BibTeX records: Futai Zou

download as .bib file

@article{DBLP:journals/compsec/HuZHSW24,
  author       = {Yuelin Hu and
                  Futai Zou and
                  Jiajia Han and
                  Xin Sun and
                  Yilei Wang},
  title        = {{LLM-TIKG:} Threat intelligence knowledge graph construction utilizing
                  large language model},
  journal      = {Comput. Secur.},
  volume       = {145},
  pages        = {103999},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103999},
  doi          = {10.1016/J.COSE.2024.103999},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuZHSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangZHCY24,
  author       = {Zehui Zhang and
                  Futai Zou and
                  Jianan Hong and
                  Libo Chen and
                  Ping Yi},
  title        = {Detection and Analysis of Broken Access Control Vulnerabilities in
                  App-Cloud Interaction in IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {17},
  pages        = {28267--28280},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3400858},
  doi          = {10.1109/JIOT.2024.3400858},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangZHCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhuLHHZ24,
  author       = {Chengchen Zhu and
                  Kunling Li and
                  Jianan Hong and
                  Cunqing Hua and
                  Futai Zou},
  title        = {A Secure and Private Authentication Based on Radio Frequency Fingerprinting},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2024, Denver,
                  CO, USA, June 9-13, 2024},
  pages        = {2210--2215},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICC51166.2024.10622361},
  doi          = {10.1109/ICC51166.2024.10622361},
  timestamp    = {Mon, 02 Sep 2024 15:04:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhuLHHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/ZhouHZZH24,
  author       = {Jiayue Zhou and
                  Jianan Hong and
                  Chengchen Zhu and
                  Futai Zou and
                  Cunqing Hua},
  title        = {Trustful Blockchain-Enabled Identity Management for {VANET} with Short-Latency
                  Authentication},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2024, Big Island, HI, USA, February 19-22, 2024},
  pages        = {659--663},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICNC59896.2024.10556332},
  doi          = {10.1109/ICNC59896.2024.10556332},
  timestamp    = {Mon, 01 Jul 2024 16:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/ZhouHZZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuZYWZ23,
  author       = {Bolun Wu and
                  Futai Zou and
                  Ping Yi and
                  Yue Wu and
                  Liang Zhang},
  title        = {SlicedLocator: Code vulnerability locator based on sliced dependence
                  graph},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103469},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103469},
  doi          = {10.1016/J.COSE.2023.103469},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuZYWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WuZZYL23,
  author       = {Bolun Wu and
                  Futai Zou and
                  Chengwei Zhang and
                  Tangda Yu and
                  Yun Li},
  title        = {Multi-field relation mining for malicious {HTTP} traffic detection
                  based on attention and cross network},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103411},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103411},
  doi          = {10.1016/J.JISA.2022.103411},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/WuZZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZouHXW23,
  author       = {Futai Zou and
                  Yuelin Hu and
                  Wenliang Xu and
                  Yue Wu},
  editor       = {Ding Wang and
                  Moti Yung and
                  Zheli Liu and
                  Xiaofeng Chen},
  title        = {Link Prediction-Based Multi-Identity Recognition of Darknet Vendors},
  booktitle    = {Information and Communications Security - 25th International Conference,
                  {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14252},
  pages        = {317--332},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7356-9\_19},
  doi          = {10.1007/978-981-99-7356-9\_19},
  timestamp    = {Tue, 24 Oct 2023 16:55:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZouHXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLSZW22,
  author       = {Jingcheng Yang and
                  Hongwei Li and
                  Shuo Shao and
                  Futai Zou and
                  Yue Wu},
  title        = {{FS-IDS:} {A} framework for intrusion detection based on few-shot
                  learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102899},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102899},
  doi          = {10.1016/J.COSE.2022.102899},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLSZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/NieZQZW22,
  author       = {Mingjie Nie and
                  Futai Zou and
                  Yi Qin and
                  Tianming Zheng and
                  Yue Wu},
  title        = {{QUIC-CNN:} Website Fingerprinting for {QUIC} Traffic in Tor Network},
  booktitle    = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications;
                  8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart
                  City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022,
                  Hainan, China, December 18-20, 2022},
  pages        = {663--671},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00114},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00114},
  timestamp    = {Thu, 06 Apr 2023 11:34:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/NieZQZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/QinZWZ22,
  author       = {Yi Qin and
                  Tianming Zheng and
                  Yue Wu and
                  Futai Zou},
  title        = {Tracing Tor Hidden Service Through Protocol Characteristics},
  booktitle    = {31st International Conference on Computer Communications and Networks,
                  {ICCCN} 2022, Honolulu, HI, USA, July 25-28, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCCN54977.2022.9868859},
  doi          = {10.1109/ICCCN54977.2022.9868859},
  timestamp    = {Wed, 14 Sep 2022 19:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/QinZWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/QinWZW22,
  author       = {Yi Qin and
                  Jiahe Wu and
                  Futai Zou and
                  Yue Wu},
  title        = {Breaking Tor's Anonymity by Modifying Cell's Command},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes,
                  Greece, June 30 - July 3, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISCC55528.2022.9913045},
  doi          = {10.1109/ISCC55528.2022.9913045},
  timestamp    = {Tue, 25 Oct 2022 21:20:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iscc/QinWZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhaiZT022,
  author       = {Haochen Zhai and
                  Futai Zou and
                  Junhua Tang and
                  Yue Wu},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Towards High Transferability on Neural Network for Black-Box Adversarial
                  Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {72--88},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_5},
  doi          = {10.1007/978-3-031-25538-0\_5},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZhaiZT022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuZ21,
  author       = {Wenliang Xu and
                  Futai Zou},
  title        = {Obfuscated Tor Traffic Identification Based on Sliding Window},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5587837:1--5587837:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5587837},
  doi          = {10.1155/2021/5587837},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/0003XCPNWZ21,
  author       = {Chengwei Zhang and
                  Yunlu Xu and
                  Zhanzhan Cheng and
                  Shiliang Pu and
                  Yi Niu and
                  Fei Wu and
                  Futai Zou},
  title        = {{SPIN:} Structure-Preserving Inner Offset Network for Scene Text Recognition},
  booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2021, Thirty-Third Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9,
                  2021},
  pages        = {3305--3314},
  publisher    = {{AAAI} Press},
  year         = {2021},
  url          = {https://doi.org/10.1609/aaai.v35i4.16442},
  doi          = {10.1609/AAAI.V35I4.16442},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/0003XCPNWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZouRZT21,
  author       = {Futai Zou and
                  Yundong Ren and
                  Jiachen Zhu and
                  Junhua Tang},
  title        = {Detecting Data Leakage in {DNS} Traffic based on Time Series Anomaly
                  Detection},
  booktitle    = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications;
                  7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart
                  City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys),
                  Haikou, Hainan, China, December 20-22, 2021},
  pages        = {503--510},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00090},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00090},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZouRZT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZouZ21,
  author       = {Futai Zou and
                  Haochen Zhai},
  title        = {Browser Fingerprinting Identification Using Incremental Clustering
                  Algorithm Based on Autoencoder},
  booktitle    = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications;
                  7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart
                  City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys),
                  Haikou, Hainan, China, December 20-22, 2021},
  pages        = {525--532},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00093},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00093},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZouZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiT0Z21,
  author       = {Jingsong Li and
                  Junhua Tang and
                  Jianhua Li and
                  Futai Zou},
  title        = {Deep Reinforcement Learning for Intelligent Computing and Content
                  Edge Service in ICN-based IoV},
  booktitle    = {{IEEE} International Conference on Communications Workshops, {ICC}
                  Workshops 2021, Montreal, QC, Canada, June 14-23, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCWorkshops50388.2021.9473558},
  doi          = {10.1109/ICCWORKSHOPS50388.2021.9473558},
  timestamp    = {Tue, 13 Jul 2021 14:57:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiT0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/XieYZZ21,
  author       = {Chenqi Xie and
                  Ping Yi and
                  Baowen Zhang and
                  Futai Zou},
  title        = {DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning},
  booktitle    = {33rd {IEEE} International Conference on Tools with Artificial Intelligence,
                  {ICTAI} 2021, Washington, DC, USA, November 1-3, 2021},
  pages        = {169--175},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICTAI52525.2021.00031},
  doi          = {10.1109/ICTAI52525.2021.00031},
  timestamp    = {Tue, 28 Dec 2021 13:25:55 +0100},
  biburl       = {https://dblp.org/rec/conf/ictai/XieYZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZouSH21,
  author       = {Futai Zou and
                  Qianying Shen and
                  Yuzong Hu},
  editor       = {Joseph K. Liu and
                  Sokratis K. Katsikas and
                  Weizhi Meng and
                  Willy Susilo and
                  Rolly Intan},
  title        = {Word-Map: Using Community Detection Algorithm to Detect AGDs},
  booktitle    = {Information Security - 24th International Conference, {ISC} 2021,
                  Virtual Event, November 10-12, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13118},
  pages        = {398--414},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91356-4\_21},
  doi          = {10.1007/978-3-030-91356-4\_21},
  timestamp    = {Fri, 03 Dec 2021 17:36:27 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ZouSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WeiZ21,
  author       = {Yuheng Wei and
                  Futai Zou},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Automatic Generation of Malware Threat Intelligence from Unstructured
                  Malware Traces},
  booktitle    = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {398},
  pages        = {44--61},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90019-9\_3},
  doi          = {10.1007/978-3-030-90019-9\_3},
  timestamp    = {Thu, 04 Nov 2021 12:25:36 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WeiZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuXZ21,
  author       = {Bolun Wu and
                  Yuanhang Xu and
                  Futai Zou},
  title        = {Malware Classification by Learning Semantic and Structural Features
                  of Control Flow Graphs},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {540--547},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00084},
  doi          = {10.1109/TRUSTCOM53373.2021.00084},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouMGL21,
  author       = {Futai Zou and
                  Dechao Meng and
                  Wentao Gao and
                  Linsen Li},
  title        = {DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {577--586},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00088},
  doi          = {10.1109/TRUSTCOM53373.2021.00088},
  timestamp    = {Sun, 13 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouMGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiangZLY20,
  author       = {Xiaoshi Liang and
                  Futai Zou and
                  Linsen Li and
                  Ping Yi},
  title        = {Mobile terminal identity authentication system based on behavioral
                  characteristics},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147719899371},
  doi          = {10.1177/1550147719899371},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiangZLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/ZhangLZN20,
  author       = {Lingxuan Zhang and
                  Linsen Li and
                  Futai Zou and
                  Jiachao Niu},
  editor       = {Tinoosh Mohsenin and
                  Weisheng Zhao and
                  Yiran Chen and
                  Onur Mutlu},
  title        = {Quantitatively Assessing the Cyber-to-Physical Risk of Industrial
                  Cyber-Physical Systems},
  booktitle    = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event,
                  China, September 7-9, 2020},
  pages        = {439--444},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386263.3406945},
  doi          = {10.1145/3386263.3406945},
  timestamp    = {Mon, 04 Jul 2022 14:19:34 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/ZhangLZN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ShenZ20,
  author       = {Qianying Shen and
                  Futai Zou},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Detecting Dictionary Based AGDs Based on Community Detection},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {42--48},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_3},
  doi          = {10.1007/978-3-030-63086-7\_3},
  timestamp    = {Tue, 15 Dec 2020 15:14:02 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ShenZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YangYZ20,
  author       = {Jingcheng Yang and
                  Haowei Ye and
                  Futai Zou},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {pyDNetTopic: {A} Framework for Uncovering What Darknet Market Users
                  Talking About},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {118--139},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_8},
  doi          = {10.1007/978-3-030-63086-7\_8},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/YangYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HuZLY20,
  author       = {Yuzong Hu and
                  Futai Zou and
                  Linsen Li and
                  Ping Yi},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {418--424},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00064},
  doi          = {10.1109/TRUSTCOM50675.2020.00064},
  timestamp    = {Fri, 30 Apr 2021 12:35:40 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/HuZLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-13117,
  author       = {Chengwei Zhang and
                  Yunlu Xu and
                  Zhanzhan Cheng and
                  Shiliang Pu and
                  Yi Niu and
                  Fei Wu and
                  Futai Zou},
  title        = {{SPIN:} Structure-Preserving Inner Offset Network for Scene Text Recognition},
  journal      = {CoRR},
  volume       = {abs/2005.13117},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.13117},
  eprinttype    = {arXiv},
  eprint       = {2005.13117},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-13117.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangYZW19,
  author       = {Kedi Wang and
                  Ping Yi and
                  Futai Zou and
                  Yue Wu},
  title        = {Generating Adversarial Samples With Constrained Wasserstein Distance},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {136812--136821},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2942607},
  doi          = {10.1109/ACCESS.2019.2942607},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangYZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/HuangYZYWZ19,
  author       = {Cheng Huang and
                  Ping Yi and
                  Futai Zou and
                  Yao Yao and
                  Wei Wang and
                  Ting Zhu},
  title        = {{CCID:} Cross-Correlation Identity Distinction Method for Detecting
                  Shrew DDoS},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2019},
  pages        = {6705347:1--6705347:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6705347},
  doi          = {10.1155/2019/6705347},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/HuangYZYWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/YuZLY19,
  author       = {Tangda Yu and
                  Futai Zou and
                  Linsen Li and
                  Ping Yi},
  title        = {An Encrypted Malicious Traffic Detection System Based on Neural Network},
  booktitle    = {2019 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2019, Guilin, China, October 17-19,
                  2019},
  pages        = {62--70},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CyberC.2019.00020},
  doi          = {10.1109/CYBERC.2019.00020},
  timestamp    = {Tue, 21 Jan 2020 19:19:11 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/YuZLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BiWHZ19,
  author       = {Yue Bi and
                  Yue Wu and
                  Cunqing Hua and
                  Futai Zou},
  title        = {Evolutionary Anti-Jamming Game in Non-Orthogonal Multiple Access System},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013752},
  doi          = {10.1109/GLOBECOM38437.2019.9013752},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/BiWHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/ZhuZ19,
  author       = {Jiachen Zhu and
                  Futai Zou},
  editor       = {Zheng Xiao and
                  Laurence T. Yang and
                  Pavan Balaji and
                  Tao Li and
                  Keqin Li and
                  Albert Y. Zomaya},
  title        = {Detecting Malicious Domains Using Modified {SVM} Model},
  booktitle    = {21st {IEEE} International Conference on High Performance Computing
                  and Communications; 17th {IEEE} International Conference on Smart
                  City; 5th {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019},
  pages        = {492--499},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00079},
  doi          = {10.1109/HPCC/SMARTCITY/DSS.2019.00079},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/ZhuZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/JiangLWZ19,
  author       = {Yongkang Jiang and
                  Shenghong Li and
                  Yue Wu and
                  Futai Zou},
  editor       = {Tom Gedeon and
                  Kok Wai Wong and
                  Minho Lee},
  title        = {A Novel Image-Based Malware Classification Model Using Deep Learning},
  booktitle    = {Neural Information Processing - 26th International Conference, {ICONIP}
                  2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11954},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36711-4\_14},
  doi          = {10.1007/978-3-030-36711-4\_14},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/JiangLWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ZhangXCNP0Z19,
  author       = {Chengwei Zhang and
                  Yunlu Xu and
                  Zhanzhan Cheng and
                  Yi Niu and
                  Shiliang Pu and
                  Fei Wu and
                  Futai Zou},
  editor       = {Laurent Amsaleg and
                  Benoit Huet and
                  Martha A. Larson and
                  Guillaume Gravier and
                  Hayley Hung and
                  Chong{-}Wah Ngo and
                  Wei Tsang Ooi},
  title        = {Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal
                  Action Localization},
  booktitle    = {Proceedings of the 27th {ACM} International Conference on Multimedia,
                  {MM} 2019, Nice, France, October 21-25, 2019},
  pages        = {738--746},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3343031.3351044},
  doi          = {10.1145/3343031.3351044},
  timestamp    = {Thu, 03 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/ZhangXCNP0Z19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-02422,
  author       = {Chengwei Zhang and
                  Yunlu Xu and
                  Zhanzhan Cheng and
                  Yi Niu and
                  Shiliang Pu and
                  Fei Wu and
                  Futai Zou},
  title        = {Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal
                  Action Localization},
  journal      = {CoRR},
  volume       = {abs/1908.02422},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.02422},
  eprinttype    = {arXiv},
  eprint       = {1908.02422},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-02422.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/ZouLWLZJ18,
  author       = {Futai Zou and
                  Linsen Li and
                  Yue Wu and
                  Jianhua Li and
                  Siyu Zhang and
                  Kaida Jiang},
  title        = {Detecting Domain-Flux Malware Using {DNS} Failure Traffic},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {28},
  number       = {2},
  pages        = {151--174},
  year         = {2018},
  url          = {https://doi.org/10.1142/S0218194018400016},
  doi          = {10.1142/S0218194018400016},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/ZouLWLZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/YiGZYWZ18,
  author       = {Ping Yi and
                  Yuxiang Guan and
                  Futai Zou and
                  Yao Yao and
                  Wei Wang and
                  Ting Zhu},
  title        = {Web Phishing Detection Using a Deep Learning Framework},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {4678746:1--4678746:9},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/4678746},
  doi          = {10.1155/2018/4678746},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/YiGZYWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/FangXLSZL18,
  author       = {Liang Fang and
                  Guangtao Xue and
                  Feng Lyu and
                  Hao Sheng and
                  Futai Zou and
                  Minglu Li},
  title        = {Intelligent Large-Scale {AP} Control with Remarkable Energy Saving
                  in Campus WiFi System},
  booktitle    = {24th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2018, Singapore, December 11-13, 2018},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/PADSW.2018.8645048},
  doi          = {10.1109/PADSW.2018.8645048},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/FangXLSZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssic/HeZW18,
  author       = {Boren He and
                  Futai Zou and
                  Yue Wu},
  title        = {Multi-SDN Based Cooperation Scheme for DDoS Attack Defense},
  booktitle    = {Third International Conference on Security of Smart Cities, Industrial
                  Control System and Communications, {SSIC} 2018, Shanghai, China, October
                  18-19, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SSIC.2018.8556830},
  doi          = {10.1109/SSIC.2018.8556830},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssic/HeZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZouZLPL17,
  author       = {Futai Zou and
                  Siyu Zhang and
                  Linsen Li and
                  Li Pan and
                  Jianhua Li},
  title        = {Detecting malware based on expired command-and-control traffic},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147717720791},
  doi          = {10.1177/1550147717720791},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZouZLPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/XiaPSZ16,
  author       = {Yechao Xia and
                  Li Pan and
                  Liang Shi and
                  Futai Zou},
  title        = {Attribute Credibility Based Sybil Goup Detection in Online Social
                  Networks},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {358--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.68},
  doi          = {10.1109/DSC.2016.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/XiaPSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZouZPPLL16,
  author       = {Futai Zou and
                  Siyu Zhang and
                  Bei Pei and
                  Li Pan and
                  Linsen Li and
                  Jianhua Li},
  title        = {Survey on Domain Name System Security},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {602--607},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.96},
  doi          = {10.1109/DSC.2016.96},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ZouZPPLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/WangZPHPML16,
  author       = {Zihao Wang and
                  Futai Zou and
                  Bei Pei and
                  Weijia He and
                  Li Pan and
                  Zhaochong Mao and
                  Linsen Li},
  title        = {Detecting Malicious Server Based on Server-to-Server Realation Graph},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {698--702},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.79},
  doi          = {10.1109/DSC.2016.79},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/WangZPHPML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZouZRY15,
  author       = {Futai Zou and
                  Siyu Zhang and
                  Weixiong Rao and
                  Ping Yi},
  title        = {Detecting Malware Based on {DNS} Graph Mining},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {102687:1--102687:12},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/102687},
  doi          = {10.1155/2015/102687},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZouZRY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgec/WangWCYZZ14,
  author       = {Eric Ke Wang and
                  Tsu{-}Yang Wu and
                  Chien{-}Ming Chen and
                  Yuming Ye and
                  Zhujin Zhang and
                  Futai Zou},
  editor       = {Hui Sun and
                  Chin{-}Yu Yang and
                  Chun{-}Wei Lin and
                  Jeng{-}Shyang Pan and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Ajith Abraham},
  title        = {{MDPAS:} Markov Decision Process Based Adaptive Security for Sensors
                  in Internet of Things},
  booktitle    = {Genetic and Evolutionary Computing - Proceeding of the Eighth International
                  Conference on Genetic and Evolutionary Computing, {ICGEC} 2014, October
                  18-20, 2014, Nanchang, China},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {329},
  pages        = {389--397},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12286-1\_40},
  doi          = {10.1007/978-3-319-12286-1\_40},
  timestamp    = {Mon, 08 Jul 2024 11:45:06 +0200},
  biburl       = {https://dblp.org/rec/conf/icgec/WangWCYZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/GuiWPZX12,
  author       = {Jiaping Gui and
                  Yue Wu and
                  Chenji Pan and
                  Futai Zou and
                  Yifei Xie},
  title        = {Cost based routing in delay tolerant networks},
  booktitle    = {23rd {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 2012, Sydney, Australia, September 9-12,
                  2012},
  pages        = {1084--1089},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/PIMRC.2012.6362507},
  doi          = {10.1109/PIMRC.2012.6362507},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/GuiWPZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/HongLYZZ10,
  author       = {Jiacheng Hong and
                  Ning Liu and
                  Ping Yi and
                  Futai Zou and
                  Qiang Zhai},
  title        = {Securing Wireless Mesh Network with Mobile Firewall},
  booktitle    = {International Conference on Wireless Communications and Signal Processing,
                  {WCSP} 2010, Suzhou, China, 21-23 October, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCSP.2010.5633566},
  doi          = {10.1109/WCSP.2010.5633566},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/HongLYZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RaoCFCZ09,
  author       = {Weixiong Rao and
                  Lei Chen and
                  Ada Wai{-}Chee Fu and
                  Hanhua Chen and
                  Futai Zou},
  title        = {On Efficient Content Matching in Distributed Pub/Sub Systems},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {756--764},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5061984},
  doi          = {10.1109/INFCOM.2009.5061984},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RaoCFCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/HuangZM07,
  author       = {Xinli Huang and
                  Futai Zou and
                  Fan{-}Yuan Ma},
  title        = {Targeted Local Immunization in Scale-Free Peer-to-Peer Networks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {3},
  pages        = {457--468},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9046-2},
  doi          = {10.1007/S11390-007-9046-2},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/HuangZM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/LiHMZ05,
  author       = {Yin Li and
                  Xinli Huang and
                  Fanyuan Ma and
                  Futai Zou},
  editor       = {Hai Zhuge and
                  Geoffrey C. Fox},
  title        = {Building Efficient Super-Peer Overlay Network for {DHT} Systems},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference,
                  Beijing, China, November 30 - December 3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3795},
  pages        = {787--798},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11590354\_99},
  doi          = {10.1007/11590354\_99},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/LiHMZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/LiHZM05,
  author       = {Yin Li and
                  Xinli Huang and
                  Futai Zou and
                  Fanyuan Ma},
  editor       = {Francis C. M. Lau and
                  Hui Lei and
                  Xiaofeng Meng and
                  Min Wang},
  title        = {eDSR: {A} Decentralized Service Registry for e-Commerce},
  booktitle    = {2005 {IEEE} International Conference on e-Business Engineering {(ICEBE}
                  2005), 18-21 October 2005, Beijing, China},
  pages        = {615--619},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICEBE.2005.57},
  doi          = {10.1109/ICEBE.2005.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/LiHZM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/LiZWM04,
  author       = {Yin Li and
                  Futai Zou and
                  Zengde Wu and
                  Fanyuan Ma},
  editor       = {Jeffrey Xu Yu and
                  Xuemin Lin and
                  Hongjun Lu and
                  Yanchun Zhang},
  title        = {{PWSD:} {A} Scalable Web Service Discovery Architecture Based on Peer-to-Peer
                  Overlay Network},
  booktitle    = {Advanced Web Technologies and Applications, 6th Asia-Pacific Web Conference,
                  APWeb 2004, Hangzhou, China, April 14-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3007},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24655-8\_32},
  doi          = {10.1007/978-3-540-24655-8\_32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apweb/LiZWM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/LiZML04,
  author       = {Yin Li and
                  Futai Zou and
                  Fanyuan Ma and
                  Minglu Li},
  editor       = {Hai Jin and
                  Yi Pan and
                  Nong Xiao and
                  Jianhua Sun},
  title        = {pXRepository: {A} Peer-to-Peer {XML} Repository for Web Service Discovery},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
                  Wuhan, China, October 21-24, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3251},
  pages        = {137--144},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30208-7\_24},
  doi          = {10.1007/978-3-540-30208-7\_24},
  timestamp    = {Fri, 26 Feb 2021 08:55:11 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/LiZML04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ZouLZML04,
  author       = {Futai Zou and
                  Yin Li and
                  Liang Zhang and
                  Fanyuan Ma and
                  Minglu Li},
  editor       = {Hai Jin and
                  Yi Pan and
                  Nong Xiao and
                  Jianhua Sun},
  title        = {A Novel Approach for Constructing Small World in Structured {P2P}
                  Systems},
  booktitle    = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference,
                  Wuhan, China, October 21-24, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3251},
  pages        = {807--810},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30208-7\_110},
  doi          = {10.1007/978-3-540-30208-7\_110},
  timestamp    = {Fri, 27 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ZouLZML04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/ZouCMZT04,
  author       = {Futai Zou and
                  Shudong Chen and
                  Fanyuan Ma and
                  Liang Zhang and
                  Junjun Tang},
  editor       = {Jiannong Cao and
                  Laurence Tianruo Yang and
                  Minyi Guo and
                  Francis Chi{-}Moon Lau},
  title        = {Using the Linking Model to Understand the Performance of {DHT} Routing
                  Algorithms},
  booktitle    = {Parallel and Distributed Processing and Applications, Second InternationalSymposium,
                  {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3358},
  pages        = {544--549},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30566-8\_65},
  doi          = {10.1007/978-3-540-30566-8\_65},
  timestamp    = {Tue, 14 Apr 2020 13:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/ZouCMZT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LiZML04,
  author       = {Yin Li and
                  Futai Zou and
                  Fanyuan Ma and
                  Minglu Li},
  editor       = {Hai Jin and
                  Guang R. Gao and
                  Zhiwei Xu and
                  Hao Chen},
  title        = {Build a Distributed Repository for Web Service Discovery Based on
                  Peer-to-Peer Network},
  booktitle    = {Network and Parallel Computing, {IFIP} International Conference, {NPC}
                  2004, Wuhan, China, October 18-20, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3222},
  pages        = {175--182},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30141-7\_26},
  doi          = {10.1007/978-3-540-30141-7\_26},
  timestamp    = {Sun, 02 Jun 2019 21:27:18 +0200},
  biburl       = {https://dblp.org/rec/conf/npc/LiZML04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/ZouLZM04,
  author       = {Futai Zou and
                  Yin Li and
                  Liang Zhang and
                  Fanyuan Ma},
  editor       = {Qing Li and
                  Guoren Wang and
                  Ling Feng},
  title        = {{CCAN:} Cache-Based {CAN} Using the Small World Model},
  booktitle    = {Advances in Web-Age Information Management: 5th International Conference,
                  {WAIM} 2004, Dalian, China, July 15-17, 2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {3129},
  pages        = {167--175},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27772-9\_18},
  doi          = {10.1007/978-3-540-27772-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/ZouLZM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/ZouZLM03,
  author       = {Futai Zou and
                  Liang Zhang and
                  Yin Li and
                  Fanyuan Ma},
  editor       = {Minglu Li and
                  Xian{-}He Sun and
                  Qianni Deng and
                  Jun Ni},
  title        = {Effect of Links on {DHT} Routing Algorithms},
  booktitle    = {Grid and Cooperative Computing, Second International Workshop, {GCC}
                  2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3032},
  pages        = {308--315},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24679-4\_64},
  doi          = {10.1007/978-3-540-24679-4\_64},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/gcc/ZouZLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/YuPZM03,
  author       = {Shui Yu and
                  Leyun Pan and
                  Futai Zou and
                  Fanyuan Ma},
  editor       = {Minglu Li and
                  Xian{-}He Sun and
                  Qianni Deng and
                  Jun Ni},
  title        = {{DHCS:} {A} Case of Knowledge Share in Cooperative Computing Environment},
  booktitle    = {Grid and Cooperative Computing, Second International Workshop, {GCC}
                  2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3033},
  pages        = {380--387},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24680-0\_62},
  doi          = {10.1007/978-3-540-24680-0\_62},
  timestamp    = {Tue, 03 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/YuPZM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}