default search action
Guozhen Cheng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Shuyi Li, Xiaohan Yang, Guozhen Cheng, Wenyan Liu, Hongchao Hu:
SA-MDRAD: sample-adaptive multi-teacher dynamic rectification adversarial distillation. Multim. Syst. 30(4): 225 (2024) - [c15]Lin Wei, Shihao Zhang, Yufei Gao, Lei Shi, Huijuan Lian, Guozhen Cheng, Mengyang He:
Workflow task offloading mechanism based on A3C under computing network integration. CSCWD 2024: 2288-2294 - [c14]Lin Wei, Jinyang Li, Yufei Gao, Lei Shi, Huijuan Lian, Guozhen Cheng, Mengyang He:
Resource matching algorithm based on multidimensional computing resource measurement in computing power network. CSCWD 2024: 2295-2300 - [c13]Fengming Hu, Guozhen Cheng, Feng Xu:
A Range-Elevation Combined SAR Tomography for Sparse Airborne Array-InSAR Images. IGARSS 2024: 2040-2043 - [c12]Guozhen Cheng, ZhiChao Wang, Fengming Hu, Feng Xu:
An Orthogonal Subspace Decomposition-based Large Scale SAR Super-Resolution Process Using Relative Optimal Subspace. IGARSS 2024: 3151-3154 - 2023
- [c11]Yuanbo Li, Hongchao Hu, Shuai Zhang, Guozhen Cheng, Wenyan Liu:
An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning. ISPA/BDCloud/SocialCom/SustainCom 2023: 410-415 - [c10]Dacheng Zhou, Hongchang Chen, Guozhen Cheng:
A Security Containers Placement Algorithm Based on DQN for Microservices to Defend Against Co-Resident Threat. ICCCS 2023: 683-688 - [c9]Guozhen Cheng, Fengming Hu, Feng Xu:
Improving 3D Reconstruction with Airborne Array-InSAR Images using a Capon-Based Sidelobe Reduction. IGARSS 2023: 7922-7925 - 2022
- [j17]Dacheng Zhou, Hongchang Chen, Ke Shang, Guozhen Cheng, Jianpeng Zhang, Hongchao Hu:
Cushion: A proactive resource provisioning method to mitigate SLO violations for containerized microservices. IET Commun. 16(17): 2105-2122 (2022) - 2020
- [j16]Jianjian Ai, Hongchang Chen, Zehua Guo, Guozhen Cheng, Thar Baker:
Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment. Future Gener. Comput. Syst. 111: 841-852 (2020)
2010 – 2019
- 2019
- [j15]Jianjian Ai, Zehua Guo, Hongchang Chen, Guozhen Cheng:
Improving the Routing Security in Software-Defined Networks. IEEE Commun. Lett. 23(5): 838-841 (2019) - [j14]Qing Tong, Yunfei Guo, Hongchao Hu, Wenyan Liu, Guozhen Cheng, Ling-shu Li:
A Diversity Metric Based Study on the Correlation between Diversity and Security. IEICE Trans. Inf. Syst. 102-D(10): 1993-2003 (2019) - [j13]Yang Chen, Hongchao Hu, Guozhen Cheng:
Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional network properties. Frontiers Inf. Technol. Electron. Eng. 20(2): 238-252 (2019) - [c8]Jianjian Ai, Hongchang Chen, Zehua Guo, Guozhen Cheng, Thar Baker:
Improving Resiliency of Software-Defined Networks with Network Coding-based Multipath Routing. ISCC 2019: 1-6 - 2018
- [j12]Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng:
Mimic defense: a designed-in cybersecurity defense framework. IET Inf. Secur. 12(3): 226-237 (2018) - [j11]Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng:
Scientific workflow execution system based on mimic defense in the cloud environment. Frontiers Inf. Technol. Electron. Eng. 19(12): 1522-1536 (2018) - [j10]Chao Qi, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, Shuo Zhao:
Security Analysis of Dynamic SDN Architectures Based on Game Theory. Secur. Commun. Networks 2018: 4123736:1-4123736:10 (2018) - [j9]Tao Wang, Hongchang Chen, Guozhen Cheng, Yulin Lu:
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction. Secur. Commun. Networks 2018: 7545079:1-7545079:16 (2018) - 2017
- [j8]Xing Ye, Guozhen Cheng, Xingguo Luo:
Maximizing SDN control resource utilization via switch migration. Comput. Networks 126: 69-80 (2017) - [j7]Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu:
MNOS: a mimic network operating system for software defined networks. IET Inf. Secur. 11(6): 345-355 (2017) - [c7]Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang:
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture. CyberC 2017: 50-53 - [c6]Zhenping Lu, Fucai Chen, Guozhen Cheng, Shuxin Li:
The Best Defense Strategy against Session Hijacking Using Security Game in SDN. HPCC/SmartCity/DSS 2017: 419-426 - [c5]Chao Qi, Jiangxing Wu, Hongchang Chen, Hongtao Yu, Hongchao Hu, Guozhen Cheng:
Game-Theoretic Analysis for Security of Various Software-Defined Networking (SDN) Architectures. VTC Spring 2017: 1-5 - 2016
- [j6]Guozhen Cheng, Hongchang Chen, Hongchao Hu, Julong Lan:
Dynamic switch migration towards a scalable SDN control plane. Int. J. Commun. Syst. 29(9): 1482-1499 (2016) - [j5]Gang Xiong, Yuxiang Hu, Julong Lan, Guozhen Cheng:
A Mechanism for Configurable Network Service Chaining and Its Implementation. KSII Trans. Internet Inf. Syst. 10(8): 3701-3727 (2016) - [c4]Zhiming Wang, Jiangxing Wu, Zehua Guo, Guozhen Cheng, Hongchao Hu:
Secure virtual network embedding to mitigate the risk of covert channel attacks. INFOCOM Workshops 2016: 144-145 - [c3]Chao Qi, Jiangxing Wu, Hongchao Hu, Guozhen Cheng, Wenyan Liu, Jianjian Ai, Chao Yang:
An intensive security architecture with multi-controller for SDN. INFOCOM Workshops 2016: 401-402 - 2015
- [j4]Guozhen Cheng, Hongchang Chen, Hongchao Hu, Zhiming Wang, Julong Lan:
Enabling network function combination via service chain instantiation. Comput. Networks 92: 396-407 (2015) - [j3]Guozhen Cheng, Hongchang Chen, Zhiming Wang, Peng Yi, Fengyu Zhang, Hongchao Hu:
Towards Adaptive Network Nodes via Service Chain Construction. IEEE Trans. Netw. Serv. Manag. 12(2): 248-262 (2015) - [c2]Zhiming Wang, Jiangxing Wu, Guozhen Cheng, Yiming Jiang:
Mutine: A Mutable Virtual Network Embedding with Game-Theoretic Stochastic Routing. GLOBECOM 2015: 1-6 - [c1]Guozhen Cheng, Hongchang Chen, Zhiming Wang, Shuqiao Chen:
DHA: Distributed decisions on the switch migration toward a scalable SDN control plane. Networking 2015: 1-9 - 2014
- [j2]Guozhen Cheng, Hongchang Chen, Dong-nian Cheng, Zhen Zhang, Julong Lan:
Uncovering network traffic anomalies based on their sparse distributions. Sci. China Inf. Sci. 57(9): 1-11 (2014) - [j1]Guozhen Cheng, Hongchang Chen, Shuqiao Chen, Hongchao Hu, Peng Yi:
How to Make Network Nodes Adaptive? IEEE Commun. Lett. 18(3): 515-518 (2014)
Coauthor Index
aka: Hong-chao Hu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint