2008 |
13 | EE | Hong Zhang,
Hai-Xin Duan,
Wu Liu:
RRM: An incentive reputation model for promoting good behaviors in distributed systems.
Science in China Series F: Information Sciences 51(11): 1871-1882 (2008) |
2005 |
12 | EE | Hong Zhang,
Hai-Xin Duan,
Wu Liu,
Jianping Wu:
An Extensible AAA Infrastructure for IPv6.
CIS (2) 2005: 482-487 |
11 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems.
CIS (2) 2005: 518-525 |
10 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li:
New Algorithm Mining Intrusion Patterns.
FSKD (2) 2005: 774-777 |
9 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li:
New Method for Intrusion Features Mining in IDS.
ICIC (1) 2005: 429-437 |
8 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li:
The Authorization Service in Dynamic Trust Domains.
ICITA (2) 2005: 564-567 |
7 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker.
ICITA (2) 2005: 759-762 |
2004 |
6 | EE | Wu Liu,
Jianping Wu,
Hai-Xin Duan,
Xing Li,
Ping Ren:
XML Based X.509 Authorization in CERNET Grid.
GCC 2004: 325-332 |
5 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Xing Li,
Ping Ren:
Algorithms for Congestion Detection and Control.
GCC Workshops 2004: 374-381 |
4 | | Wu Liu,
Hai-Xin Duan,
Yong Feng,
Yong-Bin Li,
Ping Ren:
Improved algorithms tracing back to attacking sources.
Parallel and Distributed Computing and Networks 2004: 222-226 |
3 | EE | Yong-Bin Li,
Wu Liu,
Xiao-Lin Xiang:
Geometry Theorem Proving by Decomposing Polynomial Systems into Strong Regular Sets.
J. Comput. Sci. Technol. 19(6): 820-827 (2004) |
2003 |
2 | EE | Wu Liu,
Hai-Xin Duan,
Jianping Wu,
Ping Ren,
Li-Hua Lu:
Distributed IDS Tracing Back to Attacking Sources.
GCC (1) 2003: 859-866 |
1993 |
1 | EE | Wu Liu,
Kenichi Kanatani:
Interpretation of conic motion and its applications.
International Journal of Computer Vision 10(1): 67-84 (1993) |