关注
Zhiliang Wang
Zhiliang Wang
在 tsinghua.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Traffic engineering in SDN/OSPF hybrid network
Y Guo, Z Wang, X Yin, X Shi, J Wu
2014 IEEE 22nd international conference on network protocols, 563-568, 2014
1752014
Detecting prefix hijackings in the internet with argus
X Shi, Y Xiang, Z Wang, X Yin, J Wu
Proceedings of the 2012 Internet Measurement Conference, 15-28, 2012
1582012
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning
Y Zhong, W Chen, Z Wang, Y Chen, K Wang, Y Li, X Yin, X Shi, J Yang, ...
Computer Networks 169, 107049, 2020
1342020
Evaluating and improving adversarial robustness of machine learning-based network intrusion detectors
D Han, Z Wang, Y Zhong, W Chen, J Yang, S Lu, X Shi, X Yin
IEEE Journal on Selected Areas in Communications 39 (8), 2632-2647, 2021
832021
A survey on network verification and testing with formal methods: Approaches and challenges
Y Li, X Yin, Z Wang, J Yao, X Shi, J Wu, H Zhang, Q Wang
IEEE Communications Surveys & Tutorials 21 (1), 940-969, 2018
532018
Incremental deployment for traffic engineering in hybrid SDN network
Y Guo, Z Wang, X Yin, X Shi, J Wu, H Zhang
2015 IEEE 34th international performance computing and communications …, 2015
532015
Deepaid: Interpreting and improving deep learning-based anomaly detection in security applications
D Han, Z Wang, W Chen, Y Zhong, S Wang, H Zhang, J Yang, X Shi, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
512021
Traffic engineering in hybrid SDN networks with multiple traffic matrices
Y Guo, Z Wang, X Yin, X Shi, J Wu
Computer Networks 126, 187-199, 2017
412017
Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning
S Wang, Z Wang, T Zhou, H Sun, X Yin, D Han, H Zhang, X Shi, J Yang
IEEE Transactions on Information Forensics and Security 17, 3972-3987, 2022
402022
Accuracy, scalability, coverage: A practical configuration verifier on a global wan
F Ye, D Yu, E Zhai, HH Liu, B Tian, Q Ye, C Wang, X Wu, T Guo, C Jin, ...
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
372020
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks
X Sun, Z Wang, J Yang, X Liu
Computers & Security 99, 102057, 2020
342020
Traffic engineering in partially deployed segment routing over IPv6 network with deep reinforcement learning
Y Tian, Z Wang, X Yin, X Shi, Y Guo, H Geng, J Yang
IEEE/ACM Transactions on Networking 28 (4), 1573-1586, 2020
332020
Efficient scheduling of weighted coflows in data centers
Z Wang, H Zhang, X Shi, X Yin, Y Li, H Geng, Q Wu, J Liu
IEEE Transactions on Parallel and Distributed Systems 30 (9), 2003-2017, 2019
332019
An IoT device identification method based on semi-supervised learning
L Fan, S Zhang, Y Wu, Z Wang, C Duan, J Li, J Yang
2020 16th International Conference on Network and Service Management (CNSM), 1-7, 2020
302020
Argus: An accurate and agile system to detecting IP prefix hijacking
Y Xiang, Z Wang, X Yin, J Wu
2011 19th IEEE International Conference on Network Protocols, 43-48, 2011
302011
Toposcope: Recover as relationships from fragmentary observations
Z Jin, X Shi, Y Yang, X Yin, Z Wang, J Wu
Proceedings of the ACM Internet Measurement Conference, 266-280, 2020
292020
Traffic matrix prediction based on deep learning for dynamic traffic engineering
Z Liu, Z Wang, X Yin, X Shi, Y Guo, Y Tian
2019 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2019
292019
Performance evaluation of software-defined networking with real-life isp traffic
X Kong, Z Wang, X Shi, X Yin, D Li
2013 IEEE Symposium on Computers and Communications (ISCC), 000541-000547, 2013
272013
Mutation testing of protocol messages based on extended TTCN-3
C Jing, Z Wang, X Shi, X Yin, J Wu
22nd International Conference on Advanced Information Networking and …, 2008
272008
More load, more differentiation—A design principle for deadline-aware congestion control
H Zhang, X Shi, X Yin, F Ren, Z Wang
2015 IEEE Conference on Computer Communications (INFOCOM), 127-135, 2015
262015
系统目前无法执行此操作,请稍后再试。
文章 1–20