Follow
Wanlei Zhou
Wanlei Zhou
Professor, City University of Macau, Macao
Verified email at cityu.edu.mo - Homepage
Title
Cited by
Cited by
Year
Teaching and learning online with wikis
NC Augar, R Raitman, W Zhou
Deakin University, 2004
6502004
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
4622011
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Y Yu, K Li, W Zhou, P Li
Journal of Network and computer Applications 35 (3), 867-880, 2012
4612012
A manifesto for future generation cloud computing: Research directions for the next decade
R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ...
ACM computing surveys (CSUR) 51 (5), 1-38, 2018
4302018
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013
4262013
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
4252014
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
3312011
Differentially private data publishing and analysis: A survey
T Zhu, G Li, W Zhou, SY Philip
IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017
3182017
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011
3032011
Security and privacy in 6G networks: New areas and new challenges
M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou
Digital Communications and Networks 6 (3), 281-291, 2020
2982020
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2692010
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
Y Xiang, W Zhou, M Guo
IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2008
2412008
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
2362016
Internet traffic classification by aggregating correlated naive bayes predictions
J Zhang, C Chen, Y Xiang, W Zhou
Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013
2312013
Correlated differential privacy: Hiding information in non-IID data set
T Zhu, P Xiong, G Li, W Zhou
IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014
2192014
Twitter spam detection: Survey of new approaches and comparative study
T Wu, S Wen, Y Xiang, W Zhou
Computers & Security 76, 265-284, 2018
2162018
Employing wikis for online collaboration in the e-learning environment: Case study
R Raitman, N Augar, W Zhou
Third International Conference on Information Technology and Applications …, 2005
2102005
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
2002013
A blockchain-based location privacy-preserving crowdsensing system
M Yang, T Zhu, K Liang, W Zhou, RH Deng
Future Generation Computer Systems 94, 408-418, 2019
1952019
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
1942016
The system can't perform the operation now. Try again later.
Articles 1–20