Zhiping Cai

Zhiping Cai (蔡志平)

Visiting Professor
Room 4176, Bahen Centre for Information Technology
iQua Lab, Department of Electrical and Computer Engineering
University of Toronto
Email: zpcai at nudt.edu.cn
URL:  http://individual.utoronto.ca/zcai/

Google: https://scholar.google.com/citations?user=uVwk4XIAAAAJ&hl=en



Dr. Zhiping Cai is a full Professor in Networking Engineering Department, School of Computer, National University of Defense Technology (NUDT) at Changsha, China. He has visited iQua Lab in 2013, which is leaded by Prof. Baochun Li.  Zhiping Cai received his bachelor's, master's and Ph.D degree in computer science and technology with honor from NUDT in July 1996, April 2002 and December 2005, respectively. His doctoral dissertation has been rewarded with the Outstanding Dissertation Award of the Chinese PLA. Zhiping Cai’s current research interests include Big Data, Network Security and Network Virtualization. He has served as a referee of paper review for the ToN, TPDS, ComNet. He serves on many conference program committees such as EUV, NAS. And he is a senior member of China Computer Federation. Zhiping Cai received the Silver Awards for Education from the Chinese PLA in July 2009. He received research support from National Science Foundation of China (61379145, 61070198, 0603062) and Science Foundation of Hunan Provincial (06JJ3035). He has published over 100 academic papers and awarded the Best Paper Award of IEEE NAS 2009, NPC 2009 and CCCC 2016.


Selected Recent Publications International Conference and Journal

2018

·         Tongqing Zhou, Bin Xiao, Zhiping Cai, Mingxu. From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing. INFOCOM 2018. (CCF A)

·         Xinwang Liu, XinZhong Zhu, Miaomiao Li, En Zhu, Li Liu, Zhiping Cai, Jianping Yin, Wen Gao. Localized Incomplete Multiple Kernel k-means. IJCAI 2018. (CCF A)

·         Shuhao Liu, Hong Xu, Wei Bai, Libin Liu, Kai Chen, and Zhiping Cai. RepNet: Cutting Latency with Flow Replication in Data Center Networks. IEEE Transactions on Services Computing. 2018, doi: 10.1109/TSC.2018.2793250

·         Yeting Guo, Fang Liu, Zhiping Cai, Nong Xiao and Ziming Zhao. Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage. Sensors 2018, 18(4), 1189; doi:10.3390/s18041189  (SCI)

·         Xujing Li, Anfeng Liu, Mande Xie, Neal N Xiong, Zhiwen Zeng, Zhiping Cai. Title: Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks. Sensor. 2018. (SCI)

·         Yang Li, Zhi-Ping Cai, Hong Xu. LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks[J]  Journal of Computer Science and Technology, 2018,V33(2): 277-285. (CCF B)

·         Heng Zhang, Zhiping Cai, Qiang Liu, Qinjun Xiao, Yangyang Li and Chak Fone Cheang. A Survey on Security-aware Network Measurement in SDN, Security and Communication Networks, 2018, 2459154, DoI:10.1155/2018/2459154,2018.   (CCF C, SCI)

·         Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shenqun Fang, Guoyan Wang. Security and Privacy in the Medical Internet of Things. Security and Communication Networks. vol. 2018, 5978636, DoI:10.1155/2018/5978636,2018. (CCF C, SCI).

·         Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, and Guoyan Wang. Data Processing and Text Mining Technologies on Electronic Medical Records: A Review, Journal of Healthcare Engineering. Volume 2018 (2018), Article ID 4302425  (SCI)

·         Jing Xia, Zhiping Cai, Ming Xu. An Active Defense Solution for ARP Spoofing in OpenFlow Network, Chinese Journal of Electronics, 2018, (CCF C, SCI).

·         Jinhua Cui, Yuanyuan Zhang, Zhiping Cai, Anfeng Liu, Yangyang Li. Securing Display Path for Security-Sensitive Applications on Mobile Devices. Computers, Materials & Continua. (SCI).

·         刘强,李桐,于洋,蔡志平(通信作者),周桐庆. 面向可穿戴设备的数据安全隐私保护技术综述[J]. 计算机研究与发展, 2018, 55(1): 14-29.

·         赵梓铭,刘芳,蔡志平,肖侬. 边缘计算:平台、应用与挑战,. 计算机研究与发展. 2018, 55 (2): 327-337

2017

·         Min Chen, Shigang Chen, Zhiping Cai. Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement. IEEE/ACM Transactions on Networking, 25(2): 1249-1262 (2017)

·         Qingjun Xiao, Shigang Chen, Min Chen, Yian Zhou, Zhiping Cai. Adaptive Joint Estimation Protocol for Arbitrary Pair of Tag Sets in a Distributed RFID System. IEEE/ACM Transactions on Networking, 25(5): 2670-2685 (2017).

·         Tongqing Zhou, Zhiping Cai, Bin Xiao, Yueyue Chen, Ming Xu. Detecting Rogue AP with the Crowd Wisdom. In Proc. ICDCS 2017, pp: 2327-2332

·         Tongqing Zhou, Zhiping Cai, Kui Wu, Yueyue Chen, Ming Xua, FIDC: A Framework for Improving Data Credibility in Mobile Crowdsensing. Computer Networks. 120: 157-169 (2017) . http://www.sciencedirect.com/science/article/pii/S1389128617301445

·         Yang Yu, Jun Long, Zhiping Cai: Session-Based Network Intrusion Detection Using a Deep Learning Architecture. MDAI 2017: 144-155

·         Yang Yu, Jun Long, Zhiping Cai: Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders. Accepted by Security and Communication Networks. https://www.hindawi.com/journals/scn/2017/4184196/

 

2016

·         Ming ZhuJiannong CaoZhiping CaiZongjian HeMing Xu: Providing flexible services for heterogeneous vehicles: an NFV-based approach. IEEE Network 30(3): 64-71 ()

·         Yanping Li, Weifeng Chen,  Zhiping Cai, Yuguang Fang. CAKA: A Novel Certificateless-based Cross Domain Authenticated Key Agreement Protocol for Wireless Mesh Networks. Wireless Networks 22(8)2523-25352016.

·         Qiang Liu, Xiping Hu, Edith C.H.Ngai, Min Liang, Victor C.M.Leung, Zhiping Cai, Jianping Yin. A Security Patch Addressing Bandwidth Request Vulnerabilities in the IEEE 802.16 Standard. IEEE Network 2016, 305):26-34.

·         Qiang Liu, Jianping Yin, Victor C. M. Leung, Jun-Hai Zhai, Zhiping Cai, Jiarun Lin: Applying a new localized generalization error model to design neural networks trained with extreme learning machine. Neural Computing and Applications, 2016, 27(1):59-66.

·         Tongqing Zhou, Zhiping Cai, Ming Xu, Yueyue Chen. Leveraging Crowd to Improve Data Credibility for Mobile Crowdsensing. Proc. ISCC 2016: 561-568. June, 2016, Messina, Italy

·         Ming Zhu, Fei Liu, Zhiping Cai and Ming Xu. Maintaining Connectivity of MANETs through Multiple Unmanned Aerial Vehicles. Accepted by Mathematical Problems in Engineering.

·         Jiarun Lin, Changwang Zhang, Zhiping Cai, Qiang Liu, Jianping Yin. A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks. Journal: Int. J. of Autonomous and Adaptive Communications Systems, 2016 Vol.9, No.1/2, pp.149 – 163.

·         Yang Yu, Jun Long, Fang Liu, Zhiping Cai: Machine Learning Combining with Visualization for Intrusion Detection: A Survey. MDAI 2016: 239-249.

·         Jiyu Chen, Zhiping Cai, Shiping Chen: Efficient Distributed Joint Detection of Widespread Events in Large Networked Systems.GLOBECOM 2016: 1-6

·         Jing Xia, Zhiping Cai, Ming Xu: Optimized Virtual Network Functions Migration for NFV. ICPADS 2016: 340-346

·         Jing XiaDeming Pang, Zhiping Cai, Ming XuGang Hu: Reasonably Migrating Virtual Machine in NFV-Featured Networks. CIT 2016: 361-366

·         方峰,蔡志平,肇启佳,林加润,朱明. 使用Spark Streaming的自适应实时DDoS检测和防御技术. 计算机科学与探索,2016,10(5):601-611.

·         周桐庆,蔡志平,徐明,夏竟. 基于软件定义网络的流量工程. 软件学报.

2015

·         Zhiping Cai, Min Chen, Shigang Chen, Yan Qiao, Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring, in Proc. of IEEE International Conference on Network Protocols (ICNP), San Francisco, November 2015. (Acceptance rate: 20%)

·         Shuhao Liu, Zhiping Cai, Hong Xu, Ming Xu. Towards Security-aware Virtual Network Embedding. Computer Networks, 2015, 91:151-163.

·         Kai Zheng, Zhiping Cai, Xin Zhang, Zhijun Wang, Baohua Yang. Algorithms to speedup pattern matching for network intrusion detection systems, Computer Communications, 2015, 62: 47-58. http://www.sciencedirect.com/science/article/pii/S0140366415000559

·         Songping Yu, Mingzhu Deng, Nong Xiao, Yuxuan Xing, Fang Liu, Zhiping Cai,Wei Chen. WAlloc: An Efficient Wear-Aware Allocator for Non-Volatile Main Memory. In Proc. IPCCC 2015. (Acceptance rate: 29%)

·         Ming Zhu, Yueyue Chen, Zhiping Cai, Ming Xu. Using Unmanned Aerial Vehicle Chain to Improve Link Capacity of Two Mobile Nodes. In Proc. ICMA 2015.

·         林加润,殷建平,蔡志平,朱明,程勇.云计算环境下安全的极限学习机外包机制.计算机工程与科学.2015,37(10):1806-1810.

 

2014

·         Shuhao Liu, Zhiping Cai, Hong Xu, Ming Xu. Security-aware Virtual Network Embedding. In Proc. ICC 2014.

·         Ming Zhu, Zhiping Cai, Dong Zhao, Junhui Wang, Ming Xu.Using Multiple Unmanned Aerial Vehicles to Maintain Connectivity of MANETs. In Proc. ICCCN 2014.

2013

·         Shuhao Liu, Hong XuZhiping CaiLow Latency Datacenter Networking: A Short Survey.  CoRR abs/1312.3455 (2013)

·         Qiang Liu, Jianping Yin, Victor C. M. Leung, Zhiping Cai: FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMN. IEEE Trans. Wireless Communications, 12(10):5124-5137 (2013)

·         Jiarun Lin, Jianping Yin, Changwang Zhang, Zhiping Cai, A Secure and Practical Mechanism of Outsourcing Extreme Learning Machine in Cloud Computing. IEEE Intelligent Systems, vol. 28, no. 6, 2013.

·         Jiarun Lin, Jianping Yin, Changwang Zhang, Zhiping Cai, Victor C.M. Leung. A TCP-Friendly AQM Algorithm to Mitigate Low-rate DDoS Attacks. IEEE HPCC 2013.(extend to International Journal of Autonomous and Adaptive Communications Systems)

·         Zhiping Cai, Zhijun Wang, Kai Zheng, Jiannong Cao: A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering. IEEE Trans. Computers 62(3): 417-427 (2013)

·         Nong Xiao, Bin Chen, Zhiping Cai: A demand-driven virtual disk prefetch mechanism for seamless mobility of personal computing environments. The Journal of Supercomputing 63(1): 150-170 (2013)

2012

·         Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo, Jianping Yin: Flow level detection and filtering of low-rate DDoS. Computer Networks 56(15): 3417-3431 (2012)

·         Pin Lv, Zhiping Cai, Jia Xu, Ming Xu: Multicast Service-Oriented Virtual Network Embedding in Wireless Mesh Networks. IEEE Communications Letters 16(3): 375-377 (2012)

·         Qiang Liu, Jianping Yin, Victor C. M. Leung, Zhiping Cai: ISAR: Improved Situation-Aware Routing Method for Wireless Mesh Backbones. IEEE Communications Letters 16(9): 1404-1407 (2012)

·         Wentao Zhao, Jun Long, Jianping Yin, Zhiping Cai, Ge-Ming Xia: Sampling Attack against Active Learning in Adversarial Environment. MDAI 2012: 222-233
 

2011

·         Jun Long, Wentao Zhao, Fangzhou Zhu, Zhiping Cai: Active Learning to Defend Poisoning Attack against Semi-Supervised Intrusion Detection Classifier. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 19(Supplement-1): 93-106 (2011)

2010

·          Zhiping Cai, Fang Liu, Nong Xiao, Qiang Liu, Zhiyin Wang. Virtual Network Embedding For Evolving Networks. GLOBECOM 2010.

·          Zhiping Cai, Zhijun Wang, Kai Zheng. A Distributed TCAM Coprocessor Architecture for Integrated Policy Filtering and Content Filtering. IEEE ICC 2010.

·          Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Baohua Yang. Scalable NIDS via Negative Pattern Matching and Exclusive MatchingINFOCOM 2010: 731-739.

·         Changwang Zhang, Jianping Yin, Zhiping Cai, Weifeng Chen. RRED: Robust RED Algorithm to Counter Low-rate Denial-of-Service Attacks. IEEE Communications Letters 14(5): 489-491 (2010)

·         Fangzhou Zhu, Jun Long, Wentao Zhao, Zhiping Cai: A Misleading Attack against Semi-supervised Learning for Intrusion Detection. MDAI 2010: 287-298

·         Qiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu: A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis. NSS 2010: 70-74

2009

·         Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang. Virtual Disk Image Reclamation for Software Updates in Virtual Machine Environments. In Proc. NAS 2009. (Best Paper Award)

·         Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang. DPM: A Demand-driven Virtual Disk Prefetch Mechanism for Mobile Personal Computing Environments. In Proc. NPC 2009. (Best Paper Award)

·          Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li: DDoS Attack Detection Algorithm Using IP Address Features. Proc. FAW 2009: 207-215. 

·         Bin Chen, Nong Xiao, Zhiping Cai, Changsheng Fu. An On-demand Software Deployment Approach Based on Lightweight Virtual Disk Images in Grid Environment. In Proc. GCC 2009.

·         Changwang Zhang, Jianping Yin, Zhiping Cai. RSFB: a Resilient Stochastic Fair Blue algorithm against spoofing DDoS attacks. In Proc. ISCIT 2009.

·         Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Chengkun Wu. DDoS Attack Detection Algorithm Using IP Address Features Interaction. In Proc. INCOS 2009, pp: 113-118. 2009. (2009 International Conference on Intelligent Networking and Collaborative Systems)

·         Jieren Cheng, Boyun Zhang, Jianping Yin, Yun Liu, Zhiping Cai. DDoS Attack Detection Algorithm Using Three-State Partition Based on Flow Interaction. In Proc. SecTech 2009, CCIS 58, pp. 176-184.

·         Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, ChengKun Wu. Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion. In Proc. SecTech 2009, CCIS 58, pp. 132-139.

·         Chengkun Wu, Jianping Yin, Zhiping Cai, En Zhu, Jieren Chen. A Hybrid Parallel Signature Matching Model in Network Security Applications using SIMD GPU. In Proc. APPT 2009.

·         Chengkun Wu, Jianping Yin, Zhiping Cai. An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection based on Many-Core GPU. In Proc. SecTech 2009(Security Technology) Springer LNCS:191-204.

2005-2008

·         Yongan Wu, Min Li, Zhiping Cai, En Zhu: A Distributed Algorithm to Approximate Node-Weighted Minimum alpha-Connected (Theta, k)-Coverage in Dense Sensor Networks. FAW 2008: 221-232.

·         Bin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang. An Optimized COW Block Device Driver in VMM for Fast, On-demand Software Deployment. In Proc. EUV 2008. pp:387-392.

·         Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai. Efficient disk Encryption and verification through trusted nonce. IEEE Symposium on Computers and Communications, 2008. ISCC 2008.pp:304-309.

·         Zhiping Cai, Jianping Yin, Xianghui Liu, Fang Liu, Shaohe Lv. Efficiently Monitoring Link Bandwidth in IP Networks. In Proc. IEEE GLOBECOM 2005. St. Louis, USA, 2005.

·          Zhiping Cai, Wentao Zhao, Jianping Yin and Xianghui Liu. Using Passive Measuring to Calibrate Active Measuring Latency. In Proc. ICOIN 2005. Jeju Island, Korea. Lecture Notes in Computer Science 3391. Springer-Verlag, Berlin Heidelberg, January 2005.                             

·         Zhiping Cai, Jianping Yin, Xianghui Liu, Shaohe Lv and Fang Liu. Distributed Active Measuring Link Bandwidth in IP Networks. In Proc. NPC 2005. Lecture Notes in Computer Science 3779. Springer-Verlag, Berlin Heidelberg, November 2005. 

·         Zhiping Cai, Jianping Yin, Xianghui Liu and Shaohe Lv. An Approximation Algorithm for Weak Vertex Cover Problem in Network Management. In Proc. AAIM 2005. Lecture Notes in Computer Science 3521. June 2005.

·         Zhiping Cai, Jianping Yin, Xianghui Liu, Shaohe Lv and Fang Liu. Efficiently Monitoring Flow Bandwidth. In Proc. NPC 2005. Lecture Notes in Computer Science 3779. Springer-Verlag, Berlin Heidelberg,November 2005.

·         Jianping Yin, Zhiping Cai, Wentao Zhao, and Xianghui Liu. Passive Calibration of Active Measuring Latency. In Proc. ICN 2005. Reiun Island, France. Lecture Notes in Computer Science 3421. Springer-Verlag, Berlin Heidelberg, April 2005.

·         Xianghui Liu, Jianping Yin, Zhiping Cai. Analysis on Placement of network monitors, 2005 International Conference on Computer Networks and Mobile Computing, LNCS 3619. Springer-Verlag, August 2005.                                                                                    

·         Xianghui Liu, Jianping Yin, Zhiping Cai. Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Neural Networks In Proc. ISNN 2005, LNCS 3496, 2005.                                                    

·         Xianghui Liu, Jianping Yin, Zhiping Cai, Xicheng Lu .Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Programming. ICNC'05-FSKD'05, Springer-Verlag, August 2005. 

·         Fang Liu, Yong Chen, Kui Dai, Zhiying Wang, Zhiping Cai. Research on Risk Probability Estimating using Fuzzy Clustering for Dynamic Security Assessment, RSFDGrC 2005, LNAI 3642, Springer-Verlag, August 2005.                                                                                    

·         Shaohe Lv, Jianping Yin, Zhiping Cai. Towards A New Methodology for Estimating Bandwidth on Network Paths. In Proc. MMNS 2005, Barcelona, Spain. LNCS. Springer-Verlag, Oct.,2005.

·         Shaohe Lv, Jianping Yin, Zhiping Cai. On A Novel Methodology for Estimating Available Bandwidth Along Network Paths. In Proc. International Conference on Computer Intelligence and Security 2005. LNCS. Dec. 2005.                                                                                                              

·         Shaohe Lv, Jianping Yin, Zhiping Cai. On A Novel Filtering Mechanism for Capacity Estimation. In Proc. AINTEC 2005. LNCS. Dec. 2005.                                                                                  

·         2004

·         Xianghui Liu, Jianping Yin, Zhiping Cai. On the analysis of Efficient Monitoring Network Traffic, In Proc. IEEE IPOM 2004, October, 2004.                                                                             

·          Xianghui Liu, Jianping Yin, Xicheng Lu, Zhiping Cai. The Analysis of Efficient Monitoring Grid Traffic with Flow Conservation Equation. In GCC Workshops 2004. Lecture Notes in Computer Science 3252. Springer-Verlag, Berlin Heidelberg, October, 2004.


Selected Recent Publications Chinese Journal

·           蔡志平,刘强,吕品,肖侬,王志英. 虚拟网络映射模型及其优化算法. 软件学报.2012,23(4) 864-877.

·           蔡志平, 刘芳, 赵文涛, 刘湘辉, 殷建平. IP网络测量部署模型及其优化算法. 软件学报.2008, 19 (02):419-431.

·           蔡志平, 殷建平, 刘湘辉. 延迟约束的分布式演化网络监测模型. 软件学报 , 2006, 17(1):117~123.

·           蔡志平,殷建平,刘湘辉,吕绍和. 网络延迟主动测量数据的被动测量校准方法.电子学报,2005,33(11):9~12.

·           蔡志平,殷建平,刘湘辉,吕绍和. 链路约束的分布式网络监测模型. 计算机研究与发展.200643(3):601~606.

·           吕绍和,蔡志平,殷建平. 一种基于应用需求的网络路径可用带宽测量策略. 电子学报. 2006 34(10):1793~1798.

·           刘湘辉,殷建平,卢锡城,蔡志平,赵建民. 基于原始对偶方法的求解网络流量监测集算法的改进. 软件学报. 200617(4): 838~844.

·           龙军,殷建平,祝恩,蔡志平. 选取最大可能预测错误样例的主动学习算法. 计算机研究与发展. 2008,45(3): 472~478.

·            程杰仁、殷建平、刘运、蔡志平、李敏. 基于地址相关度的分布式拒绝服务攻击检测方法. 计算机研究与发展. 2009. 46(8):1334~1340.

·           王珊珊、殷建平、张国敏、蔡志平. 求解无线传感器网络定位问题的线性规划算法. 计算机研究与发展. 2009. 46(5):705~712.

·           陈彬, 肖侬, 蔡志平, 王志英. 基于优化的COW虚拟块设备的虚拟机按需部署机制. 计算机学报. 2009, 23(10):1915~1916.

·           陈彬, 肖侬, 蔡志平, 王志英. 虚拟机环境下软件按需部署中的预取机制研究. 软件学报. 2010, 21(12):3186~3198.

·           刘强,殷建平,蔡志平. 一种基于不确定图的网络漏洞分析方法. 软件学报. 2011, 22(6):1398~1412.

·           张长旺,殷建平,蔡志平,刘新旺,林加润,朱明. 一种抗DDoS攻击的主动队列管理算法. 软件学报. 2011,22(9):2182−2192.

·           刘运,蔡志平,钟平,殷建平,程杰仁. 一种基于条件随机场的DDoS攻击检测方法.软件学报.2011, 22(8):1897-1910.

Reviewer

·           IEEE Transactions on Networking (ToN)

·           IEEE Transactions on Parallel and Distributed Systems (TPDS)

·           Computer Networks

·           Computer Communications

·           计算机学报

·           软件学报

·           计算机研究与发展

·           电子学报

·           国防科技大学学报

·           计算机工程与科学


Supervised MASc Theses

·           李阳(2014-2017)SDN网络监测关键技术研究

·           李桐(2013-2016):面向可穿戴设备的数据匿名化发布技术研究

·           陈海文(2012-2016):基于财经新闻和历史价格的金融品种价格走势研究

·           方峰(2012-2015):基于Spark Streaming的自适应实时DDoS检测与防御技术

·           肇启佳(2012-2015):结合可视化与机器学习的网络异常检测技术研究

·           王成国(2012-2015):时间序列分析方法在黄金价格走势预测中的应用研究

·           邓仲元(2012-2014)

·           喻颖(2012-2014):面向人才招聘的搜索引擎优化技术研究

·           袁晓(2012-2014)

·           刘书昊(2012-2014):安全高效的数据中心网络关键技术研究

·           余松平(2011-2014)GSM-R信令监测录音系统关键技术的研究与实现

·           魏从源(2011-2014)网络信息的情感倾向分类技术研究


Useful Links

Conferences Dates

·         Journals

·         IEEE Events

·         USENIX Events

Citation Based Conferences Impact Ratings and Acceptance Rates Statistics

·         DBLP

·         Google Scholar

·         Networking Conference Dates

·         Conference Acceptance Rates Statistics

·         CiteSeer Citation Based Conferences Impact Ratings