dblp.uni-trier.dewww.uni-trier.de

Binxing Fang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
59EEYu Zhang, Binxing Fang, Hongli Zhang: On Destination Set in IP-Level Topology Measurement. ICN 2008: 168-173
58EEYuanzhe Yao, Binxing Fang, Xinran Liu, Hong Zhang: Autonomic Grid Node Organization and Management in RNMS. ICYCS 2008: 223-228
57EEJian-Wei Ye, Binxing Fang, Jin-Qiao Shi, Zhi-Gang Wu: Protecting Mobile Codes Using the Decentralized Label Model. WAIM 2008: 493-500
56EEWei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li: A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. WAIM 2008: 558-563
55EEYu Wang, Binxing Fang, Xueqi Cheng, Li Guo, Hongbo Xu: Incremental web page template detection. WWW 2008: 1247-1248
2007
54EEYang Li, Binxing Fang, Li Guo, You Chen: Network anomaly detection based on TCM-KNN algorithm. ASIACCS 2007: 13-19
53EEYang Li, Binxing Fang: A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. ICNP 2007: 340-341
52EEZhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen: Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. IPCCC 2007: 348-355
51EEZhibin Zhang, Yanjun Zhang, Li Guo, Binxing Fang: LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems. ISCC 2007: 87-93
50EEYang Li, Binxing Fang, Li Guo: A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme. ISNN (1) 2007: 1286-1292
49EEYang Li, Binxing Fang, Li Guo, You Chen: TCM-KNN Algorithm for Supervised Network Intrusion Detection. PAISI 2007: 141-151
48EEPing Wang, Binxing Fang, Xiao-chun Yun, Jun Zheng: A User-Habit Property: Haunting of Users in IP Networks. IEICE Transactions 90-D(1): 371-373 (2007)
47EEYuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng: How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007)
2006
46EETingting Chen, Yi Wang, Binxing Fang, Jun Zheng: Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree. AICT/ICIW 2006: 30
45EEHongjie Sun, Binxing Fang, Hongli Zhang: User-Perceived Web QoS Measurement and Evaluation System. APWeb 2006: 157-165
44EEWei Wang, Binxing Fang: Grid Service Based Parallel Debugging Environment. APWeb Workshops 2006: 971-978
43EEXiangwen Liao, Binxing Fang, Weihua Luo, Bin Wang: Experimental Performance Study of a User Intensive and Large-scale Digital Library Framework. DIAL 2006: 332-339
42EEYang Li, Binxing Fang, Li Guo, Shen Wang: Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach. ICNS 2006: 86
41EENi Zhang, Yu Jiang, Binxing Fang, Li Guo, Xueqi Cheng: A traffic-classified technique for filtering spam from bulk delivery E-mails. IPCCC 2006
40EEChen Bo, Binxing Fang, Xiao-chun Yun: Adaptive Method for Monitoring Network and Early Detection of Internet Worms. ISI 2006: 178-189
39EEHao Luo, Binxing Fang, Xiao-chun Yun: A Counting-Based Method for Massive Spam Mail Classification. ISPEC 2006: 45-56
38EEPing Wang, Binxing Fang, Xiao-chun Yun: Model and Estimation of Worm Propagation Under Network Partition. ISPEC 2006: 57-66
37EEHao Luo, Binxing Fang, Xiao-chun Yun: Anomaly Detection in SMTP Traffic. ITNG 2006: 408-413
36EEYang Li, Binxing Fang, Li Guo: TTSF: A Novel Two-Tier Spam Filter. PDCAT 2006: 503-508
35EEJianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: A parallel programming interface for out-of-core cluster applications. Cluster Computing 9(3): 321-327 (2006)
34EEWeizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao: Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments. Science in China Series F: Information Sciences 49(6): 906-926 (2006)
2005
33EEXunxun Chen, Binxing Fang, Lei Li, Yu Jiang: WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm. APPT 2005: 515-523
32EEPing Wang, Binxing Fang, Xiao-chun Yun: A New User-Habit Based Approach for Early Warning of Worms. CIS (2) 2005: 212-219
31EEYongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun: Assessment of Windows System Security Using Vulnerability Relationship Graph. CIS (2) 2005: 415-420
30EETianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng: Performance Analysis ofWonGoo System. CIT 2005: 716-723
29EEBaiLing Wang, Binxing Fang, Xiao-chun Yun: A Worm Behavioral Approach to Susceptible Host Detection. GCC 2005: 77-83
28 Xiaofeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang: A Model for Estimating the Performance of Synchronous Parallel Network Simulation. IASTED PDCS 2005: 548-553
27EEA-Ning Du, Binxing Fang, Bin Li: A Biased Support Vector Machine Approach to Web Filtering. ICAPR (1) 2005: 363-370
26EETianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo: Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. ICCNMC 2005: 853-862
25EETianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo: Building Scale-Free Overlay Mix Networks with Small-World Properties. ICITA (2) 2005: 529-534
24EEPing Wang, Binxing Fang, Xiao-chun Yun: A New Approach to Automatically Detect Worms. PDCAT 2005: 259-263
23EEYi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen: Worm Detection in Large Scale Network by Traffic. PDCAT 2005: 270-273
22EEHongjie Sun, Binxing Fang, Hongli Zhang: A Distributed Architecture for Network Performance Measurement and Evaluation System. PDCAT 2005: 471-475
21 Ni Zhang, Binxing Fang, Li Guo: Techniques of IP Data Management in Network Address Resource platform. PDPTA 2005: 540-545
20EEXiuguo Bao, Binxing Fang, Mingzeng Hu, Binbin Xu: Heterogeneous Search in Unstructured Peer-to-Peer Networks. IEEE Distributed Systems Online 6(2): (2005)
19EEYu Jiang, Binxing Fang, Ming-Zeng Hu, Xiang Cui: Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement. J. Comput. Sci. Technol. 20(5): 689-701 (2005)
18EELongtao He, Binxing Fang, Jie Sui: The wide window string matching algorithm. Theor. Comput. Sci. 332(1-3): 391-404 (2005)
2004
17EEJianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: Developing a user-level middleware for out-of-core computation on Grids. CCGRID 2004: 686-690
16EEWei Wang, Binxing Fang, Hongli Zhang, Yuanzhe Yao: Ad Hoc Debugging Environment for Grid Applications. GCC 2004: 113-120
15EEYuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang: PGMS: A P2P-Based Grid Monitoring System. GCC 2004: 903-906
14EEGang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang: Measurement and Modeling of Large-Scale Peer-to-Peer Storage System. GCC Workshops 2004: 270-277
13EEXiuguo Bao, Binxing Fang, Mingzeng Hu: Cocktail Search in Unstructured P2P Networks. GCC Workshops 2004: 286-293
12EEYuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang: Network Performance Measurement Methodologies in PGMS. GCC Workshops 2004: 466-473
11EEJun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang: Anomaly Detection Using Fast SOFM. GCC Workshops 2004: 530-537
10EEWeizhe Zhang, Binxing Fang, Hui He, Hongli Zhang, Mingzeng Hu: Multisite Resource Selection and Scheduling Algorithm on Computational Grid. IPDPS 2004
9EEYu Jiang, Binxing Fang, Mingzeng Hu: Techniques in Mapping Router-Level Internet Topology from Multiple Vantage Points. PDCAT 2004: 410-415
8EEJin-Qiao Shi, Binxing Fang, Bin Li: Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment. PDCAT 2004: 613-618
7EEJianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: The Practice of I/O Optimizations for Out-of-Core Computation. PDCAT 2004: 81-85
6EEGang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang: Explaining BitTorrent Traffic Self-Similarity. PDCAT 2004: 839-843
5 Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng: WonGoo: A Peer-to-Peer Protocol for Anonymous Communication. PDPTA 2004: 1102-1106
4 Wei Wang, Binxing Fang, Hongli Zhang: Grid-Enabled Parallel Debugging Environment: A Portal Solution. PDPTA 2004: 856-862
3EELongtao He, Binxing Fang: Linear Nondeterministic Dawg String Matching Algorithm. SPIRE 2004: 70-71
2EEZhihong Tian, Binxing Fang, Xiao-chun Yun: Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. Web Intelligence 2004: 24-28
1EEWu Yang, Binxing Fang, Bo Liu, Hongli Zhang: Intrusion detection system for high-speed network. Computer Communications 27(13): 1288-1294 (2004)

Coauthor Index

1Xiuguo Bao [13] [20]
2Chen Bo [40]
3Zhenfu Cao [47]
4Wei-ling Chang [56]
5Hai-Yong Chen [23]
6Tingting Chen [46]
7Xiaojun Chen [52]
8Xunxun Chen [33]
9You Chen [49] [54]
10Xiaoming Cheng [47]
11Xueqi Cheng [5] [25] [30] [41] [55]
12Yue Chi [31]
13Xiang Cui [19]
14A-Ning Du [27]
15Lei Gao [34]
16Li Guo [21] [25] [26] [36] [41] [42] [49] [50] [51] [52] [54] [55]
17Hui He [10]
18Longtao He [3] [18]
19Mingzeng Hu (Ming-Zeng Hu) [6] [7] [9] [10] [11] [13] [14] [17] [19] [20] [34] [35]
20Yu Jiang [9] [19] [33] [41]
21Bin Li [8] [27]
22Lei Li [33]
23Shuhao Li [56]
24Yang Li [36] [42] [49] [50] [53] [54]
25Xiangwen Liao [43]
26Bo Liu [1]
27Gang Liu [6] [14]
28Xinran Liu [34] [58]
29Tianbo Lu [5] [25] [26] [30]
30Hao Luo [37] [39]
31Weihua Luo [43]
32Jin-Qiao Shi [8] [57]
33Jie Sui [18]
34Hongjie Sun [22] [45]
35Yuzhong Sun [5] [25] [26] [30]
36Jianqi Tang [7] [17] [35]
37Zhihong Tian [2]
38BaiLing Wang [29]
39Bin Wang [43]
40Ping Wang [24] [32] [38] [48]
41Shen Wang [42]
42Shupeng Wang [56]
43Wei Wang [4] [12] [15] [16] [44]
44Xiaofeng Wang [28]
45Yi Wang [46]
46Yu Wang [55]
47Zhi-Gang Wu [57]
48Yi Xin [23]
49Binbin Xu [20]
50Hongbo Xu [55]
51Wu Yang [1]
52Yuanzhe Yao [12] [15] [16] [58]
53Jian-Wei Ye [57]
54Xiao-chun Yun [2] [23] [24] [29] [31] [32] [37] [38] [39] [40] [47] [48] [56]
55Hong Zhang [58]
56Hongli Zhang [1] [4] [6] [7] [10] [11] [12] [14] [15] [16] [17] [22] [28] [34] [35] [45] [59]
57Ni Zhang [21] [41]
58Weizhe Zhang [10] [28] [34]
59Yanjun Zhang [51]
60Yongzheng Zhang [31]
61Yu Zhang [59]
62Zhibin Zhang [51] [52]
63Jun Zheng [11] [46] [48]
64Yuan Zhou [47]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)