Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TopoScope: Recover AS Relationships From Fragmentary Observations., , , , , and . Internet Measurement Conference, page 266-280. ACM, (2020)Efficient and Accurate Flow Record Collection With HashFlow., , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (5): 1069-1083 (2022)An online framework for catching top spreaders and scanners., , and . Comput. Networks, 54 (9): 1375-1388 (2010)基于逐跳方式的单链路故障保护算法 (Single-link Failure Protection Algorithm Based on Hop-by-Hop Routing)., , , , and . 计算机科学, 44 (7): 68-73 (2017)DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications., , , , , , , , and . CCS, page 3197-3217. ACM, (2021)Boosting bandwidth availability over inter-DC WAN., , , , , , and . CoNEXT, page 297-312. ACM, (2021)Delay Based Congestion Control for Cross-Datacenter Networks., , , , , , and . IWQoS, page 1-4. IEEE, (2023)ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment., , , , , , and . NDSS, The Internet Society, (2022)RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)From ISP Address Announcement Patterns to Routing Scalability., , and . TMA, volume 7189 of Lecture Notes in Computer Science, page 43-47. Springer, (2012)