2008 |
12 | EE | Xiang-he Yang,
Huaping Hu,
Xin Chen:
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol.
ARES 2008: 484-490 |
11 | EE | Xin Chen,
Huaping Hu,
Bo Liu,
Fengtao Xiao,
Zunguo Huang:
Performance Analysis of the HLLACF.
ICYCS 2008: 2120-2124 |
10 | EE | Fengtao Xiao,
Huaping Hu,
Bo Liu,
Xin Chen:
A Novel Worm Detection Model Based on Host Packet Behavior Ranking.
OTM Conferences (2) 2008: 969-986 |
9 | EE | Fengtao Xiao,
Huaping Hu,
Xin Chen,
Bo Liu:
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns.
WAIM 2008: 654-660 |
2007 |
8 | EE | Bing Yang,
Huaping Hu,
Xiangwen Duan,
Shiyao Jin:
An Intelligent Network-Warning Model with Strong Survivability.
CANS 2007: 133-145 |
2006 |
7 | EE | Chenlin Huang,
Huaping Hu,
Zhiying Wang:
A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications.
ATC 2006: 312-321 |
2005 |
6 | EE | Shijie Song,
Huaping Hu,
Shiyao Jin:
HVSM: A New Sequential Pattern Mining Algorithm Using Bitmap Representation.
ADMA 2005: 455-463 |
2004 |
5 | EE | Chenlin Huang,
Huaping Hu,
Zhiying Wang:
Modeling Time-Related Trust.
GCC Workshops 2004: 382-389 |
4 | EE | Guangming Hu,
Zunguo Huang,
Huaping Hu,
Zhenghu Gong:
Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks.
GCC Workshops 2004: 398-405 |
3 | EE | Haitao Chen,
Chuanfu Xu,
Zunguo Huang,
Zhenghu Gong,
Huaping Hu:
Researches on Scalable Architecture for Security Information Distribution Service.
GCC Workshops 2004: 450-457 |
2 | EE | Shijie Song,
Zunguo Huang,
Huaping Hu,
Shiyao Jin:
A Sequential Pattern Mining Algorithm for Misuse Intrusion Detection.
GCC Workshops 2004: 458-465 |
2003 |
1 | EE | Haitao Chen,
Chuanfu Xu,
Zunguo Huang,
Huaping Hu,
Zhenghu Gong:
A Scalable Peer-to-Peer Lookup Model.
GCC (1) 2003: 379-387 |