default search action
Jinshu Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j101]Hongcheng Zou, Ziling Wei, Jinshu Su, Shuhui Chen, Zheng Qin:
Relation-CNN: Enhancing website fingerprinting attack with relation features and NFS-CNN. Expert Syst. Appl. 247: 123236 (2024) - [j100]Yanhua Liu, Zhihuang Liu, Qiu Zhang, Jinshu Su, Zhiping Cai, Xiaoyan Li:
Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services. Future Gener. Comput. Syst. 154: 59-71 (2024) - [j99]Congxi Song, Biao Han, Jinshu Su:
4D-MAP: Multipath Adaptive Packet Scheduling for Live Streaming over QUIC. J. Comput. Sci. Technol. 39(2): 159-176 (2024) - [j98]Yang Li, Ziling Wei, Jinshu Su, Baokang Zhao:
A multi-agent collaboration scheme for energy-efficient task scheduling in a 3D UAV-MEC space. Frontiers Inf. Technol. Electron. Eng. 25(6): 824-838 (2024) - [j97]Congxi Song, Biao Han, Xiaolan Ji, Yahui Li, Jinshu Su:
AI-Driven Multipath Transmission: Empowering UAV-Based Live Streaming. IEEE Netw. 38(2): 202-210 (2024) - [c155]Mingtai Lv, Xiangrui Yang, Huan Zhou, Wenfei Wu, Yusheng Xia, Jinshu Su:
WeMu: A design of wireless network emulator. APNet 2024: 211-212 - [c154]Jiahao Liu, Jinshu Su, Yi Wang, Xincheng Tang:
Secure Key Exchange via Transparent Reverse Firewalls. DSPP (1) 2024: 160-177 - [c153]Congxi Song, Biao Han, Ruidong Li, Xueqiang Han, Cong Liu, Jinshu Su:
Aquilas: Adaptive QoS-Oriented Multipath Packet Scheduler with Hierarchical Intelligence for QUIC. ICDCS 2024: 485-495 - 2023
- [j96]Xiaolan Ji, Biao Han, Cao Xu, Congxi Song, Jinshu Su:
Adaptive QoS-aware multipath congestion control for live streaming. Comput. Networks 220: 109470 (2023) - [j95]Jianxin Huang, Bo Yu, Runhao Liu, Jinshu Su:
Automatic discovery of stateful variables in network protocol software based on replay analysis. Frontiers Inf. Technol. Electron. Eng. 24(3): 403-416 (2023) - [j94]Lin Liu, Jinshu Su, Ximeng Liu, Rongmao Chen, Xinyi Huang, Guang Kou, Shaojing Fu:
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. IEEE Trans. Cloud Comput. 11(3): 3211-3225 (2023) - [j93]Tongqing Zhou, Zhiping Cai, Fang Liu, Jinshu Su:
In Pursuit of Beauty: Aesthetic-Aware and Context-Adaptive Photo Selection in Crowdsensing. IEEE Trans. Knowl. Data Eng. 35(9): 9364-9377 (2023) - [j92]Na Zhao, Biao Han, Ruidong Li, Jinshu Su, Cong Zhou:
A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training. IEEE Trans. Netw. Serv. Manag. 20(2): 1418-1429 (2023) - [j91]Xionglve Li, Tongqing Zhou, Zhiping Cai, Jinshu Su:
Realizing Fine-Grained Inference of AS Path With a Generative Measurable Process. IEEE/ACM Trans. Netw. 31(6): 3112-3127 (2023) - 2022
- [j90]Hongcheng Zou, Jinshu Su, Ziling Wei, Shuhui Chen, Baokang Zhao:
An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance. Comput. Networks 219: 109461 (2022) - [j89]Yang Li, Ziling Wei, Jinshu Su:
Moving direction-based adaptive task migration in MEC. IET Commun. 16(17): 2002-2018 (2022) - [j88]Jinshu Su, Baokang Zhao, Yi Dai, Jijun Cao, Ziling Wei, Na Zhao, Congxi Song, Yujing Liu, Yusheng Xia:
Technology trends in large-scale high-efficiency network computing. Frontiers Inf. Technol. Electron. Eng. 23(12): 1733-1746 (2022) - [j87]Ziling Wei, Baokang Zhao, Jinshu Su:
Event-Driven Computation Offloading in IoT With Edge Computing. IEEE Trans. Wirel. Commun. 21(9): 6847-6860 (2022) - [c152]Meizhen Huang, Jinshu Su, Zhong Liao, Shuhui Chen, Ziling Wei:
Multi-Level Text Importance Classification Architecture Based on Deep Learning. APNet 2022: 87-89 - [c151]Mengjuan Li, Jinshu Su, Hongyun Liu, Zhiming Zhao, Xue Ouyang, Huan Zhou:
The Extreme Counts: Modeling the Performance Uncertainty of Cloud Resources with Extreme Value Theory. ICSOC 2022: 498-512 - [c150]Xiaolan Ji, Biao Han, Ruidong Li, Cao Xu, Yahui Li, Jinshu Su:
ACCeSS: Adaptive QoS-aware Congestion Control for Multipath TCP. IWQoS 2022: 1-10 - 2021
- [j86]Yusheng Xia, Rongmao Chen, Jinshu Su, Hongcheng Zou:
Balancing anonymity and resilience in anonymous communication networks. Comput. Secur. 101: 102106 (2021) - [j85]Huan Zhou, Xue Ouyang, Jinshu Su, Cees de Laat, Zhiming Zhao:
Enforcing trustworthy cloud SLA with witnesses: A game theory-based model using smart contracts. Concurr. Comput. Pract. Exp. 33(14) (2021) - [j84]Shiwen Zhang, Tingting Yao, Voundi Koe Arthur Sandor, Tien-Hsiung Weng, Wei Liang, Jinshu Su:
A novel blockchain-based privacy-preserving framework for online social networks. Connect. Sci. 33(3): 555-575 (2021) - [j83]Pengkun Li, Jinshu Su, Xiaofeng Wang, Qianqian Xing:
DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability. Secur. Commun. Networks 2021: 1974493:1-1974493:17 (2021) - [j82]Yusheng Xia, Jinshu Su, Rongmao Chen, Xinyi Huang:
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer. IEEE Trans. Inf. Forensics Secur. 16: 1245-1260 (2021) - [j81]Jiahao Liu, Baokang Zhao, Qin Xin, Jinshu Su, Wei Ou:
DRL-ER: An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations. IEEE Trans. Netw. Sci. Eng. 8(4): 2872-2884 (2021) - [c149]Baokang Zhao, Murao Lin, Ziling Wei, Qin Xin, Jinshu Su:
A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification. ICA3PP (1) 2021: 385-401 - [c148]Bingnan Hou, Zhiping Cai, Kui Wu, Jinshu Su, Yinqiao Xiong:
6Hit: A Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning. INFOCOM 2021: 1-10 - [c147]Yang Cai, Biao Han, Jie Li, Na Zhao, Jinshu Su:
ModelCoder: A Fault Model based Automatic Root Cause Localization Framework for Microservice Systems. IWQoS 2021: 1-6 - [c146]Na Zhao, Biao Han, Yang Cai, Jinshu Su:
SeqAD: An Unsupervised and Sequential Autoencoder Ensembles based Anomaly Detection Framework for KPI. IWQoS 2021: 1-6 - [c145]Yang Cai, Biao Han, Jinshu Su, Xiaoyan Wang:
TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems. MSN 2021: 512-519 - [c144]Jiahao Liu, Ziling Wei, Baokang Zhao, Jinshu Su, Qin Xin:
A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations. WASA (3) 2021: 254-261 - 2020
- [j80]Xin Wang, Shuhui Chen, Jinshu Su:
Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks. IEEE Access 8: 182065-182077 (2020) - [j79]Ye Peng, Wentao Zhao, Wei Cai, Jinshu Su, Biao Han, Qiang Liu:
Evaluating Deep Learning for Image Classification in Adversarial Environment. IEICE Trans. Inf. Syst. 103-D(4): 825-837 (2020) - [j78]Jiaxian Lv, Yi Wang, Jinshu Su, Rongmao Chen, Wenjun Wu:
Security of Auditing Protocols Against Subversion Attacks. Int. J. Found. Comput. Sci. 31(2): 193-206 (2020) - [j77]Jie Li, Rongmao Chen, Jinshu Su, Xinyi Huang, Xiaofeng Wang:
ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices. IEEE Internet Things J. 7(2): 1216-1229 (2020) - [j76]Pengkun Li, Jinshu Su, Xiaofeng Wang:
iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy. IEEE Internet Things J. 7(8): 6828-6841 (2020) - [j75]Lin Liu, Jinshu Su, Baokang Zhao, Qiong Wang, Jinrong Chen, Yuchuan Luo:
Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things. Symmetry 12(1): 103 (2020) - [j74]Lin Liu, Rongmao Chen, Ximeng Liu, Jinshu Su, Linbo Qiao:
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud. IEEE Trans. Inf. Forensics Secur. 15: 2914-2929 (2020) - [j73]Ziling Wei, Jinshu Su, Baokang Zhao, Xicheng Lu:
Distributed Opportunistic Scheduling in Cooperative Networks With RF Energy Harvesting. IEEE/ACM Trans. Netw. 28(5): 2257-2270 (2020) - [j72]Xin Wang, Shuhui Chen, Jinshu Su:
Real Network Traffic Collection and Deep Learning for Mobile App Identification. Wirel. Commun. Mob. Comput. 2020: 4707909:1-4707909:14 (2020) - [c143]Shiying Wang, Lei Wang, Ziyang Kang, Lianhua Qu, Shiming Li, Jinshu Su:
A Software-Hardware Co-exploration Framework for Optimizing Communication in Neuromorphic Processor. ACA 2020: 87-100 - [c142]Yusheng Xia, Rongmao Chen, Jinshu Su, Chen Pan, Han Su:
Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks. ICC 2020: 1-7 - [c141]Xin Wang, Shuhui Chen, Jinshu Su:
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification. INFOCOM Workshops 2020: 424-429
2010 – 2019
- 2019
- [j71]Jinshu Su, Wen Wang, Cong Liu:
A survey of control consistency in Software-Defined Networking. CCF Trans. Netw. 2(3-4): 137-152 (2019) - [j70]Jie Li, Jinshu Su, Rongmao Chen, Xiaofeng Wang, Shuhui Chen:
Practical privacy-preserving deep packet inspection outsourcing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j69]Ziling Wei, Baokang Zhao, Jinshu Su, Xicheng Lu:
Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: A Learning Method. IEEE Internet Things J. 6(3): 4436-4447 (2019) - [j68]Lin Liu, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng, Xiaofeng Wang:
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data. IEEE Internet Things J. 6(6): 9841-9852 (2019) - [j67]Shuang Zhao, Shuhui Chen, Yipin Sun, Zhiping Cai, Jinshu Su:
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier. Secur. Commun. Networks 2019: 9595081:1-9595081:11 (2019) - [j66]Huan Zhou, Yang Hu, Xue Ouyang, Jinshu Su, Spiros Koulouzis, Cees de Laat, Zhiming Zhao:
CloudsStorm: A framework for seamlessly programming and controlling virtual infrastructure functions during the DevOps lifecycle of cloud applications. Softw. Pract. Exp. 49(10): 1421-1447 (2019) - [j65]Yi Dai, Kai Lu, Liquan Xiao, Jinshu Su:
A Cost-Efficient Router Architecture for HPC Inter-Connection Networks: Design and Implementation. IEEE Trans. Parallel Distributed Syst. 30(4): 738-753 (2019) - [c140]Shaofei Lu, Qian Zeng, Heng Wu, Jinshu Su, Xuchong Liu, Hongliang Tang:
A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function. HPCC/SmartCity/DSS 2019: 2305-2310 - [c139]Ziling Wei, Baokang Zhao, Jinshu Su:
Cooperative Sensing in Cognitive Radio Ad Hoc Networks. ICC 2019: 1-6 - [c138]Jinshu Su, Biao Han, Gaofeng Lv, Tao Li, Zhigang Sun:
A Heterogeneous Parallel Packet Processing Architecture for NFV Acceleration. ICNP 2019: 1-2 - [c137]Huan Zhou, Xue Ouyang, Zhijie Ren, Jinshu Su, Cees de Laat, Zhiming Zhao:
A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement. INFOCOM 2019: 1567-1575 - [c136]Lin Liu, Jinshu Su, Rongmao Chen, Jinrong Chen, Guangliang Sun, Jie Li:
Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data. ML4CS 2019: 361-377 - [c135]Pengkun Li, Jinshu Su, Xiaofeng Wang:
iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency. SIGCOMM Posters and Demos 2019: 166-168 - 2018
- [j64]Biao Han, Xiangrui Yang, Zhigang Sun, Jinfeng Huang, Jinshu Su:
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN. Secur. Commun. Networks 2018: 9649643:1-9649643:15 (2018) - [j63]Binfeng Wang, Jinshu Su:
FlexMonitor: A Flexible Monitoring Framework in SDN. Symmetry 10(12): 713 (2018) - [j62]Yiming Zhang, Dongsheng Li, Zhigang Sun, Feng Zhao, Jinshu Su, Xicheng Lu:
CSR: Classified Source Routing in Distributed Networks. IEEE Trans. Cloud Comput. 6(2): 464-477 (2018) - [c134]Huan Zhou, Yang Hu, Jinshu Su, Mingmin Chi, Cees de Laat, Zhiming Zhao:
Empowering Dynamic Task-Based Applications with Agile Virtual Infrastructure Programmability. IEEE CLOUD 2018: 484-491 - [c133]Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ACISP 2018: 431-451 - [c132]Huan Zhou, Yang Hu, Jinshu Su, Cees de Laat, Zhiming Zhao:
CloudsStorm: An Application-Driven Framework to Enhance the Programmability and Controllability of Cloud Virtual Infrastructures. CLOUD 2018: 265-280 - [c131]Hongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin:
Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures. ICCCS (5) 2018: 465-477 - [c130]Chengcheng Xu, Jinshu Su, Shuhui Chen:
Exploring Efficient NFA Data Structures to Accelerate DFA Generation. ICCSP 2018: 56-61 - [c129]Yusheng Xia, Jinshu Su, Rongmao Chen, Yaping Liu, Shuhui Chen:
A Real-Time Aware Routing Strategy in Smart City Environments. SECON Workshops 2018: 9-14 - [c128]Hanwen Wang, Biao Han, Jinshu Su, Xiaoyan Wang:
A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised Learning. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1803-1810 - 2017
- [j61]Qian He, Ning Zhang, Jinshu Su, Xiaosong Zhang:
Fast backup and recovery for web protectiuon using trigger and block hash approach. Comput. Syst. Sci. Eng. 32(2) (2017) - [j60]Lin-Bo Qiao, Bo-Feng Zhang, Jinshu Su, Xicheng Lu:
A systematic review of structured sparse learning. Frontiers Inf. Technol. Electron. Eng. 18(4): 445-463 (2017) - [j59]Mian Cheng, Jinshu Su, Jing Xu:
Real-time pre-processing system with hardware accelerator for mobile core networks. Frontiers Inf. Technol. Electron. Eng. 18(11): 1720-1731 (2017) - [j58]Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su:
PoweRock: Power Modeling and Flexible Dynamic Power Management for Many-Core Architectures. IEEE Syst. J. 11(2): 600-612 (2017) - [j57]Hao Sun, Xiaofeng Wang, Rajkumar Buyya, Jinshu Su:
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Softw. Pract. Exp. 47(3): 421-441 (2017) - [c127]Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu:
PriMal: Cloud-Based Privacy-Preserving Malware Detection. ACISP (2) 2017: 153-172 - [c126]Binfeng Wang, Jinshu Su, Lin Chen, Jinsheng Deng, Long Zheng:
EffiEye: Application-aware Large Flow Detection in Data Center. CCGrid 2017: 794-796 - [c125]Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun, Shuhui Chen:
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch. CSS 2017: 119-134 - [c124]Binfeng Wang, Jinshu Su, Junnan Li, Biao Han:
EffiView: Trigger-Based Monitoring Approach with Low Cost in SDN. HPCC/SmartCity/DSS 2017: 309-315 - [c123]Hongyi Chen, Ho-fung Leung, Biao Han, Jinshu Su:
Automatic privacy leakage detection for massive android apps via a novel hybrid approach. ICC 2017: 1-7 - [c122]Wen Wang, Wenbo He, Jinshu Su:
Enhancing the effectiveness of traffic engineering in hybrid SDN. ICC 2017: 1-6 - [c121]Wen Wang, Wenbo He, Jinshu Su:
Boosting The Benefits of Hybrid SDN. ICDCS 2017: 2165-2170 - [c120]Chengcheng Xu, Jinshu Su, Shuhui Chen, Biao Han:
Offset-FA: Detach the Closures and Countings for Efficient Regular Expression Matching. SC² 2017: 263-266 - 2016
- [j56]Hongyi Chen, Zhigang Sun, Fei Yi, Jinshu Su:
BufferBank storage: an economic, scalable and universally usable in-network storage model for streaming data applications. Sci. China Inf. Sci. 59(1): 1-15 (2016) - [j55]Chengcheng Xu, Shuhui Chen, Jinshu Su, Siu-Ming Yiu, Lucas Chi Kwong Hui:
A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms. IEEE Commun. Surv. Tutorials 18(4): 2991-3029 (2016) - [j54]Yilun Wu, Xinye Lin, Xicheng Lu, Jinshu Su, Peixin Chen:
A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor. IEICE Trans. Inf. Syst. 99-D(10): 2638-2642 (2016) - [j53]Peixin Chen, Yilun Wu, Jinshu Su, Xiaofeng Wang:
Comparing Performance of Hierarchical Identity-Based Signature Schemes. IEICE Trans. Inf. Syst. 99-D(12): 3181-3184 (2016) - [j52]Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing Resilience of Inter-Domain Routing System under Regional Failures. KSII Trans. Internet Inf. Syst. 10(4): 1630-1642 (2016) - [j51]Qian He, Baokang Zhao, Liang Chang, Jinshu Su, Ilsun You:
PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics. Int. J. Data Warehous. Min. 12(2): 21-38 (2016) - [j50]Yilun Wu, Xicheng Lu, Jinshu Su, Peixin Chen:
An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System. J. Medical Syst. 40(12): 258:1-258:9 (2016) - [j49]Peixin Chen, Jinshu Su, Baokang Zhao, Xiaofeng Wang, Ilsun You:
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing. Secur. Commun. Networks 9(14): 2302-2312 (2016) - [j48]Yuan Li, Michal Pióro, Di Yuan, Jinshu Su:
Optimizing link rate assignment and transmission scheduling in WMN through compatible set generation. Telecommun. Syst. 61(2): 325-335 (2016) - [j47]Baokang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, Jinshu Su, Ilsun You, Francesco Palmieri:
A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems. IEEE Trans. Ind. Electron. 63(8): 5101-5108 (2016) - [c119]Huan Zhou, Junchao Wang, Yang Hu, Jinshu Su, Paul Martin, Cees T. A. M. de Laat, Zhiming Zhao:
Fast Resource Co-provisioning for Time Critical Applications Based on Networked Infrastructures. CLOUD 2016: 802-805 - [c118]Linbo Qiao, Bofeng Zhang, Jinshu Su, Xicheng Lu:
Linearized Alternating Direction Method of Multipliers for Constrained Nonconvex Regularized Optimization. ACML 2016: 97-109 - [c117]Mian Cheng, Yipin Sun, Baokang Zhao, Jinshu Su:
An Event Grouping Approach for Infinite Stream with Differential Privacy. APSCC 2016: 106-116 - [c116]Linbo Qiao, Bofeng Zhang, Lei Zhuang, Jinshu Su:
An Efficient Algorithm for Tensor Principal Component Analysis via Proximal Linearized Alternating Direction Method of Multipliers. CBD 2016: 283-288 - [c115]Wen Wang, Wenbo He, Jinshu Su:
Redactor: Reconcile network control with declarative control programs In SDN. ICNP 2016: 1-10 - [c114]Jie Li, Shuhui Chen, Jinshu Su:
Implementation of TCP large receive offload on multi-core NPU platform. ICTC 2016: 258-263 - [c113]Yusheng Xia, Yaping Liu, Jinshu Su:
Tendency-based caching in Content-Centric Networking. ICUFN 2016: 960-965 - [c112]Wen Wang, Wenbo He, Jinshu Su, Yixin Chen:
Cupid: Congestion-free consistent data plane update in software defined networks. INFOCOM 2016: 1-9 - [c111]Chengcheng Xu, Baokang Zhao, Shuhui Chen, Jinshu Su:
A Novel Hybrid Architecture for High Speed Regular Expression Matching. MobiSec 2016: 164-174 - [c110]Linbo Qiao, Bofeng Zhang, Yipin Sun, Jinshu Su:
Rigidly Self-Expressive Sparse Subspace Clustering. PAKDD Workshops 2016: 101-114 - [c109]Wen Wang, Cong Liu, Jinshu Su, Wenbo He:
Achieving Consistent SDN Control With Declarative Applications. SIGCOMM 2016: 585-586 - [c108]Jinshu Su, Shuhui Chen, Biao Han, Chengcheng Xu, Xin Wang:
A 60Gbps DPI Prototype based on Memory-Centric FPGA. SIGCOMM 2016: 627-628 - [c107]Mian Cheng, Baokang Zhao, Jinshu Su:
A Real-Time Processing System for Anonymization of Mobile Core Network Traffic. SpaCCS Workshops 2016: 229-237 - 2015
- [j46]Wenzhong Guo, Guolong Chen, Chaolong Yu, Jinshu Su, Zhanghui Liu:
A Two-stage Clustering Sleep Scheduling Algorithm with Particle Swarm Optimization in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 27(1-2): 27-49 (2015) - [j45]Jijun Cao, Jinshu Su:
Improving application layer multicast forwarding performance by offloading multisend operations. Comput. Syst. Sci. Eng. 30(3) (2015) - [j44]Xiaofeng Wang, Jinshu Su, Baosheng Wang, Guojun Wang, Ho-fung Leung:
Trust Description and Propagation System: Semantics and axiomatization. Knowl. Based Syst. 90: 81-91 (2015) - [j43]Yipin Sun, Bofeng Zhang, Baokang Zhao, Xiangyu Su, Jinshu Su:
Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Netw. Appl. 8(6): 1108-1121 (2015) - [j42]Jinshu Su, Xiaofeng Wang, Weisong Shi, Indrakshi Ray:
Security, trust, and resilience of distributed networks and systems. Secur. Commun. Networks 8(10): 1829-1830 (2015) - [j41]Guangyao Zhao, Bing Sun, Chao Li, Jinshu Su:
Truncated differential cryptanalysis of PRINCE. Secur. Commun. Networks 8(16): 2875-2887 (2015) - [j40]Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su:
Latency-aware DVFS for efficient power state transitions on many-core architectures. J. Supercomput. 71(7): 2720-2747 (2015) - [j39]Biao Han, Jie Li, Jinshu Su, Minyi Guo, Baokang Zhao:
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs. IEEE Trans. Parallel Distributed Syst. 26(4): 1117-1128 (2015) - [c106]Yilun Wu, Jinshu Su, Baochun Li:
Keyword Search over Shared Cloud Data without Secure Channel or Authority. CLOUD 2015: 580-587 - [c105]Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su, Ilsun You:
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups. BWCCA 2015: 364-369 - [c104]Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou:
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol. CCS 2015: 1632-1634 - [c103]Peixin Chen, Xiaofeng Wang, Jinshu Su:
A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups. ICA3PP (Workshops and Symposiums) 2015: 46-56 - [c102]Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, Jinshu Su:
An Efficient Pre-filter to Accelerate Regular Expression Matching. ICA3PP (Workshops and Symposiums) 2015: 111-119 - [c101]Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Ilsun You:
Removing Key Escrow from the LW-HIBE Scheme. ICA3PP (Workshops and Symposiums) 2015: 593-605 - [c100]Peixin Chen, Xiaofeng Wang, Jinshu Su:
An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage. ICA3PP (Workshops and Symposiums) 2015: 633-647 - [c99]Changjiang Fei, Baokang Zhao, Chunqing Wu, Wanrong Yu, Biao Han, Jinshu Su:
Towards efficient radio resource scheduling in LTE-based satellite mobile communication system. INFOCOM Workshops 2015: 167-172 - [c98]Wen Wang, Wenbo He, Jinshu Su:
Network intrusion detection and prevention middlebox management in SDN. IPCCC 2015: 1-8 - [c97]Wen Wang, Wenbo He, Jinshu Su:
M2SDN: Achieving multipath and multihoming in data centers with software defined networking. IWQoS 2015: 11-20 - [c96]Baokang Zhao, Ziling Wei, Bo Liu, Jinshu Su, Ilsun You:
Providing adaptive quality of security in quantum networks. QSHINE 2015: 440-445 - [c95]Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen:
RScam: Cloud-Based Anti-Malware via Reversible Sketch. SecureComm 2015: 157-174 - [c94]Peixin Chen, Xiaofeng Wang, Jinshu Su:
T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection. SocialSec 2015: 72-79 - [c93]Yiming Zhang, Dongsheng Li, Yijie Wang, Zhigang Sun, Feng Zhao, Jinshu Su:
Design, Implementation and Evaluation of an Application-Layer Virtualized Network. SOSE 2015: 235-240 - [c92]Yipin Sun, Shuhui Chen, Biao Han, Bofeng Zhang, Jinshu Su:
A Novel Location Privacy Mining Threat in Vehicular Internet Access Service. WASA 2015: 467-476 - 2014
- [j38]Yuan Li, Michal Pióro, Di Yuan, Jinshu Su:
Optimizing compatible sets in wireless networks through integer programming. EURO J. Comput. Optim. 2(1-2): 1-15 (2014) - [j37]Jinshu Su, Dan Cao, Baokang Zhao, Xiaofeng Wang, Ilsun You:
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Future Gener. Comput. Syst. 33: 11-18 (2014) - [j36]Ziling Wei, Baokang Zhao, Bo Liu, Jinshu Su, Liyang Xu, Erci Xu:
A novel steganography approach for voice over IP. J. Ambient Intell. Humaniz. Comput. 5(4): 601-610 (2014) - [j35]Yanpeng Ma, Xiaofeng Wang, Jinshu Su, Chunqing Wu, Wanrong Yu, Baokang Zhao:
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks. J. Networks 9(4): 896-907 (2014) - [j34]Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet. New Gener. Comput. 32(3-4): 237-255 (2014) - [j33]Yujing Liu, Wei Peng, Jinshu Su:
A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Networks 7(11): 2201-2210 (2014) - [j32]Wei Peng, Guohua Dong, Kun Yang, Jinshu Su:
A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks. IEEE Trans. Mob. Comput. 13(12): 2706-2718 (2014) - [j31]Huabiao Lu, Baokang Zhao, Jinshu Su, Peidai Xie:
Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing. Wirel. Pers. Commun. 75(3): 1591-1609 (2014) - [c91]Guohong Zhao, Shuhui Chen, Baokang Zhao, Ilsun You, Jinshu Su, Wanrong Yu:
A High-Speed Network Content Filtering System. CD-ARES 2014: 257-269 - [c90]Qian He, Baokang Zhao, Yunjian Long, Jinshu Su, Ilsun You:
A Structure P2P Based Web Services Registry with Access and Control. CD-ARES 2014: 286-297 - [c89]Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang:
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP. CCS 2014: 1520-1522 - [c88]Zhiquan Lai, Baokang Zhao, Jinshu Su:
Efficient DVFS to Prevent Hard Faults for Many-Core Architectures. ICT-EurAsia 2014: 674-679 - [c87]Zhiquan Lai, King Tin Lam, Cho-Li Wang, Jinshu Su:
A Power Modelling Approach for Many-Core Architectures. SKG 2014: 128-132 - [c86]Ziling Wei, Jinshu Su, Baokang Zhao:
SPS: A Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network. WASA 2014: 324-335 - 2013
- [j30]Ruilin Li, Chao Li, Jinshu Su, Bing Sun:
Security evaluation of MISTY structure with SPN round function. Comput. Math. Appl. 65(9): 1264-1279 (2013) - [j29]Bing Bai, Zhenqian Feng, Baokang Zhao, Jinshu Su:
Benefiting from the community structure in opportunistic forwarding. Comput. Sci. Inf. Syst. 10(2): 865-876 (2013) - [j28]Ziling Wei, Baokang Zhao, Jinshu Su:
PDA: A Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System. Int. J. Distributed Sens. Networks 9 (2013) - [j27]Yujing Liu, Xiapu Luo, Rocky K. C. Chang, Jinshu Su:
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events. IEEE J. Sel. Areas Commun. 31(6): 1147-1157 (2013) - [j26]Huabiao Lu, Xiaofeng Wang, Baokang Zhao, Fei Wang, Jinshu Su:
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 58(5-6): 1140-1154 (2013) - [j25]Dan Cao, Baokang Zhao, Jinshu Su, Baosheng Wang, Xiaofeng Wang:
A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing. Math. Comput. Model. 58(5-6): 1175-1188 (2013) - [c85]Lin-Bo Qiao, Bo-Feng Zhang, Rui-Yuan Zhao, Jinshu Su:
Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method. CSS 2013: 104-116 - [c84]Fei Wang, Bin Xiao, Kai Bu, Jinshu Su:
Detect and identify blocker tags in tree-based RFID systems. ICC 2013: 2133-2137 - [c83]Biao Han, Jie Li, Jinshu Su:
Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks. ICC 2013: 6128-6132 - [c82]Yujing Liu, Wei Peng, Jinshu Su, Zhilin Wang:
Assessing Survivability of Inter-domain Routing System under Cascading Failures. ICoC 2013: 97-108 - [c81]Peidai Xie, Yongjun Wang, Huabiao Lu, Meijian Li, Jinshu Su:
Mining Network Behavior Specifications of Malware Based on Binary Analysis. ICoC 2013: 248-255 - [c80]Peidai Xie, Xicheng Lu, Jinshu Su, Yongjun Wang, Meijian Li:
iPanda: A comprehensive malware analysis tool. ICOIN 2013: 481-486 - [c79]Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su:
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation. ICT-EurAsia 2013: 271-284 - [c78]Bo Liu, Baokang Zhao, Ziling Wei, Chunqing Wu, Jinshu Su, Wanrong Yu, Fei Wang, Shihai Sun:
Qphone: a quantum security VoIP phone. SIGCOMM 2013: 477-478 - [c77]Yanpeng Ma, Wei Peng, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Chunqing Wu:
A Location Management Algorithm for LEO Satellite Networks. TrustCom/ISPA/IUCC 2013: 1362-1366 - [c76]Yanpeng Ma, Wei Peng, Wanrong Yu, Jinshu Su, Chunqing Wu, Guohong Zhao:
A Distributed Routing Algorithm for LEO Satellite Networks. TrustCom/ISPA/IUCC 2013: 1367-1371 - [c75]Biao Han, Jie Li, Jinshu Su:
Optimal relay node placement for multi-pair cooperative communication in wireless networks. WCNC 2013: 4724-4729 - [e1]Jinshu Su, Baokang Zhao, Zhigang Sun, Xiaofeng Wang, Fei Wang, Ke Xu:
Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers. Communications in Computer and Information Science 401, Springer 2013, ISBN 978-3-642-53958-9 [contents] - 2012
- [j24]Baokang Zhao, Wei Peng, Ziming Song, Jinshu Su, Chunqing Wu, Wanrong Yu, Qiaolin Hu:
Towards efficient and practical network coding in delay tolerant networks. Comput. Math. Appl. 63(2): 588-600 (2012) - [j23]Zhenqian Feng, Bing Bai, Baokang Zhao, Jinshu Su:
ICTree: discovering the underlying connections of your rental virtual machines in the public clouds. Comput. Syst. Sci. Eng. 27(6) (2012) - [j22]Ilsun You, Jinshu Su:
Editorial. Comput. Syst. Sci. Eng. 27(6) (2012) - [j21]Baokang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Jinshu Su:
Privacy aware publishing of successive location information in sensor networks. Future Gener. Comput. Syst. 28(6): 913-922 (2012) - [j20]Bin Dai, Feng Wang, Baokang Zhao, Jinshu Su:
Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing. IEICE Trans. Inf. Syst. 95-D(1): 94-107 (2012) - [j19]Wei Peng, Zimu Li, Yujing Liu, Jinshu Su:
Assessing the vulnerability of network topologies under large-scale regional failures. J. Commun. Networks 14(4): 451-460 (2012) - [j18]Biao Han, Jie Li, Jinshu Su, Jiannong Cao:
Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks. IEEE J. Sel. Areas Commun. 30(2): 450-457 (2012) - [j17]Lijun Wu, Kaile Su, Abdul Sattar, Qingliang Chen, Jinshu Su, Wei Wu:
A complete first-order temporal BDI logic for forest multi-agent systems. Knowl. Based Syst. 27: 343-351 (2012) - [j16]Fei Wang, Hailong Wang, Xiaofeng Wang, Jinshu Su:
A new multistage approach to detect subtle DDoS attacks. Math. Comput. Model. 55(1-2): 198-213 (2012) - [j15]Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su:
Flexible multi-authority attribute-based signature schemes for expressive policy. Mob. Inf. Syst. 8(3): 255-274 (2012) - [j14]Yipin Sun, Zhenqian Feng, Qiaolin Hu, Jinshu Su:
An efficient distributed key management scheme for group-signature based anonymous authentication in VANET. Secur. Commun. Networks 5(1): 79-86 (2012) - [j13]Xiaofeng Wang, Ling Liu, Jinshu Su:
RLM: A General Model for Trust Representation and Aggregation. IEEE Trans. Serv. Comput. 5(1): 131-143 (2012) - [c74]Zhenqian Feng, Bing Bai, Baokang Zhao, Jinshu Su:
An Analytic Goodput Model for TCP Incast. IMIS 2012: 427-432 - [c73]Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Baokang Zhao, Xiaofeng Hu:
A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks. IMIS 2012: 433-438 - [c72]Jinshu Su:
STDN Introduction. IPDPS Workshops 2012: 1176 - [c71]Yujing Liu, Jinshu Su, Rocky K. C. Chang:
LDC: Detecting BGP Prefix Hijacking by Load Distribution Change. IPDPS Workshops 2012: 1197-1203 - [c70]Lin-Bo Qiao, Bo-Feng Zhang, Zhiquan Lai, Jinshu Su:
Mining of Attack Models in IDS Alerts from Network Backbone by a Two-stage Clustering Method. IPDPS Workshops 2012: 1263-1269 - [c69]Peidai Xie, Xicheng Lu, Yongjun Wang, Jinshu Su, Meijian Li:
An Automatic Approach to Detect Anti-debugging in Malware Analysis. ISCTCS 2012: 436-442 - [c68]Fei Wang, Xiaofeng Wang, Xiaofeng Hu, Jinshu Su:
Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection. MASS Workshops 2012: 1-4 - [c67]Wei Peng, Guohua Dong, Kun Yang, Jinshu Su, Jun Wu:
A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant Networks. MSN 2012: 140-146 - [c66]Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Baokang Zhao, Xiaofeng Hu:
A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks. MUSIC 2012: 240-245 - [c65]Yujing Liu, Xiapu Luo, Rocky K. C. Chang, Jinshu Su:
Characterizing Inter-domain Rerouting after Japan Earthquake. Networking (2) 2012: 124-135 - [c64]Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. TrustCom 2012: 215-222 - [c63]Wei Peng, Xiaofeng Hu, Feng Zhao, Jinshu Su:
A Fast Algorithm to Find All-Pairs Shortest Paths in Complex Networks. ICCS 2012: 557-566 - 2011
- [j12]Jijun Cao, Jinshu Su, Jing Xie, Feng Chen:
DBMISD-D: A distributed algorithm for constructing and maintaining high stability application-layer multicast tree. Comput. Syst. Sci. Eng. 26(5) (2011) - [j11]Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su:
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm. Future Gener. Comput. Syst. 27(8): 1124-1134 (2011) - [j10]Xuejun Yang, Xiangke Liao, Kai Lu, Qingfeng Hu, Junqiang Song, Jinshu Su:
The TianHe-1A Supercomputer: Its Hardware and Software. J. Comput. Sci. Technol. 26(3): 344-351 (2011) - [c62]Wei Peng, Zimu Li, Jinshu Su, Muwei Dong:
Evaluation of Topological Vulnerability of the Internet under Regional Failures. ARES 2011: 164-175 - [c61]Bo Liu, Erci Xu, Jin Wang, Ziling Wei, Liyang Xu, Baokang Zhao, Jinshu Su:
Thwarting audio steganography attacks in cloud storage systems. CDC 2011: 259-265 - [c60]Xiaozhe Zhang, Xicheng Lu, Jinshu Su, Baosheng Wang, Zexin Lu:
SDBGP: A scalable, distributed BGP routing protocol implementation. HPSR 2011: 191-196 - [c59]Feng Wang, Bin Dai, Jinshu Su:
How Can Multipath Dissemination Help to Detect Prefix Hijacking? ICCCN 2011: 1-8 - [c58]Baokang Zhao, Ziming Song, Jinshu Su, Wei Peng, Qiaolin Hu:
NTC: Towards Efficient Network Coding in Delay Tolerant Networks. IMIS 2011: 57-64 - [c57]Lei Wang, Shuhui Chen, Yong Tang, Jinshu Su:
Gregex: GPU Based High Speed Regular Expression Matching Engine. IMIS 2011: 366-370 - [c56]Bing Bai, Jinshu Su, Baokang Zhao, Wanrong Yu, Ling Wen:
Snail Crawling: An Enhanced Method for DTNs Routing. IMIS 2011: 394-397 - [c55]Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su, Guofei Ji:
Multi-authority Attribute-Based Signature. INCoS 2011: 668-672 - [c54]Biao Han, Jie Li, Jinshu Su:
Self-supported congestion-aware networking for emergency services in WANETs. INFOCOM 2011: 891-899 - [c53]Ziling Wei, Liyang Xu, Bo Liu, Eci Xu, Baokang Zhao, Jinshu Su:
VISOR: A Pratical VoIP Steganography Platform. MSN 2011: 370-372 - [c52]Bing Bai, Zhenqian Feng, Baokang Zhao, Jinshu Su:
One Leader at One Time: OLOT Routing in Delay Tolerant Networks. MSN 2011: 432-435 - [c51]Zhenqian Feng, Bing Bai, Baokang Zhao, Jinshu Su:
Shrew Attack in Cloud Data Center Networks. MSN 2011: 441-445 - [c50]Xiangyu Su, Jinzhen Bao, Baokang Zhao, Jinshu Su:
Protecting Router Forwarding Table in Space. MSN 2011: 446-450 - [c49]Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su, Yijiao Chen:
Authenticating with Attributes in Online Social Networks. NBiS 2011: 607-611 - [c48]Erchi Xu, Bo Liu, Liyang Xu, Ziling Wei, Baokang Zhao, Jinshu Su:
Adaptive VoIP Steganography for Information Hiding within Network Audio Streams. NBiS 2011: 612-617 - [c47]Bofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su:
Analysis of prefix hijacking based on AS hierarchical model. NSS 2011: 322-326 - [c46]Yujing Liu, Wei Peng, Jinshu Su:
Study on IP Prefix Hijacking in Cloud Computing Networks Based on Attack Planning. TrustCom 2011: 922-926 - 2010
- [j9]Xuejun Yang, Xiangke Liao, Weixia Xu, Junqiang Song, Qingfeng Hu, Jinshu Su, Liquan Xiao, Kai Lu, Qiang Dou, Juping Jiang, Canqun Yang:
TH-1: China's first petaflop supercomputer. Frontiers Comput. Sci. China 4(4): 445-455 (2010) - [j8]Baokang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su:
An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming. IEICE Trans. Inf. Syst. 93-D(3): 531-533 (2010) - [j7]Yujing Liu, Bofeng Zhang, Fei Wang, Jinshu Su:
Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System. J. Next Gener. Inf. Technol. 1(3): 96-105 (2010) - [j6]Feng Chen, Dehui Liu, Yi Zhang, Jinshu Su:
A Scalable Approach to Analyzing Network Security using Compact Attack Graphs. J. Networks 5(5): 543-550 (2010) - [j5]Lijun Wu, Jinshu Su, Kaile Su, Xiangyu Luo, Zhihua Yang:
A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems. Knowl. Based Syst. 23(2): 162-168 (2010) - [j4]Yipin Sun, Rongxing Lu, Xiaodong Lin, Xuemin Shen, Jinshu Su:
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications. IEEE Trans. Veh. Technol. 59(7): 3589-3603 (2010) - [c45]Yipin Sun, Xiangyu Su, Baokang Zhao, Jinshu Su:
Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications. CIT 2010: 2825-2830 - [c44]Baokang Zhao, Xiangyu Su, Yipin Sun, Jinshu Su, Shanshan Li:
A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks. CIT 2010: 2837-2842 - [c43]Zhenqian Feng, Haitao Wu, Jinshu Su:
Exploring potential vulnerabilities in data center network. StudentWorkshop@CoNEXT 2010: 12:1-12:2 - [c42]Yipin Sun, Rongxing Lu, Xiaodong Lin, Xuemin Shen, Jinshu Su:
A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications. ICC 2010: 1-6 - [c41]Yipin Sun, Xiaodong Lin, Rongxing Lu, Xuemin Shen, Jinshu Su:
Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs. ICC 2010: 1-5 - [c40]Jie Yu, Liming Lu, Zhoujun Li, Xiaofeng Wang, Jinshu Su:
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks. ICPP 2010: 680-689
2000 – 2009
- 2009
- [j3]Baokang Zhao, Jinshu Su, Wei Peng, YingZhi Zeng, Meng Wang:
An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems. Intell. Autom. Soft Comput. 15(3): 485-493 (2009) - [j2]Rui Tu, Jinshu Su, Ruoshan Kong:
An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split. Int. J. Commun. Netw. Syst. Sci. 2(7): 641-644 (2009) - [c39]Lijun Wu, Jinshu Su, Xiangyu Luo, Zhihua Yang, Qingliang Chen:
A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-agent Systems. Canadian AI 2009: 146-157 - [c38]Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su:
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. AINA 2009: 411-418 - [c37]Xiaofeng Wang, Rajkumar Buyya, Jinshu Su:
Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy. CCGRID 2009: 108-115 - [c36]Jijun Cao, Zhigang Sun, Jinshu Su:
HPC: A Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast. CSO (1) 2009: 680-685 - [c35]Feng Chen, Jinshu Su, Yi Zhang:
A Scalable Approach to Full Attack Graphs Generation. ESSoS 2009: 150-163 - [c34]Yipin Sun, Baokang Zhao, Jinshu Su:
ECHO: Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications. FCST 2009: 581-586 - [c33]Yan Xia, Zhenghu Gong, Baokang Zhao, Jinshu Su:
A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks. FCST 2009: 587-592 - [c32]YingZhi Zeng, Xia Yan, Jinshu Su:
A new broadcast-Key Management Scheme for Distributed Wireless Sensor Networks. MASS 2009: 882-887 - [c31]YingZhi Zeng, Xia Yan, Jinshu Su:
A new Group Key Management Scheme based on DMST for Wireless Sensor Networks. MASS 2009: 989-994 - [c30]Bin Dai, Huabiao Lu, Zhigang Sun, Ziming Song, Yanpeng Ma, Jinshu Su:
MORT: A Technique to Improve Routing Efficiency in Fault-Tolerant Multipath Routing. MSN 2009: 430-435 - [c29]Rui Tu, Jinshu Su, Feng Chen:
Network Access Control Mechanism Based on Locator/Identifier Split. NAS 2009: 171-174 - 2008
- [j1]Yi Dai, Jinshu Su, Ying Zhang:
A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch. Int. J. Electron. Secur. Digit. Forensics 1(4): 362-373 (2008) - [c28]Feng Chen, Lingyu Wang, Jinshu Su:
An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs. IAS 2008: 209-212 - [c27]Jijun Cao, Jinshu Su, Chunqing Wu:
Modeling and Analyzing the Instantaneous Stability for Application Layer Multicast. APSCC 2008: 217-224 - [c26]Baokang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su, Yanqin Yang:
Towards Successive Privacy Protection in Sensor Networks. EUC (2) 2008: 167-172 - [c25]Sheng Wang, Jinshu Su:
Analysis of Reverse Traffic in Delay-Based Congestion Control. ICDS 2008: 178-183 - [c24]Sheng Wang, Jinshu Su:
Analysis and Enhancement of Delay-Based Congestion Control. ICDS 2008: 184-189 - [c23]Hong Wang, Zhenghu Gong, Zexin Lu, Jinshu Su, Sudan Li:
An Entropy Based Algorithm to Find Critical Traffic Matrices. ICN 2008: 392-397 - [c22]Baokang Zhao, Meng Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su:
Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems. DIPES 2008: 201-211 - [c21]Feng Chen, Jinshu Su:
A Flexible Approach to Measuring Network Security Using Attack Graphs. ISECS 2008: 426-431 - [c20]Wei Cheng, Kai Xing, Xiuzhen Cheng, Xicheng Lu, Zexin Lu, Jinshu Su, Baosheng Wang, Yujun Liu:
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. MobiHoc 2008: 209-220 - [c19]Baokang Zhao, Meng Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su:
Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems. RTCSA 2008: 293-302 - 2007
- [c18]Jijun Cao, Xiangquan Shi, Chunqing Wu, Jinshu Su, Zhaowei Meng:
Efficient Congestion Control Based on Awareness of Multistage Resources (CC-AMR). APNOMS 2007: 608-611 - [c17]Yi Dai, Jinshu Su, Zhigang Sun, Jianbo Guan:
A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet Reordering in Load-Balanced Switches. APSCC 2007: 151-155 - [c16]Jijun Cao, Jinshu Su, Chunqing Wu:
Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast. APSCC 2007: 179-186 - [c15]YingZhi Zeng, Baokang Zhao, Jinshu Su, Xia Yan, Zili Shao:
A Loop-Based Key Management Scheme for Wireless Sensor Networks. EUC Workshops 2007: 103-114 - [c14]Lijun Wu, Jinshu Su:
Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent System Via Extended Mu-Calculus. LSMS (1) 2007: 510-522 - [c13]YingZhi Zeng, Jinshu Su, Xia Yan, Baokang Zhao, QingYuan Huang:
LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks. MSN 2007: 772-783 - 2006
- [c12]QingYuan Huang, Jinshu Su, YingZhi Zeng, Yongjun Wang:
Spreading Activation Model for Connectivity Based Clustering. ADVIS 2006: 398-407 - [c11]QingYuan Huang, Yongjun Wang, Jinshu Su, YingZhi Zeng:
Personalized Fair Reputation Based Resource Allocation in Grid. ADVIS 2006: 408-417 - [c10]Zhaowei Meng, Jinshu Su, Stefano Avallone:
A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic. AINTEC 2006: 159-171 - [c9]Chunqing Wu, Xiangquan Shi, Xuejun Yang, Jinshu Su:
The Impact of Parallel and Multithread Mechanism on Network Processor Performance. GCC 2006: 236-240 - [c8]Yaping Liu, Zhenghu Gong, Baosheng Wang, Jinshu Su:
A Routing Optimization Algorithm for BGP Egress Selection. ICDCIT 2006: 192-199 - [c7]Zhaowei Meng, Jinshu Su, Vittorio Manetti:
A New Precomputation Scheme for MPLS Traffic Engineering Routing. ICDCN 2006: 391-396 - [c6]Dongsheng Li, Xicheng Lu, Baosheng Wang, Jinshu Su, Jiannong Cao, Keith C. C. Chan, Hong Va Leong:
Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems. ICDCS 2006: 64 - 2005
- [c5]Feng Zhao, Jinshu Su, Xiaomei Cheng:
OpenRouter: A TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication. ICCNMC 2005: 1032-1041 - 2004
- [c4]Jing Zheng, Jinshu Su, Kan Yang, Yijie Wang:
Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks. International Conference on Computational Science 2004: 373-380 - [c3]Jing Zheng, Jinshu Su, Xicheng Lu:
A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability. ISPA 2004: 399-409 - [c2]Dongsheng Li, Xicheng Lu, Jinshu Su:
Graph-Theoretic Analysis of Kautz Topology and DHT Schemes. NPC 2004: 308-315 - 2003
- [c1]Xiaofeng Hu, Zhigang Sun, Xicheng Lu, Jinshu Su:
Using Split Queues to Improve the Performance of Parallel Switch. APPT 2003: 3-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint