Zhiliang Wang
Zhiliang Wang
Verified email at
Cited by
Cited by
Traffic engineering in SDN/OSPF hybrid network
Y Guo, Z Wang, X Yin, X Shi, J Wu
2014 IEEE 22nd international conference on network protocols, 563-568, 2014
Detecting prefix hijackings in the internet with argus
X Shi, Y Xiang, Z Wang, X Yin, J Wu
Proceedings of the 2012 Internet Measurement Conference, 15-28, 2012
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning
Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li, X Yin, X Shi, J Yang, ...
Computer Networks 169, 107049, 2020
Incremental deployment for traffic engineering in hybrid SDN network
Y Guo, Z Wang, X Yin, X Shi, J Wu, H Zhang
2015 IEEE 34th international performance computing and communications …, 2015
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021
A survey on network verification and testing with formal methods: Approaches and challenges
Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu, H Zhang, Q Wang
IEEE Communications Surveys & Tutorials 21 (1), 940-969, 2018
Traffic engineering in hybrid SDN networks with multiple traffic matrices
Y Guo, Z Wang, X Yin, X Shi, J Wu
Computer Networks 126, 187-199, 2017
Argus: An accurate and agile system to detecting IP prefix hijacking
Y Xiang, Z Wang, X Yin, J Wu
2011 19th IEEE International Conference on Network Protocols, 43-48, 2011
Mutation testing of protocol messages based on extended TTCN-3
C Jing, Z Wang, X Shi, X Yin, J Wu
22nd International Conference on Advanced Information Networking and …, 2008
Performance evaluation of software-defined networking with real-life isp traffic
X Kong, Z Wang, X Shi, X Yin, D Li
2013 IEEE Symposium on Computers and Communications (ISCC), 000541-000547, 2013
Analysis of comparisons between OpenFlow and ForCES
Z Wang, T Tsou, J Huang, X Shi, X Yin
ForCES, IETF, 2012
Accuracy, scalability, coverage: A practical configuration verifier on a global WAN
F Ye, D Yu, E Zhai, HH Liu, B Tian, Q Ye, C Wang, X Wu, T Guo, C Jin, ...
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
Formal modeling and systematic black-box testing of sdn data plane
J Yao, Z Wang, X Yin, X Shiyz, J Wu
2014 IEEE 22nd International Conference on Network Protocols, 179-190, 2014
More load, more differentiation—A design principle for deadline-aware congestion control
H Zhang, X Shi, X Yin, F Ren, Z Wang
2015 IEEE Conference on Computer Communications (INFOCOM), 127-135, 2015
Conversational model based VoIP traffic generation
L Ji, X Yin, X Shi, Z Wang
International Conference on Networking and Services (ICNS'07), 14-14, 2007
Practical traffic-space adversarial attacks on learning-based nidss
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
arXiv preprint arXiv:2005.07519, 2020
Traffic engineering in partially deployed segment routing over IPv6 network with deep reinforcement learning
Y Tian, Z Wang, X Yin, X Shi, Y Guo, H Geng, J Yang
IEEE/ACM Transactions on Networking 28 (4), 1573-1586, 2020
Algebra and algorithms for multipath QoS routing in link state networks
H Geng, X Shi, X Yin, Z Wang, S Yin
Journal of Communications and Networks 19 (2), 189-200, 2017
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks
X Sun, Z Wang, J Yang, X Liu
Computers & Security 99, 102057, 2020
Efficient scheduling of weighted coflows in data centers
Z Wang, H Zhang, X Shi, X Yin, Y Li, H Geng, Q Wu, J Liu
IEEE Transactions on Parallel and Distributed Systems 30 (9), 2003-2017, 2019
The system can't perform the operation now. Try again later.
Articles 1–20