default search action
Zhongchuan Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j15]Chao Wang, Zhongchuan Fu, Yanyan Huo:
End-to-end diagnosis of cloud systems against intermittent faults. Comput. Sci. Inf. Syst. 18(3): 771-790 (2021) - 2020
- [j14]Hongsong Chen, Caixia Meng, Zhongchuan Fu, Chao-Hsien Lee:
Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network. IET Inf. Secur. 14(4): 452-458 (2020) - [j13]Chao Wang, Zhongchuan Fu:
Quantitative evaluation of fault propagation in a commercial cloud system. Int. J. Distributed Sens. Networks 16(3) (2020)
2010 – 2019
- 2019
- [j12]Hongsong Chen, Caixia Meng, Zhiguang Shan, Zhongchuan Fu, Bharat K. Bhargava:
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation. IEEE Access 7: 32853-32866 (2019) - [j11]Hongsong Chen, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, Zhongchuan Fu:
A novel SMP-based survivability evaluation metric and approach in wireless sensor network. Comput. Sci. Inf. Syst. 16(3): 733-751 (2019) - [j10]Hongsong Chen, Zhongchuan Fu, Gang Wang:
A novel HHT and KS statistic approach to detect RoQ attack in wireless sensor network. Int. J. Embed. Syst. 11(5): 643-652 (2019) - [j9]Hongsong Chen, Ming Liu, Zhongchuan Fu:
Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network. Wirel. Pers. Commun. 104(2): 595-615 (2019) - 2018
- [j8]Bi-ying Zhang, Zhongchuan Fu, Hongsong Chen, Gang Cui:
TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors. Microprocess. Microsystems 60: 162-172 (2018) - 2017
- [j7]Fengkai Yuan, Zhenzhou Ji, Zhongchuan Fu:
RACMan: Replication-aware cache management for manycore CMPs with private LLCs. Microprocess. Microsystems 51: 165-175 (2017) - [c3]Shen Wang, An Huang, Zhongchuan Fu:
Behavior Prediction for Industrial Control System. CSPS 2017: 1953-1958 - 2016
- [j6]Hongsong Chen, Gang Wang, Zhongchuan Fu:
基于分段模型检测的云服务跨域认证协议的形式化分析与验证 (Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check). 计算机科学 43(4): 140-144 (2016) - 2015
- [j5]Hongsong Chen, Zhongchuan Fu:
Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation. Mob. Inf. Syst. 2015: 852173:1-852173:9 (2015) - [c2]Hongsong Chen, Zhi Han, Zhongchuan Fu:
Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks. TrustCom/BigDataSE/ISPA (1) 2015: 1272-1278 - 2014
- [j4]Hongsong Chen, Bharat K. Bhargava, Zhongchuan Fu:
Multilabels-Based Scalable Access Control for Big Data Applications. IEEE Cloud Comput. 1(3): 65-71 (2014) - 2011
- [j3]Hongsong Chen, Zhongchuan Fu:
A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks. Intell. Autom. Soft Comput. 17(8): 1063-1074 (2011) - 2010
- [c1]Chao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, Bin Li, Lin Chen, Zexu Zhang, Yuying Wang, Gang Cui:
CFCSS without Aliasing for SPARC Architecture. CIT 2010: 2094-2100
2000 – 2009
- 2007
- [j2]Hongsong Chen, Zhongchuan Fu, Chengyao Wang, Zhenzhou Ji, Mingzeng Hu:
Using network processor to establish security agent for AODV routing protocol. J. Comput. Inf. Technol. 15(1): 61-70 (2007) - [j1]Hongsong Chen, Zhenzhou Ji, Mingzeng Hu, Zhongchuan Fu, Ruixiang Jiang:
Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. J. Netw. Comput. Appl. 30(1): 145-166 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint