default search action
Shunzheng Yu
Person information
- affiliation: Sun Yat-Sen University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j37]Xuefeng Jin, Shunzheng Yu:
A two-stage method for doubly resource constrained elementary shortest path problems. Knowl. Based Syst. 293: 111661 (2024) - 2023
- [j36]Yu Liang, Yi Xie, Shensheng Tang, Shunzheng Yu, Xingcheng Liu, Jiankun Hu:
Network Traffic Content Identification Based on Time-Scale Signal Modeling. IEEE Trans. Dependable Secur. Comput. 20(3): 2607-2624 (2023) - 2022
- [j35]Shun-Zheng Yu:
Explicit Duration Recurrent Networks. IEEE Trans. Neural Networks Learn. Syst. 33(7): 3120-3130 (2022) - 2020
- [j34]Jing-Lun Luo, Shun-Zheng Yu, Si-Jie Peng:
SDN/NFV-Based Security Service Function Tree for Cloud. IEEE Access 8: 38538-38545 (2020) - 2019
- [j33]Qin-Liang Lin, Shun-Zheng Yu:
Mice flow aggregation approach for Green networking. IET Commun. 13(15): 2352-2361 (2019) - [j32]Xincheng Tan, Yi Xie, Haishou Ma, Shunzheng Yu, Jiankun Hu:
Recognizing the content types of network traffic based on a hybrid DNN-HMM model. J. Netw. Comput. Appl. 142: 51-62 (2019) - [j31]Xincheng Tan, Yi Xie, Haishou Ma, Shunzheng Yu, Jiankun Hu:
Corrigendum to "Recognizing the content types of network traffic based on a hybrid DNN-HMM model" [J. Netw. Comput. Appl. 142 (2019) 51-62]. J. Netw. Comput. Appl. 145 (2019) - 2018
- [j30]Qin-Liang Lin, Shun-Zheng Yu:
PESA: a predictive energy-saving approach based on an OSHMM. IET Commun. 12(14): 1751-1758 (2018) - [j29]Waixi Liu, Jin Li, Jun Cai, Yu Wang, Xiao-Chu Liu, Shun-Zheng Yu:
COD: caching on demand in information-centric networking. Telecommun. Syst. 69(3): 303-319 (2018) - 2017
- [j28]Waixi Liu, Shun-Zheng Yu, Guang Tan, Jun Cai:
Information-centric networking with built-in network coding to achieve multisource transmission at network-layer. Comput. Networks 115: 110-128 (2017) - [j27]Qin-Liang Lin, Shun-Zheng Yu:
A Distributed Green Networking Approach for Data Center Networks. IEEE Commun. Lett. 21(4): 797-800 (2017) - [j26]Jian Kuang, Shun-Zheng Yu:
Broadcast-Based Content Delivery in Information-Centric Hybrid Multihop Wireless Networks. IEEE Commun. Lett. 21(4): 889-892 (2017) - 2016
- [j25]Qin-Liang Lin, Shun-Zheng Yu:
A spatial HMM approach for green networking. Comput. Commun. 88: 34-44 (2016) - [j24]Xiao-Fan Chen, Shun-Zheng Yu:
CIPA: A collaborative intrusion prevention architecture for programmable network and SDN. Comput. Secur. 58: 1-19 (2016) - [j23]Bai-Chao Li, Shun-Zheng Yu:
Keyword Mining for Private Protocols Tunneled Over WebSocket. IEEE Commun. Lett. 20(7): 1337-1340 (2016) - [j22]Xiao-Fan Chen, Shunzheng Yu:
A Collaborative Intrusion Detection System against DDoS for SDN. IEICE Trans. Inf. Syst. 99-D(9): 2395-2399 (2016) - [j21]Yan Liu, Shun-Zheng Yu:
Network coding-based multisource content delivery in Content Centric Networking. J. Netw. Comput. Appl. 64: 167-175 (2016) - [j20]Yi Xie, Yu Wang, Haitao He, Yang Xiang, Shunzheng Yu, Xincheng Liu:
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior. IEEE/ACM Trans. Netw. 24(5): 3162-3176 (2016) - 2015
- [j19]Jian Kuang, Shun-Zheng Yu:
CSAR: A Content-Scent based Architecture for Information-Centric mobile ad hoc networks. Comput. Commun. 71: 84-96 (2015) - [j18]Bai-Chao Li, Shun-Zheng Yu:
A Robust Scaling Approach for Implementation of HsMMs. IEEE Signal Process. Lett. 22(9): 1264-1268 (2015) - 2014
- [j17]Shilei Lv, Shunzheng Yu:
A fuzzy k-coverage approach for RFID network planning using plant growth simulation algorithm. J. Netw. Comput. Appl. 39: 280-291 (2014) - 2013
- [j16]Waixi Liu, Shun-Zheng Yu, Ying Gao, Wei-Tao Wu:
Caching efficiency of information-centric networking. IET Networks 2(2): 53-62 (2013) - [j15]Jian-Zhen Luo, Shun-Zheng Yu:
Position-based automatic reverse engineering of network protocols. J. Netw. Comput. Appl. 36(3): 1070-1077 (2013) - 2012
- [j14]Shilei Lv, Shunzheng Yu:
A novel middleware-based approach for redundant reader elimination using PSO. Int. J. Secur. Networks 7(4): 220-227 (2012) - [j13]Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. J. Netw. Comput. Appl. 35(3): 992-1000 (2012) - 2011
- [j12]Jun Cai, Shun-Zheng Yu, Yu Wang:
The community Analysis of User Behaviors Network for Web Traffic. J. Softw. 6(11): 2217-2224 (2011) - 2010
- [j11]Shun-Zheng Yu:
Hidden semi-Markov models. Artif. Intell. 174(2): 215-243 (2010) - [j10]Yu Wang, Yang Xiang, Shun-Zheng Yu:
An automatic application signature construction system for unknown traffic. Concurr. Comput. Pract. Exp. 22(13): 1927-1944 (2010) - 2009
- [j9]Wei-Zhou Lu, Wei-Xuan Gu, Shun-Zheng Yu:
One-way queuing delay measurement and its application on detecting DDoS attack. J. Netw. Comput. Appl. 32(2): 367-376 (2009) - [j8]Yu Wang, Shun-Zheng Yu:
Supervised Learning Real-time Traffic Classifiers. J. Networks 4(7): 622-629 (2009) - [j7]Jun Cai, Shun-Zheng Yu, Jing-li Liu:
The Design of a Wireless Data Acquisition and Transmission System. J. Networks 4(10): 1042-1049 (2009) - [j6]Yi Xie, Shun-Zheng Yu:
Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw. 17(1): 15-25 (2009) - [j5]Yi Xie, Shun-Zheng Yu:
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Trans. Netw. 17(1): 54-65 (2009) - 2008
- [j4]Xuegong Tan, Shun-Zheng Yu, Jin Han Park:
A note about some properties of BC graphs. Inf. Process. Lett. 108(6): 398-401 (2008) - 2006
- [j3]Shun-Zheng Yu, Hisashi Kobayashi:
Practical implementation of an efficient forward-backward algorithm for an explicit-duration hidden Markov model. IEEE Trans. Signal Process. 54(5): 1947-1951 (2006) - 2003
- [j2]Shun-Zheng Yu, Hisashi Kobayashi:
A hidden semi-Markov model with missing data and multiple observation sequences for mobility tracking. Signal Process. 83(2): 235-250 (2003) - [j1]Shun-Zheng Yu, Hisashi Kobayashi:
An efficient forward-backward algorithm for an explicit-duration hidden Markov model. IEEE Signal Process. Lett. 10(1): 11-14 (2003)
Conference and Workshop Papers
- 2024
- [c27]Bin Lan, Shunzheng Yu:
Detecting Cyber Attacks in Industrial Control Systems Using Duration-aware Representation Learning. ICCAI 2024: 379-386 - 2023
- [c26]Jinhua Lu, Shunzheng Yu:
Application Identification Based on Overlap Relationship of Concurrent Flows and Their Durations. CNML 2023: 88-92 - [c25]Bin Lan, Shunzheng Yu:
Detecting Cyber Attacks in Industrial Control Systems Using Spatio-Temporal Autoencoder. IJCNN 2023: 1-8 - [c24]Xuefeng Jin, Shunzheng Yu:
A Learning-Based Framework for Constrained Shortest Path Problems. SMC 2023: 62-68 - 2013
- [c23]Shilei Lv, Shunzheng Yu:
A Middleware-Based Model for Redundant Reader Elimination Using Plant Growth Simulation Algorithm. CIS 2013: 36-40 - [c22]Waixi Liu, Shun-Zheng Yu, Ping-Yu Zhu:
Multisource dissemination in content-centric networking. NOF 2013: 1-5 - 2012
- [c21]Yu Wang, Yang Xiang, Jun Zhang, Shunzheng Yu:
Internet traffic clustering with constraints. IWCMC 2012: 619-624 - 2011
- [c20]Yu Wang, Yang Xiang, Shunzheng Yu:
Internet Traffic Classification Using Machine Learning: A Token-based Approach. CSE 2011: 285-289 - [c19]Yi Xie, Shun-Zheng Yu, Shensheng Tang, Xiangnong Huang:
A Two-Layer Hidden Markov Model for the Arrival Process of Web Traffic. MASCOTS 2011: 469-471 - [c18]Yu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu:
A novel semi-supervised approach for network traffic clustering. NSS 2011: 169-175 - 2010
- [c17]Yu Wang, Yang Xiang, Shun-Zheng Yu:
Automatic Application Signature Construction from Unknown Traffic. AINA 2010: 1115-1120 - [c16]Xuegong Tan, Shun-Zheng Yu:
Anycast Routing in Hypercube Multicomputers. PDPTA 2010: 500-507 - [c15]Ming-Ming Xiao, Shun-Zheng Yu:
Learning Automata Representation of Network Protocol by Grammar Induction. WISM 2010: 220-227 - 2009
- [c14]Tao Wang, Shun-Zheng Yu:
Centralized Botnet Detection by Traffic Aggregation. ISPA 2009: 86-93 - [c13]Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang:
Automatic Network Protocol Automaton Extraction. NSS 2009: 336-343 - 2008
- [c12]Ning Li, Shun-Zheng Yu:
Periodic hidden Markov model-based workload clustering and characterization. CIT 2008: 378-383 - [c11]Yu Wang, Shun-Zheng Yu:
Move Statistics-Based Traffic Classifiers Online. CSSE (4) 2008: 721-725 - [c10]Chenghua Tang, Shunzheng Yu:
Assessment of Network Security Policy Based on Security Capability. CSSE (3) 2008: 906-910 - [c9]Yi Xie, Shun-Zheng Yu:
Measuring the Normality of Web Proxies' Behavior Based on Locality Principles. NPC 2008: 61-73 - [c8]Chenghua Tang, Shunzheng Yu:
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism. NPC Workshops 2008: 88-95 - [c7]Li He, Shunzheng Yu, Min Li:
Anomaly Detection Based on Available Bandwidth Estimation. NPC Workshops 2008: 176-183 - [c6]Min Li, Shunzheng Yu, Li He:
Detecting Network-Wide Traffic Anomalies Based on Spatial HMM. NPC Workshops 2008: 198-203 - 2007
- [c5]Yi Xie, Shun-Zheng Yu:
Detecting Shrew HTTP Flood Attacks for Flash Crowds. International Conference on Computational Science (1) 2007: 640-647 - 2006
- [c4]Yi Xie, Shun-Zheng Yu:
A Dynamic Anomaly Detection Model for Web User Behavior Based on HsMM. CSCWD 2006: 811-821 - [c3]Yi Xie, Shun-Zheng Yu:
A Novel Model for Detecting Application Layer DDoS Attacks. IMSCCS (2) 2006: 56-63 - 2000
- [c2]Shun-Zheng Yu, Hisashi Kobayashi:
A new prefetch cache scheme. GLOBECOM 2000: 350-355 - [c1]Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark:
An integrated mobility and traffic model for resource allocation in wireless networks. WOWMOM 2000: 39-47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint