2008 |
12 | EE | Xin Chen,
Huaping Hu,
Bo Liu,
Fengtao Xiao,
Zunguo Huang:
Performance Analysis of the HLLACF.
ICYCS 2008: 2120-2124 |
11 | EE | Shenghui Su,
Zunguo Huang,
Jun Hu:
The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation
CoRR abs/0801.4817: (2008) |
2007 |
10 | EE | Xin Xu,
Yongqiang Sun,
Zunguo Huang:
Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning.
PAISI 2007: 196-207 |
2005 |
9 | EE | Haitao Chen,
Zhenghu Gong,
Zunguo Huang:
An Efficient Distributed Search Method.
HPCC 2005: 265-270 |
8 | EE | Haitao Chen,
Zunguo Huang,
Zhenghu Gong:
Efficient Content Locating in Peer-to-Peer Systems.
ICEBE 2005: 253-257 |
7 | EE | Haitao Chen,
Zhenghu Gong,
Zunguo Huang:
Parallel Downloading Algorithm for Large-volume File Distribution.
PDCAT 2005: 745-749 |
2004 |
6 | EE | Guangming Hu,
Zunguo Huang,
Huaping Hu,
Zhenghu Gong:
Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks.
GCC Workshops 2004: 398-405 |
5 | EE | Xin Xu,
Zunguo Huang,
Lei Xuan:
Autonomic Computing for Defense-in-Depth Information Assurance: Architecture and a Case Study.
GCC Workshops 2004: 414-421 |
4 | EE | Haitao Chen,
Chuanfu Xu,
Zunguo Huang,
Zhenghu Gong,
Huaping Hu:
Researches on Scalable Architecture for Security Information Distribution Service.
GCC Workshops 2004: 450-457 |
3 | EE | Shijie Song,
Zunguo Huang,
Huaping Hu,
Shiyao Jin:
A Sequential Pattern Mining Algorithm for Misuse Intrusion Detection.
GCC Workshops 2004: 458-465 |
2003 |
2 | EE | Zunguo Huang:
The Tenure Duty Method (TDM) in the Active Incident Recovery Research.
APPT 2003: 557-564 |
1 | EE | Haitao Chen,
Chuanfu Xu,
Zunguo Huang,
Huaping Hu,
Zhenghu Gong:
A Scalable Peer-to-Peer Lookup Model.
GCC (1) 2003: 379-387 |