default search action
Zhitang Li
- > Home > Persons > Zhitang Li
Publications
- 2015
- [j16]Guanghua Song, Zhitang Li, Juan Zhao, Jun Hu, Hao Tu:
A reversible video steganography algorithm for MVC based on motion vector. Multim. Tools Appl. 74(11): 3759-3782 (2015) - 2014
- [j14]Zhengbiao Guo, Zhitang Li, Hao Tu, Shuyu Liu:
A novel P2P IPTV system for IPv4/v6 networks. Multim. Tools Appl. 72(1): 967-986 (2014) - [j13]Zhengbiao Guo, Zhitang Li, Hao Tu, Da Xie:
Weibo: An Information-Driven Online Social Network. Trans. Comput. Sci. 22: 3-16 (2014) - [c65]Guanghua Song, Zhitang Li, Juan Zhao, Hao Tu, Junxia Cheng:
A video steganography algorithm for MVC without distortion drift. ICAILP 2014: 738-742 - 2012
- [c63]Guanghua Song, Zhitang Li, Hao Tu:
Forward or ignore: User behavior analysis and prediction on microblogging. CSCWD 2012: 678-684 - [c62]Guanghua Song, Zhitang Li, Hao Tu:
Forward or Ignore: User Behavior Analysis and Prediction on Microblogging. IEA/AIE 2012: 231-241 - [c61]Zhengbiao Guo, Zhitang Li, Hao Tu, Long Li:
Characterizing User Behavior in Weibo. MUSIC 2012: 60-65 - [c60]Haider Salim, Zhitang Li, Hao Tu, Zhengbiao Guo:
A Client/Server Based Mechanism to Prevent ARP Spoofing Attacks. ICSI (2) 2012: 254-263 - 2011
- [c58]Zhengbiao Guo, Zhitang Li, Hao Tu:
Sina Microblog: An Information-Driven Online Social Network. CW 2011: 160-167 - [c57]Shuyu Liu, Zhengbiao Guo, Zhitang Li, Hao Tu:
An Empirical Study of the Beezone System. PDCAT 2011: 146-151 - 2010
- [j3]Xiaojing Ma, Zhitang Li, Hao Tu, Bochao Zhang:
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift. IEEE Trans. Circuits Syst. Video Technol. 20(10): 1320-1330 (2010) - 2009
- [j2]Hao Tu, Zhitang Li, Bin Liu, Yejiang Zhang:
An Efficient Worm Defense System Based Signature Extraction. Int. J. Distributed Sens. Networks 5(1): 23 (2009) - [c56]Binbin Wang, Zhitang Li, Hao Tu, Jie Ma:
Measuring Peer-to-Peer Botnets Using Control Flow Stability. ARES 2009: 663-669 - 2008
- [c44]Hao Tu, Zhitang Li, Bin Liu:
Mining Network Traffic for Worm Signature Extraction. FSKD (4) 2008: 327-331 - [c39]Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm. ISECS 2008: 114-117 - 2007
- [c20]Hao Tu, Zhitang Li, Bin Liu:
Detecting Botnets by Analyzing DNS Traffic. PAISI 2007: 323-324 - [c19]Li-Juan Zhou, Zhitang Li, Hao Tu:
Proposion and Analysis of a TCP Feature of P2P Traffic. PAKDD 2007: 1148-1155 - 2005
- [c3]Yao Li, Zhitang Li, Hao Tu:
Dynamic immune intrusion detection system for IPv6. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 374-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint