default search action
BibTeX records: Futai Zou
@article{DBLP:journals/compsec/HuZHSW24, author = {Yuelin Hu and Futai Zou and Jiajia Han and Xin Sun and Yilei Wang}, title = {{LLM-TIKG:} Threat intelligence knowledge graph construction utilizing large language model}, journal = {Comput. Secur.}, volume = {145}, pages = {103999}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103999}, doi = {10.1016/J.COSE.2024.103999}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuZHSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangZHCY24, author = {Zehui Zhang and Futai Zou and Jianan Hong and Libo Chen and Ping Yi}, title = {Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {17}, pages = {28267--28280}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3400858}, doi = {10.1109/JIOT.2024.3400858}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangZHCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhuLHHZ24, author = {Chengchen Zhu and Kunling Li and Jianan Hong and Cunqing Hua and Futai Zou}, title = {A Secure and Private Authentication Based on Radio Frequency Fingerprinting}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2024, Denver, CO, USA, June 9-13, 2024}, pages = {2210--2215}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICC51166.2024.10622361}, doi = {10.1109/ICC51166.2024.10622361}, timestamp = {Mon, 02 Sep 2024 15:04:36 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhuLHHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/ZhouHZZH24, author = {Jiayue Zhou and Jianan Hong and Chengchen Zhu and Futai Zou and Cunqing Hua}, title = {Trustful Blockchain-Enabled Identity Management for {VANET} with Short-Latency Authentication}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2024, Big Island, HI, USA, February 19-22, 2024}, pages = {659--663}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICNC59896.2024.10556332}, doi = {10.1109/ICNC59896.2024.10556332}, timestamp = {Mon, 01 Jul 2024 16:54:43 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/ZhouHZZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuZYWZ23, author = {Bolun Wu and Futai Zou and Ping Yi and Yue Wu and Liang Zhang}, title = {SlicedLocator: Code vulnerability locator based on sliced dependence graph}, journal = {Comput. Secur.}, volume = {134}, pages = {103469}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103469}, doi = {10.1016/J.COSE.2023.103469}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuZYWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WuZZYL23, author = {Bolun Wu and Futai Zou and Chengwei Zhang and Tangda Yu and Yun Li}, title = {Multi-field relation mining for malicious {HTTP} traffic detection based on attention and cross network}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103411}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103411}, doi = {10.1016/J.JISA.2022.103411}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WuZZYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZouHXW23, author = {Futai Zou and Yuelin Hu and Wenliang Xu and Yue Wu}, editor = {Ding Wang and Moti Yung and Zheli Liu and Xiaofeng Chen}, title = {Link Prediction-Based Multi-Identity Recognition of Darknet Vendors}, booktitle = {Information and Communications Security - 25th International Conference, {ICICS} 2023, Tianjin, China, November 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14252}, pages = {317--332}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7356-9\_19}, doi = {10.1007/978-981-99-7356-9\_19}, timestamp = {Tue, 24 Oct 2023 16:55:55 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZouHXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLSZW22, author = {Jingcheng Yang and Hongwei Li and Shuo Shao and Futai Zou and Yue Wu}, title = {{FS-IDS:} {A} framework for intrusion detection based on few-shot learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102899}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102899}, doi = {10.1016/J.COSE.2022.102899}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangLSZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/NieZQZW22, author = {Mingjie Nie and Futai Zou and Yi Qin and Tianming Zheng and Yue Wu}, title = {{QUIC-CNN:} Website Fingerprinting for {QUIC} Traffic in Tor Network}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {663--671}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00114}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00114}, timestamp = {Thu, 06 Apr 2023 11:34:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/NieZQZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/QinZWZ22, author = {Yi Qin and Tianming Zheng and Yue Wu and Futai Zou}, title = {Tracing Tor Hidden Service Through Protocol Characteristics}, booktitle = {31st International Conference on Computer Communications and Networks, {ICCCN} 2022, Honolulu, HI, USA, July 25-28, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCCN54977.2022.9868859}, doi = {10.1109/ICCCN54977.2022.9868859}, timestamp = {Wed, 14 Sep 2022 19:28:51 +0200}, biburl = {https://dblp.org/rec/conf/icccn/QinZWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/QinWZW22, author = {Yi Qin and Jiahe Wu and Futai Zou and Yue Wu}, title = {Breaking Tor's Anonymity by Modifying Cell's Command}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes, Greece, June 30 - July 3, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCC55528.2022.9913045}, doi = {10.1109/ISCC55528.2022.9913045}, timestamp = {Tue, 25 Oct 2022 21:20:50 +0200}, biburl = {https://dblp.org/rec/conf/iscc/QinWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZhaiZT022, author = {Haochen Zhai and Futai Zou and Junhua Tang and Yue Wu}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Towards High Transferability on Neural Network for Black-Box Adversarial Attacks}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {72--88}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_5}, doi = {10.1007/978-3-031-25538-0\_5}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZhaiZT022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuZ21, author = {Wenliang Xu and Futai Zou}, title = {Obfuscated Tor Traffic Identification Based on Sliding Window}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5587837:1--5587837:11}, year = {2021}, url = {https://doi.org/10.1155/2021/5587837}, doi = {10.1155/2021/5587837}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/0003XCPNWZ21, author = {Chengwei Zhang and Yunlu Xu and Zhanzhan Cheng and Shiliang Pu and Yi Niu and Fei Wu and Futai Zou}, title = {{SPIN:} Structure-Preserving Inner Offset Network for Scene Text Recognition}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {3305--3314}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i4.16442}, doi = {10.1609/AAAI.V35I4.16442}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/0003XCPNWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZouRZT21, author = {Futai Zou and Yundong Ren and Jiachen Zhu and Junhua Tang}, title = {Detecting Data Leakage in {DNS} Traffic based on Time Series Anomaly Detection}, booktitle = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications; 7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, December 20-22, 2021}, pages = {503--510}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00090}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00090}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZouRZT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZouZ21, author = {Futai Zou and Haochen Zhai}, title = {Browser Fingerprinting Identification Using Incremental Clustering Algorithm Based on Autoencoder}, booktitle = {2021 {IEEE} 23rd Int Conf on High Performance Computing {\&} Communications; 7th Int Conf on Data Science {\&} Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, December 20-22, 2021}, pages = {525--532}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00093}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS53884.2021.00093}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZouZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiT0Z21, author = {Jingsong Li and Junhua Tang and Jianhua Li and Futai Zou}, title = {Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV}, booktitle = {{IEEE} International Conference on Communications Workshops, {ICC} Workshops 2021, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCWorkshops50388.2021.9473558}, doi = {10.1109/ICCWORKSHOPS50388.2021.9473558}, timestamp = {Tue, 13 Jul 2021 14:57:20 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiT0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/XieYZZ21, author = {Chenqi Xie and Ping Yi and Baowen Zhang and Futai Zou}, title = {DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning}, booktitle = {33rd {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2021, Washington, DC, USA, November 1-3, 2021}, pages = {169--175}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICTAI52525.2021.00031}, doi = {10.1109/ICTAI52525.2021.00031}, timestamp = {Tue, 28 Dec 2021 13:25:55 +0100}, biburl = {https://dblp.org/rec/conf/ictai/XieYZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZouSH21, author = {Futai Zou and Qianying Shen and Yuzong Hu}, editor = {Joseph K. Liu and Sokratis K. Katsikas and Weizhi Meng and Willy Susilo and Rolly Intan}, title = {Word-Map: Using Community Detection Algorithm to Detect AGDs}, booktitle = {Information Security - 24th International Conference, {ISC} 2021, Virtual Event, November 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13118}, pages = {398--414}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91356-4\_21}, doi = {10.1007/978-3-030-91356-4\_21}, timestamp = {Fri, 03 Dec 2021 17:36:27 +0100}, biburl = {https://dblp.org/rec/conf/isw/ZouSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WeiZ21, author = {Yuheng Wei and Futai Zou}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces}, booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {398}, pages = {44--61}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90019-9\_3}, doi = {10.1007/978-3-030-90019-9\_3}, timestamp = {Thu, 04 Nov 2021 12:25:36 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WeiZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuXZ21, author = {Bolun Wu and Yuanhang Xu and Futai Zou}, title = {Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {540--547}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00084}, doi = {10.1109/TRUSTCOM53373.2021.00084}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WuXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouMGL21, author = {Futai Zou and Dechao Meng and Wentao Gao and Linsen Li}, title = {DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {577--586}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00088}, doi = {10.1109/TRUSTCOM53373.2021.00088}, timestamp = {Sun, 13 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZouMGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiangZLY20, author = {Xiaoshi Liang and Futai Zou and Linsen Li and Ping Yi}, title = {Mobile terminal identity authentication system based on behavioral characteristics}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {1}, year = {2020}, url = {https://doi.org/10.1177/1550147719899371}, doi = {10.1177/1550147719899371}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LiangZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/ZhangLZN20, author = {Lingxuan Zhang and Linsen Li and Futai Zou and Jiachao Niu}, editor = {Tinoosh Mohsenin and Weisheng Zhao and Yiran Chen and Onur Mutlu}, title = {Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems}, booktitle = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event, China, September 7-9, 2020}, pages = {439--444}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386263.3406945}, doi = {10.1145/3386263.3406945}, timestamp = {Mon, 04 Jul 2022 14:19:34 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/ZhangLZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ShenZ20, author = {Qianying Shen and Futai Zou}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {Detecting Dictionary Based AGDs Based on Community Detection}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {42--48}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_3}, doi = {10.1007/978-3-030-63086-7\_3}, timestamp = {Tue, 15 Dec 2020 15:14:02 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ShenZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YangYZ20, author = {Jingcheng Yang and Haowei Ye and Futai Zou}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {pyDNetTopic: {A} Framework for Uncovering What Darknet Market Users Talking About}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {118--139}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_8}, doi = {10.1007/978-3-030-63086-7\_8}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/YangYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HuZLY20, author = {Yuzong Hu and Futai Zou and Linsen Li and Ping Yi}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {418--424}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00064}, doi = {10.1109/TRUSTCOM50675.2020.00064}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/HuZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-13117, author = {Chengwei Zhang and Yunlu Xu and Zhanzhan Cheng and Shiliang Pu and Yi Niu and Fei Wu and Futai Zou}, title = {{SPIN:} Structure-Preserving Inner Offset Network for Scene Text Recognition}, journal = {CoRR}, volume = {abs/2005.13117}, year = {2020}, url = {https://arxiv.org/abs/2005.13117}, eprinttype = {arXiv}, eprint = {2005.13117}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-13117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangYZW19, author = {Kedi Wang and Ping Yi and Futai Zou and Yue Wu}, title = {Generating Adversarial Samples With Constrained Wasserstein Distance}, journal = {{IEEE} Access}, volume = {7}, pages = {136812--136821}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942607}, doi = {10.1109/ACCESS.2019.2942607}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/HuangYZYWZ19, author = {Cheng Huang and Ping Yi and Futai Zou and Yao Yao and Wei Wang and Ting Zhu}, title = {{CCID:} Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2019}, pages = {6705347:1--6705347:9}, year = {2019}, url = {https://doi.org/10.1155/2019/6705347}, doi = {10.1155/2019/6705347}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/HuangYZYWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/YuZLY19, author = {Tangda Yu and Futai Zou and Linsen Li and Ping Yi}, title = {An Encrypted Malicious Traffic Detection System Based on Neural Network}, booktitle = {2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019, Guilin, China, October 17-19, 2019}, pages = {62--70}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CyberC.2019.00020}, doi = {10.1109/CYBERC.2019.00020}, timestamp = {Tue, 21 Jan 2020 19:19:11 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/YuZLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BiWHZ19, author = {Yue Bi and Yue Wu and Cunqing Hua and Futai Zou}, title = {Evolutionary Anti-Jamming Game in Non-Orthogonal Multiple Access System}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013752}, doi = {10.1109/GLOBECOM38437.2019.9013752}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/BiWHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZhuZ19, author = {Jiachen Zhu and Futai Zou}, editor = {Zheng Xiao and Laurence T. Yang and Pavan Balaji and Tao Li and Keqin Li and Albert Y. Zomaya}, title = {Detecting Malicious Domains Using Modified {SVM} Model}, booktitle = {21st {IEEE} International Conference on High Performance Computing and Communications; 17th {IEEE} International Conference on Smart City; 5th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019}, pages = {492--499}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00079}, doi = {10.1109/HPCC/SMARTCITY/DSS.2019.00079}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZhuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/JiangLWZ19, author = {Yongkang Jiang and Shenghong Li and Yue Wu and Futai Zou}, editor = {Tom Gedeon and Kok Wai Wong and Minho Lee}, title = {A Novel Image-Based Malware Classification Model Using Deep Learning}, booktitle = {Neural Information Processing - 26th International Conference, {ICONIP} 2019, Sydney, NSW, Australia, December 12-15, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11954}, pages = {150--161}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36711-4\_14}, doi = {10.1007/978-3-030-36711-4\_14}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/JiangLWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ZhangXCNP0Z19, author = {Chengwei Zhang and Yunlu Xu and Zhanzhan Cheng and Yi Niu and Shiliang Pu and Fei Wu and Futai Zou}, editor = {Laurent Amsaleg and Benoit Huet and Martha A. Larson and Guillaume Gravier and Hayley Hung and Chong{-}Wah Ngo and Wei Tsang Ooi}, title = {Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization}, booktitle = {Proceedings of the 27th {ACM} International Conference on Multimedia, {MM} 2019, Nice, France, October 21-25, 2019}, pages = {738--746}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3343031.3351044}, doi = {10.1145/3343031.3351044}, timestamp = {Thu, 03 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/ZhangXCNP0Z19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-02422, author = {Chengwei Zhang and Yunlu Xu and Zhanzhan Cheng and Yi Niu and Shiliang Pu and Fei Wu and Futai Zou}, title = {Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization}, journal = {CoRR}, volume = {abs/1908.02422}, year = {2019}, url = {http://arxiv.org/abs/1908.02422}, eprinttype = {arXiv}, eprint = {1908.02422}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-02422.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/ZouLWLZJ18, author = {Futai Zou and Linsen Li and Yue Wu and Jianhua Li and Siyu Zhang and Kaida Jiang}, title = {Detecting Domain-Flux Malware Using {DNS} Failure Traffic}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {28}, number = {2}, pages = {151--174}, year = {2018}, url = {https://doi.org/10.1142/S0218194018400016}, doi = {10.1142/S0218194018400016}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/ZouLWLZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/YiGZYWZ18, author = {Ping Yi and Yuxiang Guan and Futai Zou and Yao Yao and Wei Wang and Ting Zhu}, title = {Web Phishing Detection Using a Deep Learning Framework}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {4678746:1--4678746:9}, year = {2018}, url = {https://doi.org/10.1155/2018/4678746}, doi = {10.1155/2018/4678746}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/YiGZYWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/FangXLSZL18, author = {Liang Fang and Guangtao Xue and Feng Lyu and Hao Sheng and Futai Zou and Minglu Li}, title = {Intelligent Large-Scale {AP} Control with Remarkable Energy Saving in Campus WiFi System}, booktitle = {24th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2018, Singapore, December 11-13, 2018}, pages = {69--76}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/PADSW.2018.8645048}, doi = {10.1109/PADSW.2018.8645048}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/FangXLSZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssic/HeZW18, author = {Boren He and Futai Zou and Yue Wu}, title = {Multi-SDN Based Cooperation Scheme for DDoS Attack Defense}, booktitle = {Third International Conference on Security of Smart Cities, Industrial Control System and Communications, {SSIC} 2018, Shanghai, China, October 18-19, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SSIC.2018.8556830}, doi = {10.1109/SSIC.2018.8556830}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssic/HeZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZouZLPL17, author = {Futai Zou and Siyu Zhang and Linsen Li and Li Pan and Jianhua Li}, title = {Detecting malware based on expired command-and-control traffic}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {7}, year = {2017}, url = {https://doi.org/10.1177/1550147717720791}, doi = {10.1177/1550147717720791}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZouZLPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/XiaPSZ16, author = {Yechao Xia and Li Pan and Liang Shi and Futai Zou}, title = {Attribute Credibility Based Sybil Goup Detection in Online Social Networks}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {358--363}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.68}, doi = {10.1109/DSC.2016.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/XiaPSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZouZPPLL16, author = {Futai Zou and Siyu Zhang and Bei Pei and Li Pan and Linsen Li and Jianhua Li}, title = {Survey on Domain Name System Security}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {602--607}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.96}, doi = {10.1109/DSC.2016.96}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ZouZPPLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/WangZPHPML16, author = {Zihao Wang and Futai Zou and Bei Pei and Weijia He and Li Pan and Zhaochong Mao and Linsen Li}, title = {Detecting Malicious Server Based on Server-to-Server Realation Graph}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {698--702}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.79}, doi = {10.1109/DSC.2016.79}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/WangZPHPML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZouZRY15, author = {Futai Zou and Siyu Zhang and Weixiong Rao and Ping Yi}, title = {Detecting Malware Based on {DNS} Graph Mining}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {102687:1--102687:12}, year = {2015}, url = {https://doi.org/10.1155/2015/102687}, doi = {10.1155/2015/102687}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZouZRY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgec/WangWCYZZ14, author = {Eric Ke Wang and Tsu{-}Yang Wu and Chien{-}Ming Chen and Yuming Ye and Zhujin Zhang and Futai Zou}, editor = {Hui Sun and Chin{-}Yu Yang and Chun{-}Wei Lin and Jeng{-}Shyang Pan and V{\'{a}}clav Sn{\'{a}}sel and Ajith Abraham}, title = {{MDPAS:} Markov Decision Process Based Adaptive Security for Sensors in Internet of Things}, booktitle = {Genetic and Evolutionary Computing - Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, {ICGEC} 2014, October 18-20, 2014, Nanchang, China}, series = {Advances in Intelligent Systems and Computing}, volume = {329}, pages = {389--397}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12286-1\_40}, doi = {10.1007/978-3-319-12286-1\_40}, timestamp = {Mon, 08 Jul 2024 11:45:06 +0200}, biburl = {https://dblp.org/rec/conf/icgec/WangWCYZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/GuiWPZX12, author = {Jiaping Gui and Yue Wu and Chenji Pan and Futai Zou and Yifei Xie}, title = {Cost based routing in delay tolerant networks}, booktitle = {23rd {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2012, Sydney, Australia, September 9-12, 2012}, pages = {1084--1089}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/PIMRC.2012.6362507}, doi = {10.1109/PIMRC.2012.6362507}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/GuiWPZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/HongLYZZ10, author = {Jiacheng Hong and Ning Liu and Ping Yi and Futai Zou and Qiang Zhai}, title = {Securing Wireless Mesh Network with Mobile Firewall}, booktitle = {International Conference on Wireless Communications and Signal Processing, {WCSP} 2010, Suzhou, China, 21-23 October, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCSP.2010.5633566}, doi = {10.1109/WCSP.2010.5633566}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/HongLYZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RaoCFCZ09, author = {Weixiong Rao and Lei Chen and Ada Wai{-}Chee Fu and Hanhua Chen and Futai Zou}, title = {On Efficient Content Matching in Distributed Pub/Sub Systems}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {756--764}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5061984}, doi = {10.1109/INFCOM.2009.5061984}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RaoCFCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/HuangZM07, author = {Xinli Huang and Futai Zou and Fan{-}Yuan Ma}, title = {Targeted Local Immunization in Scale-Free Peer-to-Peer Networks}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {3}, pages = {457--468}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9046-2}, doi = {10.1007/S11390-007-9046-2}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/HuangZM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/LiHMZ05, author = {Yin Li and Xinli Huang and Fanyuan Ma and Futai Zou}, editor = {Hai Zhuge and Geoffrey C. Fox}, title = {Building Efficient Super-Peer Overlay Network for {DHT} Systems}, booktitle = {Grid and Cooperative Computing - {GCC} 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3795}, pages = {787--798}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11590354\_99}, doi = {10.1007/11590354\_99}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/gcc/LiHMZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/LiHZM05, author = {Yin Li and Xinli Huang and Futai Zou and Fanyuan Ma}, editor = {Francis C. M. Lau and Hui Lei and Xiaofeng Meng and Min Wang}, title = {eDSR: {A} Decentralized Service Registry for e-Commerce}, booktitle = {2005 {IEEE} International Conference on e-Business Engineering {(ICEBE} 2005), 18-21 October 2005, Beijing, China}, pages = {615--619}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICEBE.2005.57}, doi = {10.1109/ICEBE.2005.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/LiHZM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apweb/LiZWM04, author = {Yin Li and Futai Zou and Zengde Wu and Fanyuan Ma}, editor = {Jeffrey Xu Yu and Xuemin Lin and Hongjun Lu and Yanchun Zhang}, title = {{PWSD:} {A} Scalable Web Service Discovery Architecture Based on Peer-to-Peer Overlay Network}, booktitle = {Advanced Web Technologies and Applications, 6th Asia-Pacific Web Conference, APWeb 2004, Hangzhou, China, April 14-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3007}, pages = {291--300}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24655-8\_32}, doi = {10.1007/978-3-540-24655-8\_32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apweb/LiZWM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/LiZML04, author = {Yin Li and Futai Zou and Fanyuan Ma and Minglu Li}, editor = {Hai Jin and Yi Pan and Nong Xiao and Jianhua Sun}, title = {pXRepository: {A} Peer-to-Peer {XML} Repository for Web Service Discovery}, booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3251}, pages = {137--144}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30208-7\_24}, doi = {10.1007/978-3-540-30208-7\_24}, timestamp = {Fri, 26 Feb 2021 08:55:11 +0100}, biburl = {https://dblp.org/rec/conf/gcc/LiZML04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ZouLZML04, author = {Futai Zou and Yin Li and Liang Zhang and Fanyuan Ma and Minglu Li}, editor = {Hai Jin and Yi Pan and Nong Xiao and Jianhua Sun}, title = {A Novel Approach for Constructing Small World in Structured {P2P} Systems}, booktitle = {Grid and Cooperative Computing - {GCC} 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3251}, pages = {807--810}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30208-7\_110}, doi = {10.1007/978-3-540-30208-7\_110}, timestamp = {Fri, 27 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ZouLZML04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/ZouCMZT04, author = {Futai Zou and Shudong Chen and Fanyuan Ma and Liang Zhang and Junjun Tang}, editor = {Jiannong Cao and Laurence Tianruo Yang and Minyi Guo and Francis Chi{-}Moon Lau}, title = {Using the Linking Model to Understand the Performance of {DHT} Routing Algorithms}, booktitle = {Parallel and Distributed Processing and Applications, Second InternationalSymposium, {ISPA} 2004, Hong Kong, China, December 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3358}, pages = {544--549}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30566-8\_65}, doi = {10.1007/978-3-540-30566-8\_65}, timestamp = {Tue, 14 Apr 2020 13:23:10 +0200}, biburl = {https://dblp.org/rec/conf/ispa/ZouCMZT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LiZML04, author = {Yin Li and Futai Zou and Fanyuan Ma and Minglu Li}, editor = {Hai Jin and Guang R. Gao and Zhiwei Xu and Hao Chen}, title = {Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network}, booktitle = {Network and Parallel Computing, {IFIP} International Conference, {NPC} 2004, Wuhan, China, October 18-20, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3222}, pages = {175--182}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30141-7\_26}, doi = {10.1007/978-3-540-30141-7\_26}, timestamp = {Sun, 02 Jun 2019 21:27:18 +0200}, biburl = {https://dblp.org/rec/conf/npc/LiZML04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/ZouLZM04, author = {Futai Zou and Yin Li and Liang Zhang and Fanyuan Ma}, editor = {Qing Li and Guoren Wang and Ling Feng}, title = {{CCAN:} Cache-Based {CAN} Using the Small World Model}, booktitle = {Advances in Web-Age Information Management: 5th International Conference, {WAIM} 2004, Dalian, China, July 15-17, 2004}, series = {Lecture Notes in Computer Science}, volume = {3129}, pages = {167--175}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27772-9\_18}, doi = {10.1007/978-3-540-27772-9\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/waim/ZouLZM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/ZouZLM03, author = {Futai Zou and Liang Zhang and Yin Li and Fanyuan Ma}, editor = {Minglu Li and Xian{-}He Sun and Qianni Deng and Jun Ni}, title = {Effect of Links on {DHT} Routing Algorithms}, booktitle = {Grid and Cooperative Computing, Second International Workshop, {GCC} 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3032}, pages = {308--315}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24679-4\_64}, doi = {10.1007/978-3-540-24679-4\_64}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/gcc/ZouZLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/YuPZM03, author = {Shui Yu and Leyun Pan and Futai Zou and Fanyuan Ma}, editor = {Minglu Li and Xian{-}He Sun and Qianni Deng and Jun Ni}, title = {{DHCS:} {A} Case of Knowledge Share in Cooperative Computing Environment}, booktitle = {Grid and Cooperative Computing, Second International Workshop, {GCC} 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3033}, pages = {380--387}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24680-0\_62}, doi = {10.1007/978-3-540-24680-0\_62}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/YuPZM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.