]Jianghua Liu, Jingyu Hou, Wenjie Yang, Yang Xiang, Wanlei Zhou, Wei Wu, Xinyi Huang:
Leakage-Free Dissemination of Authenticated Tree-Structured Data With Multi-Party Control. IEEE Trans. Computers 70(7): 1120-1131 (2021) - [j185]Jianghua Liu, Jinhua Ma, Yang Xiang, Wanlei Zhou, Xinyi Huang:
Authenticated Medical Documents Releasing with Privacy Protection and Release Control. IEEE Trans. Dependable Secur. Comput. 18(1): 448-459 (2021) - [j184]Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou:
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries. IEEE Trans. Inf. Forensics Secur. 16: 569-584 (2021) - [j183]Aneesh Sreevallabh Chivukula, Xinghao Yang, Wei Liu, Tianqing Zhu, Wanlei Zhou:
Game Theoretical Adversarial Deep Learning With Variational Adversaries. IEEE Trans. Knowl. Data Eng. 33(11): 3568-3581 (2021) - [j182]Youyang Qu, Shui Yu, Wanlei Zhou, Shiping Chen, Jun Wu:
Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks. IEEE Trans. Netw. Sci. Eng. 8(1): 269-281 (2021) - [j181]Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Frank Jiang, Wanlei Zhou:
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat. IEEE Trans. Syst. Man Cybern. Syst. 51(10): 5977-5991 (2021) - [j180]Jianchao Lu, Xi Zheng, Lihong Tang, Tianyi Zhang, Quan Z. Sheng, Chen Wang, Jiong Jin, Shui Yu, Wanlei Zhou:
Can Steering Wheel Detect Your Driving Fatigue? IEEE Trans. Veh. Technol. 70(6): 5537-5550 (2021) - [c169]Zichuan Xu, Haozhe Ren, Weifa Liang, Qiufen Xia, Wanlei Zhou, Guowei Wu, Pan Zhou:
Near Optimal and Dynamic Mechanisms Towards a Stable NFV Market in Multi-Tier Cloud Networks. INFOCOM 2021: 1-10 - [e10]Wanlei Zhou, Yi Mu:
Advances in Web-Based Learning - ICWL 2021 - 20th International Conference, ICWL 2021, Macau, China, November 13-14, 2021, Proceedings. Lecture Notes in Computer Science 13103, Springer 2021, ISBN 978-3-030-90784-6 [contents] - [i16]Bo Liu, Ming Ding, Hanyu Xue, Tianqing Zhu, Dayong Ye, Li Song, Wanlei Zhou:
DP-Image: Differential Privacy for Image Data in Feature Space. CoRR abs/2103.07073 (2021) - [i15]Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin, Ping Xiong, Wanlei Zhou:
Adversarial Attacks Against Deep Generative Models on Data: A Survey. CoRR abs/2112.00247 (2021) - 2020
- [j179]Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang, Shui Yu, Wanlei Zhou:
Security and privacy in 6G networks: New areas and new challenges. Digit. Commun. Networks 6(3): 281-291 (2020) - [j178]Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu:
Differentially private model publishing in cyber physical systems. Future Gener. Comput. Syst. 108: 1297-1306 (2020) - [j177]Ping Xiong, Lefeng Zhang, Tianqing Zhu, Gang Li, Wanlei Zhou:
Private collaborative filtering under untrusted recommender server. Future Gener. Comput. Syst. 109: 511-520 (2020) - [j176]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang:
A study of data pre-processing techniques for imbalanced biomedical data classification. Int. J. Bioinform. Res. Appl. 16(3): 290-318 (2020) - [j175]Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Cai Lu, Guangmin Hu:
Network sparse representation: Decomposition, dimensionality-reduction and reconstruction. Inf. Sci. 521: 307-325 (2020) - [j174]Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy, Mehrdad Rostami:
Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms. J. High Speed Networks 26(2): 141-153 (2020) - [j173]Mohammad Reza Nosouhi, Shui Yu, Wanlei Zhou, Marthie Grobler, Habiba Keshtiar:
Blockchain for secure location verification. J. Parallel Distributed Comput. 136: 40-51 (2020) - [j172]Dayong Ye, Tianqing Zhu, Wanlei Zhou, Philip S. Yu:
Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning. IEEE Trans. Cybern. 50(10): 4214-4227 (2020) - [j171]Yanxin Zhang, Yulei Sui, Shirui Pan, Zheng Zheng, Baodi Ning, Ivor W. Tsang, Wanlei Zhou:
Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning. IEEE Trans. Inf. Forensics Secur. 15: 3401-3414 (2020) - [j170]Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou:
Correlated Differential Privacy: Feature Selection in Machine Learning. IEEE Trans. Ind. Informatics 16(3): 2115-2124 (2020) - [j169]Linjing Wu, Qingtang Liu, Wanlei Zhou, Gang Mao, Jingxiu Huang, Huan Huang:
A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning. Technol. Knowl. Learn. 25(4): 811-833 (2020) - [j168]Youyang Qu, Shui Yu, Wanlei Zhou, Yonghong Tian:
GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems. IEEE Trans. Netw. Sci. Eng. 7(4): 2576-2586 (2020) - [j167]Shi-Jinn Horng, Cheng-Chung Lu, Wanlei Zhou:
An Identity-Based and Revocable Data-Sharing Scheme in VANETs. IEEE Trans. Veh. Technol. 69(12): 15933-15946 (2020) - [c168]Peng Li, Toshiaki Miyazaki, Wanlei Zhou:
Secure Balance Planning of Off-blockchain Payment Channel Networks. INFOCOM 2020: 1728-1737 - [c167]Jing Li, Weifa Liang, Zichuan Xu, Wanlei Zhou:
Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing. LCN 2020: 42-53 - [c166]Tianrui Zong, Yong Xiang, Iynkaran Natgunanathan, Longxiang Gao, Wanlei Zhou:
Channel Correlation Based Robust Audio Watermarking Mechanism for Stereo Signals. WISE (2) 2020: 240-251 - [i14]Tao Zhang, Tianqing Zhu, Renping Liu, Wanlei Zhou:
Correlated Data in Differential Privacy: Definition and Analysis. CoRR abs/2008.00180 (2020) - [i13]Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu:
More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence. CoRR abs/2008.01916 (2020) - [i12]Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou:
A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries. CoRR abs/2008.05629 (2020) - [i11]Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou, Philip S. Yu:
Differentially Private Multi-Agent Planning for Logistic-like Problems. CoRR abs/2008.06832 (2020) - [i10]Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Privacy Intelligence: A Survey on Image Sharing on Online Social Networks. CoRR abs/2008.12199 (2020) - [i9]Tao Zhang, Tianqing Zhu, Mengde Han, Jing Li, Wanlei Zhou, Philip S. Yu:
Fairness Constraints in Semi-supervised Learning. CoRR abs/2009.06190 (2020) - [i8]Tao Zhang, Tianqing Zhu, Jing Li, Mengde Han, Wanlei Zhou, Philip S. Yu:
Fairness in Semi-supervised Learning: Unlabeled Data Help to Reduce Discrimination. CoRR abs/2009.12040 (2020) - [i7]Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou:
Correlated Differential Privacy: Feature Selection in Machine Learning. CoRR abs/2010.03094 (2020) - [i6]Sheng Shen, Tianqing Zhu, Di Wu, Wei Wang, Wanlei Zhou:
From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security. CoRR abs/2010.09258 (2020) - [i5]Dayong Ye, Tianqing Zhu, Zishuo Cheng, Wanlei Zhou, Philip S. Yu:
Differential Advising in Multi-Agent Reinforcement Learning. CoRR abs/2011.03640 (2020)
2010 – 2019
- 2019
- [b5]Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181 - [j166]Yunyun Wu, Jingyu Hou, Jing Liu, Wanlei Zhou, Shaowen Yao:
Novel Multi-Keyword Search on Encrypted Data in the Cloud. IEEE Access 7: 31984-31996 (2019) - [j165]Bo Liu, Ming Ding, Tianqing Zhu, Yong Xiang, Wanlei Zhou:
Adversaries or allies? Privacy and deep learning in big data era. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j164]Chee Keong Ng, Frank Jiang, Leo Yu Zhang, Wanlei Zhou:
Static malware clustering using enhanced deep embedding method. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j163]Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo N. Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio Martín Llorente, Sabrina De Capitani di Vimercati, Pierangela Samarati, Dejan S. Milojicic, Carlos A. Varela, Rami Bahsoon, Marcos Dias de Assunção, Omer F. Rana, Wanlei Zhou, Hai Jin, Wolfgang Gentzsch, Albert Y. Zomaya, Haiying Shen:
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade. ACM Comput. Surv. 51(5): 105:1-105:38 (2019) - [j162]Mengmeng Yang, Tianqing Zhu, Kaitai Liang, Wanlei Zhou, Robert H. Deng:
A blockchain-based location privacy-preserving crowdsensing system. Future Gener. Comput. Syst. 94: 408-418 (2019) - [j161]Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Cai Lu, Sheng Wen, Guangmin Hu:
Edge-based stochastic network model reveals structural complexity of edges. Future Gener. Comput. Syst. 100: 1073-1087 (2019) - [j160]Yongqing Jiang, Jinhua Lu, Jingyu Hou, Wanlei Zhou:
Greedily assemble tandem repeats for next generation sequences. Int. J. High Perform. Comput. Netw. 15(1/2): 1-11 (2019) - [j159]Xianjiao Zeng, Guangquan Xu, Xi Zheng, Yang Xiang, Wanlei Zhou:
E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT. IEEE Internet Things J. 6(2): 1506-1519 (2019) - [j158]Lu-Xing Yang, Pengdeng Li, Yushu Zhang, Xiaofan Yang, Yong Xiang, Wanlei Zhou:
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach. IEEE Trans. Inf. Forensics Secur. 14(7): 1713-1728 (2019) - [j157]Derek Wang, Tingmin Wu, Sheng Wen, Xiaofeng Chen, Yang Xiang, Wanlei Zhou:
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation. IEEE Trans. Sustain. Comput. 4(2): 178-190 (2019) - [c165]Bo Liu, Tianqing Zhu, Wanlei Zhou, Kun Wang, Haibo Zhou, Ming Ding:
Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions. GLOBECOM 2019: 1-6 - [c164]Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Hangyu Hu, Youyang Qu, Guangmin Hu:
Null Model and Community Structure in Heterogeneous Networks. ICA3PP (2) 2019: 151-163 - [c163]Sheng Shen, Tianqing Zhu, Dayong Ye, Mengmeng Yang, Tingting Liao, Wanlei Zhou:
Simultaneously Advising via Differential Privacy in Cloud Servers Environment. ICA3PP (1) 2019: 550-563 - [c162]Youyang Qu, Shui Yu, Jingwen Zhang, Huynh Thi Thanh Binh, Longxiang Gao, Wanlei Zhou:
GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing. ICC 2019: 1-6 - [c161]Jianchao Lu, Xi Zheng, Quan Z. Sheng, Zawar Hussain, Jiaxing Wang, Wanlei Zhou:
MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors. MobiQuitous 2019: 180-189 - [c160]Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeid Saedy, Mehrdad Rostami:
Improving Recommender Systems Accuracy in Social Networks Using Popularity. PDCAT 2019: 301-307 - [p1]Jianghua Liu, Yang Xiang, Wanlei Zhou, Xinyi Huang, Jinhua Ma:
Data Authentication with Privacy Protection. Advances in Cyber Security 2019: 115-142 - [i4]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang:
A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification. CoRR abs/1911.00996 (2019) - 2018
- [b4]Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang:
Location Privacy in Mobile Applications. Springer 2018, ISBN 978-981-13-1704-0, pp. 1-101 - [j156]Mengmeng Yang, Tianqing Zhu, Yang Xiang, Wanlei Zhou:
Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy. IEEE Access 6: 14779-14789 (2018) - [j155]Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, Wanlei Zhou:
Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture. IEEE Access 6: 17119-17129 (2018) - [j154]Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Yong Xiang:
Location Privacy and Its Applications: A Systematic Study. IEEE Access 6: 17606-17624 (2018) - [j153]Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, Wanlei Zhou:
Differential Private POI Queries via Johnson-Lindenstrauss Transform. IEEE Access 6: 29685-29699 (2018) - [j152]Luxing Yang, Pengdeng Li, Xiaofan Yang, Yong Xiang, Wanlei Zhou:
A Differential Game Approach to Patch Injection. IEEE Access 6: 58924-58938 (2018) - [j151]Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou:
Human-Driven Edge Computing and Communication: Part 2. IEEE Commun. Mag. 56(2): 134-135 (2018) - [j150]Tingmin Wu, Sheng Wen, Yang Xiang, Wanlei Zhou:
Twitter spam detection: Survey of new approaches and comparative study. Comput. Secur. 76: 265-284 (2018) - [j149]Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang, Wanlei Zhou:
An iteration-based differentially private social network data release. Comput. Syst. Sci. Eng. 33(2) (2018) - [j148]Tianqing Zhu, Gang Li, Ping Xiong, Wanlei Zhou:
Answering differentially private queries for continual datasets release. Future Gener. Comput. Syst. 87: 816-827 (2018) - [j147]Derek Wang, Tingmin Wu, Sheng Wen, Donghai Liu, Yang Xiang, Wanlei Zhou, Houcine Hassan, Abdulhameed Alelaiwi:
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks. J. Comput. Sci. 26: 456-467 (2018) - [j146]Youyang Qu, Shui Yu, Longxiang Gao, Wanlei Zhou, Sancheng Peng:
A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks. IEEE Trans. Comput. Soc. Syst. 5(3): 773-784 (2018) - [j145]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Rumor Source Identification in Social Networks with Time-Varying Topology. IEEE Trans. Dependable Secur. Comput. 15(1): 166-179 (2018) - [j144]Bo Liu, Wanlei Zhou, Longxiang Gao, Haibo Zhou, Tom H. Luan, Sheng Wen:
Malware Propagations in Wireless Ad Hoc Networks. IEEE Trans. Dependable Secur. Comput. 15(6): 1016-1026 (2018) - [j143]Youyang Qu, Shui Yu, Wanlei Zhou, Sancheng Peng, Guojun Wang, Ke Xiao:
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wirel. Commun. 25(6): 91-97 (2018) - [c159]Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. AsiaCCS 2018: 723-734 - [c158]Jianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang, Xinyi Huang:
Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases. ESORICS (2) 2018: 167-186 - [c157]Bo Liu, Ming Ding, Tianqing Zhu, Yong Xiang, Wanlei Zhou:
Using Adversarial Noises to Protect Privacy in Deep Learning Era. GLOBECOM 2018: 1-6 - [c156]Youyang Qu, Shui Yu, Wanlei Zhou, Jianwei Niu:
FBI: Friendship Learning-Based User Identification in Multiple Social Networks. GLOBECOM 2018: 1-6 - [c155]Youyang Qu, Lei Cui, Shui Yu, Wanlei Zhou, Jun Wu:
Improving Data Utility through Game Theory in Personalized Differential Privacy. ICC 2018: 1-6 - [c154]Derek Wang, Wanlei Zhou, James Xi Zheng, Sheng Wen, Jun Zhang, Yang Xiang:
Who Spread to Whom? Inferring Online Social Networks with User Features. ICC 2018: 1-6 - [c153]Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori:
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. NSS 2018: 202-211 - [c152]Kasra Majbouri Yazdi, Adel Majbouri Yazdi, Saeid Khodayi, Jingyu Hou, Wanlei Zhou, Saeed Saedy:
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks. SpaCCS 2018: 381-391 - [c151]Walaa Alajali, Wanlei Zhou, Sheng Wen:
Traffic Flow Prediction for Road Intersection Safety. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 812-820 - [c150]Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Haider Adeeb Kassem:
Hiding RFID in the Image Matching Based Access Control to a Smart Building. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1988-1993 - [i3]Derek Wang, Chaoran Li, Sheng Wen, Yang Xiang, Wanlei Zhou, Surya Nepal:
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks. CoRR abs/1803.05123 (2018) - 2017
- [b3]Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu:
Differential Privacy and Applications. Advances in Information Security 69, Springer 2017, ISBN 978-3-319-62002-2, pp. 1-222 - [j142]Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou:
Human-Driven Edge Computing and Communication: Part 1. IEEE Commun. Mag. 55(11): 70-71 (2017) - [j141]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A secure search protocol for low cost passive RFID tags. Comput. Networks 122: 70-82 (2017) - [j140]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies. IEEE Commun. Surv. Tutorials 19(1): 465-481 (2017) - [j139]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou, Houcine Hassan:
The structure of communities in scale-free networks. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j138]Longxiang Gao, Tom H. Luan, Shui Yu, Wanlei Zhou, Bo Liu:
FogRoute: DTN-Based Data Dissemination Model in Fog Computing. IEEE Internet Things J. 4(1): 225-235 (2017) - [j137]Sheng Wen, Jiao Jiao Jiang, Bo Liu, Yang Xiang, Wanlei Zhou:
Using epidemic betweenness to measure the influence of users in complex networks. J. Netw. Comput. Appl. 78: 288-299 (2017) - [j136]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou:
Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning. IEEE Trans. Fuzzy Syst. 25(6): 1476-1490 (2017) - [j135]Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Geyong Min:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. IEEE Trans. Inf. Forensics Secur. 12(4): 914-925 (2017) - [j134]Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu:
Differentially Private Data Publishing and Analysis: A Survey. IEEE Trans. Knowl. Data Eng. 29(8): 1619-1638 (2017) - [j133]Bo Liu, Wanlei Zhou, Tianqing Zhu, Haibo Zhou, Xiaodong Lin:
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models. IEEE Trans. Veh. Technol. 66(5): 4410-4423 (2017) - [c149]Yongqing Jiang, Jinhua Lu, Jingyu Hou, Wanlei Zhou:
TRA: tandem repeat assembler for next generation sequences. ACSW 2017: 4:1-4:6 - [c148]Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu:
Differentially private query learning: From data publishing to model publishing. IEEE BigData 2017: 1117-1122 - [c147]Xiaoning Zhang, Shui Yu, Zhichao Xu, Yichao Li, Zijing Cheng, Wanlei Zhou:
Flow Entry Sharing in Protection Design for Software Defined Networks. GLOBECOM 2017: 1-7 - [c146]Mengmeng Yang, Tianqing Zhu, Yang Xiang, Wanlei Zhou:
Personalized Privacy Preserving Collaborative Filtering. GPC 2017: 371-385 - [c145]Derek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal:
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. ICDCS 2017: 2417-2422 - [c144]Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li:
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). ISPEC 2017: 694-704 - [c143]Walaa Alajali, Sheng Wen, Wanlei Zhou:
On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment. SpaCCS Workshops 2017: 641-652 - [c142]Mengmeng Yang, Tianqing Zhu, Lichuan Ma, Yang Xiang, Wanlei Zhou:
Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform. TrustCom/BigDataSE/ICESS 2017: 417-424 - [c141]Lihong Tang, Wanlun Ma, Sheng Wen, Marthie Grobler, Yang Xiang, Wanlei Zhou:
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media. WISE (2) 2017: 528-539 - [i2]Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu:
Differentially Private Query Learning: from Data Publishing to Model Publishing. CoRR abs/1710.05095 (2017) - [i1]Rajkumar Buyya, Satish Narayana Srirama, Giuliano Casale, Rodrigo N. Calheiros, Yogesh Simmhan, Blesson Varghese, Erol Gelenbe, Bahman Javadi, Luis Miguel Vaquero, Marco A. S. Netto, Adel Nadjaran Toosi, Maria Alejandra Rodriguez, Ignacio Martín Llorente, Sabrina De Capitani di Vimercati, Pierangela Samarati, Dejan S. Milojicic, Carlos A. Varela, Rami Bahsoon, Marcos Dias de Assunção, Omer F. Rana, Wanlei Zhou, Hai Jin, Wolfgang Gentzsch, Albert Y. Zomaya, Haiying Shen:
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade. CoRR abs/1711.09123 (2017) - 2016
- [j132]James Jong Hyuk Park, Wanlei Zhou:
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing. Entropy 18(9): 334 (2016) - [j131]Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou, Jonathan J. Oliver:
Spammers Are Becoming "Smarter" on Twitter. IT Prof. 18(2): 66-70 (2016) - [j130]Guangyan Huang, Jing He, Wanlei Zhou, Guang-Li Huang, Limin Guo, Xiangmin Zhou, Feiyi Tang:
Discovery of stop regions for understanding repeat travel behaviors of moving objects. J. Comput. Syst. Sci. 82(4): 582-593 (2016) - [j129]Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, Cao Yuan:
Privacy-preserving topic model for tagging recommender systems. Knowl. Inf. Syst. 46(1): 33-58 (2016) - [j128]Faizal Riaz-ud-Din, Wanlei Zhou, Robin Doss:
Query verification schemes for cloud-hosted databases: a brief survey. Int. J. Parallel Emergent Distributed Syst. 31(6): 543-561 (2016) - [j127]Shui Yu, Wanlei Zhou, Song Guo, Minyi Guo:
A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking. IEEE Trans. Computers 65(5): 1418-1427 (2016) - [j126]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Comments and Corrections. IEEE Trans. Comput. Soc. Syst. 3(1): 42 (2016) - [j125]Song Han, Shuai Zhao, Qinghua Li, Chun-Hua Ju, Wanlei Zhou:
PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance. IEEE Trans. Inf. Forensics Secur. 11(9): 1940-1955 (2016) - [j124]Mohammad Sayad Haghighi, Sheng Wen, Yang Xiang, Barry G. Quinn, Wanlei Zhou:
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 11(12): 2854-2865 (2016) - [j123]Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Tom H. Luan, Haibo Zhou:
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks. IEEE Trans. Veh. Technol. 65(12): 9942-9953 (2016) - [c140]Jiao Jiao Jiang, Youyang Qu, Shui Yu, Wanlei Zhou, Wei Wu:
Studying the Global Spreading Influence and Local Connections of Users in Online Social Networks. CIT 2016: 431-435 - [c139]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Wanlei Zhou, Yi Qian:
Analysis of the Spreading Influence Variations for Online Social Users under Attacks. GLOBECOM 2016: 1-6 - [c138]Faizal Riaz-ud-Din, Robin Doss, Wanlei Zhou:
String matching query verification on cloud-hosted databases. ICDCN 2016: 17:1-17:10 - [c137]Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jia-Nan Liu:
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. NSS 2016: 65-79 - [c136]Bo Liu, Wanlei Zhou, Jiao Jiao Jiang, Kun Wang:
K-Source: Multiple source selection for traffic offloading in mobile social networks. WCSP 2016: 1-5 - 2015
- [b2]Longxiang Gao, Shui Yu, Tom H. Luan, Wanlei Zhou:
Delay Tolerant Networks. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-18107-3, pp. 1-85 - [j122]Saravanan Sundaresan, Robin Doss, Wanlei Zhou, Selwyn Piramuthu:
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Comput. Commun. 55: 112-124 (2015) - [j121]Yongli Ren, Gang Li, Wanlei Zhou:
A survey of recommendation techniques based on offline data processing. Concurr. Comput. Pract. Exp. 27(15): 3915-3942 (2015) - [j120]Shui Yu, Guojun Wang, Wanlei Zhou:
Modeling malicious activities in cyber space. IEEE Netw. 29(6): 83-87 (2015) - [j119]Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou:
Special issue on recent advances in network and information security - security and communication networks journal. Secur. Commun. Networks 8(1): 1 (2015) - [j118]Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou, Guiyi Wei:
Detecting stepping stones by abnormal causality probability. Secur. Commun. Networks 8(10): 1831-1844 (2015) - [j117]Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. IEEE Trans. Computers 64(3): 640-653 (2015) - [j116]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Computers 64(10): 2994-3008 (2015) - [j115]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. IEEE Trans. Comput. Soc. Syst. 2(3): 65-76 (2015) - [j114]Tianrui Zong, Yong Xiang, Iynkaran Natgunanathan, Song Guo, Wanlei Zhou, Gleb Beliakov:
Robust Histogram Shape-Based Method for Image Watermarking. IEEE Trans. Circuits Syst. Video Technol. 25(5): 717-729 (2015) - [j113]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
Secure Tag Search in RFID Systems Using Mobile Readers. IEEE Trans. Dependable Secur. Comput. 12(2): 230-242 (2015) - [j112]Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou:
Correlated Differential Privacy: Hiding Information in Non-IID Data Set. IEEE Trans. Inf. Forensics Secur. 10(2): 229-242 (2015) - [j111]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans. Inf. Forensics Secur. 10(12): 2616-2626 (2015) - [j110]Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, Jie Wu:
Robust Network Traffic Classification. IEEE/ACM Trans. Netw. 23(4): 1257-1270 (2015) - [j109]Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, Ping Xiong:
Privacy preserving data release for tagging recommender systems. Web Intell. 13(4): 229-246 (2015) - [j108]Guangyan Huang, Jing He, Yanchun Zhang, Wanlei Zhou, Hai Liu, Peng Zhang, Zhiming Ding, Yue You, Jian Cao:
Mining streams of short text for analysis of world-wide event evolutions. World Wide Web 18(5): 1201-1217 (2015) - [c135]Guangyan Huang, Jing He, Chi-Hung Chi, Wanlei Zhou, Yanchun Zhang:
A Data as a Product Model for Future Consumption of Big Stream Data in Clouds. SCC 2015: 256-263 - [c134]Chao Chen, Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou:
6 million spam tweets: A large ground truth for timely Twitter spam detection. ICC 2015: 7065-7070 - [c133]Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
Asymmetric self-learning for tackling Twitter Spam Drift. INFOCOM Workshops 2015: 208-213 - [c132]Sheng Wen, Jiaojiao Jiang, Kasra Majbouri Yazdi, Yang Xiang, Wanlei Zhou:
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks. SocialSec 2015: 80-84 - [c131]Bo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, Tom H. Luan:
Mobility Increases the Risk of Malware Propagations in Wireless Networks. TrustCom/BigDataSE/ISPA (1) 2015: 90-95 - 2014
- [j107]Yini Wang, Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling the Propagation of Worms in Networks: A Survey. IEEE Commun. Surv. Tutorials 16(2): 942-960 (2014) - [j106]Tianqing Zhu, Yongli Ren, Wanlei Zhou, Jia Rong, Ping Xiong:
An effective privacy preserving algorithm for neighborhood-based collaborative filtering. Future Gener. Comput. Syst. 36: 142-155 (2014) - [j105]Wei Zhou, Weijia Jia, Sheng Wen, Yang Xiang, Wanlei Zhou:
Detection and defense of application-layer DDoS attacks in backbone web traffic. Future Gener. Comput. Syst. 38: 36-46 (2014) - [j104]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie:
Internet traffic clustering with side information. J. Comput. Syst. Sci. 80(5): 1021-1036 (2014) - [j103]Yonghong Tian, Shui Yu, Chin-Yung Lin, Wen Gao, Wanlei Zhou:
Guest Editorial. J. Multim. 9(1): 1-3 (2014) - [j102]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou:
Are the popular users always important for information dissemination in online social networks? IEEE Netw. 28(5): 64-67 (2014) - [j101]Theerasak Thapngam, Shui Yu, Wanlei Zhou, S. Kami Makki:
Distributed Denial of Service (DDoS) detection by traffic pattern analysis. Peer-to-Peer Netw. Appl. 7(4): 346-358 (2014) - [j100]Tianqing Zhu, Gang Li, Lei Pan, Yongli Ren, Wanlei Zhou:
Privacy preserving collaborative filtering for KNN attack resisting. Soc. Netw. Anal. Min. 4(1): 196 (2014) - [j99]Yongli Ren, Gang Li, Jun Zhang, Wanlei Zhou:
The maximum imputation framework for neighborhood-based collaborative filtering. Soc. Netw. Anal. Min. 4(1): 207 (2014) - [j98]Yong Xiang, Iynkaran Natgunanathan, Song Guo, Wanlei Zhou, Saeid Nahavandi:
Patchwork-Based Audio Watermarking Method Robust to De-synchronization Attacks. IEEE ACM Trans. Audio Speech Lang. Process. 22(9): 1413-1423 (2014) - [j97]Silvio Cesare, Yang Xiang, Wanlei Zhou:
Control Flow-Based Malware VariantDetection. IEEE Trans. Dependable Secur. Comput. 11(4): 307-317 (2014) - [j96]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. IEEE Trans. Dependable Secur. Comput. 11(4): 361-374 (2014) - [j95]Saravanan Sundaresan, Robin Doss, Selwyn Piramuthu, Wanlei Zhou:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Inf. Forensics Secur. 9(6): 961-975 (2014) - [j94]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, Laurence T. Yang:
Internet Traffic Classification Using Constrained Clustering. IEEE Trans. Parallel Distributed Syst. 25(11): 2932-2943 (2014) - [j93]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou, Weijia Jia:
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(12): 3306-3316 (2014) - [j92]Yongli Ren, Gang Li, Wanlei Zhou:
Modelling personal preferences for Top-N movie recommendations. Web Intell. Agent Syst. 12(3): 289-307 (2014) - [c130]Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. NSS 2014: 138-151 - [c129]Tianqing Zhu, Gang Li, Wanlei Zhou, Ping Xiong, Cao Yuan:
Deferentially Private Tagging Recommendation Based on Topic Model. PAKDD (1) 2014: 557-568 - [e9]Xian-He Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei (Chris) Liu:
Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8630, Springer 2014, ISBN 978-3-319-11196-4 [contents] - [e8]Xian-He Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, Hua Guo, Geyong Min, Tingting Yang, Yulei Wu, Lei (Chris) Liu:
Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II. Lecture Notes in Computer Science 8631, Springer 2014, ISBN 978-3-319-11193-3 [contents] - 2013
- [j91]Robin Doss, Saravanan Sundaresan, Wanlei Zhou:
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1): 383-396 (2013) - [j90]Jun Zhang, Lei Ye, Yang Xiang, Wanlei Zhou:
Robust image retrieval with hidden classes. Comput. Vis. Image Underst. 117(6): 670-679 (2013) - [j89]Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang:
Unsupervised traffic classification using flow statistical properties and IP packet payload. J. Comput. Syst. Sci. 79(5): 573-585 (2013) - [j88]Yongli Ren, Gang Li, Wanlei Zhou:
A learning method for Top-N recommendations with incomplete data. Soc. Netw. Anal. Min. 3(4): 1135-1148 (2013) - [j87]Silvio Cesare, Yang Xiang, Wanlei Zhou:
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware. IEEE Trans. Computers 62(6): 1193-1206 (2013) - [j86]Yongli Ren, Gang Li, Jun Zhang, Wanlei Zhou:
Lazy Collaborative Filtering for Data Sets With Missing Values. IEEE Trans. Cybern. 43(6): 1822-1834 (2013) - [j85]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. IEEE Trans. Inf. Forensics Secur. 8(1): 5-15 (2013) - [j84]Robin Doss, Wanlei Zhou, Shui Yu:
Secure RFID Tag Ownership Transfer Based on Quadratic Residues. IEEE Trans. Inf. Forensics Secur. 8(2): 390-401 (2013) - [j83]Guojun Wang, Wanlei Zhou, Laurence T. Yang:
Trust, security and privacy for pervasive applications. J. Supercomput. 64(3): 661-663 (2013) - [j82]Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, Shui Yu:
Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks. IEEE Trans. Mob. Comput. 12(11): 2132-2144 (2013) - [j81]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou, Athanasios V. Vasilakos:
An Effective Network Traffic Classification Method with Unknown Flow Detection. IEEE Trans. Netw. Serv. Manag. 10(2): 133-147 (2013) - [j80]Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, Yong Guan:
Network Traffic Classification Using Correlation Information. IEEE Trans. Parallel Distributed Syst. 24(1): 104-117 (2013) - [j79]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia:
Modeling Propagation Dynamics of Social Network Worms. IEEE Trans. Parallel Distributed Syst. 24(8): 1633-1643 (2013) - [c128]Yongli Ren, Gang Li, Jun Zhang, Wanlei Zhou:
AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering. ASONAM 2013: 628-635 - [c127]Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, Ping Xiong:
Differential privacy for neighborhood-based collaborative filtering. ASONAM 2013: 752-759 - [c126]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Robust network traffic identification with unknown applications. AsiaCCS 2013: 405-414 - [c125]Xiao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou:
Traffic Identification in Semi-known Network Environment. CSE 2013: 572-579 - [c124]Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou:
Zero-Day Traffic Identification. CSS 2013: 213-227 - [c123]Sheng Wen, Ping Li, Di Wu, Yang Xiang, Wanlei Zhou:
Detecting Stepping Stones by Abnormal Causality Probability. CSS 2013: 308-322 - [c122]Shui Yu, Wanlei Zhou, Song Guo, Minyi Guo:
A dynamical Deterministic Packet Marking scheme for DDoS traceback. GLOBECOM 2013: 729-734 - [c121]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Secure ownership transfer in multi-tag/multi-owner passive RFID systems. GLOBECOM 2013: 2891-2896 - [c120]Shui Yu, Robin Doss, Wanlei Zhou, Song Guo:
A general cloud firewall framework with dynamic resource allocation. ICC 2013: 1941-1945 - [c119]Longxiang Gao, Ming Li, Wanlei Zhou, Wen Shi:
Anonymous Data Forwarding in Human Associated Delay Tolerant Networks. ICDCS Workshops 2013: 17-21 - [c118]Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling and Analysis for Thwarting Worm Propagation in Email Networks. NSS 2013: 763-769 - [c117]Yongli Ren, Tianqing Zhu, Gang Li, Wanlei Zhou:
Top-N Recommendations by Learning User Preference Dynamics. PAKDD (2) 2013: 390-401 - [c116]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
RFID tags - Grouping proof with forward security. RFID-TA 2013: 1-6 - [c115]Yongli Ren, Gang Li, Wanlei Zhou:
Recommendation Techniques Based on Off-Line Data Processing a Multifaceted Survey. SKG 2013: 6-13 - [c114]Tianqing Zhu, Ping Xiong, Yang Xiang, Wanlei Zhou:
An Effective Deferentially Private Data Releasing Algorithm for Decision Tree. TrustCom/ISPA/IUCC 2013: 388-395 - [c113]Longxiang Gao, Ming Li, Wanlei Zhou, Wen Shi:
Privacy Protected Data Forwarding in Human Associated Delay Tolerant Networks. TrustCom/ISPA/IUCC 2013: 586-593 - [c112]Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, Ping Xiong:
Privacy Preserving for Tagging Recommender Systems. Web Intelligence 2013: 81-88 - [c111]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Offline grouping proof protocol for RFID systems. WiMob 2013: 247-252 - 2012
- [j78]Jiankun Hu, Yang Xiang, Wanlei Zhou:
Advances in Network and System Security: Editorial Statement. Comput. J. 55(4): 382-383 (2012) - [j77]Shui Yu, Wanlei Zhou, Weijia Jia, Jiankun Hu:
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics. Comput. J. 55(4): 410-421 (2012) - [j76]Robin Doss, Wanlei Zhou, Saravanan Sundaresan, Shui Yu, Longxiang Gao:
A minimum disclosure approach to authentication and privacy in RFID systems. Comput. Networks 56(15): 3401-3416 (2012) - [j75]Yang Xiang, Jiankun Hu, Wanlei Zhou:
Advances in network and system security. Concurr. Comput. Pract. Exp. 24(10): 1035-1036 (2012) - [j74]Sheng Wen, Wei Zhou, Yang Xiang, Wanlei Zhou:
CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion. Concurr. Comput. Pract. Exp. 24(10): 1137-1153 (2012) - [j73]Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, Yang Xiang:
Locating Defense Positions for Thwarting the Propagation of Topological Worms. IEEE Commun. Lett. 16(4): 560-563 (2012) - [j72]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and compound classification of network traffic. Int. J. Secur. Networks 7(4): 252-261 (2012) - [j71]Yanli Yu, Keqiu Li, Wanlei Zhou, Ping Li:
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3): 867-880 (2012) - [j70]Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. J. Netw. Comput. Appl. 35(3): 992-1000 (2012) - [j69]Longxiang Gao, Ming Li, Alessio Bonti, Wanlei Zhou, Shui Yu:
M-Dimension: Multi-characteristics based routing protocol in human associated delay-tolerant networks with improved performance over one dimensional classic models. J. Netw. Comput. Appl. 35(4): 1285-1296 (2012) - [j68]Iynkaran Natgunanathan, Yong Xiang, Yue Rong, Wanlei Zhou, Song Guo:
Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking. IEEE Trans. Speech Audio Process. 20(8): 2232-2239 (2012) - [j67]Yong Xiang, Iynkaran Natgunanathan, Dezhong Peng, Wanlei Zhou, Shui Yu:
A Dual-Channel Time-Spread Echo Method for Audio Watermarking. IEEE Trans. Inf. Forensics Secur. 7(2): 383-392 (2012) - [j66]Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, Feilong Tang:
Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient. IEEE Trans. Parallel Distributed Syst. 23(6): 1073-1080 (2012) - [c110]Yongli Ren, Gang Li, Wanlei Zhou:
Learning Rating Patterns for Top-N Recommendations. ASONAM 2012: 472-479 - [c109]Yongli Ren, Gang Li, Jun Zhang, Wanlei Zhou:
The efficient imputation method for neighborhood-based collaborative filtering. CIKM 2012: 684-693 - [c108]Theerasak Thapngam, Shui Yu, Wanlei Zhou:
DDoS discrimination by Linear Discriminant Analysis (LDA). ICNC 2012: 532-536 - [c107]Shui Yu, Wanlei Zhou, Wanchun Dou, S. Kami Makki:
Why it is Hard to Fight against Cyber Criminals? ICDCS Workshops 2012: 537-541 - [c106]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Semi-supervised and Compound Classification of Network Traffic. ICDCS Workshops 2012: 617-621 - [c105]Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags. PIMRC 2012: 30-35 - [c104]Yongli Ren, Gang Li, Wanlei Zhou:
Improving Top-N Recommendations with User Consuming Profiles. PRICAI 2012: 887-890 - [c103]Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Classification of Correlated Internet Traffic Flows. TrustCom 2012: 490-496 - [c102]Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou:
An Analytical Model on the Propagation of Modern Email Worms. TrustCom 2012: 533-540 - [c101]Longxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti, Wanlei Zhou, Shui Yu:
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs. TrustCom 2012: 1245-1250 - [c100]Robin Doss, Wanlei Zhou:
A secure tag ownership transfer scheme in a closed loop RFID system. WCNC Workshops 2012: 164-169 - [c99]Yongli Ren, Gang Li, Wanlei Zhou:
Learning User Preference Patterns for Top-N Recommendations. Web Intelligence 2012: 137-144 - [e7]Yang Xiang, Javier López, C.-C. Jay Kuo, Wanlei Zhou:
Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012. Proceedings. Lecture Notes in Computer Science 7672, Springer 2012, ISBN 978-3-642-35361-1 [contents] - 2011
- [j65]Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu:
Secure Image Retrieval Based on Visual Content and Watermarking Protocol. Comput. J. 54(10): 1661-1674 (2011) - [j64]Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang:
The Microcosmic Model of Worm Propagation. Comput. J. 54(10): 1700-1720 (2011) - [j63]Yang Xiang, Wanlei Zhou:
Special issue: Building secure parallel and distributed networks and systems. Comput. Commun. 34(4): 525 (2011) - [j62]Yang Xiang, Jiankun Hu, Wanlei Zhou:
Editorial: Advances in network and system security. Comput. Secur. 30(5): 295-296 (2011) - [j61]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Special Issue: Securing Distributed Networks and Systems. Concurr. Comput. Pract. Exp. 23(12): 1311-1312 (2011) - [j60]Baoshu Xu, Wenyu Qu, Wanlei Zhou:
A mobile agent-based routing algorithm and some theoretical analysis. Comput. Syst. Sci. Eng. 26(1) (2011) - [j59]Yang Xiang, Wanlei Zhou:
Special Section: Trusted computing. Future Gener. Comput. Syst. 27(5): 527-528 (2011) - [j58]Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang:
Eliminating Errors in Worm Propagation Models. IEEE Commun. Lett. 15(9): 1022-1024 (2011) - [j57]Ashley Chonka, Yang Xiang, Wanlei Zhou, Alessio Bonti:
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J. Netw. Comput. Appl. 34(4): 1097-1107 (2011) - [j56]Yang Xiang, Ke Li, Wanlei Zhou:
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Trans. Inf. Forensics Secur. 6(2): 426-437 (2011) - [j55]Yong Xiang, Dezhong Peng, Iynkaran Natgunanathan, Wanlei Zhou:
Effective Pseudonoise Sequence and Decoding Function for Imperceptibility and Robustness Enhancement in Time-Spread Echo-Based Audio Watermarking. IEEE Trans. Multim. 13(1): 2-13 (2011) - [j54]Shui Yu, Wanlei Zhou, Robin Doss, Weijia Jia:
Traceback of DDoS Attacks Using Entropy Variations. IEEE Trans. Parallel Distributed Syst. 22(3): 412-425 (2011) - [c98]Yini Wang, Sheng Wen, Wei Zhou, Wanlei Zhou, Yang Xiang:
The Probability Model of Peer-to-Peer Botnet Propagation. ICA3PP (1) 2011: 470-480 - [c97]Ming Li, Longxiang Gao, Wanlei Zhou:
MAR: Message-aware routing for opportunistic wireless ad hoc networks. ATNAC 2011: 1-6 - [e6]Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou:
Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part I. Lecture Notes in Computer Science 7016, Springer 2011, ISBN 978-3-642-24649-4 [contents] - [e5]Yang Xiang, Alfredo Cuzzocrea, Michael Hobbs, Wanlei Zhou:
Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part II. Lecture Notes in Computer Science 7017, Springer 2011, ISBN 978-3-642-24668-5 [contents] - 2010
- [j53]Yang Xiang, Daxin Tian, Wanlei Zhou:
A microscopic competition model and its dynamics analysis on network attacks. Concurr. Comput. Pract. Exp. 22(4): 503-517 (2010) - [j52]Atul Sajjanhar, Guojun Lu, Dengsheng Zhang, Jingyu Hou, Wanlei Zhou, Yi-Ping Phoebe Chen:
Spectral shape descriptor using spherical harmonics. Integr. Comput. Aided Eng. 17(2): 167-173 (2010) - [j51]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Addressing in Wireless Sensor Networks without Location Awareness. J. Inf. Sci. Eng. 26(2): 443-460 (2010) - [j50]Yang Xiang, Wanlei Zhou, Haining Wang:
Security in next generation wireless networks. Secur. Commun. Networks 3(1): 1-3 (2010) - [j49]Wenyu Qu, Wanlei Zhou, Masaru Kitsuregawa:
Sharable file searching in unstructured Peer-to-peer systems. J. Supercomput. 51(2): 149-166 (2010) - [j48]John Casey, Wanlei Zhou:
A locality aware cache diffusion system. J. Supercomput. 52(1): 1-22 (2010) - [j47]Haohua Zhang, Hai Zhao, Wei Cai, Jie Liu, Wanlei Zhou:
Using the k-core decomposition to analyze the static structure of large-scale software systems. J. Supercomput. 53(2): 352-369 (2010) - [c96]Ming Li, Longxiang Gao, Wanlei Zhou:
S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks. EUC 2010: 737-742 - [c95]Ming Li, Alessio Bonti, Wanlei Zhou:
OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security. EUC 2010: 826-832 - [c94]Ping Li, Wanlei Zhou, Yanli Yu:
A Quick-Response Real-Time Stepping Stone Detection Scheme. HPCC 2010: 677-682 - [c93]Sheng Wen, Yang Xiang, Wanlei Zhou:
A Lightweight Intrusion Alert Fusion System. HPCC 2010: 695-700 - [c92]Shui Yu, Theerasak Thapngam, Su Wei, Wanlei Zhou:
Efficient Web Browsing with Perfect Anonymity Using Page Prefetching. ICA3PP (1) 2010: 1-12 - [c91]Sheng Wen, Weijia Jia, Wei Zhou, Wanlei Zhou, Chuan Xu:
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. NSS 2010: 247-254 - [c90]Ping Li, Wanlei Zhou, Yini Wang:
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection. NSS 2010: 377-382 - [e4]Yang Xiang, Pierangela Samarati, Jiankun Hu, Wanlei Zhou, Ahmad-Reza Sadeghi:
Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8484-3 [contents]
2000 – 2009
- 2009
- [j46]Yang Xiang, Wanlei Zhou:
Special Issue: Multi-core Supported Network and System Security. Concurr. Comput. Pract. Exp. 21(10): 1251-1253 (2009) - [j45]Md. Rafiqul Islam, Wanlei Zhou, Yang Xiang, Abdun Naser Mahmood:
Spam filtering for network traffic security on a multi-core environment. Concurr. Comput. Pract. Exp. 21(10): 1307-1320 (2009) - [j44]Zhaobin Liu, Wenyu Qu, Haitao Li, Min Ruan, Wanlei Zhou:
I/O scheduling and performance analysis on multi-core platforms. Concurr. Comput. Pract. Exp. 21(10): 1405-1417 (2009) - [j43]John Casey, Wanlei Zhou:
Adjacency cache: an efficient P2P web cache indexing and lookup system. Comput. Syst. Sci. Eng. 24(5) (2009) - [j42]Wenyu Qu, Wanlei Zhou, Masaru Kitsuregawa:
A parallel information retrieval method for e-commerce. Comput. Syst. Sci. Eng. 24(5) (2009) - [j41]Ashley Chonka, Jaipal Singh, Wanlei Zhou:
Chaos theory based detection against network mimicking DDoS attacks. IEEE Commun. Lett. 13(9): 717-719 (2009) - [j40]Ke Li, Wanlei Zhou, Shui Yu:
Effective metric for detecting distributed denial-of-service attacks based on information divergence. IET Commun. 3(12): 1851-1860 (2009) - [j39]John Casey, Wanlei Zhou:
Reducing the bandwidth requirements of P2P keyword indexing. Int. J. High Perform. Comput. Netw. 6(2): 119-129 (2009) - [j38]Ferial Khaddage, Ashley Chonka, Wanlei Zhou:
E-Learning over Mobile Phone Technology: Best Practices and Guidelines. Int. J. Interact. Mob. Technol. 3(3): 55-58 (2009) - [j37]Ferial Khaddage, Elicia Lanham, Wanlei Zhou:
A Mobile Learning Model for Universities -Re-blending the Current Learning Environment. Int. J. Interact. Mob. Technol. 3(S1): 18-23 (2009) - [j36]Wanlei Zhou, Yang Xiang:
Network and system security. J. Netw. Comput. Appl. 32(2): 345-346 (2009) - [j35]Md. Rafiqul Islam, Wanlei Zhou, Minyi Guo, Yang Xiang:
An innovative analyser for multi-classifier e-mail classification based on grey list analysis. J. Netw. Comput. Appl. 32(2): 357-366 (2009) - [j34]Yang Xiang, Wanlei Zhou, Minyi Guo:
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. IEEE Trans. Parallel Distributed Syst. 20(4): 567-580 (2009) - [c89]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
MVGL Analyser for Multi-classifier Based Spam Filtering System. ACIS-ICIS 2009: 394-399 - [c88]Chao Zhang, Wenyu Qu, Zhaobin Liu, Wanlei Zhou:
A Resource Allocation Method for Computational Grids Based on On-line Reverse Auction. ChinaGrid 2009: 28-31 - [c87]Ke Li, Wanlei Zhou, Shui Yu, Bo Dai:
Effective DDoS Attacks Detection Using Generalized Entropy Metric. ICA3PP 2009: 266-280 - [c86]Md. Rafiqul Islam, Wanlei Zhou:
Minimizing the Limitations of GL Analyser of Fusion Based Email Classification. ICA3PP 2009: 761-774 - [c85]Ke Li, Wanlei Zhou, Ping Li:
Reliable Downloading Algorithms for BitTorrent-like Systems. NPC 2009: 167-173 - [c84]Ke Li, Wanlei Zhou, Ping Li, Jing Hai, Jianwen Liu:
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics. NSS 2009: 9-17 - [c83]Shui Yu, Theerasak Thapngam, Jianwen Liu, Su Wei, Wanlei Zhou:
Discriminating DDoS Flows from Flash Crowds Using Information Distance. NSS 2009: 351-356 - [c82]Ashley Chonka, Wanlei Zhou, Yang Xiang:
Defending Grid Web Services from XDoS Attacks by SOTA. PerCom Workshops 2009: 1-6 - [e3]Yang Xiang, Javier López, Haining Wang, Wanlei Zhou:
Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3838-9 [contents] - 2008
- [j33]Wanlei Zhou, Yang Xiang, Minyi Guo:
Special Issue: Network Attacks and Defense Systems. Comput. Syst. Sci. Eng. 23(3) (2008) - [j32]Shui Yu, Wanlei Zhou, Robin Doss:
Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12(4): 318-321 (2008) - [c81]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Email Categorization Using (2+1)-Tier Classification Algorithms. ACIS-ICIS 2008: 276-281 - [c80]Wanlei Zhou:
Keynote III: Detection and traceback of DDoS attacks. CIT 2008: 3 - [c79]Atul Sajjanhar, Guojun Lu, Dengsheng Zhang, Wanlei Zhou, Yi-Ping Phoebe Chen:
Image retrieval based on semantics of intra-region color properties. CIT 2008: 338-343 - [c78]Ashley Chonka, Wanlei Zhou, Yang Xiang:
Protecting web services with Service Oriented Traceback Architecture. CIT 2008: 706-711 - [c77]Yang Xiang, Wanlei Zhou:
Using Multi-Core Processors to Support Network Security Applications. FTDCS 2008: 213-218 - [c76]Wanlei Zhou, John Casey:
Reducing Cache Lookup and Publish Overhead through Locality Awareness in P2P Web Caching. HPCC 2008: 296-303 - [c75]Ping Li, Wanlei Zhou, Ke Li:
An Operational Approach to Validate the Path of BGP. ICA3PP 2008: 133-143 - [c74]Wanlei Zhou, Yang Xiang:
Using Multi-core to Support Security-Related Applications. ICA3PP 2008: 316-317 - [c73]Md. Rafiqul Islam, Jaipal Singh, Ashley Chonka, Wanlei Zhou:
Multi-classifier Classification of Spam Email on a Ubiquitous Multi-core Architecture. NPC Workshops 2008: 210-217 - [c72]Ashley Chonka, Soon Keow Chong, Wanlei Zhou, Yang Xiang:
Multi-Core Defense System (MSDS) for Protecting Computer Infrastructure against DDoS Attacks. PDCAT 2008: 503-508 - [c71]Shui Yu, Wanlei Zhou:
Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. PerCom 2008: 566-571 - [c70]Ashley Chonka, Wanlei Zhou, Jaipal Singh, Yang Xiang:
Detecting and Tracing DDoS Attacks by Intelligent Decision Prototype. PerCom 2008: 578-583 - 2007
- [j31]Yang Xiang, Wanlei Zhou:
Pervasive computing at tableside: a wireless web-based ordering system. Int. J. Pervasive Comput. Commun. 3(1): 82-101 (2007) - [j30]Jingyu Hou, Wei Shi, Gang Li, Wanlei Zhou:
An effective non-parametric method for globally clustering genes from expression profiles. Medical Biol. Eng. Comput. 45(12): 1175-1185 (2007) - [c69]John Casey, Ashley Chonka, Wanlei Zhou:
Adjacency Cache: Fast Web Cache Indexing and Lookup. ACIS-ICIS 2007: 616-621 - [c68]Md. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury:
Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. ACIS-ICIS 2007: 757-762 - [c67]Atul Sajjanhar, Guojun Lu, Dengsheng Zhang, Wanlei Zhou:
A Composite Descriptor for Shape Retrieval. ACIS-ICIS 2007: 795-800 - [c66]Ke Li, Wanlei Zhou, Shui Yu, Bo Dai:
A Parallel Downloading Algorithm for Redundant Networks. CIT 2007: 177-182 - [c65]Md. Rafiqul Islam, Wanlei Zhou:
Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms. ICA3PP 2007: 458-469 - [c64]Ke Li, Wanlei Zhou, Shui Yu, Ping Li:
Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks. KSEM 2007: 538-543 - [c63]Yang Xiang, Wanlei Zhou, Jinjun Chen:
Managing Email Overload with an Automatic Nonparametric Clustering Approach. NPC 2007: 81-90 - [c62]Md. Rafiqul Islam, Wanlei Zhou:
Email Categorization Using Multi-stage Classification Technique. PDCAT 2007: 51-58 - [c61]Ke Li, Wanlei Zhou, Shui Yu, Yunsheng Zhang:
A Resource-Search and Routing Algorithm within PCDN Autonomy Area. PDCAT 2007: 509-514 - [c60]Ke Li, Wanlei Zhou, Shui Yu:
An Enhanced Parallel Downloading Algorithm for BT. PDPTA 2007: 1023-1027 - [r1]Yang Xiang, Wanlei Zhou:
Defending against Distributed Denial of Service. Encyclopedia of Information Ethics and Security 2007: 121-129 - 2006
- [j29]Wei Shi, Wanlei Zhou:
Frequency distribution of TATA Box and extension sequences on human promoters. BMC Bioinform. 7(S-4) (2006) - [j28]Changgui Chen, Wanlei Zhou:
A solution for fault tolerance in replicated database systems. Int. J. Comput. Sci. Eng. 2(1/2): 64-71 (2006) - [j27]Yang Xiang, Wanlei Zhou:
Protecting information infrastructure from DDoS attacks by MADF. Int. J. High Perform. Comput. Netw. 4(5/6): 357-367 (2006) - [j26]Naomi Augar, Ruth S. Raitman, Wanlei Zhou:
Developing wikis to foster web-based learning communities: an iterative approach. Int. J. Web Based Communities 2(3): 302-317 (2006) - [j25]Yang Xiang, Wanlei Zhou:
Protecting web applications from DDoS attacks by an active distributed defense system. Int. J. Web Inf. Syst. 2(1): 37-44 (2006) - [c59]Wei Shi, Wanlei Zhou:
Frequency Distribution of TATA Box and Extension Sequences on Human Promoters. IMSCCS (1) 2006: 3-9 - [c58]Robin Chellappa Doss, Deddy Chandra, Lei Pan, Wanlei Zhou, Morshed U. Chowdhury:
Lease Based Addressing for Event-Driven Wireless Sensor Networks. ISCC 2006: 251-256 - 2005
- [b1]Weijia Jia, Wanlei Zhou:
Distributed network systems - from concepts to implementations. Network theory and applications 15, Springer 2005, ISBN 978-0-387-23839-5, pp. I-XX, 1-513 - [j24]Andrzej Goscinski, Malcolm Campbell, Robert Dew, Peter Horan, D. Newlands, Justin T. Rough, Jackie Silcock, Wanlei Zhou:
An IT Bachelor Degree Using Modern Technologies to Illustrate Core Concepts and Principles and Building Generic Skills. Educ. Inf. Technol. 10(4): 361-379 (2005) - [c57]Mingjun Lan, Wanlei Zhou:
Spam Filtering based on Preference Ranking. CIT 2005: 223-227 - [c56]Leanne Ngo, Wanlei Zhou, Matthew J. Warren:
Understanding Transition towards Information Security Culture Change. AISM 2005: 67-73 - [c55]Yang Xiang, Wanlei Zhou:
Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. CANS 2005: 320-333 - [c54]Md. Rafiqul Islam, Morshed U. Chowdhury, Wanlei Zhou:
An Innovative Spam Filtering Model Based on Support Vector Machine. CIMCA/IAWTIC 2005: 348-353 - [c53]Yang Xiang, Wanlei Zhou:
Mark-aided distributed filtering by using neural network for DDoS defense. GLOBECOM 2005: 5 - [c52]Ying Zhao, Wanlei Zhou, Yingying Zhang, E. J. Lanham, Jiumei Huang:
Clock Synchronization State Graphs Based on Clock Precision Difference. ICA3PP 2005: 34-39 - [c51]John Casey, Wanlei Zhou:
Reducing the Bandwidth Requirements of P2P Keyword Indexing. ICA3PP 2005: 50-59 - [c50]Wei Shi, Yang Xiang, Wanlei Zhou:
Distributed Defense Against Distributed Denial-of-Service Attacks. ICA3PP 2005: 357-362 - [c49]Shui Yu, Wanlei Zhou:
An Efficient Reliable Architecture for Application Layer Anycast Service. ICA3PP 2005: 376-385 - [c48]Ruth S. Raitman, Leanne Ngo, Naomi Augar, Wanlei Zhou:
Security in the Online E-Learning Environment. ICALT 2005: 702-706 - [c47]Ruth S. Raitman, Naomi Augar, Wanlei Zhou:
Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study. ICITA (2) 2005: 142-146 - [c46]Leanne Ngo, Wanlei Zhou:
The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready! ICITA (2) 2005: 230-233 - [c45]Yang Xiang, Wanlei Zhou:
A Defense System against DDoS Attacks by Large-Scale IP Traceback. ICITA (2) 2005: 431-436 - [c44]Wei Shi, Wanlei Zhou:
A Parallel Euler Approach for Large-Scale Biological Sequence Assembly. ICITA (1) 2005: 437-441 - [c43]Wanlei Zhou:
Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial. ISPA 2005: 17-18 - [c42]Yang Xiang, Wanlei Zhou:
Intelligent DDoS Packet Filtering in High-Speed Networks. ISPA 2005: 395-406 - [c41]Shui Yu, Wanlei Zhou:
A Mesh Based Anycast Routing Protocol for Ad Hoc Networks. ISPA 2005: 927-932 - [c40]Changgui Chen, Wanlei Zhou, Wei Dai:
A Reactive Framework for Supporting Knowledge Management. Parallel and Distributed Computing and Networks 2005: 405-410 - [c39]Wei Dai, Changgui Chen, Wanlei Zhou:
A Sensor Enabled Multi-Agent Infrastructure for Applications Integration. WSTST 2005: 1319-1328 - [e2]Michael Hobbs, Andrzej M. Goscinski, Wanlei Zhou:
Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings. Lecture Notes in Computer Science 3719, Springer 2005, ISBN 3-540-29235-7 [contents] - 2004
- [j23]Chengzhung Sun, Wanlei Zhou, Andrzej M. Goscinski, Xue-bin Chi:
Advanced services for Clusters and Internet computing. Future Gener. Comput. Syst. 20(4): 501-503 (2004) - [j22]Wanlei Zhou, Li Wang, Weijia Jia:
An analysis of update ordering in distributed replication systems. Future Gener. Comput. Syst. 20(4): 565-590 (2004) - [j21]Weijia Jia, Bo Han, Pui-on Au, Yong He, Wanlei Zhou:
Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks. IEICE Trans. Inf. Syst. 87-D(7): 1625-1632 (2004) - [j20]Joseph Fong, Wanlei Zhou:
Guest Editors' Introduction. Int. J. Comput. Process. Orient. Lang. 17(1): 1-2 (2004) - [j19]Changgui Chen, Weijia Jia, Wanlei Zhou:
A reactive system architecture for building fault-tolerant distributed applications. J. Syst. Softw. 72(3): 401-415 (2004) - [j18]Weijia Jia, Bo Han, Chuanlin Zhang, Wanlei Zhou:
Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow. J. Supercomput. 29(2): 197-209 (2004) - [c38]Adil M. Hammadi, John Casey, Wanlei Zhou:
The Cost of Recovery Protocols in Web-based Database Systems. IEEE SCC 2004: 137-142 - [c37]Yang Xiang, Wanlei Zhou:
Protect Grids from DDoS Attacks. GCC 2004: 309-316 - [c36]Hua Ye, Wanlei Zhou, Justin T. Rough:
A Fast and Robust Method Applied in Telecommunication Systems. IC-AI 2004: 423-426 - [c35]Hua Ye, Wanlei Zhou:
Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems. ICETE (1) 2004: 129-135 - [c34]Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury:
Toward Pervasive Computing in Restaurant. ICETE (1) 2004: 312- - [c33]Naomi Augar, Ruth S. Raitman, Wanlei Zhou:
From e-Learning to Virtual Learning Community: Bridging the Gap. ICWL 2004: 301-308 - [c32]Wei Shi, Wanlei Zhou, Weimin Zheng:
A Self-Learning System for Identifying Harmful Network Information. iiWAS 2004 - [c31]Yang Xiang, Wanlei Zhou:
An Active Distributed Defense System to Protect Web Applications from DDOS Attacks. iiWAS 2004 - [c30]Shui Yu, Wanlei Zhou, John Casey:
Load Balance Algorithms for Anycast. iiWAS 2004 - [c29]Wanlei Zhou, Yang Xiang:
Combating DDoS Attacks in Web-based Services. iiWAS 2004 - [c28]Shui Yu, Wanlei Zhou, Justin T. Rough:
Minicast: A Multicast-Anycast Protocol for Message Delivery. ISPA 2004: 798-803 - [c27]Shui Yu, Wanlei Zhou:
A Novel Middleware Based Web Database Model. Web Intelligence 2004: 533-536 - 2003
- [j17]Joseph Fong, Wanlei Zhou:
Guest Editors' Introduction. Int. J. Comput. Process. Orient. Lang. 16(4): 241-242 (2003) - [j16]Elicia Lanham, Wanlei Zhou:
Cultural Issues in Online Learning - Is Blended Learning a Possible Solution? Int. J. Comput. Process. Orient. Lang. 16(4): 275-292 (2003) - [j15]Ming Li, Chi-Hung Chi, Weijia Jia, Wei Zhao, Wanlei Zhou, Jiannong Cao, Dongyang Long, Qiang Meng:
Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. Int. J. Inf. Technol. Decis. Mak. 2(3): 397-405 (2003) - [j14]Ying Zhao, Wanlei Zhou, Jiumei Huang, Shui Yu:
Self-Adaptive Clock Synchronization for Computational Grid. J. Comput. Sci. Technol. 18(4): 434-441 (2003) - [c26]Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan:
Self-Adaptive Clock Synchronization Based on Clock Precision Difference. ACSC 2003: 181-187 - [c25]Wei Shi, Wanlei Zhou:
Large-Scale Biological Sequence Assembly and Alignment by Using Computing Grid. GCC (1) 2003: 26-33 - [c24]Shui Yu, John Casey, Wanlei Zhou:
A Load Balancing Algorithm for Web Based Server Grids. GCC (2) 2003: 121-128 - [c23]Wanlei Zhou, Hua Ye, Lin Ye:
Improving the Performance of Equalization in Communication Systems. GCC (2) 2003: 388-395 - [c22]Mingjun Lan, Wanlei Zhou:
An Adaptive Information Grid Architecture for Recommendation System. GCC (1) 2003: 584-591 - [c21]Changgui Chen, Wanlei Zhou:
Towards an Interactive Architecture for Web-Based Databases. GCC (2) 2003: 871-878 - [c20]Yang Xiang, Wanlei Zhou, Morshed U. Chowdhury:
GHIRS: Integration of Hotel Management Systems by Web Services. GCC (2) 2003: 1002-1009 - [c19]Elicia Lanham, Wanlei Zhou:
Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned. ICWL 2003: 134-144 - [c18]Ruth S. Raitman, Wanlei Zhou, Paul Nicholson:
Exploring the Foundations of Practicing Online Collaboration. ICWL 2003: 532-541 - [c17]Changgui Chen, Wanlei Zhou:
A Solution for Fault-Tolerance in Replicated Database Systems. ISPA 2003: 411-422 - [c16]Shui Yu, Wanlei Zhou, Weijia Jia:
Fault-Tolerant Servers for Anycast Communication. PDPTA 2003: 1244-1250 - [e1]Wanlei Zhou, Paul Nicholson, Brian J. Corbitt, Joseph Fong:
Advances in Web-Based Learning - ICWL 2003, Second International Conference, Melbourne, Australia, August 18-20, 2003, Proceedings. Lecture Notes in Computer Science 2783, Springer 2003, ISBN 3-540-40772-3 [contents] - 2002
- [j13]Wanlei Zhou, Weijia Jia:
A token-based independent update protocol for managing replicated objects. Comput. Syst. Sci. Eng. 17(3): 189-207 (2002) - [c15]Shui Yu, Wanlei Zhou, Fuchun Huang, Mingjun Lan:
An Efficient Algorithm for Application-Layer Anycasting. DCW 2002: 74-83 - [c14]Weijia Jia, Pui-on Au, Yong He, Wanlei Zhou:
Optimal Multicast Tree Routing for Cluster Computing in Hypercube Interconnection Networks. ISPAN 2002: 295-300 - 2001
- [j12]Wu Yeu, Yonghong Tian, Wanlei Zhou:
The Development of a Mobile Decision Support System. J. Interconnect. Networks 2(3): 379-390 (2001) - [j11]Li Wang, Wanlei Zhou, Weijia Jia:
The design and implementation of an active replication scheme for distributing services in a cluster of workstations. J. Syst. Softw. 58(3): 199-210 (2001) - [c13]Wanlei Zhou, Li Wang:
Automating the Construction of Replicated Objects in a Cluster of Workstations. CCGRID 2001: 634-639 - [c12]Haiyi Zhang, Barbro Back, Wanlei Zhou:
The Design and Implementation of a Traffic Accident Analysis System. IEA/AIE 2001: 476-481 - 2000
- [c11]Changgui Chen, Wanlei Zhou:
An architecture for resolving networking partitioning. CATA 2000: 84-87
1990 – 1999
- 1999
- [j10]Wanlei Zhou, Andrzej M. Goscinski:
Managing Replicated Remote Procedure Call Transactions. Comput. J. 42(7): 592-608 (1999) - [j9]Wanlei Zhou:
Detecting and tolerating failures in a loosely integrated heterogeneous database system. Comput. Commun. 22(11): 1056-1067 (1999) - [j8]Wanlei Zhou:
Replication Techniques in Distributed Systems. Parallel Distributed Comput. Pract. 2(2) (1999) - [c10]Wanlei Zhou, Michael Zhou:
The Design and Application of Sensors Implemented in Java. Applied Informatics 1999: 47-50 - [c9]Wanlei Zhou, Robert Holmes:
The Design and Simulation of a Hybrid Replication Control Protocol. ISPAN 1999: 210-215 - [c8]Li Wang, Wanlei Zhou:
A Tool for Constructing Service Replication Systems. TOOLS (31) 1999: 358-361 - 1998
- [c7]Li Wang, Wanlei Zhou:
Primary-Backup Object Replications in Java. TOOLS (27) 1998: 78-82 - 1997
- [j7]Wanlei Zhou:
A tool for layered analysing and understanding of distributed programs. Comput. Commun. 20(5): 385-392 (1997) - [j6]Wanlei Zhou, Andrzej M. Goscinski:
Fault-tolerant servers for the RHODOS system. J. Syst. Softw. 37(3): 201-214 (1997) - [c6]Wanlei Zhou:
Using Sensors to Detect Failures in a Loosely Integrated Heterogeneous Database System. PDPTA 1997: 848-857 - [c5]Li Wang, Wanlei Zhou:
An Architecture for Building Reliable Distributed Object-Based Systems. TOOLS (24) 1997: 260-265 - 1996
- [j5]Wanlei Zhou:
Supporting fault-tolerant and open distributed processing using RPC. Comput. Commun. 19(6-7): 528-538 (1996) - [j4]Wanlei Zhou, Brian Molinari:
A system for managing remote procedure call transactions. J. Syst. Softw. 34(2): 133-149 (1996) - [c4]Wanlei Zhou:
A tool for assisting the understanding of distributed programs. ACSE 1996: 223-230 - 1994
- [j3]Wanlei Zhou:
A rapid prototyping system for distributed information system applications. J. Syst. Softw. 24(1): 3-29 (1994) - 1993
- [j2]Wanlei Zhou:
The design and implementation of a distributed program monitor. J. Syst. Softw. 22(1): 63-77 (1993) - [c3]Wanlei Zhou:
A Layered Distributed Program Debugger. SPDP 1993: 665-668 - 1991
- [c2]Wanlei Zhou, Brian Molinari:
On the Management of Remote Procedure Call Transactions. ICCI 1991: 571-581 - 1990
- [j1]Wanlei Zhou:
PM: a system for prototyping and monitoring remote procedure call programs. ACM SIGSOFT Softw. Eng. Notes 15(1): 59-63 (1990) - [c1]Wanlei Zhou, Brian Molinari:
A Model of Execution Time Estimating for RPC-Oriented Programs. ICCI 1990: 376-384
Coauthor Index
aka: Robin Chellappa Doss
aka: Jiao Jiao Jiang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint