Search

Your search keyword '"Zhiwei Yan"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Zhiwei Yan" Remove constraint Author: "Zhiwei Yan" Topic computer Remove constraint Topic: computer
42 results on '"Zhiwei Yan"'

Search Results

1. BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain

2. Detection-Oriented Backbone Trained from Near Scratch and Local Feature Refinement for Small Object Detection

3. Discriminative Region Mining for Object Detection

4. The road to DNS privacy

5. Optimization and Decomposition Methods in Network Traffic Prediction Model: A Review and Discussion

6. Detail preservation and feature refinement for object detection

7. Is DNS Ready for Ubiquitous Internet of Things?

8. A Distributed Autonomous Organization for Internet Address Management

9. Hybrid Network Mobility Support in Named Data Networking

10. Detection of DNS DDoS Attacks with Random Forest Algorithm on Spark

11. Optimized video content delivery for mobile networks using the transformative computing model

12. Efficient Producer Mobility Support in Named Data Networking

13. Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay

14. Application of Text Classification Method Based on Depth Learning in Email Handwriting Analysis

15. DNS based Neighbor Discovery in ITS

16. Localized paging in proxy mobile IPv6 networks

17. An Entropy-SVM Based Interest Flooding Attack Detection Method in ICN

18. RRPhish: Anti-phishing via mining brand resources request

19. Distributed proxies with fast handover support for a PURSUIT based networking architecture

20. Utilizing the Domain Name System for Scalable and Secure Named Data Networking

21. Performance study of the dual‐stack mobile IP protocols in the evolving mobile internet

22. A robust internet abuse detection method

23. Data aggregation in named data networking

24. Towards tackling privacy disclosure issues in Domain Name Service

25. The Cache Location Selection Based on Group Betweenness Centrality Maximization

26. A method for software trusted update on network security equipment

27. Phishing detection based on newly registered domains

28. ISBORD: Internet Searching based on Resource Description

29. RPKI Deployment: Risks and Alternative Solutions

30. An efficient data management architecture for the large-scale deployment of Resource Public Key Infrastructure

31. Botnet Domain Name Detection based on Machine Learning

32. Enhanced HMIPv6 with cascaded tunnel

33. Dynamic proxy based distributed mobility management in PURSUIT

34. A Universal Object Name Resolution Scheme for IoT

35. Localized Paging Scheme in PMIPv6

36. RNS-A Public Resource Name Service Platform for the Internet of Things

37. A cache-splitting scheme for DNS recursive server

38. Novel Branching-Router based Multicast Routing Protocol with Mobility Support

39. A Forwarding-Chain Based Mobile Multicast Scheme with Management Support

40. Network mobility support in PMIPv6 network

41. A CDMA-assisted seamless handover scheme for WLAN

42. Novel Hierarchical Based Route Optimization Scheme for Nested Mobile Network: Design and Performance Evaluation

Catalog

Books, media, physical & digital resources