Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jinshu Su
@article{DBLP:journals/cn/JiHXSS23, author = {Xiaolan Ji and Biao Han and Cao Xu and Congxi Song and Jinshu Su}, title = {Adaptive QoS-aware multipath congestion control for live streaming}, journal = {Comput. Networks}, volume = {220}, pages = {109470}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2022.109470}, doi = {10.1016/J.COMNET.2022.109470}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JiHXSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/HuangYLS23, author = {Jianxin Huang and Bo Yu and Runhao Liu and Jinshu Su}, title = {Automatic discovery of stateful variables in network protocol software based on replay analysis}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {24}, number = {3}, pages = {403--416}, year = {2023}, url = {https://doi.org/10.1631/FITEE.2200275}, doi = {10.1631/FITEE.2200275}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/HuangYLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiuSLCHKF23, author = {Lin Liu and Jinshu Su and Ximeng Liu and Rongmao Chen and Xinyi Huang and Guang Kou and Shaojing Fu}, title = {Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {3211--3225}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3269510}, doi = {10.1109/TCC.2023.3269510}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/LiuSLCHKF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ZhouCLS23, author = {Tongqing Zhou and Zhiping Cai and Fang Liu and Jinshu Su}, title = {In Pursuit of Beauty: Aesthetic-Aware and Context-Adaptive Photo Selection in Crowdsensing}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {9}, pages = {9364--9377}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2023.3237969}, doi = {10.1109/TKDE.2023.3237969}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ZhouCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ZhaoHLSZ23, author = {Na Zhao and Biao Han and Ruidong Li and Jinshu Su and Cong Zhou}, title = {A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing Loss Training}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {2}, pages = {1418--1429}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2022.3224803}, doi = {10.1109/TNSM.2022.3224803}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ZhaoHLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LiZCS23, author = {Xionglve Li and Tongqing Zhou and Zhiping Cai and Jinshu Su}, title = {Realizing Fine-Grained Inference of {AS} Path With a Generative Measurable Process}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {31}, number = {6}, pages = {3112--3127}, year = {2023}, url = {https://doi.org/10.1109/TNET.2023.3270565}, doi = {10.1109/TNET.2023.3270565}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/LiZCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZouSWCZ22, author = {Hongcheng Zou and Jinshu Su and Ziling Wei and Shuhui Chen and Baokang Zhao}, title = {An efficient cross-domain few-shot website fingerprinting attack with Brownian distance covariance}, journal = {Comput. Networks}, volume = {219}, pages = {109461}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109461}, doi = {10.1016/J.COMNET.2022.109461}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZouSWCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LiWS22, author = {Yang Li and Ziling Wei and Jinshu Su}, title = {Moving direction-based adaptive task migration in {MEC}}, journal = {{IET} Commun.}, volume = {16}, number = {17}, pages = {2002--2018}, year = {2022}, url = {https://doi.org/10.1049/cmu2.12455}, doi = {10.1049/CMU2.12455}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-com/LiWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/SuZDCWZSLX22, author = {Jinshu Su and Baokang Zhao and Yi Dai and Jijun Cao and Ziling Wei and Na Zhao and Congxi Song and Yujing Liu and Yusheng Xia}, title = {Technology trends in large-scale high-efficiency network computing}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {23}, number = {12}, pages = {1733--1746}, year = {2022}, url = {https://doi.org/10.1631/FITEE.2200217}, doi = {10.1631/FITEE.2200217}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jzusc/SuZDCWZSLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WeiZS22, author = {Ziling Wei and Baokang Zhao and Jinshu Su}, title = {Event-Driven Computation Offloading in IoT With Edge Computing}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {21}, number = {9}, pages = {6847--6860}, year = {2022}, url = {https://doi.org/10.1109/TWC.2022.3152573}, doi = {10.1109/TWC.2022.3152573}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WeiZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnet/HuangSLCW22, author = {Meizhen Huang and Jinshu Su and Zhong Liao and Shuhui Chen and Ziling Wei}, title = {Multi-Level Text Importance Classification Architecture Based on Deep Learning}, booktitle = {Proceedings of the 6th Asia-Pacific Workshop on Networking, APNet 2022, Fuzhou, China, July 1-2, 2022}, pages = {87--89}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3542637.3543702}, doi = {10.1145/3542637.3543702}, timestamp = {Thu, 09 Nov 2023 11:04:15 +0100}, biburl = {https://dblp.org/rec/conf/apnet/HuangSLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/LiSLZOZ22, author = {Mengjuan Li and Jinshu Su and Hongyun Liu and Zhiming Zhao and Xue Ouyang and Huan Zhou}, editor = {Javier Troya and Brahim Medjahed and Mario Piattini and Lina Yao and Pablo Fern{\'{a}}ndez and Antonio Ruiz{-}Cort{\'{e}}s}, title = {The Extreme Counts: Modeling the Performance Uncertainty of Cloud Resources with Extreme Value Theory}, booktitle = {Service-Oriented Computing - 20th International Conference, {ICSOC} 2022, Seville, Spain, November 29 - December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13740}, pages = {498--512}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20984-0\_35}, doi = {10.1007/978-3-031-20984-0\_35}, timestamp = {Fri, 25 Nov 2022 16:03:20 +0100}, biburl = {https://dblp.org/rec/conf/icsoc/LiSLZOZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/JiHLXLS22, author = {Xiaolan Ji and Biao Han and Ruidong Li and Cao Xu and Yahui Li and Jinshu Su}, title = {ACCeSS: Adaptive QoS-aware Congestion Control for Multipath {TCP}}, booktitle = {30th {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2022, Oslo, Norway, June 10-12, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IWQoS54832.2022.9812886}, doi = {10.1109/IWQOS54832.2022.9812886}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/JiHLXLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiaCSZ21, author = {Yusheng Xia and Rongmao Chen and Jinshu Su and Hongcheng Zou}, title = {Balancing anonymity and resilience in anonymous communication networks}, journal = {Comput. Secur.}, volume = {101}, pages = {102106}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102106}, doi = {10.1016/J.COSE.2020.102106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiaCSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ZhouOSLZ21, author = {Huan Zhou and Xue Ouyang and Jinshu Su and Cees de Laat and Zhiming Zhao}, title = {Enforcing trustworthy cloud {SLA} with witnesses: {A} game theory-based model using smart contracts}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {14}, year = {2021}, url = {https://doi.org/10.1002/cpe.5511}, doi = {10.1002/CPE.5511}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/ZhouOSLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/ZhangYSWLS21, author = {Shiwen Zhang and Tingting Yao and Voundi Koe Arthur Sandor and Tien{-}Hsiung Weng and Wei Liang and Jinshu Su}, title = {A novel blockchain-based privacy-preserving framework for online social networks}, journal = {Connect. Sci.}, volume = {33}, number = {3}, pages = {555--575}, year = {2021}, url = {https://doi.org/10.1080/09540091.2020.1854181}, doi = {10.1080/09540091.2020.1854181}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/ZhangYSWLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiSWX21, author = {Pengkun Li and Jinshu Su and Xiaofeng Wang and Qianqian Xing}, title = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet Accountability}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {1974493:1--1974493:17}, year = {2021}, url = {https://doi.org/10.1155/2021/1974493}, doi = {10.1155/2021/1974493}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiSWX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XiaSCH21, author = {Yusheng Xia and Jinshu Su and Rongmao Chen and Xinyi Huang}, title = {{APGS:} An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1245--1260}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3032294}, doi = {10.1109/TIFS.2020.3032294}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XiaSCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LiuZXSO21, author = {Jiahao Liu and Baokang Zhao and Qin Xin and Jinshu Su and Wei Ou}, title = {{DRL-ER:} An Intelligent Energy-Aware Routing Protocol With Guaranteed Delay Bounds in Satellite Mega-Constellations}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {4}, pages = {2872--2884}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3039499}, doi = {10.1109/TNSE.2020.3039499}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/LiuZXSO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhaoLW0S21, author = {Baokang Zhao and Murao Lin and Ziling Wei and Qin Xin and Jinshu Su}, editor = {Yongxuan Lai and Tian Wang and Min Jiang and Guangquan Xu and Wei Liang and Aniello Castiglione}, title = {A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained Classification}, booktitle = {Algorithms and Architectures for Parallel Processing - 21st International Conference, {ICA3PP} 2021, Virtual Event, December 3-5, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13155}, pages = {385--401}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95384-3\_25}, doi = {10.1007/978-3-030-95384-3\_25}, timestamp = {Thu, 03 Mar 2022 10:25:35 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhaoLW0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HouC0SX21, author = {Bingnan Hou and Zhiping Cai and Kui Wu and Jinshu Su and Yinqiao Xiong}, title = {6Hit: {A} Reinforcement Learning-based Approach to Target Generation for Internet-wide IPv6 Scanning}, booktitle = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOM42981.2021.9488794}, doi = {10.1109/INFOCOM42981.2021.9488794}, timestamp = {Mon, 02 Aug 2021 15:15:40 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HouC0SX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/CaiHLZS21, author = {Yang Cai and Biao Han and Jie Li and Na Zhao and Jinshu Su}, title = {ModelCoder: {A} Fault Model based Automatic Root Cause Localization Framework for Microservice Systems}, booktitle = {29th {IEEE/ACM} International Symposium on Quality of Service, {IWQOS} 2021, Tokyo, Japan, June 25-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IWQOS52092.2021.9521318}, doi = {10.1109/IWQOS52092.2021.9521318}, timestamp = {Sat, 15 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/CaiHLZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ZhaoHCS21, author = {Na Zhao and Biao Han and Yang Cai and Jinshu Su}, title = {SeqAD: An Unsupervised and Sequential Autoencoder Ensembles based Anomaly Detection Framework for {KPI}}, booktitle = {29th {IEEE/ACM} International Symposium on Quality of Service, {IWQOS} 2021, Tokyo, Japan, June 25-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IWQOS52092.2021.9521258}, doi = {10.1109/IWQOS52092.2021.9521258}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/ZhaoHCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/CaiHSW21, author = {Yang Cai and Biao Han and Jinshu Su and Xiaoyan Wang}, title = {TraceModel: An Automatic Anomaly Detection and Root Cause Localization Framework for Microservice Systems}, booktitle = {17th International Conference on Mobility, Sensing and Networking, {MSN} 2021, Exeter, United Kingdom, December 13-15, 2021}, pages = {512--519}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MSN53354.2021.00081}, doi = {10.1109/MSN53354.2021.00081}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/CaiHSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LiuWZSX21, author = {Jiahao Liu and Ziling Wei and Baokang Zhao and Jinshu Su and Qin Xin}, editor = {Zhe Liu and Fan Wu and Sajal K. Das}, title = {A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite Constellations}, booktitle = {Wireless Algorithms, Systems, and Applications - 16th International Conference, {WASA} 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12939}, pages = {254--261}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86137-7\_28}, doi = {10.1007/978-3-030-86137-7\_28}, timestamp = {Wed, 15 Sep 2021 18:38:41 +0200}, biburl = {https://dblp.org/rec/conf/wasa/LiuWZSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangCS20b, author = {Xin Wang and Shuhui Chen and Jinshu Su}, title = {Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {182065--182077}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3029190}, doi = {10.1109/ACCESS.2020.3029190}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangCS20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/PengZCSHL20, author = {Ye Peng and Wentao Zhao and Wei Cai and Jinshu Su and Biao Han and Qiang Liu}, title = {Evaluating Deep Learning for Image Classification in Adversarial Environment}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {4}, pages = {825--837}, year = {2020}, url = {https://doi.org/10.1587/transinf.2019EDP7188}, doi = {10.1587/TRANSINF.2019EDP7188}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicetd/PengZCSHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/LvWSCW20, author = {Jiaxian Lv and Yi Wang and Jinshu Su and Rongmao Chen and Wenjun Wu}, title = {Security of Auditing Protocols Against Subversion Attacks}, journal = {Int. J. Found. Comput. Sci.}, volume = {31}, number = {2}, pages = {193--206}, year = {2020}, url = {https://doi.org/10.1142/S0129054120500033}, doi = {10.1142/S0129054120500033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/LvWSCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiCSHW20, author = {Jie Li and Rongmao Chen and Jinshu Su and Xinyi Huang and Xiaofeng Wang}, title = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {2}, pages = {1216--1229}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2953715}, doi = {10.1109/JIOT.2019.2953715}, timestamp = {Thu, 24 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiCSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiSW20, author = {Pengkun Li and Jinshu Su and Xiaofeng Wang}, title = {iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {8}, pages = {6828--6841}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2988126}, doi = {10.1109/JIOT.2020.2988126}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LiuSZWCL20, author = {Lin Liu and Jinshu Su and Baokang Zhao and Qiong Wang and Jinrong Chen and Yuchuan Luo}, title = {Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things}, journal = {Symmetry}, volume = {12}, number = {1}, pages = {103}, year = {2020}, url = {https://doi.org/10.3390/sym12010103}, doi = {10.3390/SYM12010103}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/LiuSZWCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuCLSQ20, author = {Lin Liu and Rongmao Chen and Ximeng Liu and Jinshu Su and Linbo Qiao}, title = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2914--2929}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980192}, doi = {10.1109/TIFS.2020.2980192}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WeiSZL20, author = {Ziling Wei and Jinshu Su and Baokang Zhao and Xicheng Lu}, title = {Distributed Opportunistic Scheduling in Cooperative Networks With {RF} Energy Harvesting}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {5}, pages = {2257--2270}, year = {2020}, url = {https://doi.org/10.1109/TNET.2020.3011839}, doi = {10.1109/TNET.2020.3011839}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/WeiSZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/WangCS20, author = {Xin Wang and Shuhui Chen and Jinshu Su}, title = {Real Network Traffic Collection and Deep Learning for Mobile App Identification}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {4707909:1--4707909:14}, year = {2020}, url = {https://doi.org/10.1155/2020/4707909}, doi = {10.1155/2020/4707909}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/WangCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aca/WangWKQLS20, author = {Shiying Wang and Lei Wang and Ziyang Kang and Lianhua Qu and Shiming Li and Jinshu Su}, editor = {Dezun Dong and Xiaoli Gong and Cunlu Li and Dongsheng Li and Junjie Wu}, title = {A Software-Hardware Co-exploration Framework for Optimizing Communication in Neuromorphic Processor}, booktitle = {Advanced Computer Architecture - 13th Conference, {ACA} 2020, Kunming, China, August 13-15, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1256}, pages = {87--100}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-8135-9\_7}, doi = {10.1007/978-981-15-8135-9\_7}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aca/WangWKQLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XiaCSPS20, author = {Yusheng Xia and Rongmao Chen and Jinshu Su and Chen Pan and Han Su}, title = {Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149166}, doi = {10.1109/ICC40277.2020.9149166}, timestamp = {Tue, 04 Aug 2020 10:37:23 +0200}, biburl = {https://dblp.org/rec/conf/icc/XiaCSPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangCS20, author = {Xin Wang and Shuhui Chen and Jinshu Su}, title = {App-Net: {A} Hybrid Neural Network for Encrypted Mobile Traffic Classification}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {424--429}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162891}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9162891}, timestamp = {Tue, 18 Aug 2020 11:30:21 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccfton/SuWL19, author = {Jinshu Su and Wen Wang and Cong Liu}, title = {A survey of control consistency in Software-Defined Networking}, journal = {{CCF} Trans. Netw.}, volume = {2}, number = {3-4}, pages = {137--152}, year = {2019}, url = {https://doi.org/10.1007/s42045-019-00022-w}, doi = {10.1007/S42045-019-00022-W}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccfton/SuWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiSCWC19, author = {Jie Li and Jinshu Su and Rongmao Chen and Xiaofeng Wang and Shuhui Chen}, title = {Practical privacy-preserving deep packet inspection outsourcing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.4435}, doi = {10.1002/CPE.4435}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiSCWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WeiZSL19, author = {Ziling Wei and Baokang Zhao and Jinshu Su and Xicheng Lu}, title = {Dynamic Edge Computation Offloading for Internet of Things With Energy Harvesting: {A} Learning Method}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4436--4447}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2882783}, doi = {10.1109/JIOT.2018.2882783}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WeiZSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuSLCHDW19, author = {Lin Liu and Jinshu Su and Ximeng Liu and Rongmao Chen and Kai Huang and Robert H. Deng and Xiaofeng Wang}, title = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on Outsourced Cloud Data}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {6}, pages = {9841--9852}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2932444}, doi = {10.1109/JIOT.2019.2932444}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoCSCS19, author = {Shuang Zhao and Shuhui Chen and Yipin Sun and Zhiping Cai and Jinshu Su}, title = {Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9595081:1--9595081:11}, year = {2019}, url = {https://doi.org/10.1155/2019/9595081}, doi = {10.1155/2019/9595081}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoCSCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/ZhouHOSKLZ19, author = {Huan Zhou and Yang Hu and Xue Ouyang and Jinshu Su and Spiros Koulouzis and Cees de Laat and Zhiming Zhao}, title = {CloudsStorm: {A} framework for seamlessly programming and controlling virtual infrastructure functions during the DevOps lifecycle of cloud applications}, journal = {Softw. Pract. Exp.}, volume = {49}, number = {10}, pages = {1421--1447}, year = {2019}, url = {https://doi.org/10.1002/spe.2741}, doi = {10.1002/SPE.2741}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/ZhouHOSKLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/DaiLXS19, author = {Yi Dai and Kai Lu and Liquan Xiao and Jinshu Su}, title = {A Cost-Efficient Router Architecture for {HPC} Inter-Connection Networks: Design and Implementation}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {30}, number = {4}, pages = {738--753}, year = {2019}, url = {https://doi.org/10.1109/TPDS.2018.2873337}, doi = {10.1109/TPDS.2018.2873337}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/DaiLXS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/LuZWSLT19, author = {Shaofei Lu and Qian Zeng and Heng Wu and Jinshu Su and Xuchong Liu and Hongliang Tang}, editor = {Zheng Xiao and Laurence T. Yang and Pavan Balaji and Tao Li and Keqin Li and Albert Y. Zomaya}, title = {A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function}, booktitle = {21st {IEEE} International Conference on High Performance Computing and Communications; 17th {IEEE} International Conference on Smart City; 5th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019}, pages = {2305--2310}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00320}, doi = {10.1109/HPCC/SMARTCITY/DSS.2019.00320}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/LuZWSLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WeiZS19, author = {Ziling Wei and Baokang Zhao and Jinshu Su}, title = {Cooperative Sensing in Cognitive Radio Ad Hoc Networks}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761461}, doi = {10.1109/ICC.2019.8761461}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WeiZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/SuHLLS19, author = {Jinshu Su and Biao Han and Gaofeng Lv and Tao Li and Zhigang Sun}, title = {A Heterogeneous Parallel Packet Processing Architecture for {NFV} Acceleration}, booktitle = {27th {IEEE} International Conference on Network Protocols, {ICNP} 2019, Chicago, IL, USA, October 8-10, 2019}, pages = {1--2}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICNP.2019.8888106}, doi = {10.1109/ICNP.2019.8888106}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/SuHLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhouORSLZ19, author = {Huan Zhou and Xue Ouyang and Zhijie Ren and Jinshu Su and Cees de Laat and Zhiming Zhao}, title = {A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {1567--1575}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737580}, doi = {10.1109/INFOCOM.2019.8737580}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ZhouORSLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/LiuSCCSL19, author = {Lin Liu and Jinshu Su and Rongmao Chen and Jinrong Chen and Guangliang Sun and Jie Li}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {361--377}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_26}, doi = {10.1007/978-3-030-30619-9\_26}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/LiuSCCSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiSW19, author = {Pengkun Li and Jinshu Su and Xiaofeng Wang}, title = {iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos, {SIGCOMM} 2019, Beijing, China, August 19-23, 2019}, pages = {166--168}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3342280.3342347}, doi = {10.1145/3342280.3342347}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/LiSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanYSHS18, author = {Biao Han and Xiangrui Yang and Zhigang Sun and Jinfeng Huang and Jinshu Su}, title = {OverWatch: {A} Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in {SDN}}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9649643:1--9649643:15}, year = {2018}, url = {https://doi.org/10.1155/2018/9649643}, doi = {10.1155/2018/9649643}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanYSHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/WangS18a, author = {Binfeng Wang and Jinshu Su}, title = {FlexMonitor: {A} Flexible Monitoring Framework in {SDN}}, journal = {Symmetry}, volume = {10}, number = {12}, pages = {713}, year = {2018}, url = {https://doi.org/10.3390/sym10120713}, doi = {10.3390/SYM10120713}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/WangS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhangLSZSL18, author = {Yiming Zhang and Dongsheng Li and Zhigang Sun and Feng Zhao and Jinshu Su and Xicheng Lu}, title = {{CSR:} Classified Source Routing in Distributed Networks}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {2}, pages = {464--477}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2440242}, doi = {10.1109/TCC.2015.2440242}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhangLSZSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ZhouHSCLZ18, author = {Huan Zhou and Yang Hu and Jinshu Su and Mingmin Chi and Cees de Laat and Zhiming Zhao}, title = {Empowering Dynamic Task-Based Applications with Agile Virtual Infrastructure Programmability}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {484--491}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00068}, doi = {10.1109/CLOUD.2018.00068}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ZhouHSCLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18, author = {Lin Liu and Jinshu Su and Rongmao Chen and Ximeng Liu and Xiaofeng Wang and Shuhui Chen and Ho{-}fung Leung}, editor = {Willy Susilo and Guomin Yang}, title = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {431--451}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_25}, doi = {10.1007/978-3-319-93638-3\_25}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud2/ZhouHSLZ18, author = {Huan Zhou and Yang Hu and Jinshu Su and Cees de Laat and Zhiming Zhao}, editor = {Min Luo and Liang{-}Jie Zhang}, title = {CloudsStorm: An Application-Driven Framework to Enhance the Programmability and Controllability of Cloud Virtual Infrastructures}, booktitle = {Cloud Computing - {CLOUD} 2018 - 11th International Conference, Held as Part of the Services Conference Federation, {SCF} 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10967}, pages = {265--280}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94295-7\_18}, doi = {10.1007/978-3-319-94295-7\_18}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloud2/ZhouHSLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenSQZX18, author = {Hongyi Chen and Jinshu Su and Linbo Qiao and Yi Zhang and Qin Xin}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Malware Collusion Attack Against Machine Learning Based Methods: Issues and Countermeasures}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {11067}, pages = {465--477}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00018-9\_41}, doi = {10.1007/978-3-030-00018-9\_41}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenSQZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/XuSC18, author = {Chengcheng Xu and Jinshu Su and Shuhui Chen}, title = {Exploring Efficient {NFA} Data Structures to Accelerate {DFA} Generation}, booktitle = {Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018}, pages = {56--61}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3199478.3199509}, doi = {10.1145/3199478.3199509}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/XuSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/XiaSCLC18, author = {Yusheng Xia and Jinshu Su and Rongmao Chen and Yaping Liu and Shuhui Chen}, title = {A Real-Time Aware Routing Strategy in Smart City Environments}, booktitle = {2018 {IEEE} International Conference on Sensing, Communication and Networking, {SECON} Workshops 2018, Hong Kong, Hong Kong, June 11, 2018}, pages = {9--14}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SECONW.2018.8396343}, doi = {10.1109/SECONW.2018.8396343}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secon/XiaSCLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/WangHSW18, author = {Hanwen Wang and Biao Han and Jinshu Su and Xiaoyan Wang}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {A High-Performance Intrusion Detection Method Based on Combining Supervised and Unsupervised Learning}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {1803--1810}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00304}, doi = {10.1109/SMARTWORLD.2018.00304}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/WangHSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/HeZSZ17, author = {Qian He and Ning Zhang and Jinshu Su and Xiaosong Zhang}, title = {Fast backup and recovery for web protectiuon using trigger and block hash approach}, journal = {Comput. Syst. Sci. Eng.}, volume = {32}, number = {2}, year = {2017}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/HeZSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/QiaoZSL17, author = {Lin{-}Bo Qiao and Bo{-}Feng Zhang and Jinshu Su and Xicheng Lu}, title = {A systematic review of structured sparse learning}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {18}, number = {4}, pages = {445--463}, year = {2017}, url = {https://doi.org/10.1631/FITEE.1601489}, doi = {10.1631/FITEE.1601489}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/QiaoZSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/ChengSX17, author = {Mian Cheng and Jinshu Su and Jing Xu}, title = {Real-time pre-processing system with hardware accelerator for mobile core networks}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {18}, number = {11}, pages = {1720--1731}, year = {2017}, url = {https://doi.org/10.1631/FITEE.1700507}, doi = {10.1631/FITEE.1700507}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/ChengSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LaiLWS17, author = {Zhiquan Lai and King Tin Lam and Cho{-}Li Wang and Jinshu Su}, title = {PoweRock: Power Modeling and Flexible Dynamic Power Management for Many-Core Architectures}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {600--612}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2499307}, doi = {10.1109/JSYST.2015.2499307}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LaiLWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/SunWBS17, author = {Hao Sun and Xiaofeng Wang and Rajkumar Buyya and Jinshu Su}, title = {CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices}, journal = {Softw. Pract. Exp.}, volume = {47}, number = {3}, pages = {421--441}, year = {2017}, url = {https://doi.org/10.1002/spe.2420}, doi = {10.1002/SPE.2420}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/SunWBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunSWCLH17, author = {Hao Sun and Jinshu Su and Xiaofeng Wang and Rongmao Chen and Yujing Liu and Qiaolin Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {PriMal: Cloud-Based Privacy-Preserving Malware Detection}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {153--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_9}, doi = {10.1007/978-3-319-59870-3\_9}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/WangSCDZ17, author = {Binfeng Wang and Jinshu Su and Lin Chen and Jinsheng Deng and Long Zheng}, title = {EffiEye: Application-aware Large Flow Detection in Data Center}, booktitle = {Proceedings of the 17th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, {CCGRID} 2017, Madrid, Spain, May 14-17, 2017}, pages = {794--796}, publisher = {{IEEE} Computer Society / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/CCGRID.2017.90}, doi = {10.1109/CCGRID.2017.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/WangSCDZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/LiSWSC17, author = {Jie Li and Jinshu Su and Xiaofeng Wang and Hao Sun and Shuhui Chen}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {119--134}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_9}, doi = {10.1007/978-3-319-69471-9\_9}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/LiSWSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/WangSLH17, author = {Binfeng Wang and Jinshu Su and Junnan Li and Biao Han}, title = {EffiView: Trigger-Based Monitoring Approach with Low Cost in {SDN}}, booktitle = {19th {IEEE} International Conference on High Performance Computing and Communications; 15th {IEEE} International Conference on Smart City; 3rd {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2017, Bangkok, Thailand, December 18-20, 2017}, pages = {309--315}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.41}, doi = {10.1109/HPCC-SMARTCITY-DSS.2017.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/WangSLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChenLHS17, author = {Hongyi Chen and Ho{-}fung Leung and Biao Han and Jinshu Su}, title = {Automatic privacy leakage detection for massive android apps via a novel hybrid approach}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996335}, doi = {10.1109/ICC.2017.7996335}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/ChenLHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangHS17, author = {Wen Wang and Wenbo He and Jinshu Su}, title = {Enhancing the effectiveness of traffic engineering in hybrid {SDN}}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7996839}, doi = {10.1109/ICC.2017.7996839}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangHS17, author = {Wen Wang and Wenbo He and Jinshu Su}, editor = {Kisung Lee and Ling Liu}, title = {Boosting The Benefits of Hybrid {SDN}}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2165--2170}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.302}, doi = {10.1109/ICDCS.2017.302}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sc2/XuSCH17, author = {Chengcheng Xu and Jinshu Su and Shuhui Chen and Biao Han}, title = {Offset-FA: Detach the Closures and Countings for Efficient Regular Expression Matching}, booktitle = {2017 {IEEE} 7th International Symposium on Cloud and Service Computing, SC{\({^2}\)} 2017, Kanazawa, Japan, November 22-25, 2017}, pages = {263--266}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SC2.2017.50}, doi = {10.1109/SC2.2017.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sc2/XuSCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ChenSYS16, author = {Hongyi Chen and Zhigang Sun and Fei Yi and Jinshu Su}, title = {BufferBank storage: an economic, scalable and universally usable in-network storage model for streaming data applications}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {1}, pages = {1--15}, year = {2016}, url = {https://doi.org/10.1007/s11432-015-5299-5}, doi = {10.1007/S11432-015-5299-5}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ChenSYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/XuCSYH16, author = {Chengcheng Xu and Shuhui Chen and Jinshu Su and Siu{-}Ming Yiu and Lucas Chi Kwong Hui}, title = {A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {4}, pages = {2991--3029}, year = {2016}, url = {https://doi.org/10.1109/COMST.2016.2566669}, doi = {10.1109/COMST.2016.2566669}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/XuCSYH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WuLLSC16, author = {Yilun Wu and Xinye Lin and Xicheng Lu and Jinshu Su and Peixin Chen}, title = {A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {10}, pages = {2638--2642}, year = {2016}, url = {https://doi.org/10.1587/transinf.2016EDL8079}, doi = {10.1587/TRANSINF.2016EDL8079}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WuLLSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChenWSW16, author = {Peixin Chen and Yilun Wu and Jinshu Su and Xiaofeng Wang}, title = {Comparing Performance of Hierarchical Identity-Based Signature Schemes}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {12}, pages = {3181--3184}, year = {2016}, url = {https://doi.org/10.1587/transinf.2016EDL8136}, doi = {10.1587/TRANSINF.2016EDL8136}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ChenWSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiuPSW16, author = {Yujing Liu and Wei Peng and Jinshu Su and Zhilin Wang}, title = {Assessing Resilience of Inter-Domain Routing System under Regional Failures}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {4}, pages = {1630--1642}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.04.009}, doi = {10.3837/TIIS.2016.04.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiuPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/HeZCSY16, author = {Qian He and Baokang Zhao and Liang Chang and Jinshu Su and Ilsun You}, title = {{PSSRC:} {A} Web Service Registration Cloud Based on Structured {P2P} and Semantics}, journal = {Int. J. Data Warehous. Min.}, volume = {12}, number = {2}, pages = {21--38}, year = {2016}, url = {https://doi.org/10.4018/IJDWM.2016040102}, doi = {10.4018/IJDWM.2016040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdwm/HeZCSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/WuLSC16, author = {Yilun Wu and Xicheng Lu and Jinshu Su and Peixin Chen}, title = {An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System}, journal = {J. Medical Syst.}, volume = {40}, number = {12}, pages = {258:1--258:9}, year = {2016}, url = {https://doi.org/10.1007/s10916-016-0609-z}, doi = {10.1007/S10916-016-0609-Z}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/WuLSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenSZWY16, author = {Peixin Chen and Jinshu Su and Baokang Zhao and Xiaofeng Wang and Ilsun You}, title = {An escrow-free online/offline {HIBS} scheme for privacy protection of people-centric sensing}, journal = {Secur. Commun. Networks}, volume = {9}, number = {14}, pages = {2302--2312}, year = {2016}, url = {https://doi.org/10.1002/sec.1492}, doi = {10.1002/SEC.1492}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenSZWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/LiPYS16, author = {Yuan Li and Michal Pi{\'{o}}ro and Di Yuan and Jinshu Su}, title = {Optimizing link rate assignment and transmission scheduling in {WMN} through compatible set generation}, journal = {Telecommun. Syst.}, volume = {61}, number = {2}, pages = {325--335}, year = {2016}, url = {https://doi.org/10.1007/s11235-015-0004-y}, doi = {10.1007/S11235-015-0004-Y}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/LiPYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/ZhaoLWYSYP16, author = {Baokang Zhao and Bo Liu and Chunqing Wu and Wanrong Yu and Jinshu Su and Ilsun You and Francesco Palmieri}, title = {A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {63}, number = {8}, pages = {5101--5108}, year = {2016}, url = {https://doi.org/10.1109/TIE.2016.2552152}, doi = {10.1109/TIE.2016.2552152}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tie/ZhaoLWYSYP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ZhouWHS0LZ16, author = {Huan Zhou and Junchao Wang and Yang Hu and Jinshu Su and Paul Martin and Cees T. A. M. de Laat and Zhiming Zhao}, title = {Fast Resource Co-provisioning for Time Critical Applications Based on Networked Infrastructures}, booktitle = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {802--805}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CLOUD.2016.0111}, doi = {10.1109/CLOUD.2016.0111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ZhouWHS0LZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acml/QiaoZSL16, author = {Linbo Qiao and Bofeng Zhang and Jinshu Su and Xicheng Lu}, editor = {Robert J. Durrant and Kee{-}Eung Kim}, title = {Linearized Alternating Direction Method of Multipliers for Constrained Nonconvex Regularized Optimization}, booktitle = {Proceedings of The 8th Asian Conference on Machine Learning, {ACML} 2016, Hamilton, New Zealand, November 16-18, 2016}, series = {{JMLR} Workshop and Conference Proceedings}, volume = {63}, pages = {97--109}, publisher = {JMLR.org}, year = {2016}, url = {http://proceedings.mlr.press/v63/qiao37.html}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acml/QiaoZSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/ChengSZS16, author = {Mian Cheng and Yipin Sun and Baokang Zhao and Jinshu Su}, editor = {Guojun Wang and Yanbo Han and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {An Event Grouping Approach for Infinite Stream with Differential Privacy}, booktitle = {Advances in Services Computing - 10th Asia-Pacific Services Computing Conference, {APSCC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10065}, pages = {106--116}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49178-3\_8}, doi = {10.1007/978-3-319-49178-3\_8}, timestamp = {Mon, 23 Jan 2023 10:33:27 +0100}, biburl = {https://dblp.org/rec/conf/apscc/ChengSZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/QiaoZZS16, author = {Linbo Qiao and Bofeng Zhang and Lei Zhuang and Jinshu Su}, title = {An Efficient Algorithm for Tensor Principal Component Analysis via Proximal Linearized Alternating Direction Method of Multipliers}, booktitle = {International Conference on Advanced Cloud and Big Data, {CBD} 2016, Chengdu, China, August 13-16, 2016}, pages = {283--288}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CBD.2016.056}, doi = {10.1109/CBD.2016.056}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cbd/QiaoZZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/WangHS16, author = {Wen Wang and Wenbo He and Jinshu Su}, title = {Redactor: Reconcile network control with declarative control programs In {SDN}}, booktitle = {24th {IEEE} International Conference on Network Protocols, {ICNP} 2016, Singapore, November 8-11, 2016}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICNP.2016.7784433}, doi = {10.1109/ICNP.2016.7784433}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/WangHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/LiCS16, author = {Jie Li and Shuhui Chen and Jinshu Su}, title = {Implementation of {TCP} large receive offload on multi-core {NPU} platform}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21, 2016}, pages = {258--263}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICTC.2016.7763481}, doi = {10.1109/ICTC.2016.7763481}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictc/LiCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/XiaLS16, author = {Yusheng Xia and Yaping Liu and Jinshu Su}, title = {Tendency-based caching in Content-Centric Networking}, booktitle = {Eighth International Conference on Ubiquitous and Future Networks, {ICUFN} 2016, Vienna, Austria, July 5-8, 2016}, pages = {960--965}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICUFN.2016.7536940}, doi = {10.1109/ICUFN.2016.7536940}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icufn/XiaLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangHSC16, author = {Wen Wang and Wenbo He and Jinshu Su and Yixin Chen}, title = {Cupid: Congestion-free consistent data plane update in software defined networks}, booktitle = {35th Annual {IEEE} International Conference on Computer Communications, {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFOCOM.2016.7524420}, doi = {10.1109/INFOCOM.2016.7524420}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/WangHSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/XuZCS16, author = {Chengcheng Xu and Baokang Zhao and Shuhui Chen and Jinshu Su}, editor = {Ilsun You and Fang{-}Yie Leu and Hsing{-}Chung Chen and Igor V. Kotenko}, title = {A Novel Hybrid Architecture for High Speed Regular Expression Matching}, booktitle = {Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {797}, pages = {164--174}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-7850-7\_15}, doi = {10.1007/978-981-10-7850-7\_15}, timestamp = {Wed, 17 Jan 2018 14:38:18 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/XuZCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/QiaoZSS16, author = {Linbo Qiao and Bofeng Zhang and Yipin Sun and Jinshu Su}, editor = {Huiping Cao and Jinyan Li and Ruili Wang}, title = {Rigidly Self-Expressive Sparse Subspace Clustering}, booktitle = {Trends and Applications in Knowledge Discovery and Data Mining - {PAKDD} 2016 Workshops, BDM, MLSDA, PACC, {WDMBF} Auckland, New Zealand, April 19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9794}, pages = {101--114}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42996-0\_9}, doi = {10.1007/978-3-319-42996-0\_9}, timestamp = {Wed, 07 Apr 2021 15:15:53 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/QiaoZSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WangLSH16, author = {Wen Wang and Cong Liu and Jinshu Su and Wenbo He}, editor = {Marinho P. Barcellos and Jon Crowcroft and Amin Vahdat and Sachin Katti}, title = {Achieving Consistent {SDN} Control With Declarative Applications}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis, Brazil, August 22-26, 2016}, pages = {585--586}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2934872.2959060}, doi = {10.1145/2934872.2959060}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WangLSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SuCHXW16, author = {Jinshu Su and Shuhui Chen and Biao Han and Chengcheng Xu and Xin Wang}, editor = {Marinho P. Barcellos and Jon Crowcroft and Amin Vahdat and Sachin Katti}, title = {A 60Gbps {DPI} Prototype based on Memory-Centric {FPGA}}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis, Brazil, August 22-26, 2016}, pages = {627--628}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2934872.2959079}, doi = {10.1145/2934872.2959079}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/SuCHXW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/ChengZS16, author = {Mian Cheng and Baokang Zhao and Jinshu Su}, editor = {Guojun Wang and Indrakshi Ray and Jose M. Alcaraz Calero and Sabu M. Thampi}, title = {A Real-Time Processing System for Anonymization of Mobile Core Network Traffic}, booktitle = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10067}, pages = {229--237}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49145-5\_23}, doi = {10.1007/978-3-319-49145-5\_23}, timestamp = {Mon, 05 Feb 2024 20:29:50 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/ChengZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/GuoCYSL15, author = {Wenzhong Guo and Guolong Chen and Chaolong Yu and Jinshu Su and Zhanghui Liu}, title = {A Two-stage Clustering Sleep Scheduling Algorithm with Particle Swarm Optimization in Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {27}, number = {1-2}, pages = {27--49}, year = {2015}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-27-number-1-2-2015/ahswn-27-1-2-p-27-49/}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ahswn/GuoCYSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/CaoS15, author = {Jijun Cao and Jinshu Su}, title = {Improving application layer multicast forwarding performance by offloading multisend operations}, journal = {Comput. Syst. Sci. Eng.}, volume = {30}, number = {3}, year = {2015}, timestamp = {Mon, 27 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/CaoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/WangSWWL15, author = {Xiaofeng Wang and Jinshu Su and Baosheng Wang and Guojun Wang and Ho{-}fung Leung}, title = {Trust Description and Propagation System: Semantics and axiomatization}, journal = {Knowl. Based Syst.}, volume = {90}, pages = {81--91}, year = {2015}, url = {https://doi.org/10.1016/j.knosys.2015.09.030}, doi = {10.1016/J.KNOSYS.2015.09.030}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/WangSWWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SunZZSS15, author = {Yipin Sun and Bofeng Zhang and Baokang Zhao and Xiangyu Su and Jinshu Su}, title = {Mix-zones optimal deployment for protecting location privacy in {VANET}}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {6}, pages = {1108--1121}, year = {2015}, url = {https://doi.org/10.1007/s12083-014-0269-z}, doi = {10.1007/S12083-014-0269-Z}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SunZZSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SuWSR15, author = {Jinshu Su and Xiaofeng Wang and Weisong Shi and Indrakshi Ray}, title = {Security, trust, and resilience of distributed networks and systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1829--1830}, year = {2015}, url = {https://doi.org/10.1002/sec.1276}, doi = {10.1002/SEC.1276}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SuWSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoSLS15, author = {Guangyao Zhao and Bing Sun and Chao Li and Jinshu Su}, title = {Truncated differential cryptanalysis of {PRINCE}}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2875--2887}, year = {2015}, url = {https://doi.org/10.1002/sec.1213}, doi = {10.1002/SEC.1213}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhaoSLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/LaiLWS15, author = {Zhiquan Lai and King Tin Lam and Cho{-}Li Wang and Jinshu Su}, title = {Latency-aware {DVFS} for efficient power state transitions on many-core architectures}, journal = {J. Supercomput.}, volume = {71}, number = {7}, pages = {2720--2747}, year = {2015}, url = {https://doi.org/10.1007/s11227-015-1415-y}, doi = {10.1007/S11227-015-1415-Y}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/LaiLWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/HanLSGZ15, author = {Biao Han and Jie Li and Jinshu Su and Minyi Guo and Baokang Zhao}, title = {Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {26}, number = {4}, pages = {1117--1128}, year = {2015}, url = {https://doi.org/10.1109/TPDS.2014.2316155}, doi = {10.1109/TPDS.2014.2316155}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/HanLSGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/WuSL15, author = {Yilun Wu and Jinshu Su and Baochun Li}, editor = {Calton Pu and Ajay Mohindra}, title = {Keyword Search over Shared Cloud Data without Secure Channel or Authority}, booktitle = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {580--587}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CLOUD.2015.83}, doi = {10.1109/CLOUD.2015.83}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/WuSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15, author = {Peixin Chen and Xiaofeng Wang and Baokang Zhao and Hao Sun and Jinshu Su and Ilsun You}, editor = {Leonard Barolli and Fatos Xhafa and Marek R. Ogiela and Lidia Ogiela}, title = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups}, booktitle = {10th International Conference on Broadband and Wireless Computing, Communication and Applications, {BWCCA} 2015, Krakow, Poland, November 4-6, 2015}, pages = {364--369}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BWCCA.2015.9}, doi = {10.1109/BWCCA.2015.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/ChenWZSSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenWWSZ15, author = {Peixin Chen and Xiaofeng Wang and Yilun Wu and Jinshu Su and Huan Zhou}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing {BGP} Protocol}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1632--1634}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810116}, doi = {10.1145/2810103.2810116}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenWWSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ChenWS15, author = {Peixin Chen and Xiaofeng Wang and Jinshu Su}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {46--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_5}, doi = {10.1007/978-3-319-27161-3\_5}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ChenWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/XuCWS15, author = {Chengcheng Xu and Shuhui Chen and Xiaofeng Wang and Jinshu Su}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {An Efficient Pre-filter to Accelerate Regular Expression Matching}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {111--119}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_10}, doi = {10.1007/978-3-319-27161-3\_10}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/XuCWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ChenWZSY15, author = {Peixin Chen and Xiaofeng Wang and Baokang Zhao and Jinshu Su and Ilsun You}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Removing Key Escrow from the {LW-HIBE} Scheme}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {593--605}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_54}, doi = {10.1007/978-3-319-27161-3\_54}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/ChenWZSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ChenWS15a, author = {Peixin Chen and Xiaofeng Wang and Jinshu Su}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {633--647}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_58}, doi = {10.1007/978-3-319-27161-3\_58}, timestamp = {Wed, 14 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/ChenWS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FeiZWYHS15, author = {Changjiang Fei and Baokang Zhao and Chunqing Wu and Wanrong Yu and Biao Han and Jinshu Su}, title = {Towards efficient radio resource scheduling in LTE-based satellite mobile communication system}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {167--172}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179379}, doi = {10.1109/INFCOMW.2015.7179379}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/FeiZWYHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/WangHS15, author = {Wen Wang and Wenbo He and Jinshu Su}, title = {Network intrusion detection and prevention middlebox management in {SDN}}, booktitle = {34th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2015, Nanjing, China, December 14-16, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PCCC.2015.7410312}, doi = {10.1109/PCCC.2015.7410312}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/WangHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/WangHS15, author = {Wen Wang and Wenbo He and Jinshu Su}, title = {{M2SDN:} Achieving multipath and multihoming in data centers with software defined networking}, booktitle = {23rd {IEEE} International Symposium on Quality of Service, IWQoS 2015, Portland, OR, USA, June 15-16, 2015}, pages = {11--20}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IWQoS.2015.7404697}, doi = {10.1109/IWQOS.2015.7404697}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/WangHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/ZhaoWLSY15, author = {Baokang Zhao and Ziling Wei and Bo Liu and Jinshu Su and Ilsun You}, title = {Providing adaptive quality of security in quantum networks}, booktitle = {11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, {QSHINE} 2015, Taipei, Taiwan, August 19-20, 2015}, pages = {440--445}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/document/7332609/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qshine/ZhaoWLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SunWSC15, author = {Hao Sun and Xiaofeng Wang and Jinshu Su and Peixin Chen}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {RScam: Cloud-Based Anti-Malware via Reversible Sketch}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {157--174}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_9}, doi = {10.1007/978-3-319-28865-9\_9}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/Chen0S15, author = {Peixin Chen and Xiaofeng Wang and Jinshu Su}, title = {{T-HIBE:} {A} Trustworthy {HIBE} Scheme for the {OSN} Privacy Protection}, booktitle = {International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015}, pages = {72--79}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SocialSec2015.11}, doi = {10.1109/SOCIALSEC2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/Chen0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/ZhangLWSZS15, author = {Yiming Zhang and Dongsheng Li and Yijie Wang and Zhigang Sun and Feng Zhao and Jinshu Su}, title = {Design, Implementation and Evaluation of an Application-Layer Virtualized Network}, booktitle = {2015 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2015, San Francisco Bay, CA, USA, March 30 - April 3, 2015}, pages = {235--240}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SOSE.2015.41}, doi = {10.1109/SOSE.2015.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/ZhangLWSZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/SunCHZS15, author = {Yipin Sun and Shuhui Chen and Biao Han and Bofeng Zhang and Jinshu Su}, editor = {Kuai Xu and Haojin Zhu}, title = {A Novel Location Privacy Mining Threat in Vehicular Internet Access Service}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {467--476}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_46}, doi = {10.1007/978-3-319-21837-3\_46}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/SunCHZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejco/LiPYS14, author = {Yuan Li and Michal Pi{\'{o}}ro and Di Yuan and Jinshu Su}, title = {Optimizing compatible sets in wireless networks through integer programming}, journal = {{EURO} J. Comput. Optim.}, volume = {2}, number = {1-2}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.1007/s13675-013-0015-y}, doi = {10.1007/S13675-013-0015-Y}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejco/LiPYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SuCZWY14, author = {Jinshu Su and Dan Cao and Baokang Zhao and Xiaofeng Wang and Ilsun You}, title = {ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things}, journal = {Future Gener. Comput. Syst.}, volume = {33}, pages = {11--18}, year = {2014}, url = {https://doi.org/10.1016/j.future.2013.10.016}, doi = {10.1016/J.FUTURE.2013.10.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/SuCZWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/WeiZLSXX14, author = {Ziling Wei and Baokang Zhao and Bo Liu and Jinshu Su and Liyang Xu and Erci Xu}, title = {A novel steganography approach for voice over {IP}}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {5}, number = {4}, pages = {601--610}, year = {2014}, url = {https://doi.org/10.1007/s12652-013-0212-9}, doi = {10.1007/S12652-013-0212-9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/WeiZLSXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/MaWSWYZ14, author = {Yanpeng Ma and Xiaofeng Wang and Jinshu Su and Chunqing Wu and Wanrong Yu and Baokang Zhao}, title = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO} Satellite Constellation Networks}, journal = {J. Networks}, volume = {9}, number = {4}, pages = {896--907}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.4.896-907}, doi = {10.4304/JNW.9.4.896-907}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/MaWSWYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/LiuPSW14, author = {Yujing Liu and Wei Peng and Jinshu Su and Zhilin Wang}, title = {Assessing the Impact of Cascading Failures on the Interdomain Routing System of the Internet}, journal = {New Gener. Comput.}, volume = {32}, number = {3-4}, pages = {237--255}, year = {2014}, url = {https://doi.org/10.1007/s00354-014-0403-8}, doi = {10.1007/S00354-014-0403-8}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/LiuPSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuPS14, author = {Yujing Liu and Wei Peng and Jinshu Su}, title = {A study of {IP} prefix hijacking in cloud computing networks}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {2201--2210}, year = {2014}, url = {https://doi.org/10.1002/sec.738}, doi = {10.1002/SEC.738}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/PengDYS14, author = {Wei Peng and Guohua Dong and Kun Yang and Jinshu Su}, title = {A Random Road Network Model and Its Effects on Topological Characteristics of Mobile Delay-Tolerant Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {12}, pages = {2706--2718}, year = {2014}, url = {https://doi.org/10.1109/TMC.2013.66}, doi = {10.1109/TMC.2013.66}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/PengDYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LuZSX14, author = {Huabiao Lu and Baokang Zhao and Jinshu Su and Peidai Xie}, title = {Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing}, journal = {Wirel. Pers. Commun.}, volume = {75}, number = {3}, pages = {1591--1609}, year = {2014}, url = {https://doi.org/10.1007/s11277-013-1400-9}, doi = {10.1007/S11277-013-1400-9}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LuZSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZhaoCZYSY14, author = {Guohong Zhao and Shuhui Chen and Baokang Zhao and Ilsun You and Jinshu Su and Wanrong Yu}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {A High-Speed Network Content Filtering System}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {257--269}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_20}, doi = {10.1007/978-3-319-10975-6\_20}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ZhaoCZYSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HeZLSY14, author = {Qian He and Baokang Zhao and Yunjian Long and Jinshu Su and Ilsun You}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {A Structure {P2P} Based Web Services Registry with Access and Control}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {286--297}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_23}, doi = {10.1007/978-3-319-10975-6\_23}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HeZLSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangZSZY14, author = {Xiaofeng Wang and Huan Zhou and Jinshu Su and Bofeng Zhang and Fan Yang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol with Full Compliance to {TCP/IP}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1520--1522}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662371}, doi = {10.1145/2660267.2662371}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangZSZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/LaiZS14, author = {Zhiquan Lai and Baokang Zhao and Jinshu Su}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Efficient {DVFS} to Prevent Hard Faults for Many-Core Architectures}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {674--679}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_69}, doi = {10.1007/978-3-642-55032-4\_69}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/LaiZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/LaiLWS14, author = {Zhiquan Lai and King Tin Lam and Cho{-}Li Wang and Jinshu Su}, title = {A Power Modelling Approach for Many-Core Architectures}, booktitle = {2014 10th International Conference on Semantics, Knowledge and Grids, Beijing, China, August 27-29, 2014}, pages = {128--132}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SKG.2014.10}, doi = {10.1109/SKG.2014.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/LaiLWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WeiSZ14, author = {Ziling Wei and Jinshu Su and Baokang Zhao}, editor = {Zhipeng Cai and Chaokun Wang and Siyao Cheng and Hongzhi Wang and Hong Gao}, title = {{SPS:} {A} Novel Semantics-Aware Scheme for Location Privacy in People-Centric Sensing Network}, booktitle = {Wireless Algorithms, Systems, and Applications - 9th International Conference, {WASA} 2014, Harbin, China, June 23-25, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8491}, pages = {324--335}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07782-6\_30}, doi = {10.1007/978-3-319-07782-6\_30}, timestamp = {Fri, 09 Apr 2021 18:35:13 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WeiSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/LiLSS13, author = {Ruilin Li and Chao Li and Jinshu Su and Bing Sun}, title = {Security evaluation of {MISTY} structure with {SPN} round function}, journal = {Comput. Math. Appl.}, volume = {65}, number = {9}, pages = {1264--1279}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.02.029}, doi = {10.1016/J.CAMWA.2012.02.029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/LiLSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/BaiFZS13, author = {Bing Bai and Zhenqian Feng and Baokang Zhao and Jinshu Su}, title = {Benefiting from the community structure in opportunistic forwarding}, journal = {Comput. Sci. Inf. Syst.}, volume = {10}, number = {2}, pages = {865--876}, year = {2013}, url = {https://doi.org/10.2298/CSIS120921038B}, doi = {10.2298/CSIS120921038B}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/BaiFZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WeiZS13, author = {Ziling Wei and Baokang Zhao and Jinshu Su}, title = {{PDA:} {A} Novel Privacy-Preserving Robust Data Aggregation Scheme in People-Centric Sensing System}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/147839}, doi = {10.1155/2013/147839}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/WeiZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LiuLCS13, author = {Yujing Liu and Xiapu Luo and Rocky K. C. Chang and Jinshu Su}, title = {Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {31}, number = {6}, pages = {1147--1157}, year = {2013}, url = {https://doi.org/10.1109/JSAC.2013.130616}, doi = {10.1109/JSAC.2013.130616}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LiuLCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LuWZWS13, author = {Huabiao Lu and Xiaofeng Wang and Baokang Zhao and Fei Wang and Jinshu Su}, title = {ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences}, journal = {Math. Comput. Model.}, volume = {58}, number = {5-6}, pages = {1140--1154}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.03.008}, doi = {10.1016/J.MCM.2013.03.008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LuWZWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/CaoZSWW13, author = {Dan Cao and Baokang Zhao and Jinshu Su and Baosheng Wang and Xiaofeng Wang}, title = {A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing}, journal = {Math. Comput. Model.}, volume = {58}, number = {5-6}, pages = {1175--1188}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.02.007}, doi = {10.1016/J.MCM.2013.02.007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/CaoZSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/QiaoZZS13, author = {Lin{-}Bo Qiao and Bo{-}Feng Zhang and Rui{-}Yuan Zhao and Jinshu Su}, editor = {Guojun Wang and Indrakshi Ray and Dengguo Feng and Muttukrishnan Rajarajan}, title = {Online Mining of Attack Models in {IDS} Alerts from Network Backbone by a Two-Stage Clustering Method}, booktitle = {Cyberspace Safety and Security - 5th International Symposium, {CSS} 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8300}, pages = {104--116}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03584-0\_9}, doi = {10.1007/978-3-319-03584-0\_9}, timestamp = {Fri, 05 Aug 2022 08:50:55 +0200}, biburl = {https://dblp.org/rec/conf/css/QiaoZZS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangXBS13, author = {Fei Wang and Bin Xiao and Kai Bu and Jinshu Su}, title = {Detect and identify blocker tags in tree-based {RFID} systems}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {2133--2137}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6654842}, doi = {10.1109/ICC.2013.6654842}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangXBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HanLS13, author = {Biao Han and Jie Li and Jinshu Su}, title = {Optimal relay assignment for secrecy capacity maximization in cooperative ad-hoc networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2013, Budapest, Hungary, June 9-13, 2013}, pages = {6128--6132}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICC.2013.6655584}, doi = {10.1109/ICC.2013.6655584}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/HanLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoc/LiuPSW13, author = {Yujing Liu and Wei Peng and Jinshu Su and Zhilin Wang}, editor = {Jinshu Su and Baokang Zhao and Zhigang Sun and Xiaofeng Wang and Fei Wang and Ke Xu}, title = {Assessing Survivability of Inter-domain Routing System under Cascading Failures}, booktitle = {Frontiers in Internet Technologies - Second {CCF} Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {401}, pages = {97--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-53959-6\_10}, doi = {10.1007/978-3-642-53959-6\_10}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoc/LiuPSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoc/XieWLLS13, author = {Peidai Xie and Yongjun Wang and Huabiao Lu and Meijian Li and Jinshu Su}, editor = {Jinshu Su and Baokang Zhao and Zhigang Sun and Xiaofeng Wang and Fei Wang and Ke Xu}, title = {Mining Network Behavior Specifications of Malware Based on Binary Analysis}, booktitle = {Frontiers in Internet Technologies - Second {CCF} Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {401}, pages = {248--255}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-53959-6\_22}, doi = {10.1007/978-3-642-53959-6\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoc/XieWLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/XieLSWL13, author = {Peidai Xie and Xicheng Lu and Jinshu Su and Yongjun Wang and Meijian Li}, title = {iPanda: {A} comprehensive malware analysis tool}, booktitle = {The International Conference on Information Networking 2013, {ICOIN} 2013, Bangkok, Thailand, January 28-30, 2013}, pages = {481--486}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICOIN.2013.6496427}, doi = {10.1109/ICOIN.2013.6496427}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/XieLSWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13, author = {Huabiao Lu and Baokang Zhao and Xiaofeng Wang and Jinshu Su}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {271--284}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_28}, doi = {10.1007/978-3-642-36818-9\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/LiuZWWSYWS13, author = {Bo Liu and Baokang Zhao and Ziling Wei and Chunqing Wu and Jinshu Su and Wanrong Yu and Fei Wang and Shihai Sun}, editor = {Dah Ming Chiu and Jia Wang and Paul Barford and Srinivasan Seshan}, title = {Qphone: a quantum security VoIP phone}, booktitle = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August 12-16, 2013}, pages = {477--478}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2486001.2491696}, doi = {10.1145/2486001.2491696}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/LiuZWWSYWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaPWZSW13, author = {Yanpeng Ma and Wei Peng and Xiaofeng Wang and Baokang Zhao and Jinshu Su and Chunqing Wu}, title = {A Location Management Algorithm for {LEO} Satellite Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1362--1366}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.164}, doi = {10.1109/TRUSTCOM.2013.164}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaPWZSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MaPYSWZ13, author = {Yanpeng Ma and Wei Peng and Wanrong Yu and Jinshu Su and Chunqing Wu and Guohong Zhao}, title = {A Distributed Routing Algorithm for {LEO} Satellite Networks}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1367--1371}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.165}, doi = {10.1109/TRUSTCOM.2013.165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MaPYSWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/HanLS13, author = {Biao Han and Jie Li and Jinshu Su}, title = {Optimal relay node placement for multi-pair cooperative communication in wireless networks}, booktitle = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC), Shanghai, Shanghai, China, April 7-10, 2013}, pages = {4724--4729}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WCNC.2013.6555340}, doi = {10.1109/WCNC.2013.6555340}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/HanLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icoc/2013, editor = {Jinshu Su and Baokang Zhao and Zhigang Sun and Xiaofeng Wang and Fei Wang and Ke Xu}, title = {Frontiers in Internet Technologies - Second {CCF} Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {401}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-53959-6}, doi = {10.1007/978-3-642-53959-6}, isbn = {978-3-642-53958-9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ZhaoPSSWYH12, author = {Baokang Zhao and Wei Peng and Ziming Song and Jinshu Su and Chunqing Wu and Wanrong Yu and Qiaolin Hu}, title = {Towards efficient and practical network coding in delay tolerant networks}, journal = {Comput. Math. Appl.}, volume = {63}, number = {2}, pages = {588--600}, year = {2012}, url = {https://doi.org/10.1016/j.camwa.2011.10.001}, doi = {10.1016/J.CAMWA.2011.10.001}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/ZhaoPSSWYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/FengBZS12, author = {Zhenqian Feng and Bing Bai and Baokang Zhao and Jinshu Su}, title = {ICTree: discovering the underlying connections of your rental virtual machines in the public clouds}, journal = {Comput. Syst. Sci. Eng.}, volume = {27}, number = {6}, year = {2012}, timestamp = {Tue, 05 Aug 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/FengBZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/YouS12, author = {Ilsun You and Jinshu Su}, title = {Editorial}, journal = {Comput. Syst. Sci. Eng.}, volume = {27}, number = {6}, year = {2012}, timestamp = {Tue, 05 Aug 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/YouS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhaoWSCS12, author = {Baokang Zhao and Dan Wang and Zili Shao and Jiannong Cao and Jinshu Su}, title = {Privacy aware publishing of successive location information in sensor networks}, journal = {Future Gener. Comput. Syst.}, volume = {28}, number = {6}, pages = {913--922}, year = {2012}, url = {https://doi.org/10.1016/j.future.2011.09.001}, doi = {10.1016/J.FUTURE.2011.09.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhaoWSCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DaiWZS12, author = {Bin Dai and Feng Wang and Baokang Zhao and Jinshu Su}, title = {Using Regional Routing to Improve the Scalability and Security of Inter-Domain Multipath Routing}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {1}, pages = {94--107}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.94}, doi = {10.1587/TRANSINF.E95.D.94}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/DaiWZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/PengLLS12, author = {Wei Peng and Zimu Li and Yujing Liu and Jinshu Su}, title = {Assessing the vulnerability of network topologies under large-scale regional failures}, journal = {J. Commun. Networks}, volume = {14}, number = {4}, pages = {451--460}, year = {2012}, url = {https://doi.org/10.1109/JCN.2012.6292252}, doi = {10.1109/JCN.2012.6292252}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/PengLLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HanLSC12, author = {Biao Han and Jie Li and Jinshu Su and Jiannong Cao}, title = {Self-Supported Cooperative Networking for Emergency Services in Multi-Hop Wireless Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {30}, number = {2}, pages = {450--457}, year = {2012}, url = {https://doi.org/10.1109/JSAC.2012.120225}, doi = {10.1109/JSAC.2012.120225}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HanLSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/WuSSCSW12, author = {Lijun Wu and Kaile Su and Abdul Sattar and Qingliang Chen and Jinshu Su and Wei Wu}, title = {A complete first-order temporal {BDI} logic for forest multi-agent systems}, journal = {Knowl. Based Syst.}, volume = {27}, pages = {343--351}, year = {2012}, url = {https://doi.org/10.1016/j.knosys.2011.11.006}, doi = {10.1016/J.KNOSYS.2011.11.006}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/WuSSCSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/WangWWS12, author = {Fei Wang and Hailong Wang and Xiaofeng Wang and Jinshu Su}, title = {A new multistage approach to detect subtle DDoS attacks}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {198--213}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.02.025}, doi = {10.1016/J.MCM.2011.02.025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/WangWWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/CaoZWS12, author = {Dan Cao and Baokang Zhao and Xiaofeng Wang and Jinshu Su}, title = {Flexible multi-authority attribute-based signature schemes for expressive policy}, journal = {Mob. Inf. Syst.}, volume = {8}, number = {3}, pages = {255--274}, year = {2012}, url = {https://doi.org/10.3233/MIS-2012-0142}, doi = {10.3233/MIS-2012-0142}, timestamp = {Wed, 06 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/CaoZWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunFHS12, author = {Yipin Sun and Zhenqian Feng and Qiaolin Hu and Jinshu Su}, title = {An efficient distributed key management scheme for group-signature based anonymous authentication in {VANET}}, journal = {Secur. Commun. Networks}, volume = {5}, number = {1}, pages = {79--86}, year = {2012}, url = {https://doi.org/10.1002/sec.302}, doi = {10.1002/SEC.302}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunFHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangLS12, author = {Xiaofeng Wang and Ling Liu and Jinshu Su}, title = {{RLM:} {A} General Model for Trust Representation and Aggregation}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {5}, number = {1}, pages = {131--143}, year = {2012}, url = {https://doi.org/10.1109/TSC.2010.56}, doi = {10.1109/TSC.2010.56}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/WangLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/FengBZS12, author = {Zhenqian Feng and Bing Bai and Baokang Zhao and Jinshu Su}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {An Analytic Goodput Model for {TCP} Incast}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {427--432}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.21}, doi = {10.1109/IMIS.2012.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/FengBZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/MaSWSWYZH12, author = {Yanpeng Ma and Jinshu Su and Chunqing Wu and Xiaofeng Wang and Wanrong Yu and Baokang Zhao and Xiaofeng Hu}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {A Distribute and Geographic Information Based Routing Algorithm for {LEO} Satellite Constellation Networks}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {433--438}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.74}, doi = {10.1109/IMIS.2012.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/MaSWSWYZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/Su12, author = {Jinshu Su}, title = {{STDN} Introduction}, booktitle = {26th {IEEE} International Parallel and Distributed Processing Symposium Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25, 2012}, pages = {1176}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IPDPSW.2012.344}, doi = {10.1109/IPDPSW.2012.344}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/Su12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LiuSC12, author = {Yujing Liu and Jinshu Su and Rocky K. C. Chang}, title = {{LDC:} Detecting {BGP} Prefix Hijacking by Load Distribution Change}, booktitle = {26th {IEEE} International Parallel and Distributed Processing Symposium Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25, 2012}, pages = {1197--1203}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IPDPSW.2012.147}, doi = {10.1109/IPDPSW.2012.147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LiuSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/QiaoZLS12, author = {Lin{-}Bo Qiao and Bo{-}Feng Zhang and Zhiquan Lai and Jinshu Su}, title = {Mining of Attack Models in {IDS} Alerts from Network Backbone by a Two-stage Clustering Method}, booktitle = {26th {IEEE} International Parallel and Distributed Processing Symposium Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25, 2012}, pages = {1263--1269}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IPDPSW.2012.146}, doi = {10.1109/IPDPSW.2012.146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/QiaoZLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/XieLWSL12, author = {Peidai Xie and Xicheng Lu and Yongjun Wang and Jinshu Su and Meijian Li}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Automatic Approach to Detect Anti-debugging in Malware Analysis}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {320}, pages = {436--442}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35795-4\_55}, doi = {10.1007/978-3-642-35795-4\_55}, timestamp = {Fri, 29 Jun 2018 13:46:09 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/XieLWSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/WangWHS12, author = {Fei Wang and Xiaofeng Wang and Xiaofeng Hu and Jinshu Su}, title = {Bitwise sketch for lightweight reverse {IP} reconstruction in network anomaly detection}, booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume / Workshops}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MASS.2012.6708530}, doi = {10.1109/MASS.2012.6708530}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/WangWHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/PengDYSW12, author = {Wei Peng and Guohua Dong and Kun Yang and Jinshu Su and Jun Wu}, title = {A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant Networks}, booktitle = {8th International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2012, Chengdu, China, December 14-16, 2012}, pages = {140--146}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MSN.2012.25}, doi = {10.1109/MSN.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/PengDYSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/music/MaSWWYZH12, author = {Yanpeng Ma and Jinshu Su and Chunqing Wu and Xiaofeng Wang and Wanrong Yu and Baokang Zhao and Xiaofeng Hu}, title = {A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks}, booktitle = {Third {FTRA} International Conference on Mobile, Ubiquitous, and Intelligent Computing, {MUSIC} 2012, Vancouver, Canada, June 26-28, 2012}, pages = {240--245}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MUSIC.2012.49}, doi = {10.1109/MUSIC.2012.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/music/MaSWWYZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/LiuLCS12, author = {Yujing Liu and Xiapu Luo and Rocky K. C. Chang and Jinshu Su}, editor = {Robert Bestak and Lukas Kencl and Li Erran Li and Joerg Widmer and Hao Yin}, title = {Characterizing Inter-domain Rerouting after Japan Earthquake}, booktitle = {{NETWORKING} 2012 - 11th International {IFIP} {TC} 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7290}, pages = {124--135}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30054-7\_10}, doi = {10.1007/978-3-642-30054-7\_10}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/LiuLCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0007WSX12, author = {Fei Wang and Xiaofeng Wang and Jinshu Su and Bin Xiao}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight Victim Identification}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {215--222}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.295}, doi = {10.1109/TRUSTCOM.2012.295}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/0007WSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/procedia/PengHZS12, author = {Wei Peng and Xiaofeng Hu and Feng Zhao and Jinshu Su}, editor = {Hesham H. Ali and Yong Shi and Deepak Khazanchi and Michael Lees and G. Dick van Albada and Jack J. Dongarra and Peter M. A. Sloot}, title = {A Fast Algorithm to Find All-Pairs Shortest Paths in Complex Networks}, booktitle = {Proceedings of the International Conference on Computational Science, {ICCS} 2012, Omaha, Nebraska, USA, 4-6 June, 2012}, series = {Procedia Computer Science}, volume = {9}, pages = {557--566}, publisher = {Elsevier}, year = {2012}, url = {https://doi.org/10.1016/j.procs.2012.04.060}, doi = {10.1016/J.PROCS.2012.04.060}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/journals/procedia/PengHZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/CaoSXC11, author = {Jijun Cao and Jinshu Su and Jing Xie and Feng Chen}, title = {{DBMISD-D:} {A} distributed algorithm for constructing and maintaining high stability application-layer multicast tree}, journal = {Comput. Syst. Sci. Eng.}, volume = {26}, number = {5}, year = {2011}, timestamp = {Sun, 09 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/CaoSXC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangYBS11, author = {Xiaofeng Wang and Chee Shin Yeo and Rajkumar Buyya and Jinshu Su}, title = {Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm}, journal = {Future Gener. Comput. Syst.}, volume = {27}, number = {8}, pages = {1124--1134}, year = {2011}, url = {https://doi.org/10.1016/j.future.2011.03.008}, doi = {10.1016/J.FUTURE.2011.03.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/WangYBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YangLLHSS11, author = {Xuejun Yang and Xiangke Liao and Kai Lu and Qingfeng Hu and Junqiang Song and Jinshu Su}, title = {The TianHe-1A Supercomputer: Its Hardware and Software}, journal = {J. Comput. Sci. Technol.}, volume = {26}, number = {3}, pages = {344--351}, year = {2011}, url = {https://doi.org/10.1007/s02011-011-1137-8}, doi = {10.1007/S02011-011-1137-8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/YangLLHSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PengLSD11, author = {Wei Peng and Zimu Li and Jinshu Su and Muwei Dong}, editor = {A Min Tjoa and Gerald Quirchmayr and Ilsun You and Lida Xu}, title = {Evaluation of Topological Vulnerability of the Internet under Regional Failures}, booktitle = {Availability, Reliability and Security for Business, Enterprise and Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August 22-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6908}, pages = {164--175}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23300-5\_13}, doi = {10.1007/978-3-642-23300-5\_13}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PengLSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcsc/LiuXWWXZS11, author = {Bo Liu and Erci Xu and Jin Wang and Ziling Wei and Liyang Xu and Baokang Zhao and Jinshu Su}, title = {Thwarting audio steganography attacks in cloud storage systems}, booktitle = {2011 International Conference on Cloud and Service Computing, {CSC} 2011, Hong Kong, December 12-14, 2011}, pages = {259--265}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSC.2011.6138530}, doi = {10.1109/CSC.2011.6138530}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcsc/LiuXWWXZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpsr/ZhangLSWL11, author = {Xiaozhe Zhang and Xicheng Lu and Jinshu Su and Baosheng Wang and Zexin Lu}, title = {{SDBGP:} {A} scalable, distributed {BGP} routing protocol implementation}, booktitle = {Proceedings of the 12th {IEEE} International Conference on High Performance Switching and Routing, {HPSR} 2011, 4-6 July 2011, Cartagena, Spain}, pages = {191--196}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/HPSR.2011.5986025}, doi = {10.1109/HPSR.2011.5986025}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpsr/ZhangLSWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/WangDS11, author = {Feng Wang and Bin Dai and Jinshu Su}, editor = {Haohong Wang and Jin Li and George N. Rouskas and Xiaobo Zhou}, title = {How Can Multipath Dissemination Help to Detect Prefix Hijacking?}, booktitle = {Proceedings of 20th International Conference on Computer Communications and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICCCN.2011.6005930}, doi = {10.1109/ICCCN.2011.6005930}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/WangDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/ZhaoSSPH11, author = {Baokang Zhao and Ziming Song and Jinshu Su and Wei Peng and Qiaolin Hu}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {{NTC:} Towards Efficient Network Coding in Delay Tolerant Networks}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {57--64}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.105}, doi = {10.1109/IMIS.2011.105}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/ZhaoSSPH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/WangCTS11, author = {Lei Wang and Shuhui Chen and Yong Tang and Jinshu Su}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {Gregex: {GPU} Based High Speed Regular Expression Matching Engine}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {366--370}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.107}, doi = {10.1109/IMIS.2011.107}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/WangCTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/BaiSZYW11, author = {Bing Bai and Jinshu Su and Baokang Zhao and Wanrong Yu and Ling Wen}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {Snail Crawling: An Enhanced Method for DTNs Routing}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {394--397}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.112}, doi = {10.1109/IMIS.2011.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/BaiSZYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CaoZWSJ11, author = {Dan Cao and Baokang Zhao and Xiaofeng Wang and Jinshu Su and Guofei Ji}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Multi-authority Attribute-Based Signature}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {668--672}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.122}, doi = {10.1109/INCOS.2011.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/CaoZWSJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HanLS11, author = {Biao Han and Jie Li and Jinshu Su}, title = {Self-supported congestion-aware networking for emergency services in WANETs}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {891--899}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935314}, doi = {10.1109/INFCOM.2011.5935314}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HanLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/WeiXLXZS11, author = {Ziling Wei and Liyang Xu and Bo Liu and Eci Xu and Baokang Zhao and Jinshu Su}, editor = {Junliang Chen and Huadong Ma and Ivan Stojmenovic}, title = {{VISOR:} {A} Pratical VoIP Steganography Platform}, booktitle = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2011, Beijing, China, December 16-18, 2011}, pages = {370--372}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MSN.2011.88}, doi = {10.1109/MSN.2011.88}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/WeiXLXZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/BaiFZS11, author = {Bing Bai and Zhenqian Feng and Baokang Zhao and Jinshu Su}, editor = {Junliang Chen and Huadong Ma and Ivan Stojmenovic}, title = {One Leader at One Time: {OLOT} Routing in Delay Tolerant Networks}, booktitle = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2011, Beijing, China, December 16-18, 2011}, pages = {432--435}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MSN.2011.53}, doi = {10.1109/MSN.2011.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/BaiFZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/FengBZS11, author = {Zhenqian Feng and Bing Bai and Baokang Zhao and Jinshu Su}, editor = {Junliang Chen and Huadong Ma and Ivan Stojmenovic}, title = {Shrew Attack in Cloud Data Center Networks}, booktitle = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2011, Beijing, China, December 16-18, 2011}, pages = {441--445}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MSN.2011.71}, doi = {10.1109/MSN.2011.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/FengBZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/SuBZS11, author = {Xiangyu Su and Jinzhen Bao and Baokang Zhao and Jinshu Su}, editor = {Junliang Chen and Huadong Ma and Ivan Stojmenovic}, title = {Protecting Router Forwarding Table in Space}, booktitle = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2011, Beijing, China, December 16-18, 2011}, pages = {446--450}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/MSN.2011.91}, doi = {10.1109/MSN.2011.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/SuBZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/CaoZWSC11, author = {Dan Cao and Baokang Zhao and Xiaofeng Wang and Jinshu Su and Yijiao Chen}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa}, title = {Authenticating with Attributes in Online Social Networks}, booktitle = {The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011}, pages = {607--611}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/NBiS.2011.102}, doi = {10.1109/NBIS.2011.102}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/CaoZWSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/XuLXWZS11, author = {Erchi Xu and Bo Liu and Liyang Xu and Ziling Wei and Baokang Zhao and Jinshu Su}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa}, title = {Adaptive VoIP Steganography for Information Hiding within Network Audio Streams}, booktitle = {The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011}, pages = {612--617}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/NBiS.2011.103}, doi = {10.1109/NBIS.2011.103}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/XuLXWZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangLLS11, author = {Bofeng Zhang and Yuan Li and Yujing Liu and Jinshu Su}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Analysis of prefix hijacking based on {AS} hierarchical model}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {322--326}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060023}, doi = {10.1109/ICNSS.2011.6060023}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/ZhangLLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuPS11, author = {Yujing Liu and Wei Peng and Jinshu Su}, title = {Study on {IP} Prefix Hijacking in Cloud Computing Networks Based on Attack Planning}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {922--926}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.127}, doi = {10.1109/TRUSTCOM.2011.127}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/YangLXSHSXLDJa10, author = {Xuejun Yang and Xiangke Liao and Weixia Xu and Junqiang Song and Qingfeng Hu and Jinshu Su and Liquan Xiao and Kai Lu and Qiang Dou and Juping Jiang and Canqun Yang}, title = {{TH-1:} China's first petaflop supercomputer}, journal = {Frontiers Comput. Sci. China}, volume = {4}, number = {4}, pages = {445--455}, year = {2010}, url = {https://doi.org/10.1007/s11704-010-0383-x}, doi = {10.1007/S11704-010-0383-X}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/YangLXSHSXLDJa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoWSCCS10, author = {Baokang Zhao and Dan Wang and Zili Shao and Jiannong Cao and Keith C. C. Chan and Jinshu Su}, title = {An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {3}, pages = {531--533}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.531}, doi = {10.1587/TRANSINF.E93.D.531}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoWSCCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnit/YujingBFJ10, author = {Yujing Liu and Bofeng Zhang and Fei Wang and Jinshu Su}, title = {Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of {BGP} Routing System}, journal = {J. Next Gener. Inf. Technol.}, volume = {1}, number = {3}, pages = {96--105}, year = {2010}, url = {http://www.humanpub.org/jnit/ppl/JNIT0103\_11.pdf}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnit/YujingBFJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChenLZS10, author = {Feng Chen and Dehui Liu and Yi Zhang and Jinshu Su}, title = {A Scalable Approach to Analyzing Network Security using Compact Attack Graphs}, journal = {J. Networks}, volume = {5}, number = {5}, pages = {543--550}, year = {2010}, url = {https://doi.org/10.4304/jnw.5.5.543-550}, doi = {10.4304/JNW.5.5.543-550}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChenLZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/WuSSLY10, author = {Lijun Wu and Jinshu Su and Kaile Su and Xiangyu Luo and Zhihua Yang}, title = {A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems}, journal = {Knowl. Based Syst.}, volume = {23}, number = {2}, pages = {162--168}, year = {2010}, url = {https://doi.org/10.1016/j.knosys.2009.11.017}, doi = {10.1016/J.KNOSYS.2009.11.017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/WuSSLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SunLLSS10, author = {Yipin Sun and Rongxing Lu and Xiaodong Lin and Xuemin Shen and Jinshu Su}, title = {An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {59}, number = {7}, pages = {3589--3603}, year = {2010}, url = {https://doi.org/10.1109/TVT.2010.2051468}, doi = {10.1109/TVT.2010.2051468}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/SunLLSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/SunSZS10, author = {Yipin Sun and Xiangyu Su and Baokang Zhao and Jinshu Su}, title = {Mix-zones Deployment for Location Privacy Preservation in Vehicular Communications}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {2825--2830}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.472}, doi = {10.1109/CIT.2010.472}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/SunSZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZhaoSSSL10, author = {Baokang Zhao and Xiangyu Su and Yipin Sun and Jinshu Su and Shanshan Li}, title = {A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor Networks}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {2837--2842}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.474}, doi = {10.1109/CIT.2010.474}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZhaoSSSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/FengWS10, author = {Zhenqian Feng and Haitao Wu and Jinshu Su}, editor = {Philip Brighten Godfrey and Chuanxiong Guo and Olaf Maennel}, title = {Exploring potential vulnerabilities in data center network}, booktitle = {Proceedings of the {ACM} CoNEXT Student Workshop, CoNEXT '10 Student Workshop, Philadelphia, Pennsylvania, USA, November 30, 2010}, pages = {12:1--12:2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1921206.1921219}, doi = {10.1145/1921206.1921219}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/FengWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SunLLSS10, author = {Yipin Sun and Rongxing Lu and Xiaodong Lin and Xuemin Shen and Jinshu Su}, title = {A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502130}, doi = {10.1109/ICC.2010.5502130}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/SunLLSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SunLLSS10a, author = {Yipin Sun and Xiaodong Lin and Rongxing Lu and Xuemin Shen and Jinshu Su}, title = {Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502183}, doi = {10.1109/ICC.2010.5502183}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/SunLLSS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/YuLLWS10, author = {Jie Yu and Liming Lu and Zhoujun Li and Xiaofeng Wang and Jinshu Su}, title = {A Simple Effective Scheme to Enhance the Capability of Web Servers Using {P2P} Networks}, booktitle = {39th International Conference on Parallel Processing, {ICPP} 2010, San Diego, California, USA, 13-16 September 2010}, pages = {680--689}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPP.2010.76}, doi = {10.1109/ICPP.2010.76}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpp/YuLLWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/ZhaoSPZW09, author = {Baokang Zhao and Jinshu Su and Wei Peng and YingZhi Zeng and Meng Wang}, title = {An ID-Based Partially Blind Signature Scheme With Adaptive Delegation For Networked Embedded Systems}, journal = {Intell. Autom. Soft Comput.}, volume = {15}, number = {3}, pages = {485--493}, year = {2009}, url = {https://doi.org/10.1080/10798587.2009.10643044}, doi = {10.1080/10798587.2009.10643044}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/ZhaoSPZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcns/TuSK09, author = {Rui Tu and Jinshu Su and Ruoshan Kong}, title = {An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier Split}, journal = {Int. J. Commun. Netw. Syst. Sci.}, volume = {2}, number = {7}, pages = {641--644}, year = {2009}, url = {https://doi.org/10.4236/ijcns.2009.27072}, doi = {10.4236/IJCNS.2009.27072}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcns/TuSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ai/WuSLYC09, author = {Lijun Wu and Jinshu Su and Xiangyu Luo and Zhihua Yang and Qingliang Chen}, editor = {Yong Gao and Nathalie Japkowicz}, title = {A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for Multi-agent Systems}, booktitle = {Advances in Artificial Intelligence, 22nd Canadian Conference on Artificial Intelligence, Canadian {AI} 2009, Kelowna, Canada, May 25-27, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5549}, pages = {146--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01818-3\_16}, doi = {10.1007/978-3-642-01818-3\_16}, timestamp = {Thu, 28 Sep 2023 12:27:09 +0200}, biburl = {https://dblp.org/rec/conf/ai/WuSLYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/WangYBS09, author = {Xiaofeng Wang and Chee Shin Yeo and Rajkumar Buyya and Jinshu Su}, editor = {Irfan Awan and Muhammad Younas and Takahiro Hara and Arjan Durresi}, title = {Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using {GA}}, booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29, 2009}, pages = {411--418}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/AINA.2009.21}, doi = {10.1109/AINA.2009.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/WangYBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/WangBS09, author = {Xiaofeng Wang and Rajkumar Buyya and Jinshu Su}, editor = {Franck Cappello and Cho{-}Li Wang and Rajkumar Buyya}, title = {Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy}, booktitle = {9th {IEEE/ACM} International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009}, pages = {108--115}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CCGRID.2009.14}, doi = {10.1109/CCGRID.2009.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/WangBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cso/CaoSS09, author = {Jijun Cao and Zhigang Sun and Jinshu Su}, editor = {Lean Yu and Kin Keung Lai and Shashi Kant Mishra}, title = {{HPC:} {A} Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast}, booktitle = {Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, {CSO} 2009, Sanya, Hainan, China, 24-26 April 2009, Volume 1}, pages = {680--685}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSO.2009.16}, doi = {10.1109/CSO.2009.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cso/CaoSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/ChenSZ09, author = {Feng Chen and Jinshu Su and Yi Zhang}, editor = {Fabio Massacci and Samuel T. Redwine Jr. and Nicola Zannone}, title = {A Scalable Approach to Full Attack Graphs Generation}, booktitle = {Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5429}, pages = {150--163}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00199-4\_13}, doi = {10.1007/978-3-642-00199-4\_13}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/ChenSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcst/SunZS09, author = {Yipin Sun and Baokang Zhao and Jinshu Su}, title = {{ECHO:} Efficient Certificate Updating Scheme by Vehicle-to-Vehicle Communications}, booktitle = {Fourth International Conference on Frontier of Computer Science and Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009}, pages = {581--586}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FCST.2009.70}, doi = {10.1109/FCST.2009.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcst/SunZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcst/XiaGZS09, author = {Yan Xia and Zhenghu Gong and Baokang Zhao and Jinshu Su}, title = {A New Security Mechanism for Dynamic Channel Assignment in Wireless Mesh Networks}, booktitle = {Fourth International Conference on Frontier of Computer Science and Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009}, pages = {587--592}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FCST.2009.33}, doi = {10.1109/FCST.2009.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcst/XiaGZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ZengYS09, author = {YingZhi Zeng and Xia Yan and Jinshu Su}, title = {A new broadcast-Key Management Scheme for Distributed Wireless Sensor Networks}, booktitle = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China}, pages = {882--887}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MOBHOC.2009.5337042}, doi = {10.1109/MOBHOC.2009.5337042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ZengYS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ZengYS09a, author = {YingZhi Zeng and Xia Yan and Jinshu Su}, title = {A new Group Key Management Scheme based on {DMST} for Wireless Sensor Networks}, booktitle = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China}, pages = {989--994}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MOBHOC.2009.5337022}, doi = {10.1109/MOBHOC.2009.5337022}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ZengYS09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/DaiLSSMS09, author = {Bin Dai and Huabiao Lu and Zhigang Sun and Ziming Song and Yanpeng Ma and Jinshu Su}, title = {{MORT:} {A} Technique to Improve Routing Efficiency in Fault-Tolerant Multipath Routing}, booktitle = {{MSN} 2009, The Fifth International Conference on Mobile Ad-hoc and Sensor Networks, Wu Yi Mountain, Fujian, China , December 14-16, 2009}, pages = {430--435}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MSN.2009.85}, doi = {10.1109/MSN.2009.85}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/DaiLSSMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nas/TuSC09, author = {Rui Tu and Jinshu Su and Feng Chen}, title = {Network Access Control Mechanism Based on Locator/Identifier Split}, booktitle = {International Conference on Networking, Architecture, and Storage, {NAS} 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China}, pages = {171--174}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NAS.2009.34}, doi = {10.1109/NAS.2009.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nas/TuSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/DaiSZ08, author = {Yi Dai and Jinshu Su and Ying Zhang}, title = {A coordination scheduling mechanism to guarantee packet ordering in parallel packet switch}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {4}, pages = {362--373}, year = {2008}, url = {https://doi.org/10.1504/IJESDF.2008.021454}, doi = {10.1504/IJESDF.2008.021454}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/DaiSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ChenWS08, author = {Feng Chen and Lingyu Wang and Jinshu Su}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {209--212}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.38}, doi = {10.1109/IAS.2008.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ChenWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/CaoSW08, author = {Jijun Cao and Jinshu Su and Chunqing Wu}, title = {Modeling and Analyzing the Instantaneous Stability for Application Layer Multicast}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {217--224}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.22}, doi = {10.1109/APSCC.2008.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/CaoSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhaoWSCCSY08, author = {Baokang Zhao and Dan Wang and Zili Shao and Jiannong Cao and Keith C. C. Chan and Jinshu Su and Yanqin Yang}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Towards Successive Privacy Protection in Sensor Networks}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {167--172}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.150}, doi = {10.1109/EUC.2008.150}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/ZhaoWSCCSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icds/WangS08, author = {Sheng Wang and Jinshu Su}, title = {Analysis of Reverse Traffic in Delay-Based Congestion Control}, booktitle = {Second International Conference on the Digital Society {(ICDS} 2008), February 10-15, 2008, Sainte Luce, Martinique, France}, pages = {178--183}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDS.2008.31}, doi = {10.1109/ICDS.2008.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icds/WangS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icds/WangS08a, author = {Sheng Wang and Jinshu Su}, title = {Analysis and Enhancement of Delay-Based Congestion Control}, booktitle = {Second International Conference on the Digital Society {(ICDS} 2008), February 10-15, 2008, Sainte Luce, Martinique, France}, pages = {184--189}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDS.2008.32}, doi = {10.1109/ICDS.2008.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icds/WangS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icn/WangGLSL08, author = {Hong Wang and Zhenghu Gong and Zexin Lu and Jinshu Su and Sudan Li}, title = {An Entropy Based Algorithm to Find Critical Traffic Matrices}, booktitle = {Seventh International Conference on Networking {(ICN} 2008), 13-18 April 2008, Cancun, Mexico}, pages = {392--397}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICN.2008.84}, doi = {10.1109/ICN.2008.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icn/WangGLSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip10-3/ZhaoWSCCS08, author = {Baokang Zhao and Meng Wang and Zili Shao and Jiannong Cao and Keith C. C. Chan and Jinshu Su}, editor = {Bernd Kleinjohann and Lisa Kleinjohann and Wayne H. Wolf}, title = {Topology-Aware Energy Efficient Task Assignment for Collaborative In-Network Processing in Distributed Sensor Systems}, booktitle = {Distributed Embedded Systems: Design, Middleware and Resources, {IFIP} 20th World Computer Congress, {TC10} Working Conference on Distributed and Parallel Embedded Systems {(DIPES} 2008), September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {271}, pages = {201--211}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09661-2\_20}, doi = {10.1007/978-0-387-09661-2\_20}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip10-3/ZhaoWSCCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/FengJ08, author = {Feng Chen and Jinshu Su}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {A Flexible Approach to Measuring Network Security Using Attack Graphs}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {426--431}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.122}, doi = {10.1109/ISECS.2008.122}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/FengJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/ChengXCLLSWL08, author = {Wei Cheng and Kai Xing and Xiuzhen Cheng and Xicheng Lu and Zexin Lu and Jinshu Su and Baosheng Wang and Yujun Liu}, editor = {Xiaohua Jia and Ness B. Shroff and Peng{-}Jun Wan}, title = {Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks}, booktitle = {Proceedings of the 9th {ACM} Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008}, pages = {209--220}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374618.1374648}, doi = {10.1145/1374618.1374648}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobihoc/ChengXCLLSWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtcsa/ZhaoWSCCS08, author = {Baokang Zhao and Meng Wang and Zili Shao and Jiannong Cao and Keith C. C. Chan and Jinshu Su}, title = {Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion Applications in Networked Embedded Sensor Systems}, booktitle = {The Fourteenth {IEEE} Internationl Conference on Embedded and Real-Time Computing Systems and Applications, {RTCSA} 2008, Kaohisung, Taiwan, 25-27 August 2008, Proceedings}, pages = {293--302}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/RTCSA.2008.30}, doi = {10.1109/RTCSA.2008.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtcsa/ZhaoWSCCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/CaoSWSM07, author = {Jijun Cao and Xiangquan Shi and Chunqing Wu and Jinshu Su and Zhaowei Meng}, editor = {Shingo Ata and Choong Seon Hong}, title = {Efficient Congestion Control Based on Awareness of Multistage Resources {(CC-AMR)}}, booktitle = {Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2007, Sapporo, Japan, October 10-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4773}, pages = {608--611}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75476-3\_77}, doi = {10.1007/978-3-540-75476-3\_77}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/CaoSWSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/DaiSSG07, author = {Yi Dai and Jinshu Su and Zhigang Sun and Jianbo Guan}, editor = {Jie Li and Minyi Guo and Qun Jin and Yongbing Zhang and Liang{-}Jie Zhang and Hai Jin and Masahiro Mambo and Jiro Tanaka and Hiromu Hayashi}, title = {A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet Reordering in Load-Balanced Switches}, booktitle = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan}, pages = {151--155}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/APSCC.2007.61}, doi = {10.1109/APSCC.2007.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/DaiSSG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/CaoSW07, author = {Jijun Cao and Jinshu Su and Chunqing Wu}, editor = {Jie Li and Minyi Guo and Qun Jin and Yongbing Zhang and Liang{-}Jie Zhang and Hai Jin and Masahiro Mambo and Jiro Tanaka and Hiromu Hayashi}, title = {Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application Layer Multicast}, booktitle = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan}, pages = {179--186}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/APSCC.2007.68}, doi = {10.1109/APSCC.2007.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/CaoSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZengZSYS07, author = {YingZhi Zeng and Baokang Zhao and Jinshu Su and Xia Yan and Zili Shao}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {A Loop-Based Key Management Scheme for Wireless Sensor Networks}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {103--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_10}, doi = {10.1007/978-3-540-77090-9\_10}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/ZengZSYS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lsms/WuS07, author = {Lijun Wu and Jinshu Su}, editor = {Kang Li and Minrui Fei and George W. Irwin and Shiwei Ma}, title = {Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent System Via Extended Mu-Calculus}, booktitle = {Bio-Inspired Computational Intelligence and Applications, International Conference on Life System Modeling and Simulation, {LSMS} 2007, Shanghai, China, September 14-17, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4688}, pages = {510--522}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74769-7\_55}, doi = {10.1007/978-3-540-74769-7\_55}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/lsms/WuS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/ZengSYZH07, author = {YingZhi Zeng and Jinshu Su and Xia Yan and Baokang Zhao and QingYuan Huang}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, title = {{LBKERS:} {A} New Efficient Key Management Scheme for Wireless Sensor Networks}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4864}, pages = {772--783}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77024-4\_70}, doi = {10.1007/978-3-540-77024-4\_70}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/ZengSYZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/advis/HuangSZW06, author = {QingYuan Huang and Jinshu Su and YingZhi Zeng and Yongjun Wang}, editor = {Tatyana M. Yakhno and Erich J. Neuhold}, title = {Spreading Activation Model for Connectivity Based Clustering}, booktitle = {Advances in Information Systems, 4th International Conference, {ADVIS} 2006, Izmir, Turkey, October 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4243}, pages = {398--407}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11890393\_41}, doi = {10.1007/11890393\_41}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/advis/HuangSZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/advis/HuangWSZ06, author = {QingYuan Huang and Yongjun Wang and Jinshu Su and YingZhi Zeng}, editor = {Tatyana M. Yakhno and Erich J. Neuhold}, title = {Personalized Fair Reputation Based Resource Allocation in Grid}, booktitle = {Advances in Information Systems, 4th International Conference, {ADVIS} 2006, Izmir, Turkey, October 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4243}, pages = {408--417}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11890393\_42}, doi = {10.1007/11890393\_42}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/advis/HuangWSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aintec/MengSA06, author = {Zhaowei Meng and Jinshu Su and Stefano Avallone}, editor = {Kenjiro Cho and Philippe Jacquet}, title = {A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic}, booktitle = {Technologies for Advanced Heterogeneous Networks II, Second Asian Internet Engineering Conference, {AINTEC} 2006, Pathumthani, Thailand, November 28-30, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4311}, pages = {159--171}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11930181\_12}, doi = {10.1007/11930181\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/aintec/MengSA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/WuSYS06, author = {Chunqing Wu and Xiangquan Shi and Xuejun Yang and Jinshu Su}, title = {The Impact of Parallel and Multithread Mechanism on Network Processor Performance}, booktitle = {Grid and Cooperative Computing - {GCC} 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings}, pages = {236--240}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/GCC.2006.91}, doi = {10.1109/GCC.2006.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/WuSYS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/LiuGWS06, author = {Yaping Liu and Zhenghu Gong and Baosheng Wang and Jinshu Su}, editor = {Sanjay Kumar Madria and Kajal T. Claypool and Rajgopal Kannan and Prem Uppuluri and Manoj Madhava Gore}, title = {A Routing Optimization Algorithm for {BGP} Egress Selection}, booktitle = {Distributed Computing and Internet Technology, Third International Conference, {ICDCIT} 2006, Bhubaneswar, India, December 20-23, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4317}, pages = {192--199}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11951957\_18}, doi = {10.1007/11951957\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/LiuGWS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/MengSM06, author = {Zhaowei Meng and Jinshu Su and Vittorio Manetti}, editor = {Soma Chaudhuri and Samir R. Das and Himadri S. Paul and Srikanta Tirthapura}, title = {A New Precomputation Scheme for {MPLS} Traffic Engineering Routing}, booktitle = {Distributed Computing and Networking, 8th International Conference, {ICDCN} 2006, Guwahati, India, December 27-30, 2006}, series = {Lecture Notes in Computer Science}, volume = {4308}, pages = {391--396}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11947950\_44}, doi = {10.1007/11947950\_44}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/MengSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiLWSCCL06, author = {Dongsheng Li and Xicheng Lu and Baosheng Wang and Jinshu Su and Jiannong Cao and Keith C. C. Chan and Hong Va Leong}, title = {Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems}, booktitle = {26th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal}, pages = {64}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDCS.2006.26}, doi = {10.1109/ICDCS.2006.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiLWSCCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnmc/ZhaoSC05, author = {Feng Zhao and Jinshu Su and Xiaomei Cheng}, editor = {Xicheng Lu and Wei Zhao}, title = {OpenRouter: {A} TCP-Based Lightweight Protocol for Control Plane and Forwarding Plane Communication}, booktitle = {Networking and Mobile Computing, Third International Conference, {ICCNMC} 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3619}, pages = {1032--1041}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11534310\_108}, doi = {10.1007/11534310\_108}, timestamp = {Fri, 09 Apr 2021 18:41:16 +0200}, biburl = {https://dblp.org/rec/conf/iccnmc/ZhaoSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/JingJKW04, author = {Jing Zheng and Jinshu Su and Kan Yang and Yijie Wang}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3036}, pages = {373--380}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24685-5\_47}, doi = {10.1007/978-3-540-24685-5\_47}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccS/JingJKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZhengSL04, author = {Jing Zheng and Jinshu Su and Xicheng Lu}, editor = {Jiannong Cao and Laurence Tianruo Yang and Minyi Guo and Francis Chi{-}Moon Lau}, title = {A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability}, booktitle = {Parallel and Distributed Processing and Applications, Second InternationalSymposium, {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3358}, pages = {399--409}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30566-8\_49}, doi = {10.1007/978-3-540-30566-8\_49}, timestamp = {Tue, 14 Apr 2020 13:23:10 +0200}, biburl = {https://dblp.org/rec/conf/ispa/ZhengSL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LiLS04, author = {Dongsheng Li and Xicheng Lu and Jinshu Su}, editor = {Hai Jin and Guang R. Gao and Zhiwei Xu and Hao Chen}, title = {Graph-Theoretic Analysis of Kautz Topology and {DHT} Schemes}, booktitle = {Network and Parallel Computing, {IFIP} International Conference, {NPC} 2004, Wuhan, China, October 18-20, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3222}, pages = {308--315}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30141-7\_45}, doi = {10.1007/978-3-540-30141-7\_45}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/npc/LiLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/appt/HuSLS03, author = {Xiaofeng Hu and Zhigang Sun and Xicheng Lu and Jinshu Su}, editor = {Xingming Zhou and Stefan J{\"{a}}hnichen and Ming Xu and Jiannong Cao}, title = {Using Split Queues to Improve the Performance of Parallel Switch}, booktitle = {Advanced Parallel Programming Technologies, 5th International Workshop, {APPT} 2003, Xiamen, China, September 17-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2834}, pages = {3--11}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39425-9\_1}, doi = {10.1007/978-3-540-39425-9\_1}, timestamp = {Tue, 14 Apr 2020 13:23:11 +0200}, biburl = {https://dblp.org/rec/conf/appt/HuSLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.