To filter or to authorize: Network-layer DoS defense against multimillion-node botnets X Liu, X Yang, Y Lu Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 195-206, 2008 | 281 | 2008 |
Passport: Secure and Adoptable Source Authentication. X Liu, A Li, X Yang, D Wetherall Nsdi 8, 365-378, 2008 | 226 | 2008 |
Netfence: preventing internet denial of service from inside out X Liu, X Yang, Y Xia ACM SIGCOMM Computer Communication Review 40 (4), 255-266, 2010 | 152 | 2010 |
Efficient and Secure Source Authentication with Packet Passports. X Liu, X Yang, D Wetherall, TE Anderson SRUTI 6, 2-2, 2006 | 89 | 2006 |
BlockCAM: a blockchain-based cross-domain authentication model W Wang, N Hu, X Liu 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 73 | 2018 |
6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space Z Liu, Y Xiong, X Liu, W Xie, P Zhu Computer Networks 155, 31-46, 2019 | 36 | 2019 |
Bootstrapping accountability in the internet we have A Li, X Liu, X Yang 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011 | 36 | 2011 |
Internet Protocol Made Accountable. X Yang, X Liu Hotnets, 2009 | 18 | 2009 |
A technical approach to net neutrality X Yang, G Tsudik, X Liu IRVINE IS BURNING, 13, 2006 | 15 | 2006 |
Blockzone: A blockchain-based dns storage and retrieval scheme W Wang, N Hu, X Liu International Conference on Artificial Intelligence and Security, 155-166, 2019 | 13 | 2019 |
StopIt: Mitigating DoS flooding attacks from multi-million botnets X Liu, X Yang, Y Lu Technical report, UC Irvine, 2008. Technical Report 08-05, 2008 | 12 | 2008 |
构建多元化反贫困政策: 农村低保与扶贫开发政策的有效衔接 向德平, 刘欣 社会工作与管理 14 (A01), 54-61, 2014 | 8 | 2014 |
Change characteristics of soil available nitrogen and phosphorus and heavy metal contents after long-term cultivation of vegetables. Q Zhi, W Jin-shui, W Wen-xue, Q Hong-ling, Z Yi-jun, L Xin-liang, ... Yingyong Shengtai Xuebao 22 (11), 2011 | 7 | 2011 |
Influence of different coupling modes on the robustness of smart grid under targeted attack WJ Kang, G Hu, PD Zhu, Q Liu, Z Hang, X Liu Sensors 18 (6), 1699, 2018 | 6 | 2018 |
Internet registry mechanism for preventing prefix hijacks. Ruanjian Xuebao X Liu, PD Zhu, YX Peng Journal of Software 20 (3), 620-629, 2009 | 6 | 2009 |
Cross-layer attack path exploration for smart grid based on knowledge of target network WJ Kang, PD Zhu, G Hu, Z Hang, X Liu International conference on knowledge science, engineering and management …, 2018 | 5 | 2018 |
Security evaluation for interdomain routing system in the Internet X Liu, XQ Wang, PD Zhu, YX Peng J Comput Res Dev 46, 1669-1677, 2009 | 5 | 2009 |
Low Frequency VLBI Project IE Molotov, SF Likhachev, AA Chuprikov, A Dementiev, B Lipatov, ... The Universe at Low Radio Frequencies 199, 492, 2002 | 5 | 2002 |
Cooperative monitoring BGP among autonomous systems N Hu, BS Wang, X Liu Security and Communication networks 8 (10), 1943-1957, 2015 | 4 | 2015 |
Cooperative detection of Internet prefix hijacking PD Zhu, X Liu, WP Deng, HY Cao 網際網路技術學刊 11 (1), 33-45, 2010 | 3 | 2010 |