default search action
Yongning Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Feng Wang, Yongning Tang:
Diverse Intrusion and Malware Detection: AI-Based and Non-AI-Based Solutions. J. Cybersecur. Priv. 4(2): 382-387 (2024) - [c24]Manish Adhikari, Feng Wang, Chung-Chih Li, Guang Cheng, Yongning Tang:
SDT: Towards a Blockchain-Based Secure Data Trading Application. DAPPS 2024: 45-50 - 2023
- [j17]Feng Wang, Yongning Tang, Hongbing Fang:
Mitigating IoT Privacy-Revealing Features by Time Series Data Transformation. J. Cybersecur. Priv. 3(2): 209-226 (2023) - [j16]Yuyu Zhao, Guang Cheng, Yongning Tang:
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture. IEEE Trans. Inf. Forensics Secur. 18: 2667-2682 (2023) - 2022
- [j15]Jessil Fuhr, Feng Wang, Yongning Tang:
MOCA: A Network Intrusion Monitoring and Classification System. J. Cybersecur. Priv. 2(3): 629-639 (2022) - 2021
- [c23]Jessil Fuhr, Isaac Hanna, Feng Wang, Yongning Tang:
The Diminished Importance of Connection-based Features in Intrusion Detection. IPCCC 2021: 1-10 - 2020
- [j14]Ying Hu, Guang Cheng, Yongning Tang, Feng Wang:
A practical design of hash functions for IPv6 using multi-objective genetic programming. Comput. Commun. 162: 160-168 (2020) - [j13]Feng Wang, Eduard Babulak, Yongning Tang:
SL-RPL: Stability-Aware Load Balancing for RPL. Trans. Mach. Learn. Data Min. 13(1): 27-39 (2020) - [c22]Feng Wang, Yongning Tang, Lixin Gao, Guang Cheng:
BC-Sketch: A Simple Reversible Sketch for Detecting Network Anomalies. SMDS 2020: 36-44
2010 – 2019
- 2019
- [j12]Guang Cheng, Chunsheng Guo, Yongning Tang:
dptCry: an approach to decrypting ransomware WannaCry based on API hooking. CCF Trans. Netw. 2(3-4): 207-216 (2019) - [c21]Yongning Tang, Yangxuan Wu, Guang Cheng, Zhiwei Xu:
Intelligence Enabled SDN Fault Localization via Programmable In-band Network Telemetry. HPSR 2019: 1-6 - 2017
- [c20]Guang Cheng, Yongning Tang:
eOpenFlow: Software defined sampling via a highly adoptable OpenFlow extension. ICC 2017: 1-6 - [c19]Wubin Pan, Guang Cheng, Yongning Tang:
WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. TrustCom/BigDataSE/ICESS 2017: 50-57 - 2016
- [j11]Yongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen, Khalid Elmansor, Yangxuan Wu:
Automatic belief network modeling via policy inference for SDN fault localization. J. Internet Serv. Appl. 7(1): 1:1-1:13 (2016) - [c18]Yongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen:
Service Oriented Verification Integrated Fault Reasoning for SDNs. AINA 2016: 624-629 - [c17]Wubin Pan, Gaung Cheng, Hua Wu, Yongning Tang:
Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks. IWQoS 2016: 1-6 - 2013
- [j10]Guang Cheng, Yongning Tang:
Line speed accurate superspreader identification using dynamic error compensation. Comput. Commun. 36(13): 1460-1470 (2013) - [j9]Guang Cheng, Yongning Tang:
PortView: identifying port roles based on port fuzzy macroscopic behavior. J. Internet Serv. Appl. 4(1): 9:1-9:12 (2013) - [j8]Yongning Tang, Guang Cheng, James T. Yu, Bin Zhang:
Catching modern botnets using active integrated evidential reasoning. J. Internet Serv. Appl. 4(1): 20:1-20:10 (2013) - 2012
- [j7]Yongning Tang, Ehab Al-Shaer, Kaustubh R. Joshi:
Reasoning under Uncertainty for Overlay Fault Diagnosis. IEEE Trans. Netw. Serv. Manag. 9(1): 34-47 (2012) - [c16]Khalid Elbadawi, Yongning Tang, James T. Yu:
Towards an efficient verification approach on network configuration. CNSM 2012: 247-251 - 2011
- [j6]Feng Chen, Yongning Tang, Ming-Yu Shen:
Coordination control of greenhouse environmental factors. Int. J. Autom. Comput. 8(2): 147-153 (2011) - [j5]Zhiwei Xu, Yi Liu, Yongning Tang:
Adopting the Information Contained by Outliers in the Modeling Process. Int. J. Comput. Their Appl. 18(2): 100-110 (2011) - [j4]Yongning Tang, Guang Cheng, Zhiwei Xu:
Probabilistic and reactive fault diagnosis for dynamic overlay networks. Peer-to-Peer Netw. Appl. 4(4): 439-452 (2011) - [c15]Feng Chen, Xinxin Sun, Dali Wei, Yongning Tang:
Tradeoff strategy between exploration and exploitation for PSO. ICNC 2011: 1216-1222 - 2010
- [c14]Feng Chen, Dali Wei, Yongning Tang:
Wavelet analysis based sparse LS-SVR for time series data. BIC-TA 2010: 750-755 - [c13]Feng Chen, Yongning Tang:
Towards Constraint Optimal Control of Greenhouse Climate. LSMS/ICSEE 2010: 439-450
2000 – 2009
- 2009
- [c12]Yongning Tang, Ehab Al-Shaer:
Sharing end-user negative symptoms for improving overlay network dependability. DSN 2009: 275-284 - [c11]Yongning Tang, Ehab Al-Shaer:
Overlay Fault Diagnosis Based on Evidential Reasoning. INFOCOM 2009: 2596-2600 - [c10]Yongning Tang, Guang Cheng, Zhiwei Xu, Ehab Al-Shaer:
Community-base Fault Diagnosis Using Incremental Belief Revision. NAS 2009: 121-128 - [c9]Guang Cheng, Yongning Tang, Jiexin Jiang, Wei Ding:
A Trace Measurement and Analysis System for the Multi-Links CERNET Backbone. NAS 2009: 341-346 - 2008
- [j3]Yongning Tang, Ehab Al-Shaer, Raouf Boutaba:
Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. IEEE Trans. Netw. Serv. Manag. 5(1): 36-49 (2008) - [c8]Yongning Tang, Ehab Al-Shaer:
Towards Collaborative User-Level Overlay Fault Diagnosis. INFOCOM 2008: 2476-2484 - 2007
- [c7]Guang Cheng, Jian Gong, Yongning Tang:
A Hybrid Sampling Approach for Network Flow Monitoring. E2EMON 2007: 1-7 - [c6]Guang Cheng, Yongning Tang, Wei Ding:
A Double-Sampling and Hold Based Approach for Accurate and Efficient Network Flow Monitoring. International Conference on Computational Science (4) 2007: 857-864 - [c5]Yongning Tang, Ehab Al-Shaer, Bin Zhang:
Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks. Integrated Network Management 2007: 236-245 - 2005
- [c4]Yongning Tang, Ehab S. Al-Shaer, Raouf Boutaba:
Active integrated fault localization in communication networks. Integrated Network Management 2005: 543-556 - 2004
- [c3]Ehab Al-Shaer, Yongning Tang:
MRMON: remote multicast monitoring. NOMS (1) 2004: 585-598 - 2002
- [j2]Ehab S. Al-Shaer, Yongning Tang:
QoS Path Monitoring for Multicast Networks. J. Netw. Syst. Manag. 10(3): 357-381 (2002) - [c2]Ehab Al-Shaer, Yongning Tang:
SMRM: SNMP-based multicast reachability monitoring. NOMS 2002: 467-482 - 2001
- [j1]Ehab S. Al-Shaer, Yongning Tang:
Toward integrating IP multicasting in internet network management protocols. Comput. Commun. 24(5-6): 473-485 (2001) - 2000
- [c1]Ehab S. Al-Shaer, Yongning Tang:
Integrating IP Multicasting in Standard Network Management Protocols. MMNS 2000: 239-251
Coauthor Index
aka: Ehab S. Al-Shaer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint