Flow level detection and filtering of low-rate DDoS C Zhang, Z Cai, W Chen, X Luo, J Yin Computer Networks 56 (15), 3417-3431, 2012 | 146 | 2012 |
RRED: robust RED algorithm to counter low-rate denial-of-service attacks C Zhang, J Yin, Z Cai, W Chen IEEE Communications Letters 14 (5), 489-491, 2010 | 113 | 2010 |
Multiple kernel clustering with neighbor-kernel subspace segmentation S Zhou, X Liu, M Li, E Zhu, L Liu, C Zhang, J Yin IEEE transactions on neural networks and learning systems 31 (4), 1351-1362, 2019 | 77 | 2019 |
Hybrid Spreading Mechanisms and T Cell Activation Shape the Dynamics of HIV-1 Infection C Zhang, S Zhou, E Groppelli, P Pellegrino, I Williams, P Borrow, ... PLOS Computational Biology 11 (4), e1004179, 2015 | 54 | 2015 |
Hybrid Epidemics - A Case Study on Computer Worm Conficker C Zhang, S Zhou, BM Chain PLOS ONE 10 (5), e0127478, 2015 | 23 | 2015 |
Optimizing Hybrid Spreading in Metapopulations C Zhang, S Zhou, JC Miller, IJ Cox, BM Chain Scientific Reports 5, 9924, 2015 | 16 | 2015 |
Efficient one-pass multi-view subspace clustering with consensus anchors S Liu, S Wang, P Zhang, K Xu, X Liu, C Zhang, F Gao Proceedings of the AAAI Conference on Artificial Intelligence 36 (7), 7576-7584, 2022 | 15 | 2022 |
Multi-view Clustering via Deep Matrix Factorization and Partition Alignment C Zhang, S Wang, J Liu, S Zhou, P Zhang, X Liu, E Zhu, C Zhang ACM International Conference on Multimedia, 2021 | 15 | 2021 |
RSFB: a Resilient Stochastic Fair Blue algorithm against spoofing DDoS attacks C Zhang, J Yin, Z Cai 2009 9th International Symposium on Communications and Information …, 2009 | 13 | 2009 |
A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks J Lin, C Zhang, Z Cai, Q Liu, J Yin International Journal of Autonomous and Adaptive Communications Systems 9 (1 …, 2016 | 8 | 2016 |
Initializing Then Refining: A Simple Graph Attribute Imputation Network W Tu, S Zhou, X Liu, Y Liu, Z Cai, E Zhu, C Zhang, J Cheng International Joint Conference on Artificial Intelligence (IJCAI), 2022 | 7 | 2022 |
Active queue management algorithm to counter DDoS attacks CW Zhang, JP Yin, ZP Cai, XW Liu, JR Lin, M Zhu Ruanjian Xuebao/Journal of Software 22 (9), 2182-2192, 2011 | 6* | 2011 |
HIEN: Hierarchical Intention Embedding Network for Click-Through Rate Prediction Z Zheng, C Zhang, X Gao, G Chen ACM SIGIR Conference on Research and Development in Information Retrieval, 2022 | 3 | 2022 |
Fusion Multiple Kernel K-means Y Zhang, X Liu, J Liu, S Dai, C Zhang, K Xu, E Zhu Proceedings of the AAAI Conference on Artificial Intelligence, 2022 | 2 | 2022 |
LeoTask: a fast, flexible and reliable framework for computational research C Zhang, S Zhou, BM Chain arXiv preprint arXiv:1501.01678, 2015 | 1 | 2015 |
POI-Transformers: POI Entity Matching through POI Embeddings by Incorporating Semantic and Geographic Information J Zhang, C Zhang, X Liu, X Li, W Liao, P Liu, Y Yao, J Zhang | | 2021 |
Hybrid epidemic spreading-from Internet worms to HIV infection C Zhang UCL (University College London), 2015 | | 2015 |
A Max-Margin Learning Algorithm with Additional Features X Liu, J Yin, E Zhu, Y Zhan, M Li, C Zhang Frontiers in Algorithmics, 196-206, 2009 | | 2009 |