BibTeX records: Jinshu Su

download as .bib file

@article{DBLP:journals/cn/JiHXSS23,
  author       = {Xiaolan Ji and
                  Biao Han and
                  Cao Xu and
                  Congxi Song and
                  Jinshu Su},
  title        = {Adaptive QoS-aware multipath congestion control for live streaming},
  journal      = {Comput. Networks},
  volume       = {220},
  pages        = {109470},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2022.109470},
  doi          = {10.1016/J.COMNET.2022.109470},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JiHXSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/HuangYLS23,
  author       = {Jianxin Huang and
                  Bo Yu and
                  Runhao Liu and
                  Jinshu Su},
  title        = {Automatic discovery of stateful variables in network protocol software
                  based on replay analysis},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {24},
  number       = {3},
  pages        = {403--416},
  year         = {2023},
  url          = {https://doi.org/10.1631/FITEE.2200275},
  doi          = {10.1631/FITEE.2200275},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/HuangYLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiuSLCHKF23,
  author       = {Lin Liu and
                  Jinshu Su and
                  Ximeng Liu and
                  Rongmao Chen and
                  Xinyi Huang and
                  Guang Kou and
                  Shaojing Fu},
  title        = {Towards Strong Privacy Protection for Association Rule Mining and
                  Query in the Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {3211--3225},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3269510},
  doi          = {10.1109/TCC.2023.3269510},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/LiuSLCHKF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ZhouCLS23,
  author       = {Tongqing Zhou and
                  Zhiping Cai and
                  Fang Liu and
                  Jinshu Su},
  title        = {In Pursuit of Beauty: Aesthetic-Aware and Context-Adaptive Photo Selection
                  in Crowdsensing},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {9},
  pages        = {9364--9377},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2023.3237969},
  doi          = {10.1109/TKDE.2023.3237969},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ZhouCLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZhaoHLSZ23,
  author       = {Na Zhao and
                  Biao Han and
                  Ruidong Li and
                  Jinshu Su and
                  Cong Zhou},
  title        = {A Multivariate KPIs Anomaly Detection Framework With Dynamic Balancing
                  Loss Training},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {1418--1429},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2022.3224803},
  doi          = {10.1109/TNSM.2022.3224803},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZhaoHLSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/LiZCS23,
  author       = {Xionglve Li and
                  Tongqing Zhou and
                  Zhiping Cai and
                  Jinshu Su},
  title        = {Realizing Fine-Grained Inference of {AS} Path With a Generative Measurable
                  Process},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {31},
  number       = {6},
  pages        = {3112--3127},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNET.2023.3270565},
  doi          = {10.1109/TNET.2023.3270565},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/LiZCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZouSWCZ22,
  author       = {Hongcheng Zou and
                  Jinshu Su and
                  Ziling Wei and
                  Shuhui Chen and
                  Baokang Zhao},
  title        = {An efficient cross-domain few-shot website fingerprinting attack with
                  Brownian distance covariance},
  journal      = {Comput. Networks},
  volume       = {219},
  pages        = {109461},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109461},
  doi          = {10.1016/J.COMNET.2022.109461},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZouSWCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LiWS22,
  author       = {Yang Li and
                  Ziling Wei and
                  Jinshu Su},
  title        = {Moving direction-based adaptive task migration in {MEC}},
  journal      = {{IET} Commun.},
  volume       = {16},
  number       = {17},
  pages        = {2002--2018},
  year         = {2022},
  url          = {https://doi.org/10.1049/cmu2.12455},
  doi          = {10.1049/CMU2.12455},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-com/LiWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/SuZDCWZSLX22,
  author       = {Jinshu Su and
                  Baokang Zhao and
                  Yi Dai and
                  Jijun Cao and
                  Ziling Wei and
                  Na Zhao and
                  Congxi Song and
                  Yujing Liu and
                  Yusheng Xia},
  title        = {Technology trends in large-scale high-efficiency network computing},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {23},
  number       = {12},
  pages        = {1733--1746},
  year         = {2022},
  url          = {https://doi.org/10.1631/FITEE.2200217},
  doi          = {10.1631/FITEE.2200217},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jzusc/SuZDCWZSLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WeiZS22,
  author       = {Ziling Wei and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {Event-Driven Computation Offloading in IoT With Edge Computing},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {21},
  number       = {9},
  pages        = {6847--6860},
  year         = {2022},
  url          = {https://doi.org/10.1109/TWC.2022.3152573},
  doi          = {10.1109/TWC.2022.3152573},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WeiZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnet/HuangSLCW22,
  author       = {Meizhen Huang and
                  Jinshu Su and
                  Zhong Liao and
                  Shuhui Chen and
                  Ziling Wei},
  title        = {Multi-Level Text Importance Classification Architecture Based on Deep
                  Learning},
  booktitle    = {Proceedings of the 6th Asia-Pacific Workshop on Networking, APNet
                  2022, Fuzhou, China, July 1-2, 2022},
  pages        = {87--89},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3542637.3543702},
  doi          = {10.1145/3542637.3543702},
  timestamp    = {Thu, 09 Nov 2023 11:04:15 +0100},
  biburl       = {https://dblp.org/rec/conf/apnet/HuangSLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/LiSLZOZ22,
  author       = {Mengjuan Li and
                  Jinshu Su and
                  Hongyun Liu and
                  Zhiming Zhao and
                  Xue Ouyang and
                  Huan Zhou},
  editor       = {Javier Troya and
                  Brahim Medjahed and
                  Mario Piattini and
                  Lina Yao and
                  Pablo Fern{\'{a}}ndez and
                  Antonio Ruiz{-}Cort{\'{e}}s},
  title        = {The Extreme Counts: Modeling the Performance Uncertainty of Cloud
                  Resources with Extreme Value Theory},
  booktitle    = {Service-Oriented Computing - 20th International Conference, {ICSOC}
                  2022, Seville, Spain, November 29 - December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13740},
  pages        = {498--512},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20984-0\_35},
  doi          = {10.1007/978-3-031-20984-0\_35},
  timestamp    = {Fri, 25 Nov 2022 16:03:20 +0100},
  biburl       = {https://dblp.org/rec/conf/icsoc/LiSLZOZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/JiHLXLS22,
  author       = {Xiaolan Ji and
                  Biao Han and
                  Ruidong Li and
                  Cao Xu and
                  Yahui Li and
                  Jinshu Su},
  title        = {ACCeSS: Adaptive QoS-aware Congestion Control for Multipath {TCP}},
  booktitle    = {30th {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2022, Oslo, Norway, June 10-12, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IWQoS54832.2022.9812886},
  doi          = {10.1109/IWQOS54832.2022.9812886},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/JiHLXLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaCSZ21,
  author       = {Yusheng Xia and
                  Rongmao Chen and
                  Jinshu Su and
                  Hongcheng Zou},
  title        = {Balancing anonymity and resilience in anonymous communication networks},
  journal      = {Comput. Secur.},
  volume       = {101},
  pages        = {102106},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102106},
  doi          = {10.1016/J.COSE.2020.102106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaCSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ZhouOSLZ21,
  author       = {Huan Zhou and
                  Xue Ouyang and
                  Jinshu Su and
                  Cees de Laat and
                  Zhiming Zhao},
  title        = {Enforcing trustworthy cloud {SLA} with witnesses: {A} game theory-based
                  model using smart contracts},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {14},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.5511},
  doi          = {10.1002/CPE.5511},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/ZhouOSLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/ZhangYSWLS21,
  author       = {Shiwen Zhang and
                  Tingting Yao and
                  Voundi Koe Arthur Sandor and
                  Tien{-}Hsiung Weng and
                  Wei Liang and
                  Jinshu Su},
  title        = {A novel blockchain-based privacy-preserving framework for online social
                  networks},
  journal      = {Connect. Sci.},
  volume       = {33},
  number       = {3},
  pages        = {555--575},
  year         = {2021},
  url          = {https://doi.org/10.1080/09540091.2020.1854181},
  doi          = {10.1080/09540091.2020.1854181},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/ZhangYSWLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiSWX21,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Qianqian Xing},
  title        = {{DIIA:} Blockchain-Based Decentralized Infrastructure for Internet
                  Accountability},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {1974493:1--1974493:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/1974493},
  doi          = {10.1155/2021/1974493},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiSWX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XiaSCH21,
  author       = {Yusheng Xia and
                  Jinshu Su and
                  Rongmao Chen and
                  Xinyi Huang},
  title        = {{APGS:} An Efficient Source-Accountable and Metadata-Private Protocol
                  in the Network Layer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {1245--1260},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3032294},
  doi          = {10.1109/TIFS.2020.3032294},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XiaSCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiuZXSO21,
  author       = {Jiahao Liu and
                  Baokang Zhao and
                  Qin Xin and
                  Jinshu Su and
                  Wei Ou},
  title        = {{DRL-ER:} An Intelligent Energy-Aware Routing Protocol With Guaranteed
                  Delay Bounds in Satellite Mega-Constellations},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {2872--2884},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3039499},
  doi          = {10.1109/TNSE.2020.3039499},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/LiuZXSO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ZhaoLW0S21,
  author       = {Baokang Zhao and
                  Murao Lin and
                  Ziling Wei and
                  Qin Xin and
                  Jinshu Su},
  editor       = {Yongxuan Lai and
                  Tian Wang and
                  Min Jiang and
                  Guangquan Xu and
                  Wei Liang and
                  Aniello Castiglione},
  title        = {A Novel 3D Intelligent Cluster Method for Malicious Traffic Fine-Grained
                  Classification},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 21st International
                  Conference, {ICA3PP} 2021, Virtual Event, December 3-5, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13155},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95384-3\_25},
  doi          = {10.1007/978-3-030-95384-3\_25},
  timestamp    = {Thu, 03 Mar 2022 10:25:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ZhaoLW0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HouC0SX21,
  author       = {Bingnan Hou and
                  Zhiping Cai and
                  Kui Wu and
                  Jinshu Su and
                  Yinqiao Xiong},
  title        = {6Hit: {A} Reinforcement Learning-based Approach to Target Generation
                  for Internet-wide IPv6 Scanning},
  booktitle    = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021,
                  Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOM42981.2021.9488794},
  doi          = {10.1109/INFOCOM42981.2021.9488794},
  timestamp    = {Mon, 02 Aug 2021 15:15:40 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HouC0SX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/CaiHLZS21,
  author       = {Yang Cai and
                  Biao Han and
                  Jie Li and
                  Na Zhao and
                  Jinshu Su},
  title        = {ModelCoder: {A} Fault Model based Automatic Root Cause Localization
                  Framework for Microservice Systems},
  booktitle    = {29th {IEEE/ACM} International Symposium on Quality of Service, {IWQOS}
                  2021, Tokyo, Japan, June 25-28, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWQOS52092.2021.9521318},
  doi          = {10.1109/IWQOS52092.2021.9521318},
  timestamp    = {Sat, 15 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/CaiHLZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ZhaoHCS21,
  author       = {Na Zhao and
                  Biao Han and
                  Yang Cai and
                  Jinshu Su},
  title        = {SeqAD: An Unsupervised and Sequential Autoencoder Ensembles based
                  Anomaly Detection Framework for {KPI}},
  booktitle    = {29th {IEEE/ACM} International Symposium on Quality of Service, {IWQOS}
                  2021, Tokyo, Japan, June 25-28, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWQOS52092.2021.9521258},
  doi          = {10.1109/IWQOS52092.2021.9521258},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/ZhaoHCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/CaiHSW21,
  author       = {Yang Cai and
                  Biao Han and
                  Jinshu Su and
                  Xiaoyan Wang},
  title        = {TraceModel: An Automatic Anomaly Detection and Root Cause Localization
                  Framework for Microservice Systems},
  booktitle    = {17th International Conference on Mobility, Sensing and Networking,
                  {MSN} 2021, Exeter, United Kingdom, December 13-15, 2021},
  pages        = {512--519},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSN53354.2021.00081},
  doi          = {10.1109/MSN53354.2021.00081},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/CaiHSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/LiuWZSX21,
  author       = {Jiahao Liu and
                  Ziling Wei and
                  Baokang Zhao and
                  Jinshu Su and
                  Qin Xin},
  editor       = {Zhe Liu and
                  Fan Wu and
                  Sajal K. Das},
  title        = {A Probabilistic Resilient Routing Scheme for Low-Earth-Orbit Satellite
                  Constellations},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 16th International
                  Conference, {WASA} 2021, Nanjing, China, June 25-27, 2021, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12939},
  pages        = {254--261},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86137-7\_28},
  doi          = {10.1007/978-3-030-86137-7\_28},
  timestamp    = {Wed, 15 Sep 2021 18:38:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/LiuWZSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangCS20b,
  author       = {Xin Wang and
                  Shuhui Chen and
                  Jinshu Su},
  title        = {Automatic Mobile App Identification From Encrypted Traffic With Hybrid
                  Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {182065--182077},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3029190},
  doi          = {10.1109/ACCESS.2020.3029190},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangCS20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/PengZCSHL20,
  author       = {Ye Peng and
                  Wentao Zhao and
                  Wei Cai and
                  Jinshu Su and
                  Biao Han and
                  Qiang Liu},
  title        = {Evaluating Deep Learning for Image Classification in Adversarial Environment},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {4},
  pages        = {825--837},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2019EDP7188},
  doi          = {10.1587/TRANSINF.2019EDP7188},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicetd/PengZCSHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/LvWSCW20,
  author       = {Jiaxian Lv and
                  Yi Wang and
                  Jinshu Su and
                  Rongmao Chen and
                  Wenjun Wu},
  title        = {Security of Auditing Protocols Against Subversion Attacks},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {31},
  number       = {2},
  pages        = {193--206},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0129054120500033},
  doi          = {10.1142/S0129054120500033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/LvWSCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCSHW20,
  author       = {Jie Li and
                  Rongmao Chen and
                  Jinshu Su and
                  Xinyi Huang and
                  Xiaofeng Wang},
  title        = {{ME-TLS:} Middlebox-Enhanced {TLS} for Internet-of-Things Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {2},
  pages        = {1216--1229},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2953715},
  doi          = {10.1109/JIOT.2019.2953715},
  timestamp    = {Thu, 24 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiSW20,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal
                  Latency and Perfect Forward Secrecy},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {6828--6841},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2988126},
  doi          = {10.1109/JIOT.2020.2988126},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/LiuSZWCL20,
  author       = {Lin Liu and
                  Jinshu Su and
                  Baokang Zhao and
                  Qiong Wang and
                  Jinrong Chen and
                  Yuchuan Luo},
  title        = {Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service
                  in the Internet of Things},
  journal      = {Symmetry},
  volume       = {12},
  number       = {1},
  pages        = {103},
  year         = {2020},
  url          = {https://doi.org/10.3390/sym12010103},
  doi          = {10.3390/SYM12010103},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/LiuSZWCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuCLSQ20,
  author       = {Lin Liu and
                  Rongmao Chen and
                  Ximeng Liu and
                  Jinshu Su and
                  Linbo Qiao},
  title        = {Towards Practical Privacy-Preserving Decision Tree Training and Evaluation
                  in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2914--2929},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980192},
  doi          = {10.1109/TIFS.2020.2980192},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuCLSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/WeiSZL20,
  author       = {Ziling Wei and
                  Jinshu Su and
                  Baokang Zhao and
                  Xicheng Lu},
  title        = {Distributed Opportunistic Scheduling in Cooperative Networks With
                  {RF} Energy Harvesting},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {28},
  number       = {5},
  pages        = {2257--2270},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNET.2020.3011839},
  doi          = {10.1109/TNET.2020.3011839},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/WeiSZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/WangCS20,
  author       = {Xin Wang and
                  Shuhui Chen and
                  Jinshu Su},
  title        = {Real Network Traffic Collection and Deep Learning for Mobile App Identification},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {4707909:1--4707909:14},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/4707909},
  doi          = {10.1155/2020/4707909},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/WangCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aca/WangWKQLS20,
  author       = {Shiying Wang and
                  Lei Wang and
                  Ziyang Kang and
                  Lianhua Qu and
                  Shiming Li and
                  Jinshu Su},
  editor       = {Dezun Dong and
                  Xiaoli Gong and
                  Cunlu Li and
                  Dongsheng Li and
                  Junjie Wu},
  title        = {A Software-Hardware Co-exploration Framework for Optimizing Communication
                  in Neuromorphic Processor},
  booktitle    = {Advanced Computer Architecture - 13th Conference, {ACA} 2020, Kunming,
                  China, August 13-15, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1256},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-8135-9\_7},
  doi          = {10.1007/978-981-15-8135-9\_7},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aca/WangWKQLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XiaCSPS20,
  author       = {Yusheng Xia and
                  Rongmao Chen and
                  Jinshu Su and
                  Chen Pan and
                  Han Su},
  title        = {Hybrid Routing: Towards Resilient Routing in Anonymous Communication
                  Networks},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149166},
  doi          = {10.1109/ICC40277.2020.9149166},
  timestamp    = {Tue, 04 Aug 2020 10:37:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/XiaCSPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangCS20,
  author       = {Xin Wang and
                  Shuhui Chen and
                  Jinshu Su},
  title        = {App-Net: {A} Hybrid Neural Network for Encrypted Mobile Traffic Classification},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops
                  2020, Toronto, ON, Canada, July 6-9, 2020},
  pages        = {424--429},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162891},
  doi          = {10.1109/INFOCOMWKSHPS50562.2020.9162891},
  timestamp    = {Tue, 18 Aug 2020 11:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccfton/SuWL19,
  author       = {Jinshu Su and
                  Wen Wang and
                  Cong Liu},
  title        = {A survey of control consistency in Software-Defined Networking},
  journal      = {{CCF} Trans. Netw.},
  volume       = {2},
  number       = {3-4},
  pages        = {137--152},
  year         = {2019},
  url          = {https://doi.org/10.1007/s42045-019-00022-w},
  doi          = {10.1007/S42045-019-00022-W},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccfton/SuWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiSCWC19,
  author       = {Jie Li and
                  Jinshu Su and
                  Rongmao Chen and
                  Xiaofeng Wang and
                  Shuhui Chen},
  title        = {Practical privacy-preserving deep packet inspection outsourcing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4435},
  doi          = {10.1002/CPE.4435},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiSCWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WeiZSL19,
  author       = {Ziling Wei and
                  Baokang Zhao and
                  Jinshu Su and
                  Xicheng Lu},
  title        = {Dynamic Edge Computation Offloading for Internet of Things With Energy
                  Harvesting: {A} Learning Method},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4436--4447},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2882783},
  doi          = {10.1109/JIOT.2018.2882783},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WeiZSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuSLCHDW19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Ximeng Liu and
                  Rongmao Chen and
                  Kai Huang and
                  Robert H. Deng and
                  Xiaofeng Wang},
  title        = {Toward Highly Secure Yet Efficient {KNN} Classification Scheme on
                  Outsourced Cloud Data},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9841--9852},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2932444},
  doi          = {10.1109/JIOT.2019.2932444},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuSLCHDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoCSCS19,
  author       = {Shuang Zhao and
                  Shuhui Chen and
                  Yipin Sun and
                  Zhiping Cai and
                  Jinshu Su},
  title        = {Identifying Known and Unknown Mobile Application Traffic Using a Multilevel
                  Classifier},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9595081:1--9595081:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9595081},
  doi          = {10.1155/2019/9595081},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoCSCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/ZhouHOSKLZ19,
  author       = {Huan Zhou and
                  Yang Hu and
                  Xue Ouyang and
                  Jinshu Su and
                  Spiros Koulouzis and
                  Cees de Laat and
                  Zhiming Zhao},
  title        = {CloudsStorm: {A} framework for seamlessly programming and controlling
                  virtual infrastructure functions during the DevOps lifecycle of cloud
                  applications},
  journal      = {Softw. Pract. Exp.},
  volume       = {49},
  number       = {10},
  pages        = {1421--1447},
  year         = {2019},
  url          = {https://doi.org/10.1002/spe.2741},
  doi          = {10.1002/SPE.2741},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/ZhouHOSKLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/DaiLXS19,
  author       = {Yi Dai and
                  Kai Lu and
                  Liquan Xiao and
                  Jinshu Su},
  title        = {A Cost-Efficient Router Architecture for {HPC} Inter-Connection Networks:
                  Design and Implementation},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {30},
  number       = {4},
  pages        = {738--753},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPDS.2018.2873337},
  doi          = {10.1109/TPDS.2018.2873337},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/DaiLXS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/LuZWSLT19,
  author       = {Shaofei Lu and
                  Qian Zeng and
                  Heng Wu and
                  Jinshu Su and
                  Xuchong Liu and
                  Hongliang Tang},
  editor       = {Zheng Xiao and
                  Laurence T. Yang and
                  Pavan Balaji and
                  Tao Li and
                  Keqin Li and
                  Albert Y. Zomaya},
  title        = {A New Power Load Forecasting Model (SIndRNN): Independently Recurrent
                  Neural Network Based on Softmax Kernel Function},
  booktitle    = {21st {IEEE} International Conference on High Performance Computing
                  and Communications; 17th {IEEE} International Conference on Smart
                  City; 5th {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019},
  pages        = {2305--2310},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00320},
  doi          = {10.1109/HPCC/SMARTCITY/DSS.2019.00320},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/LuZWSLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WeiZS19,
  author       = {Ziling Wei and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {Cooperative Sensing in Cognitive Radio Ad Hoc Networks},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761461},
  doi          = {10.1109/ICC.2019.8761461},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WeiZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/SuHLLS19,
  author       = {Jinshu Su and
                  Biao Han and
                  Gaofeng Lv and
                  Tao Li and
                  Zhigang Sun},
  title        = {A Heterogeneous Parallel Packet Processing Architecture for {NFV}
                  Acceleration},
  booktitle    = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICNP.2019.8888106},
  doi          = {10.1109/ICNP.2019.8888106},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/SuHLLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhouORSLZ19,
  author       = {Huan Zhou and
                  Xue Ouyang and
                  Zhijie Ren and
                  Jinshu Su and
                  Cees de Laat and
                  Zhiming Zhao},
  title        = {A Blockchain based Witness Model for Trustworthy Cloud Service Level
                  Agreement Enforcement},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {1567--1575},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737580},
  doi          = {10.1109/INFOCOM.2019.8737580},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhouORSLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/LiuSCCSL19,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Jinrong Chen and
                  Guangliang Sun and
                  Jie Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Secure and Fast Decision Tree Evaluation on Outsourced Cloud Data},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {361--377},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_26},
  doi          = {10.1007/978-3-030-30619-9\_26},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/LiuSCCSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiSW19,
  author       = {Pengkun Li and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through
                  Minimal Latency},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2019 Conference Posters and Demos,
                  {SIGCOMM} 2019, Beijing, China, August 19-23, 2019},
  pages        = {166--168},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342280.3342347},
  doi          = {10.1145/3342280.3342347},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanYSHS18,
  author       = {Biao Han and
                  Xiangrui Yang and
                  Zhigang Sun and
                  Jinfeng Huang and
                  Jinshu Su},
  title        = {OverWatch: {A} Cross-Plane DDoS Attack Defense Framework with Collaborative
                  Intelligence in {SDN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9649643:1--9649643:15},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9649643},
  doi          = {10.1155/2018/9649643},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanYSHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/WangS18a,
  author       = {Binfeng Wang and
                  Jinshu Su},
  title        = {FlexMonitor: {A} Flexible Monitoring Framework in {SDN}},
  journal      = {Symmetry},
  volume       = {10},
  number       = {12},
  pages        = {713},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10120713},
  doi          = {10.3390/SYM10120713},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/WangS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhangLSZSL18,
  author       = {Yiming Zhang and
                  Dongsheng Li and
                  Zhigang Sun and
                  Feng Zhao and
                  Jinshu Su and
                  Xicheng Lu},
  title        = {{CSR:} Classified Source Routing in Distributed Networks},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {2},
  pages        = {464--477},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2440242},
  doi          = {10.1109/TCC.2015.2440242},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhangLSZSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ZhouHSCLZ18,
  author       = {Huan Zhou and
                  Yang Hu and
                  Jinshu Su and
                  Mingmin Chi and
                  Cees de Laat and
                  Zhiming Zhao},
  title        = {Empowering Dynamic Task-Based Applications with Agile Virtual Infrastructure
                  Programmability},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {484--491},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00068},
  doi          = {10.1109/CLOUD.2018.00068},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ZhouHSCLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Ximeng Liu and
                  Xiaofeng Wang and
                  Shuhui Chen and
                  Ho{-}fung Leung},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
                  Data from Multiple Parties},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi          = {10.1007/978-3-319-93638-3\_25},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud2/ZhouHSLZ18,
  author       = {Huan Zhou and
                  Yang Hu and
                  Jinshu Su and
                  Cees de Laat and
                  Zhiming Zhao},
  editor       = {Min Luo and
                  Liang{-}Jie Zhang},
  title        = {CloudsStorm: An Application-Driven Framework to Enhance the Programmability
                  and Controllability of Cloud Virtual Infrastructures},
  booktitle    = {Cloud Computing - {CLOUD} 2018 - 11th International Conference, Held
                  as Part of the Services Conference Federation, {SCF} 2018, Seattle,
                  WA, USA, June 25-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10967},
  pages        = {265--280},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94295-7\_18},
  doi          = {10.1007/978-3-319-94295-7\_18},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud2/ZhouHSLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ChenSQZX18,
  author       = {Hongyi Chen and
                  Jinshu Su and
                  Linbo Qiao and
                  Yi Zhang and
                  Qin Xin},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Malware Collusion Attack Against Machine Learning Based Methods: Issues
                  and Countermeasures},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11067},
  pages        = {465--477},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00018-9\_41},
  doi          = {10.1007/978-3-030-00018-9\_41},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ChenSQZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/XuSC18,
  author       = {Chengcheng Xu and
                  Jinshu Su and
                  Shuhui Chen},
  title        = {Exploring Efficient {NFA} Data Structures to Accelerate {DFA} Generation},
  booktitle    = {Proceedings of the 2nd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018},
  pages        = {56--61},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3199478.3199509},
  doi          = {10.1145/3199478.3199509},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsp/XuSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/XiaSCLC18,
  author       = {Yusheng Xia and
                  Jinshu Su and
                  Rongmao Chen and
                  Yaping Liu and
                  Shuhui Chen},
  title        = {A Real-Time Aware Routing Strategy in Smart City Environments},
  booktitle    = {2018 {IEEE} International Conference on Sensing, Communication and
                  Networking, {SECON} Workshops 2018, Hong Kong, Hong Kong, June 11,
                  2018},
  pages        = {9--14},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SECONW.2018.8396343},
  doi          = {10.1109/SECONW.2018.8396343},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/XiaSCLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/WangHSW18,
  author       = {Hanwen Wang and
                  Biao Han and
                  Jinshu Su and
                  Xiaoyan Wang},
  editor       = {Guojun Wang and
                  Qi Han and
                  Md. Zakirul Alam Bhuiyan and
                  Xiaoxing Ma and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Peng Li and
                  Manuel Roveri and
                  Lei Chen},
  title        = {A High-Performance Intrusion Detection Method Based on Combining Supervised
                  and Unsupervised Learning},
  booktitle    = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou,
                  China, October 8-12, 2018},
  pages        = {1803--1810},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartWorld.2018.00304},
  doi          = {10.1109/SMARTWORLD.2018.00304},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/WangHSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/HeZSZ17,
  author       = {Qian He and
                  Ning Zhang and
                  Jinshu Su and
                  Xiaosong Zhang},
  title        = {Fast backup and recovery for web protectiuon using trigger and block
                  hash approach},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {32},
  number       = {2},
  year         = {2017},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/HeZSZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/QiaoZSL17,
  author       = {Lin{-}Bo Qiao and
                  Bo{-}Feng Zhang and
                  Jinshu Su and
                  Xicheng Lu},
  title        = {A systematic review of structured sparse learning},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {18},
  number       = {4},
  pages        = {445--463},
  year         = {2017},
  url          = {https://doi.org/10.1631/FITEE.1601489},
  doi          = {10.1631/FITEE.1601489},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/QiaoZSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/ChengSX17,
  author       = {Mian Cheng and
                  Jinshu Su and
                  Jing Xu},
  title        = {Real-time pre-processing system with hardware accelerator for mobile
                  core networks},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {18},
  number       = {11},
  pages        = {1720--1731},
  year         = {2017},
  url          = {https://doi.org/10.1631/FITEE.1700507},
  doi          = {10.1631/FITEE.1700507},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/ChengSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LaiLWS17,
  author       = {Zhiquan Lai and
                  King Tin Lam and
                  Cho{-}Li Wang and
                  Jinshu Su},
  title        = {PoweRock: Power Modeling and Flexible Dynamic Power Management for
                  Many-Core Architectures},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {600--612},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2499307},
  doi          = {10.1109/JSYST.2015.2499307},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LaiLWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/SunWBS17,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {CloudEyes: Cloud-based malware detection with reversible sketch for
                  resource-constrained internet of things (IoT) devices},
  journal      = {Softw. Pract. Exp.},
  volume       = {47},
  number       = {3},
  pages        = {421--441},
  year         = {2017},
  url          = {https://doi.org/10.1002/spe.2420},
  doi          = {10.1002/SPE.2420},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/SunWBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi          = {10.1007/978-3-319-59870-3\_9},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/WangSCDZ17,
  author       = {Binfeng Wang and
                  Jinshu Su and
                  Lin Chen and
                  Jinsheng Deng and
                  Long Zheng},
  title        = {EffiEye: Application-aware Large Flow Detection in Data Center},
  booktitle    = {Proceedings of the 17th {IEEE/ACM} International Symposium on Cluster,
                  Cloud and Grid Computing, {CCGRID} 2017, Madrid, Spain, May 14-17,
                  2017},
  pages        = {794--796},
  publisher    = {{IEEE} Computer Society / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCGRID.2017.90},
  doi          = {10.1109/CCGRID.2017.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/WangSCDZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LiSWSC17,
  author       = {Jie Li and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Hao Sun and
                  Shuhui Chen},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via
                  Reversible Sketch},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {119--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_9},
  doi          = {10.1007/978-3-319-69471-9\_9},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/LiSWSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/WangSLH17,
  author       = {Binfeng Wang and
                  Jinshu Su and
                  Junnan Li and
                  Biao Han},
  title        = {EffiView: Trigger-Based Monitoring Approach with Low Cost in {SDN}},
  booktitle    = {19th {IEEE} International Conference on High Performance Computing
                  and Communications; 15th {IEEE} International Conference on Smart
                  City; 3rd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2017, Bangkok, Thailand, December 18-20, 2017},
  pages        = {309--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2017.41},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2017.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/WangSLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChenLHS17,
  author       = {Hongyi Chen and
                  Ho{-}fung Leung and
                  Biao Han and
                  Jinshu Su},
  title        = {Automatic privacy leakage detection for massive android apps via a
                  novel hybrid approach},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996335},
  doi          = {10.1109/ICC.2017.7996335},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/ChenLHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangHS17,
  author       = {Wen Wang and
                  Wenbo He and
                  Jinshu Su},
  title        = {Enhancing the effectiveness of traffic engineering in hybrid {SDN}},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996839},
  doi          = {10.1109/ICC.2017.7996839},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangHS17,
  author       = {Wen Wang and
                  Wenbo He and
                  Jinshu Su},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Boosting The Benefits of Hybrid {SDN}},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2165--2170},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.302},
  doi          = {10.1109/ICDCS.2017.302},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc2/XuSCH17,
  author       = {Chengcheng Xu and
                  Jinshu Su and
                  Shuhui Chen and
                  Biao Han},
  title        = {Offset-FA: Detach the Closures and Countings for Efficient Regular
                  Expression Matching},
  booktitle    = {2017 {IEEE} 7th International Symposium on Cloud and Service Computing,
                  SC{\({^2}\)} 2017, Kanazawa, Japan, November 22-25, 2017},
  pages        = {263--266},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SC2.2017.50},
  doi          = {10.1109/SC2.2017.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sc2/XuSCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChenSYS16,
  author       = {Hongyi Chen and
                  Zhigang Sun and
                  Fei Yi and
                  Jinshu Su},
  title        = {BufferBank storage: an economic, scalable and universally usable in-network
                  storage model for streaming data applications},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {1},
  pages        = {1--15},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-015-5299-5},
  doi          = {10.1007/S11432-015-5299-5},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChenSYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/XuCSYH16,
  author       = {Chengcheng Xu and
                  Shuhui Chen and
                  Jinshu Su and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  title        = {A Survey on Regular Expression Matching for Deep Packet Inspection:
                  Applications, Algorithms, and Hardware Platforms},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {4},
  pages        = {2991--3029},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2016.2566669},
  doi          = {10.1109/COMST.2016.2566669},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/XuCSYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WuLLSC16,
  author       = {Yilun Wu and
                  Xinye Lin and
                  Xicheng Lu and
                  Jinshu Su and
                  Peixin Chen},
  title        = {A Secure Light-Weight Public Auditing Scheme in Cloud Computing with
                  Potentially Malicious Third Party Auditor},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {10},
  pages        = {2638--2642},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8079},
  doi          = {10.1587/TRANSINF.2016EDL8079},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WuLLSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChenWSW16,
  author       = {Peixin Chen and
                  Yilun Wu and
                  Jinshu Su and
                  Xiaofeng Wang},
  title        = {Comparing Performance of Hierarchical Identity-Based Signature Schemes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {12},
  pages        = {3181--3184},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8136},
  doi          = {10.1587/TRANSINF.2016EDL8136},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChenWSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LiuPSW16,
  author       = {Yujing Liu and
                  Wei Peng and
                  Jinshu Su and
                  Zhilin Wang},
  title        = {Assessing Resilience of Inter-Domain Routing System under Regional
                  Failures},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {1630--1642},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.04.009},
  doi          = {10.3837/TIIS.2016.04.009},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LiuPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/HeZCSY16,
  author       = {Qian He and
                  Baokang Zhao and
                  Liang Chang and
                  Jinshu Su and
                  Ilsun You},
  title        = {{PSSRC:} {A} Web Service Registration Cloud Based on Structured {P2P}
                  and Semantics},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {12},
  number       = {2},
  pages        = {21--38},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJDWM.2016040102},
  doi          = {10.4018/IJDWM.2016040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdwm/HeZCSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/WuLSC16,
  author       = {Yilun Wu and
                  Xicheng Lu and
                  Jinshu Su and
                  Peixin Chen},
  title        = {An Efficient Searchable Encryption Against Keyword Guessing Attacks
                  for Sharable Electronic Medical Records in Cloud-based System},
  journal      = {J. Medical Syst.},
  volume       = {40},
  number       = {12},
  pages        = {258:1--258:9},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10916-016-0609-z},
  doi          = {10.1007/S10916-016-0609-Z},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/WuLSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenSZWY16,
  author       = {Peixin Chen and
                  Jinshu Su and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {An escrow-free online/offline {HIBS} scheme for privacy protection
                  of people-centric sensing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {14},
  pages        = {2302--2312},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1492},
  doi          = {10.1002/SEC.1492},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenSZWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LiPYS16,
  author       = {Yuan Li and
                  Michal Pi{\'{o}}ro and
                  Di Yuan and
                  Jinshu Su},
  title        = {Optimizing link rate assignment and transmission scheduling in {WMN}
                  through compatible set generation},
  journal      = {Telecommun. Syst.},
  volume       = {61},
  number       = {2},
  pages        = {325--335},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11235-015-0004-y},
  doi          = {10.1007/S11235-015-0004-Y},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LiPYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/ZhaoLWYSYP16,
  author       = {Baokang Zhao and
                  Bo Liu and
                  Chunqing Wu and
                  Wanrong Yu and
                  Jinshu Su and
                  Ilsun You and
                  Francesco Palmieri},
  title        = {A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution
                  Systems},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {63},
  number       = {8},
  pages        = {5101--5108},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIE.2016.2552152},
  doi          = {10.1109/TIE.2016.2552152},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/ZhaoLWYSYP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ZhouWHS0LZ16,
  author       = {Huan Zhou and
                  Junchao Wang and
                  Yang Hu and
                  Jinshu Su and
                  Paul Martin and
                  Cees T. A. M. de Laat and
                  Zhiming Zhao},
  title        = {Fast Resource Co-provisioning for Time Critical Applications Based
                  on Networked Infrastructures},
  booktitle    = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016,
                  San Francisco, CA, USA, June 27 - July 2, 2016},
  pages        = {802--805},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CLOUD.2016.0111},
  doi          = {10.1109/CLOUD.2016.0111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ZhouWHS0LZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acml/QiaoZSL16,
  author       = {Linbo Qiao and
                  Bofeng Zhang and
                  Jinshu Su and
                  Xicheng Lu},
  editor       = {Robert J. Durrant and
                  Kee{-}Eung Kim},
  title        = {Linearized Alternating Direction Method of Multipliers for Constrained
                  Nonconvex Regularized Optimization},
  booktitle    = {Proceedings of The 8th Asian Conference on Machine Learning, {ACML}
                  2016, Hamilton, New Zealand, November 16-18, 2016},
  series       = {{JMLR} Workshop and Conference Proceedings},
  volume       = {63},
  pages        = {97--109},
  publisher    = {JMLR.org},
  year         = {2016},
  url          = {http://proceedings.mlr.press/v63/qiao37.html},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acml/QiaoZSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/ChengSZS16,
  author       = {Mian Cheng and
                  Yipin Sun and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Yanbo Han and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {An Event Grouping Approach for Infinite Stream with Differential Privacy},
  booktitle    = {Advances in Services Computing - 10th Asia-Pacific Services Computing
                  Conference, {APSCC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10065},
  pages        = {106--116},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49178-3\_8},
  doi          = {10.1007/978-3-319-49178-3\_8},
  timestamp    = {Mon, 23 Jan 2023 10:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/ChengSZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/QiaoZZS16,
  author       = {Linbo Qiao and
                  Bofeng Zhang and
                  Lei Zhuang and
                  Jinshu Su},
  title        = {An Efficient Algorithm for Tensor Principal Component Analysis via
                  Proximal Linearized Alternating Direction Method of Multipliers},
  booktitle    = {International Conference on Advanced Cloud and Big Data, {CBD} 2016,
                  Chengdu, China, August 13-16, 2016},
  pages        = {283--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CBD.2016.056},
  doi          = {10.1109/CBD.2016.056},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cbd/QiaoZZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/WangHS16,
  author       = {Wen Wang and
                  Wenbo He and
                  Jinshu Su},
  title        = {Redactor: Reconcile network control with declarative control programs
                  In {SDN}},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784433},
  doi          = {10.1109/ICNP.2016.7784433},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/WangHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictc/LiCS16,
  author       = {Jie Li and
                  Shuhui Chen and
                  Jinshu Su},
  title        = {Implementation of {TCP} large receive offload on multi-core {NPU}
                  platform},
  booktitle    = {International Conference on Information and Communication Technology
                  Convergence, {ICTC} 2016, Jeju Island, South Korea, October 19-21,
                  2016},
  pages        = {258--263},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICTC.2016.7763481},
  doi          = {10.1109/ICTC.2016.7763481},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictc/LiCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/XiaLS16,
  author       = {Yusheng Xia and
                  Yaping Liu and
                  Jinshu Su},
  title        = {Tendency-based caching in Content-Centric Networking},
  booktitle    = {Eighth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2016, Vienna, Austria, July 5-8, 2016},
  pages        = {960--965},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICUFN.2016.7536940},
  doi          = {10.1109/ICUFN.2016.7536940},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icufn/XiaLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangHSC16,
  author       = {Wen Wang and
                  Wenbo He and
                  Jinshu Su and
                  Yixin Chen},
  title        = {Cupid: Congestion-free consistent data plane update in software defined
                  networks},
  booktitle    = {35th Annual {IEEE} International Conference on Computer Communications,
                  {INFOCOM} 2016, San Francisco, CA, USA, April 10-14, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INFOCOM.2016.7524420},
  doi          = {10.1109/INFOCOM.2016.7524420},
  timestamp    = {Fri, 13 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WangHSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/XuZCS16,
  author       = {Chengcheng Xu and
                  Baokang Zhao and
                  Shuhui Chen and
                  Jinshu Su},
  editor       = {Ilsun You and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen and
                  Igor V. Kotenko},
  title        = {A Novel Hybrid Architecture for High Speed Regular Expression Matching},
  booktitle    = {Mobile Internet Security - First International Symposium, MobiSec
                  2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {797},
  pages        = {164--174},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-7850-7\_15},
  doi          = {10.1007/978-981-10-7850-7\_15},
  timestamp    = {Wed, 17 Jan 2018 14:38:18 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/XuZCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/QiaoZSS16,
  author       = {Linbo Qiao and
                  Bofeng Zhang and
                  Yipin Sun and
                  Jinshu Su},
  editor       = {Huiping Cao and
                  Jinyan Li and
                  Ruili Wang},
  title        = {Rigidly Self-Expressive Sparse Subspace Clustering},
  booktitle    = {Trends and Applications in Knowledge Discovery and Data Mining - {PAKDD}
                  2016 Workshops, BDM, MLSDA, PACC, {WDMBF} Auckland, New Zealand, April
                  19, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9794},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42996-0\_9},
  doi          = {10.1007/978-3-319-42996-0\_9},
  timestamp    = {Wed, 07 Apr 2021 15:15:53 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/QiaoZSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/WangLSH16,
  author       = {Wen Wang and
                  Cong Liu and
                  Jinshu Su and
                  Wenbo He},
  editor       = {Marinho P. Barcellos and
                  Jon Crowcroft and
                  Amin Vahdat and
                  Sachin Katti},
  title        = {Achieving Consistent {SDN} Control With Declarative Applications},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis,
                  Brazil, August 22-26, 2016},
  pages        = {585--586},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2934872.2959060},
  doi          = {10.1145/2934872.2959060},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/WangLSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/SuCHXW16,
  author       = {Jinshu Su and
                  Shuhui Chen and
                  Biao Han and
                  Chengcheng Xu and
                  Xin Wang},
  editor       = {Marinho P. Barcellos and
                  Jon Crowcroft and
                  Amin Vahdat and
                  Sachin Katti},
  title        = {A 60Gbps {DPI} Prototype based on Memory-Centric {FPGA}},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2016 Conference, Florianopolis,
                  Brazil, August 22-26, 2016},
  pages        = {627--628},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2934872.2959079},
  doi          = {10.1145/2934872.2959079},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/SuCHXW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ChengZS16,
  author       = {Mian Cheng and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jose M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {A Real-Time Processing System for Anonymization of Mobile Core Network
                  Traffic},
  booktitle    = {Security, Privacy and Anonymity in Computation, Communication and
                  Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE,
                  DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10067},
  pages        = {229--237},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49145-5\_23},
  doi          = {10.1007/978-3-319-49145-5\_23},
  timestamp    = {Mon, 05 Feb 2024 20:29:50 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/ChengZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/GuoCYSL15,
  author       = {Wenzhong Guo and
                  Guolong Chen and
                  Chaolong Yu and
                  Jinshu Su and
                  Zhanghui Liu},
  title        = {A Two-stage Clustering Sleep Scheduling Algorithm with Particle Swarm
                  Optimization in Wireless Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {27},
  number       = {1-2},
  pages        = {27--49},
  year         = {2015},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-27-number-1-2-2015/ahswn-27-1-2-p-27-49/},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ahswn/GuoCYSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/CaoS15,
  author       = {Jijun Cao and
                  Jinshu Su},
  title        = {Improving application layer multicast forwarding performance by offloading
                  multisend operations},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {30},
  number       = {3},
  year         = {2015},
  timestamp    = {Mon, 27 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/CaoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WangSWWL15,
  author       = {Xiaofeng Wang and
                  Jinshu Su and
                  Baosheng Wang and
                  Guojun Wang and
                  Ho{-}fung Leung},
  title        = {Trust Description and Propagation System: Semantics and axiomatization},
  journal      = {Knowl. Based Syst.},
  volume       = {90},
  pages        = {81--91},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.knosys.2015.09.030},
  doi          = {10.1016/J.KNOSYS.2015.09.030},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/WangSWWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SunZZSS15,
  author       = {Yipin Sun and
                  Bofeng Zhang and
                  Baokang Zhao and
                  Xiangyu Su and
                  Jinshu Su},
  title        = {Mix-zones optimal deployment for protecting location privacy in {VANET}},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {6},
  pages        = {1108--1121},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-014-0269-z},
  doi          = {10.1007/S12083-014-0269-Z},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SunZZSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuWSR15,
  author       = {Jinshu Su and
                  Xiaofeng Wang and
                  Weisong Shi and
                  Indrakshi Ray},
  title        = {Security, trust, and resilience of distributed networks and systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1829--1830},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1276},
  doi          = {10.1002/SEC.1276},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuWSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoSLS15,
  author       = {Guangyao Zhao and
                  Bing Sun and
                  Chao Li and
                  Jinshu Su},
  title        = {Truncated differential cryptanalysis of {PRINCE}},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2875--2887},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1213},
  doi          = {10.1002/SEC.1213},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoSLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/LaiLWS15,
  author       = {Zhiquan Lai and
                  King Tin Lam and
                  Cho{-}Li Wang and
                  Jinshu Su},
  title        = {Latency-aware {DVFS} for efficient power state transitions on many-core
                  architectures},
  journal      = {J. Supercomput.},
  volume       = {71},
  number       = {7},
  pages        = {2720--2747},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11227-015-1415-y},
  doi          = {10.1007/S11227-015-1415-Y},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/LaiLWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/HanLSGZ15,
  author       = {Biao Han and
                  Jie Li and
                  Jinshu Su and
                  Minyi Guo and
                  Baokang Zhao},
  title        = {Secrecy Capacity Optimization via Cooperative Relaying and Jamming
                  for WANETs},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {26},
  number       = {4},
  pages        = {1117--1128},
  year         = {2015},
  url          = {https://doi.org/10.1109/TPDS.2014.2316155},
  doi          = {10.1109/TPDS.2014.2316155},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/HanLSGZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/WuSL15,
  author       = {Yilun Wu and
                  Jinshu Su and
                  Baochun Li},
  editor       = {Calton Pu and
                  Ajay Mohindra},
  title        = {Keyword Search over Shared Cloud Data without Secure Channel or Authority},
  booktitle    = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015,
                  New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {580--587},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CLOUD.2015.83},
  doi          = {10.1109/CLOUD.2015.83},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/WuSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ChenWZSSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Hao Sun and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite
                  Order Bilinear Groups},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {364--369},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.9},
  doi          = {10.1109/BWCCA.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/ChenWZSSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenWWSZ15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Yilun Wu and
                  Jinshu Su and
                  Huan Zhou},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing
                  {BGP} Protocol},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1632--1634},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810116},
  doi          = {10.1145/2810103.2810116},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenWWSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {A Hierarchical Identity-Based Signature from Composite Order Bilinear
                  Groups},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {46--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_5},
  doi          = {10.1007/978-3-319-27161-3\_5},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XuCWS15,
  author       = {Chengcheng Xu and
                  Shuhui Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {An Efficient Pre-filter to Accelerate Regular Expression Matching},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {111--119},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_10},
  doi          = {10.1007/978-3-319-27161-3\_10},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/XuCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWZSY15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Removing Key Escrow from the {LW-HIBE} Scheme},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {593--605},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_54},
  doi          = {10.1007/978-3-319-27161-3\_54},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenWZSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ChenWS15a,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud
                  Storage},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {633--647},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_58},
  doi          = {10.1007/978-3-319-27161-3\_58},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ChenWS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FeiZWYHS15,
  author       = {Changjiang Fei and
                  Baokang Zhao and
                  Chunqing Wu and
                  Wanrong Yu and
                  Biao Han and
                  Jinshu Su},
  title        = {Towards efficient radio resource scheduling in LTE-based satellite
                  mobile communication system},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179379},
  doi          = {10.1109/INFCOMW.2015.7179379},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/FeiZWYHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/WangHS15,
  author       = {Wen Wang and
                  Wenbo He and
                  Jinshu Su},
  title        = {Network intrusion detection and prevention middlebox management in
                  {SDN}},
  booktitle    = {34th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2015, Nanjing, China, December 14-16, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PCCC.2015.7410312},
  doi          = {10.1109/PCCC.2015.7410312},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/WangHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/WangHS15,
  author       = {Wen Wang and
                  Wenbo He and
                  Jinshu Su},
  title        = {{M2SDN:} Achieving multipath and multihoming in data centers with
                  software defined networking},
  booktitle    = {23rd {IEEE} International Symposium on Quality of Service, IWQoS 2015,
                  Portland, OR, USA, June 15-16, 2015},
  pages        = {11--20},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IWQoS.2015.7404697},
  doi          = {10.1109/IWQOS.2015.7404697},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/WangHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qshine/ZhaoWLSY15,
  author       = {Baokang Zhao and
                  Ziling Wei and
                  Bo Liu and
                  Jinshu Su and
                  Ilsun You},
  title        = {Providing adaptive quality of security in quantum networks},
  booktitle    = {11th International Conference on Heterogeneous Networking for Quality,
                  Reliability, Security and Robustness, {QSHINE} 2015, Taipei, Taiwan,
                  August 19-20, 2015},
  pages        = {440--445},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/document/7332609/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qshine/ZhaoWLSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SunWSC15,
  author       = {Hao Sun and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Peixin Chen},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {RScam: Cloud-Based Anti-Malware via Reversible Sketch},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_9},
  doi          = {10.1007/978-3-319-28865-9\_9},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SunWSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/Chen0S15,
  author       = {Peixin Chen and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {{T-HIBE:} {A} Trustworthy {HIBE} Scheme for the {OSN} Privacy Protection},
  booktitle    = {International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015},
  pages        = {72--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SocialSec2015.11},
  doi          = {10.1109/SOCIALSEC2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/Chen0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/ZhangLWSZS15,
  author       = {Yiming Zhang and
                  Dongsheng Li and
                  Yijie Wang and
                  Zhigang Sun and
                  Feng Zhao and
                  Jinshu Su},
  title        = {Design, Implementation and Evaluation of an Application-Layer Virtualized
                  Network},
  booktitle    = {2015 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE}
                  2015, San Francisco Bay, CA, USA, March 30 - April 3, 2015},
  pages        = {235--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SOSE.2015.41},
  doi          = {10.1109/SOSE.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/ZhangLWSZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/SunCHZS15,
  author       = {Yipin Sun and
                  Shuhui Chen and
                  Biao Han and
                  Bofeng Zhang and
                  Jinshu Su},
  editor       = {Kuai Xu and
                  Haojin Zhu},
  title        = {A Novel Location Privacy Mining Threat in Vehicular Internet Access
                  Service},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 10th International
                  Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9204},
  pages        = {467--476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21837-3\_46},
  doi          = {10.1007/978-3-319-21837-3\_46},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/SunCHZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejco/LiPYS14,
  author       = {Yuan Li and
                  Michal Pi{\'{o}}ro and
                  Di Yuan and
                  Jinshu Su},
  title        = {Optimizing compatible sets in wireless networks through integer programming},
  journal      = {{EURO} J. Comput. Optim.},
  volume       = {2},
  number       = {1-2},
  pages        = {1--15},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13675-013-0015-y},
  doi          = {10.1007/S13675-013-0015-Y},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejco/LiPYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/SuCZWY14,
  author       = {Jinshu Su and
                  Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Ilsun You},
  title        = {ePASS: An expressive attribute-based signature scheme with privacy
                  and an unforgeability guarantee for the Internet of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {33},
  pages        = {11--18},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2013.10.016},
  doi          = {10.1016/J.FUTURE.2013.10.016},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/SuCZWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/WeiZLSXX14,
  author       = {Ziling Wei and
                  Baokang Zhao and
                  Bo Liu and
                  Jinshu Su and
                  Liyang Xu and
                  Erci Xu},
  title        = {A novel steganography approach for voice over {IP}},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {601--610},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12652-013-0212-9},
  doi          = {10.1007/S12652-013-0212-9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/WeiZLSXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/MaWSWYZ14,
  author       = {Yanpeng Ma and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Chunqing Wu and
                  Wanrong Yu and
                  Baokang Zhao},
  title        = {A Multicast Routing Algorithm for Datagram Service in Delta {LEO}
                  Satellite Constellation Networks},
  journal      = {J. Networks},
  volume       = {9},
  number       = {4},
  pages        = {896--907},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.4.896-907},
  doi          = {10.4304/JNW.9.4.896-907},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/MaWSWYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/LiuPSW14,
  author       = {Yujing Liu and
                  Wei Peng and
                  Jinshu Su and
                  Zhilin Wang},
  title        = {Assessing the Impact of Cascading Failures on the Interdomain Routing
                  System of the Internet},
  journal      = {New Gener. Comput.},
  volume       = {32},
  number       = {3-4},
  pages        = {237--255},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00354-014-0403-8},
  doi          = {10.1007/S00354-014-0403-8},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/LiuPSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuPS14,
  author       = {Yujing Liu and
                  Wei Peng and
                  Jinshu Su},
  title        = {A study of {IP} prefix hijacking in cloud computing networks},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {2201--2210},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.738},
  doi          = {10.1002/SEC.738},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/PengDYS14,
  author       = {Wei Peng and
                  Guohua Dong and
                  Kun Yang and
                  Jinshu Su},
  title        = {A Random Road Network Model and Its Effects on Topological Characteristics
                  of Mobile Delay-Tolerant Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {12},
  pages        = {2706--2718},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2013.66},
  doi          = {10.1109/TMC.2013.66},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/PengDYS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LuZSX14,
  author       = {Huabiao Lu and
                  Baokang Zhao and
                  Jinshu Su and
                  Peidai Xie},
  title        = {Generating Lightweight Behavioral Signature for Malware Detection
                  in People-Centric Sensing},
  journal      = {Wirel. Pers. Commun.},
  volume       = {75},
  number       = {3},
  pages        = {1591--1609},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11277-013-1400-9},
  doi          = {10.1007/S11277-013-1400-9},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LuZSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhaoCZYSY14,
  author       = {Guohong Zhao and
                  Shuhui Chen and
                  Baokang Zhao and
                  Ilsun You and
                  Jinshu Su and
                  Wanrong Yu},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {A High-Speed Network Content Filtering System},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {257--269},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_20},
  doi          = {10.1007/978-3-319-10975-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhaoCZYSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HeZLSY14,
  author       = {Qian He and
                  Baokang Zhao and
                  Yunjian Long and
                  Jinshu Su and
                  Ilsun You},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {A Structure {P2P} Based Web Services Registry with Access and Control},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_23},
  doi          = {10.1007/978-3-319-10975-6\_23},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HeZLSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangZSZY14,
  author       = {Xiaofeng Wang and
                  Huan Zhou and
                  Jinshu Su and
                  Bofeng Zhang and
                  Fan Yang},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol
                  with Full Compliance to {TCP/IP}},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1520--1522},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662371},
  doi          = {10.1145/2660267.2662371},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangZSZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/LaiZS14,
  author       = {Zhiquan Lai and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Efficient {DVFS} to Prevent Hard Faults for Many-Core Architectures},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {674--679},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_69},
  doi          = {10.1007/978-3-642-55032-4\_69},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/LaiZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skg/LaiLWS14,
  author       = {Zhiquan Lai and
                  King Tin Lam and
                  Cho{-}Li Wang and
                  Jinshu Su},
  title        = {A Power Modelling Approach for Many-Core Architectures},
  booktitle    = {2014 10th International Conference on Semantics, Knowledge and Grids,
                  Beijing, China, August 27-29, 2014},
  pages        = {128--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SKG.2014.10},
  doi          = {10.1109/SKG.2014.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skg/LaiLWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/WeiSZ14,
  author       = {Ziling Wei and
                  Jinshu Su and
                  Baokang Zhao},
  editor       = {Zhipeng Cai and
                  Chaokun Wang and
                  Siyao Cheng and
                  Hongzhi Wang and
                  Hong Gao},
  title        = {{SPS:} {A} Novel Semantics-Aware Scheme for Location Privacy in People-Centric
                  Sensing Network},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 9th International
                  Conference, {WASA} 2014, Harbin, China, June 23-25, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8491},
  pages        = {324--335},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07782-6\_30},
  doi          = {10.1007/978-3-319-07782-6\_30},
  timestamp    = {Fri, 09 Apr 2021 18:35:13 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/WeiSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/LiLSS13,
  author       = {Ruilin Li and
                  Chao Li and
                  Jinshu Su and
                  Bing Sun},
  title        = {Security evaluation of {MISTY} structure with {SPN} round function},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1264--1279},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.02.029},
  doi          = {10.1016/J.CAMWA.2012.02.029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/LiLSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/BaiFZS13,
  author       = {Bing Bai and
                  Zhenqian Feng and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {Benefiting from the community structure in opportunistic forwarding},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {10},
  number       = {2},
  pages        = {865--876},
  year         = {2013},
  url          = {https://doi.org/10.2298/CSIS120921038B},
  doi          = {10.2298/CSIS120921038B},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/BaiFZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WeiZS13,
  author       = {Ziling Wei and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {{PDA:} {A} Novel Privacy-Preserving Robust Data Aggregation Scheme
                  in People-Centric Sensing System},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/147839},
  doi          = {10.1155/2013/147839},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WeiZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LiuLCS13,
  author       = {Yujing Liu and
                  Xiapu Luo and
                  Rocky K. C. Chang and
                  Jinshu Su},
  title        = {Characterizing Inter-Domain Rerouting by Betweenness Centrality after
                  Disruptive Events},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {31},
  number       = {6},
  pages        = {1147--1157},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSAC.2013.130616},
  doi          = {10.1109/JSAC.2013.130616},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LiuLCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LuWZWS13,
  author       = {Huabiao Lu and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Fei Wang and
                  Jinshu Su},
  title        = {ENDMal: An anti-obfuscation and collaborative malware detection system
                  using syscall sequences},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1140--1154},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.03.008},
  doi          = {10.1016/J.MCM.2013.03.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LuWZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/CaoZSWW13,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Jinshu Su and
                  Baosheng Wang and
                  Xiaofeng Wang},
  title        = {A privacy preserving authentication scheme with flexible identity
                  revocation in people-centric sensing},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1175--1188},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.02.007},
  doi          = {10.1016/J.MCM.2013.02.007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/CaoZSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/QiaoZZS13,
  author       = {Lin{-}Bo Qiao and
                  Bo{-}Feng Zhang and
                  Rui{-}Yuan Zhao and
                  Jinshu Su},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Dengguo Feng and
                  Muttukrishnan Rajarajan},
  title        = {Online Mining of Attack Models in {IDS} Alerts from Network Backbone
                  by a Two-Stage Clustering Method},
  booktitle    = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
                  2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8300},
  pages        = {104--116},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03584-0\_9},
  doi          = {10.1007/978-3-319-03584-0\_9},
  timestamp    = {Fri, 05 Aug 2022 08:50:55 +0200},
  biburl       = {https://dblp.org/rec/conf/css/QiaoZZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangXBS13,
  author       = {Fei Wang and
                  Bin Xiao and
                  Kai Bu and
                  Jinshu Su},
  title        = {Detect and identify blocker tags in tree-based {RFID} systems},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2133--2137},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654842},
  doi          = {10.1109/ICC.2013.6654842},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangXBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HanLS13,
  author       = {Biao Han and
                  Jie Li and
                  Jinshu Su},
  title        = {Optimal relay assignment for secrecy capacity maximization in cooperative
                  ad-hoc networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {6128--6132},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6655584},
  doi          = {10.1109/ICC.2013.6655584},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HanLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoc/LiuPSW13,
  author       = {Yujing Liu and
                  Wei Peng and
                  Jinshu Su and
                  Zhilin Wang},
  editor       = {Jinshu Su and
                  Baokang Zhao and
                  Zhigang Sun and
                  Xiaofeng Wang and
                  Fei Wang and
                  Ke Xu},
  title        = {Assessing Survivability of Inter-domain Routing System under Cascading
                  Failures},
  booktitle    = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
                  of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {401},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53959-6\_10},
  doi          = {10.1007/978-3-642-53959-6\_10},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoc/LiuPSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoc/XieWLLS13,
  author       = {Peidai Xie and
                  Yongjun Wang and
                  Huabiao Lu and
                  Meijian Li and
                  Jinshu Su},
  editor       = {Jinshu Su and
                  Baokang Zhao and
                  Zhigang Sun and
                  Xiaofeng Wang and
                  Fei Wang and
                  Ke Xu},
  title        = {Mining Network Behavior Specifications of Malware Based on Binary
                  Analysis},
  booktitle    = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
                  of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {401},
  pages        = {248--255},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53959-6\_22},
  doi          = {10.1007/978-3-642-53959-6\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoc/XieWLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/XieLSWL13,
  author       = {Peidai Xie and
                  Xicheng Lu and
                  Jinshu Su and
                  Yongjun Wang and
                  Meijian Li},
  title        = {iPanda: {A} comprehensive malware analysis tool},
  booktitle    = {The International Conference on Information Networking 2013, {ICOIN}
                  2013, Bangkok, Thailand, January 28-30, 2013},
  pages        = {481--486},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICOIN.2013.6496427},
  doi          = {10.1109/ICOIN.2013.6496427},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/XieLSWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/LuZWS13,
  author       = {Huabiao Lu and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {DiffSig: Resource Differentiation Based Malware Behavioral Concise
                  Signature Generation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {271--284},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_28},
  doi          = {10.1007/978-3-642-36818-9\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/LuZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiuZWWSYWS13,
  author       = {Bo Liu and
                  Baokang Zhao and
                  Ziling Wei and
                  Chunqing Wu and
                  Jinshu Su and
                  Wanrong Yu and
                  Fei Wang and
                  Shihai Sun},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {Qphone: a quantum security VoIP phone},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {477--478},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2491696},
  doi          = {10.1145/2486001.2491696},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiuZWWSYWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaPWZSW13,
  author       = {Yanpeng Ma and
                  Wei Peng and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Jinshu Su and
                  Chunqing Wu},
  title        = {A Location Management Algorithm for {LEO} Satellite Networks},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1362--1366},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.164},
  doi          = {10.1109/TRUSTCOM.2013.164},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaPWZSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MaPYSWZ13,
  author       = {Yanpeng Ma and
                  Wei Peng and
                  Wanrong Yu and
                  Jinshu Su and
                  Chunqing Wu and
                  Guohong Zhao},
  title        = {A Distributed Routing Algorithm for {LEO} Satellite Networks},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1367--1371},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.165},
  doi          = {10.1109/TRUSTCOM.2013.165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MaPYSWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/HanLS13,
  author       = {Biao Han and
                  Jie Li and
                  Jinshu Su},
  title        = {Optimal relay node placement for multi-pair cooperative communication
                  in wireless networks},
  booktitle    = {2013 {IEEE} Wireless Communications and Networking Conference (WCNC),
                  Shanghai, Shanghai, China, April 7-10, 2013},
  pages        = {4724--4729},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WCNC.2013.6555340},
  doi          = {10.1109/WCNC.2013.6555340},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/HanLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icoc/2013,
  editor       = {Jinshu Su and
                  Baokang Zhao and
                  Zhigang Sun and
                  Xiaofeng Wang and
                  Fei Wang and
                  Ke Xu},
  title        = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
                  of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {401},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53959-6},
  doi          = {10.1007/978-3-642-53959-6},
  isbn         = {978-3-642-53958-9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ZhaoPSSWYH12,
  author       = {Baokang Zhao and
                  Wei Peng and
                  Ziming Song and
                  Jinshu Su and
                  Chunqing Wu and
                  Wanrong Yu and
                  Qiaolin Hu},
  title        = {Towards efficient and practical network coding in delay tolerant networks},
  journal      = {Comput. Math. Appl.},
  volume       = {63},
  number       = {2},
  pages        = {588--600},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.camwa.2011.10.001},
  doi          = {10.1016/J.CAMWA.2011.10.001},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/ZhaoPSSWYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/FengBZS12,
  author       = {Zhenqian Feng and
                  Bing Bai and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {ICTree: discovering the underlying connections of your rental virtual
                  machines in the public clouds},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {27},
  number       = {6},
  year         = {2012},
  timestamp    = {Tue, 05 Aug 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/FengBZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/YouS12,
  author       = {Ilsun You and
                  Jinshu Su},
  title        = {Editorial},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {27},
  number       = {6},
  year         = {2012},
  timestamp    = {Tue, 05 Aug 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/YouS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhaoWSCS12,
  author       = {Baokang Zhao and
                  Dan Wang and
                  Zili Shao and
                  Jiannong Cao and
                  Jinshu Su},
  title        = {Privacy aware publishing of successive location information in sensor
                  networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {28},
  number       = {6},
  pages        = {913--922},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.future.2011.09.001},
  doi          = {10.1016/J.FUTURE.2011.09.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhaoWSCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DaiWZS12,
  author       = {Bin Dai and
                  Feng Wang and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {Using Regional Routing to Improve the Scalability and Security of
                  Inter-Domain Multipath Routing},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {1},
  pages        = {94--107},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.94},
  doi          = {10.1587/TRANSINF.E95.D.94},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/DaiWZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/PengLLS12,
  author       = {Wei Peng and
                  Zimu Li and
                  Yujing Liu and
                  Jinshu Su},
  title        = {Assessing the vulnerability of network topologies under large-scale
                  regional failures},
  journal      = {J. Commun. Networks},
  volume       = {14},
  number       = {4},
  pages        = {451--460},
  year         = {2012},
  url          = {https://doi.org/10.1109/JCN.2012.6292252},
  doi          = {10.1109/JCN.2012.6292252},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/PengLLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HanLSC12,
  author       = {Biao Han and
                  Jie Li and
                  Jinshu Su and
                  Jiannong Cao},
  title        = {Self-Supported Cooperative Networking for Emergency Services in Multi-Hop
                  Wireless Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {30},
  number       = {2},
  pages        = {450--457},
  year         = {2012},
  url          = {https://doi.org/10.1109/JSAC.2012.120225},
  doi          = {10.1109/JSAC.2012.120225},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/HanLSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WuSSCSW12,
  author       = {Lijun Wu and
                  Kaile Su and
                  Abdul Sattar and
                  Qingliang Chen and
                  Jinshu Su and
                  Wei Wu},
  title        = {A complete first-order temporal {BDI} logic for forest multi-agent
                  systems},
  journal      = {Knowl. Based Syst.},
  volume       = {27},
  pages        = {343--351},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.knosys.2011.11.006},
  doi          = {10.1016/J.KNOSYS.2011.11.006},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/WuSSCSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/WangWWS12,
  author       = {Fei Wang and
                  Hailong Wang and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A new multistage approach to detect subtle DDoS attacks},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {198--213},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.02.025},
  doi          = {10.1016/J.MCM.2011.02.025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/WangWWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/CaoZWS12,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {Flexible multi-authority attribute-based signature schemes for expressive
                  policy},
  journal      = {Mob. Inf. Syst.},
  volume       = {8},
  number       = {3},
  pages        = {255--274},
  year         = {2012},
  url          = {https://doi.org/10.3233/MIS-2012-0142},
  doi          = {10.3233/MIS-2012-0142},
  timestamp    = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/CaoZWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunFHS12,
  author       = {Yipin Sun and
                  Zhenqian Feng and
                  Qiaolin Hu and
                  Jinshu Su},
  title        = {An efficient distributed key management scheme for group-signature
                  based anonymous authentication in {VANET}},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {1},
  pages        = {79--86},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.302},
  doi          = {10.1002/SEC.302},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunFHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangLS12,
  author       = {Xiaofeng Wang and
                  Ling Liu and
                  Jinshu Su},
  title        = {{RLM:} {A} General Model for Trust Representation and Aggregation},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {5},
  number       = {1},
  pages        = {131--143},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSC.2010.56},
  doi          = {10.1109/TSC.2010.56},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/WangLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/FengBZS12,
  author       = {Zhenqian Feng and
                  Bing Bai and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {An Analytic Goodput Model for {TCP} Incast},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {427--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.21},
  doi          = {10.1109/IMIS.2012.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/FengBZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/MaSWSWYZH12,
  author       = {Yanpeng Ma and
                  Jinshu Su and
                  Chunqing Wu and
                  Xiaofeng Wang and
                  Wanrong Yu and
                  Baokang Zhao and
                  Xiaofeng Hu},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {A Distribute and Geographic Information Based Routing Algorithm for
                  {LEO} Satellite Constellation Networks},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {433--438},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.74},
  doi          = {10.1109/IMIS.2012.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/MaSWSWYZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/Su12,
  author       = {Jinshu Su},
  title        = {{STDN} Introduction},
  booktitle    = {26th {IEEE} International Parallel and Distributed Processing Symposium
                  Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25,
                  2012},
  pages        = {1176},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IPDPSW.2012.344},
  doi          = {10.1109/IPDPSW.2012.344},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/Su12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LiuSC12,
  author       = {Yujing Liu and
                  Jinshu Su and
                  Rocky K. C. Chang},
  title        = {{LDC:} Detecting {BGP} Prefix Hijacking by Load Distribution Change},
  booktitle    = {26th {IEEE} International Parallel and Distributed Processing Symposium
                  Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25,
                  2012},
  pages        = {1197--1203},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IPDPSW.2012.147},
  doi          = {10.1109/IPDPSW.2012.147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LiuSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/QiaoZLS12,
  author       = {Lin{-}Bo Qiao and
                  Bo{-}Feng Zhang and
                  Zhiquan Lai and
                  Jinshu Su},
  title        = {Mining of Attack Models in {IDS} Alerts from Network Backbone by a
                  Two-stage Clustering Method},
  booktitle    = {26th {IEEE} International Parallel and Distributed Processing Symposium
                  Workshops {\&} PhD Forum, {IPDPS} 2012, Shanghai, China, May 21-25,
                  2012},
  pages        = {1263--1269},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IPDPSW.2012.146},
  doi          = {10.1109/IPDPSW.2012.146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/QiaoZLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/XieLWSL12,
  author       = {Peidai Xie and
                  Xicheng Lu and
                  Yongjun Wang and
                  Jinshu Su and
                  Meijian Li},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Automatic Approach to Detect Anti-debugging in Malware Analysis},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {320},
  pages        = {436--442},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35795-4\_55},
  doi          = {10.1007/978-3-642-35795-4\_55},
  timestamp    = {Fri, 29 Jun 2018 13:46:09 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/XieLWSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/WangWHS12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Xiaofeng Hu and
                  Jinshu Su},
  title        = {Bitwise sketch for lightweight reverse {IP} reconstruction in network
                  anomaly detection},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
                  / Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6708530},
  doi          = {10.1109/MASS.2012.6708530},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/WangWHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/PengDYSW12,
  author       = {Wei Peng and
                  Guohua Dong and
                  Kun Yang and
                  Jinshu Su and
                  Jun Wu},
  title        = {A Random Road Network Model for Mobility Modeling in Mobile Delay-Tolerant
                  Networks},
  booktitle    = {8th International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2012, Chengdu, China, December 14-16, 2012},
  pages        = {140--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSN.2012.25},
  doi          = {10.1109/MSN.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/PengDYSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/music/MaSWWYZH12,
  author       = {Yanpeng Ma and
                  Jinshu Su and
                  Chunqing Wu and
                  Xiaofeng Wang and
                  Wanrong Yu and
                  Baokang Zhao and
                  Xiaofeng Hu},
  title        = {A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation
                  Networks},
  booktitle    = {Third {FTRA} International Conference on Mobile, Ubiquitous, and Intelligent
                  Computing, {MUSIC} 2012, Vancouver, Canada, June 26-28, 2012},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MUSIC.2012.49},
  doi          = {10.1109/MUSIC.2012.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/music/MaSWWYZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/LiuLCS12,
  author       = {Yujing Liu and
                  Xiapu Luo and
                  Rocky K. C. Chang and
                  Jinshu Su},
  editor       = {Robert Bestak and
                  Lukas Kencl and
                  Li Erran Li and
                  Joerg Widmer and
                  Hao Yin},
  title        = {Characterizing Inter-domain Rerouting after Japan Earthquake},
  booktitle    = {{NETWORKING} 2012 - 11th International {IFIP} {TC} 6 Networking Conference,
                  Prague, Czech Republic, May 21-25, 2012, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7290},
  pages        = {124--135},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30054-7\_10},
  doi          = {10.1007/978-3-642-30054-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/LiuLCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0007WSX12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Bin Xiao},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight
                  Victim Identification},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {215--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.295},
  doi          = {10.1109/TRUSTCOM.2012.295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0007WSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/procedia/PengHZS12,
  author       = {Wei Peng and
                  Xiaofeng Hu and
                  Feng Zhao and
                  Jinshu Su},
  editor       = {Hesham H. Ali and
                  Yong Shi and
                  Deepak Khazanchi and
                  Michael Lees and
                  G. Dick van Albada and
                  Jack J. Dongarra and
                  Peter M. A. Sloot},
  title        = {A Fast Algorithm to Find All-Pairs Shortest Paths in Complex Networks},
  booktitle    = {Proceedings of the International Conference on Computational Science,
                  {ICCS} 2012, Omaha, Nebraska, USA, 4-6 June, 2012},
  series       = {Procedia Computer Science},
  volume       = {9},
  pages        = {557--566},
  publisher    = {Elsevier},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.procs.2012.04.060},
  doi          = {10.1016/J.PROCS.2012.04.060},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/journals/procedia/PengHZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/CaoSXC11,
  author       = {Jijun Cao and
                  Jinshu Su and
                  Jing Xie and
                  Feng Chen},
  title        = {{DBMISD-D:} {A} distributed algorithm for constructing and maintaining
                  high stability application-layer multicast tree},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {26},
  number       = {5},
  year         = {2011},
  timestamp    = {Sun, 09 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/CaoSXC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangYBS11,
  author       = {Xiaofeng Wang and
                  Chee Shin Yeo and
                  Rajkumar Buyya and
                  Jinshu Su},
  title        = {Optimizing the makespan and reliability for workflow applications
                  with reputation and a look-ahead genetic algorithm},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {27},
  number       = {8},
  pages        = {1124--1134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.future.2011.03.008},
  doi          = {10.1016/J.FUTURE.2011.03.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangYBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/YangLLHSS11,
  author       = {Xuejun Yang and
                  Xiangke Liao and
                  Kai Lu and
                  Qingfeng Hu and
                  Junqiang Song and
                  Jinshu Su},
  title        = {The TianHe-1A Supercomputer: Its Hardware and Software},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {26},
  number       = {3},
  pages        = {344--351},
  year         = {2011},
  url          = {https://doi.org/10.1007/s02011-011-1137-8},
  doi          = {10.1007/S02011-011-1137-8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/YangLLHSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PengLSD11,
  author       = {Wei Peng and
                  Zimu Li and
                  Jinshu Su and
                  Muwei Dong},
  editor       = {A Min Tjoa and
                  Gerald Quirchmayr and
                  Ilsun You and
                  Lida Xu},
  title        = {Evaluation of Topological Vulnerability of the Internet under Regional
                  Failures},
  booktitle    = {Availability, Reliability and Security for Business, Enterprise and
                  Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross
                  Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August
                  22-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6908},
  pages        = {164--175},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23300-5\_13},
  doi          = {10.1007/978-3-642-23300-5\_13},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PengLSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcsc/LiuXWWXZS11,
  author       = {Bo Liu and
                  Erci Xu and
                  Jin Wang and
                  Ziling Wei and
                  Liyang Xu and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {Thwarting audio steganography attacks in cloud storage systems},
  booktitle    = {2011 International Conference on Cloud and Service Computing, {CSC}
                  2011, Hong Kong, December 12-14, 2011},
  pages        = {259--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSC.2011.6138530},
  doi          = {10.1109/CSC.2011.6138530},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcsc/LiuXWWXZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpsr/ZhangLSWL11,
  author       = {Xiaozhe Zhang and
                  Xicheng Lu and
                  Jinshu Su and
                  Baosheng Wang and
                  Zexin Lu},
  title        = {{SDBGP:} {A} scalable, distributed {BGP} routing protocol implementation},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on High Performance
                  Switching and Routing, {HPSR} 2011, 4-6 July 2011, Cartagena, Spain},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/HPSR.2011.5986025},
  doi          = {10.1109/HPSR.2011.5986025},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpsr/ZhangLSWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/WangDS11,
  author       = {Feng Wang and
                  Bin Dai and
                  Jinshu Su},
  editor       = {Haohong Wang and
                  Jin Li and
                  George N. Rouskas and
                  Xiaobo Zhou},
  title        = {How Can Multipath Dissemination Help to Detect Prefix Hijacking?},
  booktitle    = {Proceedings of 20th International Conference on Computer Communications
                  and Networks, {ICCCN} 2011, Maui, Hawaii, USA, July 31 - August 4,
                  2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICCCN.2011.6005930},
  doi          = {10.1109/ICCCN.2011.6005930},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/WangDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/ZhaoSSPH11,
  author       = {Baokang Zhao and
                  Ziming Song and
                  Jinshu Su and
                  Wei Peng and
                  Qiaolin Hu},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Feilong Tang and
                  Fatos Xhafa},
  title        = {{NTC:} Towards Efficient Network Coding in Delay Tolerant Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
                  Korea, June 30-July 02, 2011},
  pages        = {57--64},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMIS.2011.105},
  doi          = {10.1109/IMIS.2011.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/ZhaoSSPH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/WangCTS11,
  author       = {Lei Wang and
                  Shuhui Chen and
                  Yong Tang and
                  Jinshu Su},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Feilong Tang and
                  Fatos Xhafa},
  title        = {Gregex: {GPU} Based High Speed Regular Expression Matching Engine},
  booktitle    = {Proceedings of the Fifth International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
                  Korea, June 30-July 02, 2011},
  pages        = {366--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMIS.2011.107},
  doi          = {10.1109/IMIS.2011.107},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/WangCTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/BaiSZYW11,
  author       = {Bing Bai and
                  Jinshu Su and
                  Baokang Zhao and
                  Wanrong Yu and
                  Ling Wen},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Feilong Tang and
                  Fatos Xhafa},
  title        = {Snail Crawling: An Enhanced Method for DTNs Routing},
  booktitle    = {Proceedings of the Fifth International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
                  Korea, June 30-July 02, 2011},
  pages        = {394--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMIS.2011.112},
  doi          = {10.1109/IMIS.2011.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/BaiSZYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/CaoZWSJ11,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Guofei Ji},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {Multi-authority Attribute-Based Signature},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {668--672},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.122},
  doi          = {10.1109/INCOS.2011.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/CaoZWSJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HanLS11,
  author       = {Biao Han and
                  Jie Li and
                  Jinshu Su},
  title        = {Self-supported congestion-aware networking for emergency services
                  in WANETs},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {891--899},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935314},
  doi          = {10.1109/INFCOM.2011.5935314},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HanLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/WeiXLXZS11,
  author       = {Ziling Wei and
                  Liyang Xu and
                  Bo Liu and
                  Eci Xu and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Junliang Chen and
                  Huadong Ma and
                  Ivan Stojmenovic},
  title        = {{VISOR:} {A} Pratical VoIP Steganography Platform},
  booktitle    = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2011, Beijing, China, December 16-18, 2011},
  pages        = {370--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSN.2011.88},
  doi          = {10.1109/MSN.2011.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/WeiXLXZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/BaiFZS11,
  author       = {Bing Bai and
                  Zhenqian Feng and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Junliang Chen and
                  Huadong Ma and
                  Ivan Stojmenovic},
  title        = {One Leader at One Time: {OLOT} Routing in Delay Tolerant Networks},
  booktitle    = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2011, Beijing, China, December 16-18, 2011},
  pages        = {432--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSN.2011.53},
  doi          = {10.1109/MSN.2011.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/BaiFZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/FengBZS11,
  author       = {Zhenqian Feng and
                  Bing Bai and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Junliang Chen and
                  Huadong Ma and
                  Ivan Stojmenovic},
  title        = {Shrew Attack in Cloud Data Center Networks},
  booktitle    = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2011, Beijing, China, December 16-18, 2011},
  pages        = {441--445},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSN.2011.71},
  doi          = {10.1109/MSN.2011.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/FengBZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/SuBZS11,
  author       = {Xiangyu Su and
                  Jinzhen Bao and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Junliang Chen and
                  Huadong Ma and
                  Ivan Stojmenovic},
  title        = {Protecting Router Forwarding Table in Space},
  booktitle    = {Seventh International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2011, Beijing, China, December 16-18, 2011},
  pages        = {446--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MSN.2011.91},
  doi          = {10.1109/MSN.2011.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/SuBZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/CaoZWSC11,
  author       = {Dan Cao and
                  Baokang Zhao and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Yijiao Chen},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Authenticating with Attributes in Online Social Networks},
  booktitle    = {The 14th International Conference on Network-Based Information Systems,
                  NBiS 2011, Tirana, Albania, September 7-9, 2011},
  pages        = {607--611},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/NBiS.2011.102},
  doi          = {10.1109/NBIS.2011.102},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/CaoZWSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/XuLXWZS11,
  author       = {Erchi Xu and
                  Bo Liu and
                  Liyang Xu and
                  Ziling Wei and
                  Baokang Zhao and
                  Jinshu Su},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa},
  title        = {Adaptive VoIP Steganography for Information Hiding within Network
                  Audio Streams},
  booktitle    = {The 14th International Conference on Network-Based Information Systems,
                  NBiS 2011, Tirana, Albania, September 7-9, 2011},
  pages        = {612--617},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/NBiS.2011.103},
  doi          = {10.1109/NBIS.2011.103},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/XuLXWZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangLLS11,
  author       = {Bofeng Zhang and
                  Yuan Li and
                  Yujing Liu and
                  Jinshu Su},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Analysis of prefix hijacking based on {AS} hierarchical model},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {322--326},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6060023},
  doi          = {10.1109/ICNSS.2011.6060023},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangLLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuPS11,
  author       = {Yujing Liu and
                  Wei Peng and
                  Jinshu Su},
  title        = {Study on {IP} Prefix Hijacking in Cloud Computing Networks Based on
                  Attack Planning},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {922--926},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.127},
  doi          = {10.1109/TRUSTCOM.2011.127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/YangLXSHSXLDJa10,
  author       = {Xuejun Yang and
                  Xiangke Liao and
                  Weixia Xu and
                  Junqiang Song and
                  Qingfeng Hu and
                  Jinshu Su and
                  Liquan Xiao and
                  Kai Lu and
                  Qiang Dou and
                  Juping Jiang and
                  Canqun Yang},
  title        = {{TH-1:} China's first petaflop supercomputer},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {4},
  number       = {4},
  pages        = {445--455},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11704-010-0383-x},
  doi          = {10.1007/S11704-010-0383-X},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/YangLXSHSXLDJa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoWSCCS10,
  author       = {Baokang Zhao and
                  Dan Wang and
                  Zili Shao and
                  Jiannong Cao and
                  Keith C. C. Chan and
                  Jinshu Su},
  title        = {An Optimal Algorithm towards Successive Location Privacy in Sensor
                  Networks with Dynamic Programming},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {3},
  pages        = {531--533},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.531},
  doi          = {10.1587/TRANSINF.E93.D.531},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoWSCCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnit/YujingBFJ10,
  author       = {Yujing Liu and
                  Bofeng Zhang and
                  Fei Wang and
                  Jinshu Su},
  title        = {Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property
                  of {BGP} Routing System},
  journal      = {J. Next Gener. Inf. Technol.},
  volume       = {1},
  number       = {3},
  pages        = {96--105},
  year         = {2010},
  url          = {http://www.humanpub.org/jnit/ppl/JNIT0103\_11.pdf},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnit/YujingBFJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChenLZS10,
  author       = {Feng Chen and
                  Dehui Liu and
                  Yi Zhang and
                  Jinshu Su},
  title        = {A Scalable Approach to Analyzing Network Security using Compact Attack
                  Graphs},
  journal      = {J. Networks},
  volume       = {5},
  number       = {5},
  pages        = {543--550},
  year         = {2010},
  url          = {https://doi.org/10.4304/jnw.5.5.543-550},
  doi          = {10.4304/JNW.5.5.543-550},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChenLZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WuSSLY10,
  author       = {Lijun Wu and
                  Jinshu Su and
                  Kaile Su and
                  Xiangyu Luo and
                  Zhihua Yang},
  title        = {A concurrent dynamic logic of knowledge, belief and certainty for
                  multi-agent systems},
  journal      = {Knowl. Based Syst.},
  volume       = {23},
  number       = {2},
  pages        = {162--168},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.knosys.2009.11.017},
  doi          = {10.1016/J.KNOSYS.2009.11.017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/WuSSLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SunLLSS10,
  author       = {Yipin Sun and
                  Rongxing Lu and
                  Xiaodong Lin and
                  Xuemin Shen and
                  Jinshu Su},
  title        = {An Efficient Pseudonymous Authentication Scheme With Strong Privacy
                  Preservation for Vehicular Communications},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {59},
  number       = {7},
  pages        = {3589--3603},
  year         = {2010},
  url          = {https://doi.org/10.1109/TVT.2010.2051468},
  doi          = {10.1109/TVT.2010.2051468},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/SunLLSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/SunSZS10,
  author       = {Yipin Sun and
                  Xiangyu Su and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {Mix-zones Deployment for Location Privacy Preservation in Vehicular
                  Communications},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {2825--2830},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.472},
  doi          = {10.1109/CIT.2010.472},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/SunSZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhaoSSSL10,
  author       = {Baokang Zhao and
                  Xiangyu Su and
                  Yipin Sun and
                  Jinshu Su and
                  Shanshan Li},
  title        = {A Distributed Query Protocol for Continuous Privacy Preserving in
                  Wireless Sensor Networks},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {2837--2842},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.474},
  doi          = {10.1109/CIT.2010.474},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZhaoSSSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/FengWS10,
  author       = {Zhenqian Feng and
                  Haitao Wu and
                  Jinshu Su},
  editor       = {Philip Brighten Godfrey and
                  Chuanxiong Guo and
                  Olaf Maennel},
  title        = {Exploring potential vulnerabilities in data center network},
  booktitle    = {Proceedings of the {ACM} CoNEXT Student Workshop, CoNEXT '10 Student
                  Workshop, Philadelphia, Pennsylvania, USA, November 30, 2010},
  pages        = {12:1--12:2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1921206.1921219},
  doi          = {10.1145/1921206.1921219},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/FengWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SunLLSS10,
  author       = {Yipin Sun and
                  Rongxing Lu and
                  Xiaodong Lin and
                  Xuemin Shen and
                  Jinshu Su},
  title        = {A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502130},
  doi          = {10.1109/ICC.2010.5502130},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/SunLLSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SunLLSS10a,
  author       = {Yipin Sun and
                  Xiaodong Lin and
                  Rongxing Lu and
                  Xuemin Shen and
                  Jinshu Su},
  title        = {Roadside Units Deployment for Efficient Short-Time Certificate Updating
                  in VANETs},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502183},
  doi          = {10.1109/ICC.2010.5502183},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/SunLLSS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpp/YuLLWS10,
  author       = {Jie Yu and
                  Liming Lu and
                  Zhoujun Li and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A Simple Effective Scheme to Enhance the Capability of Web Servers
                  Using {P2P} Networks},
  booktitle    = {39th International Conference on Parallel Processing, {ICPP} 2010,
                  San Diego, California, USA, 13-16 September 2010},
  pages        = {680--689},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPP.2010.76},
  doi          = {10.1109/ICPP.2010.76},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpp/YuLLWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/ZhaoSPZW09,
  author       = {Baokang Zhao and
                  Jinshu Su and
                  Wei Peng and
                  YingZhi Zeng and
                  Meng Wang},
  title        = {An ID-Based Partially Blind Signature Scheme With Adaptive Delegation
                  For Networked Embedded Systems},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {15},
  number       = {3},
  pages        = {485--493},
  year         = {2009},
  url          = {https://doi.org/10.1080/10798587.2009.10643044},
  doi          = {10.1080/10798587.2009.10643044},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/ZhaoSPZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcns/TuSK09,
  author       = {Rui Tu and
                  Jinshu Su and
                  Ruoshan Kong},
  title        = {An Identifier-Based Network Access Control Mechanism Based on Locator/Identifier
                  Split},
  journal      = {Int. J. Commun. Netw. Syst. Sci.},
  volume       = {2},
  number       = {7},
  pages        = {641--644},
  year         = {2009},
  url          = {https://doi.org/10.4236/ijcns.2009.27072},
  doi          = {10.4236/IJCNS.2009.27072},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcns/TuSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ai/WuSLYC09,
  author       = {Lijun Wu and
                  Jinshu Su and
                  Xiangyu Luo and
                  Zhihua Yang and
                  Qingliang Chen},
  editor       = {Yong Gao and
                  Nathalie Japkowicz},
  title        = {A Concurrent Dynamic Logic of Knowledge, Belief and Certainty for
                  Multi-agent Systems},
  booktitle    = {Advances in Artificial Intelligence, 22nd Canadian Conference on Artificial
                  Intelligence, Canadian {AI} 2009, Kelowna, Canada, May 25-27, 2009,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5549},
  pages        = {146--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01818-3\_16},
  doi          = {10.1007/978-3-642-01818-3\_16},
  timestamp    = {Thu, 28 Sep 2023 12:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ai/WuSLYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/WangYBS09,
  author       = {Xiaofeng Wang and
                  Chee Shin Yeo and
                  Rajkumar Buyya and
                  Jinshu Su},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Takahiro Hara and
                  Arjan Durresi},
  title        = {Reliability-Driven Reputation Based Scheduling for Public-Resource
                  Computing Using {GA}},
  booktitle    = {The {IEEE} 23rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
                  2009},
  pages        = {411--418},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/AINA.2009.21},
  doi          = {10.1109/AINA.2009.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/WangYBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/WangBS09,
  author       = {Xiaofeng Wang and
                  Rajkumar Buyya and
                  Jinshu Su},
  editor       = {Franck Cappello and
                  Cho{-}Li Wang and
                  Rajkumar Buyya},
  title        = {Reliability-Oriented Genetic Algorithm for Workflow Applications Using
                  Max-Min Strategy},
  booktitle    = {9th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009},
  pages        = {108--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CCGRID.2009.14},
  doi          = {10.1109/CCGRID.2009.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/WangBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/CaoSS09,
  author       = {Jijun Cao and
                  Zhigang Sun and
                  Jinshu Su},
  editor       = {Lean Yu and
                  Kin Keung Lai and
                  Shashi Kant Mishra},
  title        = {{HPC:} {A} Hierarchical Parameter Configuration Approach for Failure
                  Detection Scheme in Application Layer Multicast},
  booktitle    = {Proceedings of the Second International Joint Conference on Computational
                  Sciences and Optimization, {CSO} 2009, Sanya, Hainan, China, 24-26
                  April 2009, Volume 1},
  pages        = {680--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSO.2009.16},
  doi          = {10.1109/CSO.2009.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cso/CaoSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/ChenSZ09,
  author       = {Feng Chen and
                  Jinshu Su and
                  Yi Zhang},
  editor       = {Fabio Massacci and
                  Samuel T. Redwine Jr. and
                  Nicola Zannone},
  title        = {A Scalable Approach to Full Attack Graphs Generation},
  booktitle    = {Engineering Secure Software and Systems, First International Symposium
                  ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5429},
  pages        = {150--163},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00199-4\_13},
  doi          = {10.1007/978-3-642-00199-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/ChenSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/SunZS09,
  author       = {Yipin Sun and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {{ECHO:} Efficient Certificate Updating Scheme by Vehicle-to-Vehicle
                  Communications},
  booktitle    = {Fourth International Conference on Frontier of Computer Science and
                  Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009},
  pages        = {581--586},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FCST.2009.70},
  doi          = {10.1109/FCST.2009.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcst/SunZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/XiaGZS09,
  author       = {Yan Xia and
                  Zhenghu Gong and
                  Baokang Zhao and
                  Jinshu Su},
  title        = {A New Security Mechanism for Dynamic Channel Assignment in Wireless
                  Mesh Networks},
  booktitle    = {Fourth International Conference on Frontier of Computer Science and
                  Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009},
  pages        = {587--592},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FCST.2009.33},
  doi          = {10.1109/FCST.2009.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcst/XiaGZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ZengYS09,
  author       = {YingZhi Zeng and
                  Xia Yan and
                  Jinshu Su},
  title        = {A new broadcast-Key Management Scheme for Distributed Wireless Sensor
                  Networks},
  booktitle    = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China},
  pages        = {882--887},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MOBHOC.2009.5337042},
  doi          = {10.1109/MOBHOC.2009.5337042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ZengYS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ZengYS09a,
  author       = {YingZhi Zeng and
                  Xia Yan and
                  Jinshu Su},
  title        = {A new Group Key Management Scheme based on {DMST} for Wireless Sensor
                  Networks},
  booktitle    = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China},
  pages        = {989--994},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MOBHOC.2009.5337022},
  doi          = {10.1109/MOBHOC.2009.5337022},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ZengYS09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/DaiLSSMS09,
  author       = {Bin Dai and
                  Huabiao Lu and
                  Zhigang Sun and
                  Ziming Song and
                  Yanpeng Ma and
                  Jinshu Su},
  title        = {{MORT:} {A} Technique to Improve Routing Efficiency in Fault-Tolerant
                  Multipath Routing},
  booktitle    = {{MSN} 2009, The Fifth International Conference on Mobile Ad-hoc and
                  Sensor Networks, Wu Yi Mountain, Fujian, China , December 14-16, 2009},
  pages        = {430--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSN.2009.85},
  doi          = {10.1109/MSN.2009.85},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/DaiLSSMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nas/TuSC09,
  author       = {Rui Tu and
                  Jinshu Su and
                  Feng Chen},
  title        = {Network Access Control Mechanism Based on Locator/Identifier Split},
  booktitle    = {International Conference on Networking, Architecture, and Storage,
                  {NAS} 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China},
  pages        = {171--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NAS.2009.34},
  doi          = {10.1109/NAS.2009.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nas/TuSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/DaiSZ08,
  author       = {Yi Dai and
                  Jinshu Su and
                  Ying Zhang},
  title        = {A coordination scheduling mechanism to guarantee packet ordering in
                  parallel packet switch},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {4},
  pages        = {362--373},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJESDF.2008.021454},
  doi          = {10.1504/IJESDF.2008.021454},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/DaiSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenWS08,
  author       = {Feng Chen and
                  Lingyu Wang and
                  Jinshu Su},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {An Efficient Approach to Minimum-Cost Network Hardening Using Attack
                  Graphs},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {209--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.38},
  doi          = {10.1109/IAS.2008.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/CaoSW08,
  author       = {Jijun Cao and
                  Jinshu Su and
                  Chunqing Wu},
  title        = {Modeling and Analyzing the Instantaneous Stability for Application
                  Layer Multicast},
  booktitle    = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008},
  pages        = {217--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/APSCC.2008.22},
  doi          = {10.1109/APSCC.2008.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/CaoSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhaoWSCCSY08,
  author       = {Baokang Zhao and
                  Dan Wang and
                  Zili Shao and
                  Jiannong Cao and
                  Keith C. C. Chan and
                  Jinshu Su and
                  Yanqin Yang},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Towards Successive Privacy Protection in Sensor Networks},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {167--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.150},
  doi          = {10.1109/EUC.2008.150},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ZhaoWSCCSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/WangS08,
  author       = {Sheng Wang and
                  Jinshu Su},
  title        = {Analysis of Reverse Traffic in Delay-Based Congestion Control},
  booktitle    = {Second International Conference on the Digital Society {(ICDS} 2008),
                  February 10-15, 2008, Sainte Luce, Martinique, France},
  pages        = {178--183},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDS.2008.31},
  doi          = {10.1109/ICDS.2008.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icds/WangS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/WangS08a,
  author       = {Sheng Wang and
                  Jinshu Su},
  title        = {Analysis and Enhancement of Delay-Based Congestion Control},
  booktitle    = {Second International Conference on the Digital Society {(ICDS} 2008),
                  February 10-15, 2008, Sainte Luce, Martinique, France},
  pages        = {184--189},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDS.2008.32},
  doi          = {10.1109/ICDS.2008.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icds/WangS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/WangGLSL08,
  author       = {Hong Wang and
                  Zhenghu Gong and
                  Zexin Lu and
                  Jinshu Su and
                  Sudan Li},
  title        = {An Entropy Based Algorithm to Find Critical Traffic Matrices},
  booktitle    = {Seventh International Conference on Networking {(ICN} 2008), 13-18
                  April 2008, Cancun, Mexico},
  pages        = {392--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICN.2008.84},
  doi          = {10.1109/ICN.2008.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icn/WangGLSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip10-3/ZhaoWSCCS08,
  author       = {Baokang Zhao and
                  Meng Wang and
                  Zili Shao and
                  Jiannong Cao and
                  Keith C. C. Chan and
                  Jinshu Su},
  editor       = {Bernd Kleinjohann and
                  Lisa Kleinjohann and
                  Wayne H. Wolf},
  title        = {Topology-Aware Energy Efficient Task Assignment for Collaborative
                  In-Network Processing in Distributed Sensor Systems},
  booktitle    = {Distributed Embedded Systems: Design, Middleware and Resources, {IFIP}
                  20th World Computer Congress, {TC10} Working Conference on Distributed
                  and Parallel Embedded Systems {(DIPES} 2008), September 7-10, 2008,
                  Milano, Italy},
  series       = {{IFIP}},
  volume       = {271},
  pages        = {201--211},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09661-2\_20},
  doi          = {10.1007/978-0-387-09661-2\_20},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip10-3/ZhaoWSCCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isecs/FengJ08,
  author       = {Feng Chen and
                  Jinshu Su},
  editor       = {Fei Yu and
                  Qi Luo and
                  Yongjun Chen and
                  Zhigang Chen},
  title        = {A Flexible Approach to Measuring Network Security Using Attack Graphs},
  booktitle    = {Proceedings of The International Symposium on Electronic Commerce
                  and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  pages        = {426--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISECS.2008.122},
  doi          = {10.1109/ISECS.2008.122},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isecs/FengJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/ChengXCLLSWL08,
  author       = {Wei Cheng and
                  Kai Xing and
                  Xiuzhen Cheng and
                  Xicheng Lu and
                  Zexin Lu and
                  Jinshu Su and
                  Baosheng Wang and
                  Yujun Liu},
  editor       = {Xiaohua Jia and
                  Ness B. Shroff and
                  Peng{-}Jun Wan},
  title        = {Route recovery in vertex-disjoint multipath routing for many-to-one
                  sensor networks},
  booktitle    = {Proceedings of the 9th {ACM} Interational Symposium on Mobile Ad Hoc
                  Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30,
                  2008},
  pages        = {209--220},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374618.1374648},
  doi          = {10.1145/1374618.1374648},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobihoc/ChengXCLLSWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtcsa/ZhaoWSCCS08,
  author       = {Baokang Zhao and
                  Meng Wang and
                  Zili Shao and
                  Jiannong Cao and
                  Keith C. C. Chan and
                  Jinshu Su},
  title        = {Topology Aware Task Allocation and Scheduling for Real-Time Data Fusion
                  Applications in Networked Embedded Sensor Systems},
  booktitle    = {The Fourteenth {IEEE} Internationl Conference on Embedded and Real-Time
                  Computing Systems and Applications, {RTCSA} 2008, Kaohisung, Taiwan,
                  25-27 August 2008, Proceedings},
  pages        = {293--302},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/RTCSA.2008.30},
  doi          = {10.1109/RTCSA.2008.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtcsa/ZhaoWSCCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/CaoSWSM07,
  author       = {Jijun Cao and
                  Xiangquan Shi and
                  Chunqing Wu and
                  Jinshu Su and
                  Zhaowei Meng},
  editor       = {Shingo Ata and
                  Choong Seon Hong},
  title        = {Efficient Congestion Control Based on Awareness of Multistage Resources
                  {(CC-AMR)}},
  booktitle    = {Managing Next Generation Networks and Services, 10th Asia-Pacific
                  Network Operations and Management Symposium, {APNOMS} 2007, Sapporo,
                  Japan, October 10-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4773},
  pages        = {608--611},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75476-3\_77},
  doi          = {10.1007/978-3-540-75476-3\_77},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/CaoSWSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/DaiSSG07,
  author       = {Yi Dai and
                  Jinshu Su and
                  Zhigang Sun and
                  Jianbo Guan},
  editor       = {Jie Li and
                  Minyi Guo and
                  Qun Jin and
                  Yongbing Zhang and
                  Liang{-}Jie Zhang and
                  Hai Jin and
                  Masahiro Mambo and
                  Jiro Tanaka and
                  Hiromu Hayashi},
  title        = {A Uniform Fine-Grain Frame Spreading Algorithm for Avoiding Packet
                  Reordering in Load-Balanced Switches},
  booktitle    = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan},
  pages        = {151--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/APSCC.2007.61},
  doi          = {10.1109/APSCC.2007.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/DaiSSG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/CaoSW07,
  author       = {Jijun Cao and
                  Jinshu Su and
                  Chunqing Wu},
  editor       = {Jie Li and
                  Minyi Guo and
                  Qun Jin and
                  Yongbing Zhang and
                  Liang{-}Jie Zhang and
                  Hai Jin and
                  Masahiro Mambo and
                  Jiro Tanaka and
                  Hiromu Hayashi},
  title        = {Using NIC-Based Multicast Scheme to Improve Forwarding Rate for Application
                  Layer Multicast},
  booktitle    = {Proceedings of The 2nd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2007, December 11-14, 2007, Tsukuba Science City, Japan},
  pages        = {179--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/APSCC.2007.68},
  doi          = {10.1109/APSCC.2007.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/CaoSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZengZSYS07,
  author       = {YingZhi Zeng and
                  Baokang Zhao and
                  Jinshu Su and
                  Xia Yan and
                  Zili Shao},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {A Loop-Based Key Management Scheme for Wireless Sensor Networks},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {103--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_10},
  doi          = {10.1007/978-3-540-77090-9\_10},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/ZengZSYS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lsms/WuS07,
  author       = {Lijun Wu and
                  Jinshu Su},
  editor       = {Kang Li and
                  Minrui Fei and
                  George W. Irwin and
                  Shiwei Ma},
  title        = {Symbolic Model Checking Temporal Logics of Knowledge in Multi-Agent
                  System Via Extended Mu-Calculus},
  booktitle    = {Bio-Inspired Computational Intelligence and Applications, International
                  Conference on Life System Modeling and Simulation, {LSMS} 2007, Shanghai,
                  China, September 14-17, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4688},
  pages        = {510--522},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74769-7\_55},
  doi          = {10.1007/978-3-540-74769-7\_55},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/lsms/WuS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/ZengSYZH07,
  author       = {YingZhi Zeng and
                  Jinshu Su and
                  Xia Yan and
                  Baokang Zhao and
                  QingYuan Huang},
  editor       = {Hongke Zhang and
                  Stephan Olariu and
                  Jiannong Cao and
                  David B. Johnson},
  title        = {{LBKERS:} {A} New Efficient Key Management Scheme for Wireless Sensor
                  Networks},
  booktitle    = {Mobile Ad-Hoc and Sensor Networks, Third International Conference,
                  {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4864},
  pages        = {772--783},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77024-4\_70},
  doi          = {10.1007/978-3-540-77024-4\_70},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/ZengSYZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/advis/HuangSZW06,
  author       = {QingYuan Huang and
                  Jinshu Su and
                  YingZhi Zeng and
                  Yongjun Wang},
  editor       = {Tatyana M. Yakhno and
                  Erich J. Neuhold},
  title        = {Spreading Activation Model for Connectivity Based Clustering},
  booktitle    = {Advances in Information Systems, 4th International Conference, {ADVIS}
                  2006, Izmir, Turkey, October 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4243},
  pages        = {398--407},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11890393\_41},
  doi          = {10.1007/11890393\_41},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/advis/HuangSZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/advis/HuangWSZ06,
  author       = {QingYuan Huang and
                  Yongjun Wang and
                  Jinshu Su and
                  YingZhi Zeng},
  editor       = {Tatyana M. Yakhno and
                  Erich J. Neuhold},
  title        = {Personalized Fair Reputation Based Resource Allocation in Grid},
  booktitle    = {Advances in Information Systems, 4th International Conference, {ADVIS}
                  2006, Izmir, Turkey, October 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4243},
  pages        = {408--417},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11890393\_42},
  doi          = {10.1007/11890393\_42},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/advis/HuangWSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aintec/MengSA06,
  author       = {Zhaowei Meng and
                  Jinshu Su and
                  Stefano Avallone},
  editor       = {Kenjiro Cho and
                  Philippe Jacquet},
  title        = {A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed
                  Traffic},
  booktitle    = {Technologies for Advanced Heterogeneous Networks II, Second Asian
                  Internet Engineering Conference, {AINTEC} 2006, Pathumthani, Thailand,
                  November 28-30, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4311},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11930181\_12},
  doi          = {10.1007/11930181\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aintec/MengSA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/WuSYS06,
  author       = {Chunqing Wu and
                  Xiangquan Shi and
                  Xuejun Yang and
                  Jinshu Su},
  title        = {The Impact of Parallel and Multithread Mechanism on Network Processor
                  Performance},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2006, 5th International Conference,
                  Changsha, Hunan, China, 21-23 October 2006, Proceedings},
  pages        = {236--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/GCC.2006.91},
  doi          = {10.1109/GCC.2006.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/WuSYS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/LiuGWS06,
  author       = {Yaping Liu and
                  Zhenghu Gong and
                  Baosheng Wang and
                  Jinshu Su},
  editor       = {Sanjay Kumar Madria and
                  Kajal T. Claypool and
                  Rajgopal Kannan and
                  Prem Uppuluri and
                  Manoj Madhava Gore},
  title        = {A Routing Optimization Algorithm for {BGP} Egress Selection},
  booktitle    = {Distributed Computing and Internet Technology, Third International
                  Conference, {ICDCIT} 2006, Bhubaneswar, India, December 20-23, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4317},
  pages        = {192--199},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11951957\_18},
  doi          = {10.1007/11951957\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/LiuGWS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/MengSM06,
  author       = {Zhaowei Meng and
                  Jinshu Su and
                  Vittorio Manetti},
  editor       = {Soma Chaudhuri and
                  Samir R. Das and
                  Himadri S. Paul and
                  Srikanta Tirthapura},
  title        = {A New Precomputation Scheme for {MPLS} Traffic Engineering Routing},
  booktitle    = {Distributed Computing and Networking, 8th International Conference,
                  {ICDCN} 2006, Guwahati, India, December 27-30, 2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4308},
  pages        = {391--396},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11947950\_44},
  doi          = {10.1007/11947950\_44},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/MengSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiLWSCCL06,
  author       = {Dongsheng Li and
                  Xicheng Lu and
                  Baosheng Wang and
                  Jinshu Su and
                  Jiannong Cao and
                  Keith C. C. Chan and
                  Hong Va Leong},
  title        = {Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems},
  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages        = {64},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDCS.2006.26},
  doi          = {10.1109/ICDCS.2006.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiLWSCCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnmc/ZhaoSC05,
  author       = {Feng Zhao and
                  Jinshu Su and
                  Xiaomei Cheng},
  editor       = {Xicheng Lu and
                  Wei Zhao},
  title        = {OpenRouter: {A} TCP-Based Lightweight Protocol for Control Plane and
                  Forwarding Plane Communication},
  booktitle    = {Networking and Mobile Computing, Third International Conference, {ICCNMC}
                  2005, Zhangjiajie, China, August 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3619},
  pages        = {1032--1041},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11534310\_108},
  doi          = {10.1007/11534310\_108},
  timestamp    = {Fri, 09 Apr 2021 18:41:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnmc/ZhaoSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/JingJKW04,
  author       = {Jing Zheng and
                  Jinshu Su and
                  Kan Yang and
                  Yijie Wang},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc
                  Networks},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3036},
  pages        = {373--380},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24685-5\_47},
  doi          = {10.1007/978-3-540-24685-5\_47},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccS/JingJKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZhengSL04,
  author       = {Jing Zheng and
                  Jinshu Su and
                  Xicheng Lu},
  editor       = {Jiannong Cao and
                  Laurence Tianruo Yang and
                  Minyi Guo and
                  Francis Chi{-}Moon Lau},
  title        = {A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks
                  for Improving Data Availability},
  booktitle    = {Parallel and Distributed Processing and Applications, Second InternationalSymposium,
                  {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3358},
  pages        = {399--409},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30566-8\_49},
  doi          = {10.1007/978-3-540-30566-8\_49},
  timestamp    = {Tue, 14 Apr 2020 13:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/ZhengSL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LiLS04,
  author       = {Dongsheng Li and
                  Xicheng Lu and
                  Jinshu Su},
  editor       = {Hai Jin and
                  Guang R. Gao and
                  Zhiwei Xu and
                  Hao Chen},
  title        = {Graph-Theoretic Analysis of Kautz Topology and {DHT} Schemes},
  booktitle    = {Network and Parallel Computing, {IFIP} International Conference, {NPC}
                  2004, Wuhan, China, October 18-20, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3222},
  pages        = {308--315},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30141-7\_45},
  doi          = {10.1007/978-3-540-30141-7\_45},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/LiLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/appt/HuSLS03,
  author       = {Xiaofeng Hu and
                  Zhigang Sun and
                  Xicheng Lu and
                  Jinshu Su},
  editor       = {Xingming Zhou and
                  Stefan J{\"{a}}hnichen and
                  Ming Xu and
                  Jiannong Cao},
  title        = {Using Split Queues to Improve the Performance of Parallel Switch},
  booktitle    = {Advanced Parallel Programming Technologies, 5th International Workshop,
                  {APPT} 2003, Xiamen, China, September 17-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2834},
  pages        = {3--11},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39425-9\_1},
  doi          = {10.1007/978-3-540-39425-9\_1},
  timestamp    = {Tue, 14 Apr 2020 13:23:11 +0200},
  biburl       = {https://dblp.org/rec/conf/appt/HuSLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics