Follow
Wanlei Zhou
Wanlei Zhou
Professor, City University of Macau, Macao
Verified email at cityu.edu.mo - Homepage
Title
Cited by
Cited by
Year
Teaching and learning online with wikis
N Augar, R Raitman, W Zhou
Beyond the comfort zone: Proceedings of the 21st ASCILITE Conference 18, 2004
6452004
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
4572011
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Y Yu, K Li, W Zhou, P Li
Journal of Network and computer Applications 35 (3), 867-880, 2012
4552012
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013
4222013
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
4172014
A manifesto for future generation cloud computing: Research directions for the next decade
R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ...
ACM computing surveys (CSUR) 51 (5), 1-38, 2018
4032018
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
3282011
Differentially private data publishing and analysis: A survey
T Zhu, G Li, W Zhou, SY Philip
IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017
3102017
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2011
2982011
Security and privacy in 6G networks: New areas and new challenges
M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou
Digital Communications and Networks 6 (3), 281-291, 2020
2772020
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2662010
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
Y Xiang, W Zhou, M Guo
IEEE Transactions on Parallel and Distributed Systems 20 (4), 567-580, 2008
2382008
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
2272016
Internet traffic classification by aggregating correlated naive bayes predictions
J Zhang, C Chen, Y Xiang, W Zhou
Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013
2242013
Correlated differential privacy: Hiding information in non-IID data set
T Zhu, P Xiong, G Li, W Zhou
IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014
2132014
Employing wikis for online collaboration in the e-learning environment: Case study
R Raitman, N Augar, W Zhou
Third International Conference on Information Technology and Applications …, 2005
2102005
Twitter spam detection: Survey of new approaches and comparative study
T Wu, S Wen, Y Xiang, W Zhou
Computers & Security 76, 265-284, 2018
2052018
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
1992013
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
1882016
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1862014
The system can't perform the operation now. Try again later.
Articles 1–20