BibTeX records: Jinjing Zhao

download as .bib file

@article{DBLP:journals/isci/ZhongZH24,
  author       = {Wenjing Zhong and
                  Jinjing Zhao and
                  Hesuan Hu},
  title        = {Non-interference assessment in colored net systems via integer linear
                  programming},
  journal      = {Inf. Sci.},
  volume       = {658},
  pages        = {120027},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.120027},
  doi          = {10.1016/J.INS.2023.120027},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhongZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/XieXZCZZJZZ23,
  author       = {Yi Xie and
                  Yun Xiong and
                  Jiawei Zhang and
                  Chao Chen and
                  Yao Zhang and
                  Jie Zhao and
                  Yizhu Jiao and
                  Jinjing Zhao and
                  Yangyong Zhu},
  title        = {Temporal super-resolution traffic flow forecasting via continuous-time
                  network dynamics},
  journal      = {Knowl. Inf. Syst.},
  volume       = {65},
  number       = {11},
  pages        = {4687--4712},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10115-023-01887-6},
  doi          = {10.1007/S10115-023-01887-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/XieXZCZZJZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ZhongZH23,
  author       = {Wenjing Zhong and
                  Jinjing Zhao and
                  Hesuan Hu},
  title        = {Beacon-Based Firing Control for Authorization Security in Workflows},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {72},
  number       = {4},
  pages        = {1594--1609},
  year         = {2023},
  url          = {https://doi.org/10.1109/TR.2023.3235785},
  doi          = {10.1109/TR.2023.3235785},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/ZhongZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhongZH23,
  author       = {Wenjing Zhong and
                  Jinjing Zhao and
                  Hesuan Hu},
  title        = {Unified Implementation and Simplification for Task-Based Authorization
                  Security in Workflows},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {3796--3811},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3268651},
  doi          = {10.1109/TSC.2023.3268651},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhongZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/ShiXZJZWL23,
  author       = {Zejian Shi and
                  Yun Xiong and
                  Yao Zhang and
                  Zhijie Jiang and
                  Jinjing Zhao and
                  Lei Wang and
                  Shanshan Li},
  title        = {Improving Code Search with Multi-Modal Momentum Contrastive Learning},
  booktitle    = {31st {IEEE/ACM} International Conference on Program Comprehension,
                  {ICPC} 2023, Melbourne, Australia, May 15-16, 2023},
  pages        = {280--291},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICPC58990.2023.00043},
  doi          = {10.1109/ICPC58990.2023.00043},
  timestamp    = {Thu, 20 Jul 2023 21:02:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwpc/ShiXZJZWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-07124,
  author       = {Yuhui Li and
                  Fangyun Wei and
                  Jinjing Zhao and
                  Chao Zhang and
                  Hongyang Zhang},
  title        = {{RAIN:} Your Language Models Can Align Themselves without Finetuning},
  journal      = {CoRR},
  volume       = {abs/2309.07124},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.07124},
  doi          = {10.48550/ARXIV.2309.07124},
  eprinttype    = {arXiv},
  eprint       = {2309.07124},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-07124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-09831,
  author       = {Zian Jia and
                  Yun Xiong and
                  Yuhong Nan and
                  Yao Zhang and
                  Jinjing Zhao and
                  Mi Wen},
  title        = {{MAGIC:} Detecting Advanced Persistent Threats via Masked Graph Representation
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2310.09831},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.09831},
  doi          = {10.48550/ARXIV.2310.09831},
  eprinttype    = {arXiv},
  eprint       = {2310.09831},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-09831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/JiaWXZZ22,
  author       = {Zian Jia and
                  Xiaosu Wang and
                  Yun Xiong and
                  Yao Zhang and
                  Jinjing Zhao},
  title        = {{AISLE:} Self-supervised Representation Learning for the Investigation
                  of Advanced Persistent Threat},
  booktitle    = {7th {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2022, Guilin, China, July 11-13, 2022},
  pages        = {360--366},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC55868.2022.00056},
  doi          = {10.1109/DSC55868.2022.00056},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/JiaWXZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/WangZZKZZ22,
  author       = {Chenxu Wang and
                  Ming Zhang and
                  Jinjing Zhao and
                  Xiaohui Kuang and
                  Han Zhang and
                  Xuhong Zhang},
  title        = {A Data-free Black-box Attack for Generating Transferable Adversarial
                  Examples},
  booktitle    = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications;
                  8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart
                  City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022,
                  Hainan, China, December 18-20, 2022},
  pages        = {672--678},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00115},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00115},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/WangZZKZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdis/WangZZK22,
  author       = {Chenxu Wang and
                  Ming Zhang and
                  Jinjing Zhao and
                  Xiaohui Kuang},
  title        = {Black-Box Adversarial Attacks on Deep Neural Networks: {A} Survey},
  booktitle    = {4th International Conference on Data Intelligence and Security, {ICDIS}
                  2022, Shenzhen, China, August 24-26, 2022},
  pages        = {88--93},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDIS55630.2022.00021},
  doi          = {10.1109/ICDIS55630.2022.00021},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdis/WangZZK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-03237,
  author       = {Xiaobin Fan and
                  Xiaoping Wang and
                  Kai Lu and
                  Lei Xue and
                  Jinjing Zhao},
  title        = {Tree-based Search Graph for Approximate Nearest Neighbor Search},
  journal      = {CoRR},
  volume       = {abs/2201.03237},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.03237},
  eprinttype    = {arXiv},
  eprint       = {2201.03237},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-03237.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhongZH21,
  author       = {Wenjing Zhong and
                  Jinjing Zhao and
                  Hesuan Hu},
  title        = {A Multilevel Non-interference Vulnerability Analysis Method for Information
                  Leakage Problem},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {367--374},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00058},
  doi          = {10.1109/DSC53577.2021.00058},
  timestamp    = {Fri, 22 Apr 2022 19:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhongZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/LiLLLZFLL21,
  author       = {Xiang Li and
                  Shenglan Liu and
                  Yunheng Li and
                  Hao Liu and
                  Jinjing Zhao and
                  Lin Feng and
                  Guihong Lao and
                  Guangzhe Li},
  editor       = {Teddy Mantoro and
                  Minho Lee and
                  Media Anugerah Ayu and
                  Kok Wai Wong and
                  Achmad Nizar Hidayanto},
  title        = {Spatial-Temporal Attention Network with Multi-similarity Loss for
                  Fine-Grained Skeleton-Based Action Recognition},
  booktitle    = {Neural Information Processing - 28th International Conference, {ICONIP}
                  2021, Sanur, Bali, Indonesia, December 8-12, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13109},
  pages        = {620--631},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92270-2\_53},
  doi          = {10.1007/978-3-030-92270-2\_53},
  timestamp    = {Tue, 14 Dec 2021 17:56:34 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/LiLLLZFLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aca/ZhaoPL20,
  author       = {Jinjing Zhao and
                  Ling Pang and
                  Bai Lin},
  editor       = {Dezun Dong and
                  Xiaoli Gong and
                  Cunlu Li and
                  Dongsheng Li and
                  Junjie Wu},
  title        = {{SDNVD-SCADA:} {A} Formalized Vulnerability Detection Platform in
                  SDN-Enabled {SCADA} System},
  booktitle    = {Advanced Computer Architecture - 13th Conference, {ACA} 2020, Kunming,
                  China, August 13-15, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1256},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-8135-9\_1},
  doi          = {10.1007/978-981-15-8135-9\_1},
  timestamp    = {Wed, 23 Mar 2022 17:30:19 +0100},
  biburl       = {https://dblp.org/rec/conf/aca/ZhaoPL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhaoPLW20,
  author       = {Jinjing Zhao and
                  Ling Pang and
                  Hongiian Li and
                  Zibin Wang},
  title        = {A Safety-Enhanced Dijkstra Routing Algorithm via {SDN} Framework},
  booktitle    = {5th {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2020, Hong Kong, July 27-30, 2020},
  pages        = {388--393},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSC50466.2020.00067},
  doi          = {10.1109/DSC50466.2020.00067},
  timestamp    = {Thu, 27 Aug 2020 13:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhaoPLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhaoWLPKW19,
  author       = {Jinjing Zhao and
                  Yan Wen and
                  Xiang Li and
                  Ling Pang and
                  Xiaohui Kuang and
                  Dongxia Wang},
  editor       = {S{\'{e}}verine Sentilles and
                  Barry W. Boehm and
                  Catia Trubiani and
                  Anne Koziolek},
  title        = {A heuristic fuzz test generator for Java native interface},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGSOFT} International Workshop on Software
                  Qualities and Their Dependencies, SQUADE@ESEC/SIGSOFT {FSE} 2019,
                  Tallinn, Estonia, August 26, 2019},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3340495.3342749},
  doi          = {10.1145/3340495.3342749},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZhaoWLPKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhaoP18,
  author       = {Jinjing Zhao and
                  Ling Pang},
  title        = {Automated Fuzz Generators for High-Coverage Tests Based on Program
                  Branch Predications},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {514--520},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00082},
  doi          = {10.1109/DSC.2018.00082},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhaoP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/ZhaoPKJ18,
  author       = {Jinjing Zhao and
                  Ling Pang and
                  Xiaohui Kuang and
                  Rong Jin},
  editor       = {Feng Zhang and
                  Jidong Zhai and
                  Marc Snir and
                  Hai Jin and
                  Hironori Kasahara and
                  Mateo Valero},
  title        = {Balancing the {QOS} and Security in Dijkstra Algorithm by {SDN} Technology},
  booktitle    = {Network and Parallel Computing - 15th {IFIP} {WG} 10.3 International
                  Conference, {NPC} 2018, Muroran, Japan, November 29 - December 1,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11276},
  pages        = {126--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05677-3\_11},
  doi          = {10.1007/978-3-030-05677-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/ZhaoPKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcallt/Zhao16a,
  author       = {Jinjing Zhao},
  title        = {{L2} Languaging in a Massively Multiplayer Online Game: An Exploration
                  of Learner Variations},
  journal      = {Int. J. Comput. Assist. Lang. Learn. Teach.},
  volume       = {6},
  number       = {4},
  pages        = {1--17},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJCALLT.2016100101},
  doi          = {10.4018/IJCALLT.2016100101},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcallt/Zhao16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/HammadZFK16,
  author       = {Eman M. Hammad and
                  Jinjing Zhao and
                  Abdallah K. Farraj and
                  Deepa Kundur},
  title        = {Mitigating link insecurities in smart grids via QoS multi-constraint
                  routing},
  booktitle    = {{IEEE} International Conference on Communication, {ICC} 2015, London,
                  United Kingdom, June 8-12, 2015, Workshop Proceedings},
  pages        = {380--386},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCW.2016.7503817},
  doi          = {10.1109/ICCW.2016.7503817},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/HammadZFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/WenZYL14,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Shuanghui Yi and
                  Xiang Li},
  editor       = {Xingang Liu and
                  Didier El Baz and
                  Ching{-}Hsien Hsu and
                  Kai Kang and
                  Weifeng Chen},
  title        = {FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight
                  Hypervisor},
  booktitle    = {17th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014},
  pages        = {620--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSE.2014.136},
  doi          = {10.1109/CSE.2014.136},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/WenZYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/WenFZL14,
  author       = {Yan Wen and
                  Youyuan Fang and
                  Jinjing Zhao and
                  Xiang Li},
  editor       = {Xingang Liu and
                  Didier El Baz and
                  Ching{-}Hsien Hsu and
                  Kai Kang and
                  Weifeng Chen},
  title        = {Shielding Your Privacy with the Local-Booted Virtual Machine},
  booktitle    = {17th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014},
  pages        = {1637--1643},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSE.2014.301},
  doi          = {10.1109/CSE.2014.301},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/WenFZL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/WenZC14,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Hua Chen},
  title        = {Towards Thwarting Data Leakage with Memory Page Access Interception},
  booktitle    = {{IEEE} 12th International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2014, Dalian, China, August 24-27, 2014},
  pages        = {26--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DASC.2014.14},
  doi          = {10.1109/DASC.2014.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/WenZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/ZhaoW13,
  author       = {Jinjing Zhao and
                  Yan Wen},
  title        = {Evaluation on the influence of internet prefix hijacking events},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {10},
  number       = {2},
  pages        = {611--631},
  year         = {2013},
  url          = {https://doi.org/10.2298/CSIS121108023Z},
  doi          = {10.2298/CSIS121108023Z},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/ZhaoW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/CaoZZLZ13,
  author       = {Huayang Cao and
                  Jinjing Zhao and
                  Peidong Zhu and
                  Xicheng Lu and
                  Chonglun Zhao},
  title        = {Worm Detection without Knowledge Base in Industrial Networks},
  journal      = {J. Commun.},
  volume       = {8},
  number       = {11},
  pages        = {716--723},
  year         = {2013},
  url          = {https://doi.org/10.12720/jcm.8.11.716-723},
  doi          = {10.12720/JCM.8.11.716-723},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/CaoZZLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmiccc/CaoZZ13,
  author       = {Huayang Cao and
                  Peidong Zhu and
                  Jinjing Zhao},
  title        = {{CBSTM:} Cloud-based Behavior Similarity Transmission Method to Detect
                  Industrial Worms},
  booktitle    = {2013 The Second International Conference on Innovative Computing and
                  Cloud Computing, {ICCC} '13, Wuhan, China - December 01 - 02, 2013},
  pages        = {158},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2556871.2556906},
  doi          = {10.1145/2556871.2556906},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/acmiccc/CaoZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/WenZCH13,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Hua Chen and
                  Minhuan Huang},
  title        = {Towards Implicitly Introspecting the Preinstalled Operating System
                  with Local-Booting Virtualization Technology},
  booktitle    = {{IEEE} 11th International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2013, Chengdu, China, December 21-22, 2013},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DASC.2013.34},
  doi          = {10.1109/DASC.2013.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/WenZCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grc/WenZCH13,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Hua Chen and
                  Minhuan Huang},
  editor       = {Shuliang Wang and
                  Xingquan Zhu and
                  Tingting He},
  title        = {Towards sharing disks between host {OS} and virtual machine with volume
                  snapshot technology},
  booktitle    = {2013 {IEEE} International Conference on Granular Computing, GrC 2013,
                  Beijing, China, December 13-15, 2013},
  pages        = {347--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/GrC.2013.6740434},
  doi          = {10.1109/GRC.2013.6740434},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grc/WenZCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/LiuWZH13,
  author       = {Lingxia Liu and
                  Dongxia Wang and
                  Jinjing Zhao and
                  Minhuan Huang},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {SA4WSs: {A} Security Architecture for Web Services},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {306--311},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_32},
  doi          = {10.1007/978-3-642-36818-9\_32},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/LiuWZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/SunCZH13,
  author       = {Xiao Xia Sun and
                  Hua Chen and
                  Jinjing Zhao and
                  Minhuan Huang},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {A Test Case Generation Technique for {VMM} Fuzzing},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {318--323},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_34},
  doi          = {10.1007/978-3-642-36818-9\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/SunCZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/KuangLZ13,
  author       = {Xiaohui Kuang and
                  Xiang Li and
                  Jinjing Zhao},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Architecture of Network Environment for High-Risk Security Experimentation},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {479--484},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_53},
  doi          = {10.1007/978-3-642-36818-9\_53},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/KuangLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ZhaoW13,
  author       = {Jinjing Zhao and
                  Yan Wen},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Emulation on the Internet Prefix Hijacking Attack Impaction},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {485--489},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_54},
  doi          = {10.1007/978-3-642-36818-9\_54},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ZhaoW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhaoW12,
  author       = {Jinjing Zhao and
                  Yan Wen},
  title        = {Analysis on the Effect of Prefix Hijacking Attack and Internet Hierarchy},
  booktitle    = {12th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012},
  pages        = {375--382},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIT.2012.90},
  doi          = {10.1109/CIT.2012.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZhaoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/WenZZCW12,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Gang Zhao and
                  Hua Chen and
                  Dongxia Wang},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {A Survey of Virtualization Technologies Focusing on Untrusted Code
                  Execution},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {378--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.92},
  doi          = {10.1109/IMIS.2012.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/WenZZCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/ZhaoWLPZ12,
  author       = {Jinjing Zhao and
                  Yan Wen and
                  Xiang Li and
                  Wei Peng and
                  Feng Zhao},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {The Relation on Prefix Hijacking and the Internet Hierarchy},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {415--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.40},
  doi          = {10.1109/IMIS.2012.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/ZhaoWLPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/WangMZW11,
  author       = {Chunlei Wang and
                  Liang Ming and
                  Jinjing Zhao and
                  Dongxia Wang},
  title        = {A General Framework for Network Survivability Testing and Evaluation},
  journal      = {J. Networks},
  volume       = {6},
  number       = {6},
  pages        = {831--841},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.6.831-841},
  doi          = {10.4304/JNW.6.6.831-841},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/WangMZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/ZhaoWW11,
  author       = {Jinjing Zhao and
                  Yan Wen and
                  Dongxia Wang},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Feilong Tang and
                  Fatos Xhafa},
  title        = {A Network Security Evaluation Method Framework Based on Multiple Criteria
                  Decision Making Theory},
  booktitle    = {Proceedings of the Fifth International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
                  Korea, June 30-July 02, 2011},
  pages        = {371--375},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMIS.2011.38},
  doi          = {10.1109/IMIS.2011.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/ZhaoWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/WenZHC11,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Minhuan Huang and
                  Hua Chen},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Feilong Tang and
                  Fatos Xhafa},
  title        = {Aquarius: {A} Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable
                  Way},
  booktitle    = {Proceedings of the Fifth International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul,
                  Korea, June 30-July 02, 2011},
  pages        = {403--407},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IMIS.2011.39},
  doi          = {10.1109/IMIS.2011.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/WenZHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/ZhaoWZ11,
  author       = {Jinjing Zhao and
                  Yan Wen and
                  Gang Zhao},
  editor       = {Erik R. Altman and
                  Weisong Shi},
  title        = {H-Fuzzing: {A} New Heuristic Method for Fuzzing Data Generation},
  booktitle    = {Network and Parallel Computing - 8th {IFIP} International Conference,
                  {NPC} 2011, Changsha, China, October 21-23, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6985},
  pages        = {32--43},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24403-2\_3},
  doi          = {10.1007/978-3-642-24403-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/ZhaoWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WenZHC11,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Minhuan Huang and
                  Hua Chen},
  title        = {Towards Detecting Thread Deadlock in Java Programs with {JVM} Introspection},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1600--1607},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.222},
  doi          = {10.1109/TRUSTCOM.2011.222},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WenZHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhaoZWL10,
  author       = {Jinjing Zhao and
                  Gang Zhao and
                  Yan Wen and
                  Xiang Li},
  title        = {Towards Detecting the Interaction Vulnerabilities in Large Distributed
                  System},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {2843--2848},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.475},
  doi          = {10.1109/CIT.2010.475},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZhaoZWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/WenHZK10,
  author       = {Yan Wen and
                  Minhuan Huang and
                  Jinjing Zhao and
                  Xiaohui Kuang},
  editor       = {Yi Peng and
                  Gang Kou and
                  Franz I. S. Ko and
                  Yong Zeng and
                  Kae{-}Dal Kwack},
  title        = {Implicit detection of stealth software with a local-booted virtual
                  machine},
  booktitle    = {Proceedings of the 3rd International Conference on Information Sciences
                  and Interaction Sciences {(ICIS} 2010), Chengdu, China, June 23-25,
                  2010},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICICIS.2010.5534733},
  doi          = {10.1109/ICICIS.2010.5534733},
  timestamp    = {Mon, 21 Jun 2021 12:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/interaction/WenHZK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinagrid/ZhaoZZC09,
  author       = {Gang Zhao and
                  Weimin Zheng and
                  Jinjing Zhao and
                  Hua Chen},
  title        = {An Heuristic Method for Web-Service Program Security Testing},
  booktitle    = {Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong,
                  China, 21-22 August, 2009},
  pages        = {139--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ChinaGrid.2009.10},
  doi          = {10.1109/CHINAGRID.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chinagrid/ZhaoZZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WenZWC08,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Huaimin Wang and
                  Jiannong Cao},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted
                  Virtual Machine Monitor},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_27},
  doi          = {10.1007/978-3-540-70500-0\_27},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WenZWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isip/WenZW08,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Huaimin Wang},
  editor       = {Fei Yu and
                  Qi Luo},
  title        = {A Novel Intrusion-Tolerant Approach for Internet Access},
  booktitle    = {International Symposium on Information Processing, {ISIP} 2008 / International
                  Pacific Workshop on Web Mining, and Web-Based Application, {WMWA}
                  2008, Moscow, Russia, 23-25 May 2008},
  pages        = {485--489},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIP.2008.28},
  doi          = {10.1109/ISIP.2008.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isip/WenZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WenZW08,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Huaimin Wang},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Hiding "real" machine from attackers and malware with a
                  minimal virtual machine monitor},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {21},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460904},
  doi          = {10.1145/1460877.1460904},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WenZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wstst/CuiZZZ08,
  author       = {Yimin Cui and
                  Tao Zou and
                  Lufeng Zhang and
                  Jinjing Zhao},
  editor       = {Richard Chbeir and
                  Youakim Badr and
                  Ajith Abraham and
                  Dominique Laurent and
                  Mario K{\"{o}}ppen and
                  Fernando Ferri and
                  Lotfi A. Zadeh and
                  Yukio Ohsawa},
  title        = {Network security simulation and evaluation},
  booktitle    = {{CSTST} 2008: Proceedings of the 5th International Conference on Soft
                  Computing as Transdisciplinary Science and Technology, Cergy-Pontoise,
                  France, October 28-31, 2008},
  pages        = {55--58},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456223.1456239},
  doi          = {10.1145/1456223.1456239},
  timestamp    = {Mon, 03 Jul 2023 14:54:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wstst/CuiZZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/ZhaoZL07,
  author       = {Jinjing Zhao and
                  Peidong Zhu and
                  Xicheng Lu},
  title        = {Pricing Models of Inter-Domain Multicasting Applications},
  booktitle    = {4th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2007, Las Vegas, NV, USA, January 11-13, 2007},
  pages        = {773--777},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CCNC.2007.157},
  doi          = {10.1109/CCNC.2007.157},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/ZhaoZL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ZhuZWC07,
  author       = {Peidong Zhu and
                  Jinjing Zhao and
                  Yan Wen and
                  Kaiyu Cai},
  editor       = {Hai Jin and
                  Omer F. Rana and
                  Yi Pan and
                  Viktor K. Prasanna},
  title        = {On the Power-Law of the Internet and the Hierarchy of {BGP} Convergence},
  booktitle    = {Algorithms and Architectures for Parallel Processing, 7th International
                  Conference, {ICA3PP} 2007, Hangzhou, China, June 11-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4494},
  pages        = {470--481},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72905-1\_42},
  doi          = {10.1007/978-3-540-72905-1\_42},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ZhuZWC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WenZW07,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Huaimin Wang},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {A Novel Approach for Untrusted Code Execution},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_31},
  doi          = {10.1007/978-3-540-77048-0\_31},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WenZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/ZhaoZLX07,
  author       = {Jinjing Zhao and
                  Peidong Zhu and
                  Xicheng Lu and
                  Lei Xuan},
  editor       = {Teresa Maria Vaz{\~{a}}o and
                  M{\'{a}}rio M. Freire and
                  Ilyoung Chong},
  title        = {Does the Average Path Length Grow in the Internet?},
  booktitle    = {Information Networking. Towards Ubiquitous Networking and Services,
                  International Conference, {ICOIN} 2007, Estoril, Portugal, January
                  23-25, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5200},
  pages        = {183--190},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-89524-4\_19},
  doi          = {10.1007/978-3-540-89524-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/ZhaoZLX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhaoLZZ06,
  author       = {Feng Zhao and
                  Xicheng Lu and
                  Peidong Zhu and
                  Jinjing Zhao},
  editor       = {Michael Gerndt and
                  Dieter Kranzlm{\"{u}}ller},
  title        = {BGPSep{\_}D: An Improved Algorithm for Constructing Correct and Scalable
                  {IBGP} Configurations Based on Vertexes Degree},
  booktitle    = {High Performance Computing and Communications, Second International
                  Conference, {HPCC} 2006, Munich, Germany, September 13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4208},
  pages        = {406--415},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11847366\_42},
  doi          = {10.1007/11847366\_42},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZhaoLZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/ZhaoLZZ06,
  author       = {Feng Zhao and
                  Xicheng Lu and
                  Peidong Zhu and
                  Jinjing Zhao},
  editor       = {Soma Chaudhuri and
                  Samir R. Das and
                  Himadri S. Paul and
                  Srikanta Tirthapura},
  title        = {BGPSep{\_}S: An Algorithm for Constructing {IBGP} Configurations with
                  Complete Visibility},
  booktitle    = {Distributed Computing and Networking, 8th International Conference,
                  {ICDCN} 2006, Guwahati, India, December 27-30, 2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4308},
  pages        = {379--384},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11947950\_42},
  doi          = {10.1007/11947950\_42},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/ZhaoLZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netgames/ZhaoZLZ06,
  author       = {Jinjing Zhao and
                  Peidong Zhu and
                  Xicheng Lu and
                  Feng Zhao},
  editor       = {Adrian David Cheok and
                  Yutaka Ishibashi},
  title        = {A practical pricing model of inter-domain multicasting based on game
                  theory},
  booktitle    = {Proceedings of the 5th Workshop on Network and System Support for
                  Games, {NETGAMES} 2006, Singapore, October 30-31, 2006},
  pages        = {40},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1230040.1230050},
  doi          = {10.1145/1230040.1230050},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netgames/ZhaoZLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/ZhaoZLZ06,
  author       = {Jinjing Zhao and
                  Peidong Zhu and
                  Xicheng Lu and
                  Feng Zhao},
  title        = {The Hierarchy of {BGP} Convergence on the Self-Organized Internet},
  booktitle    = {12th {IEEE} Pacific Rim International Symposium on Dependable Computing
                  {(PRDC} 2006), 18-20 December, 2006, University of California, Riverside,
                  {USA}},
  pages        = {391--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/PRDC.2006.60},
  doi          = {10.1109/PRDC.2006.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/ZhaoZLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics