default search action
Binxing Fang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j86]Dingyu Yan, Yaping Liu, Shuo Zhang, Binxing Fang, Feng Zhao, Zhikai Yang:
PCNP: A RoCEv2 congestion control using precise CNP. Comput. Networks 247: 110453 (2024) - [j85]Xiyuan Zhang, Gang Xiong, Zhen Li, Chen Yang, Xinjie Lin, Gaopeng Gou, Binxing Fang:
Traffic spills the beans: A robust video identification attack against YouTube. Comput. Secur. 137: 103623 (2024) - [j84]Yuntao Zhang, Binxing Fang, Zehui Xiong, Yanhao Wang, Yuwei Liu, Chao Zheng, Qinnan Zhang:
A Semantics-Based Approach on Binary Function Similarity Detection. IEEE Internet Things J. 11(15): 25910-25924 (2024) - [j83]Jiageng Yang, Chuanyi Liu, Binxing Fang:
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications. J. Cloud Comput. 13(1): 118 (2024) - [j82]Yunting Zhang, Shang Li, Lin Ye, Hongli Zhang, Zhe Chen, Binxing Fang:
Kalt: generating adversarial explainable chinese legal texts. Mach. Learn. 113(9): 6341-6371 (2024) - [j81]Yunting Zhang, Lin Ye, Zeshu Tian, Zhe Chen, Hongli Zhang, Baisong Li, Binxing Fang:
UCTT: universal and low-cost adversarial example generation for tendency classification. Neural Comput. Appl. 36(22): 13865-13894 (2024) - [j80]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang:
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers. IEEE Trans. Computers 73(3): 708-721 (2024) - [j79]Donglei Wu, Weihao Yang, Haoyu Jin, Xiangyu Zou, Wen Xia, Binxing Fang:
FedComp: A Federated Learning Compression Framework for Resource-Constrained Edge Computing Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(1): 230-243 (2024) - [j78]Donglei Wu, Weihao Yang, Xiangyu Zou, Hao Feng, Dingwen Tao, Shiyi Li, Wen Xia, Binxing Fang:
BIRD+: Design of a Lightweight Communication Compressor for Resource-Constrained Distribution Learning Platforms. IEEE Trans. Parallel Distributed Syst. 35(11): 2193-2207 (2024) - [c192]Kai Tan, Dongyang Zhan, Zhaofeng Yu, Lin Ye, Hongli Zhang, Binxing Fang:
Multi-Stage Defense: Enhancing Robustness in Sequence-Based Log Anomaly Detection. ICC 2024: 2725-2730 - [c191]Heyan Chai, Zeyu Liu, Yongxin Tong, Ziyi Yao, Binxing Fang, Qing Liao:
Towards Task-Conflicts Momentum-Calibrated Approach for Multi-task Learning. ICDE 2024: 939-952 - [c190]Jianyang Qin, Yan Jia, Yongxin Tong, Heyan Chai, Ye Ding, Xuan Wang, Binxing Fang, Qing Liao:
MUSE-Net: Disentangling Multi-Periodicity for Traffic Flow Forecasting. ICDE 2024: 1282-1295 - [c189]Jinhao Cui, Heyan Chai, Xu Yang, Ye Ding, Binxing Fang, Qing Liao:
SGCL: Semantic-aware Graph Contrastive Learning with Lipschitz Graph Augmentation. ICDE 2024: 3028-3041 - [i13]Xu Yang, Jiyuan Feng, Songyue Guo, Ye Wang, Ye Ding, Binxing Fang, Qing Liao:
DA-PFL: Dynamic Affinity Aggregation for Personalized Federated Learning. CoRR abs/2403.09284 (2024) - 2023
- [j77]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Peng Liao, Shouyou Song:
Framework for understanding intention-unbreakable malware. Sci. China Inf. Sci. 66(4) (2023) - [j76]Donglei Wu, Weihao Yang, Xiangyu Zou, Wen Xia, Shiyi Li, Zhenbo Hu, Weizhe Zhang, Binxing Fang:
Smart-DNN+: A Memory-efficient Neural Networks Compression Framework for the Model Inference. ACM Trans. Archit. Code Optim. 20(4): 49:1-49:24 (2023) - [j75]Heyan Chai, Zhe Yin, Ye Ding, Li Liu, Binxing Fang, Qing Liao:
A Model-Agnostic Approach to Mitigate Gradient Interference for Multi-Task Learning. IEEE Trans. Cybern. 53(12): 7810-7823 (2023) - [c188]Heyan Chai, Jinhao Cui, Ye Wang, Min Zhang, Binxing Fang, Qing Liao:
Improving Gradient Trade-offs between Tasks in Multi-task Text Classification. ACL (1) 2023: 2565-2579 - [c187]Heyan Chai, Ziyi Yao, Siyu Tang, Ye Wang, Liqiang Nie, Binxing Fang, Qing Liao:
Aspect-to-Scope Oriented Multi-view Contrastive Learning for Aspect-based Sentiment Analysis. EMNLP (Findings) 2023: 10902-10913 - [c186]Dikai Mo, Yujia Zhu, Zhen Jie, Yong Sun, Qingyun Liu, Binxing Fang:
Unveiling Flawed Cache Structures in DNS Infrastructure via Record Watermarking. GLOBECOM 2023: 6024-6029 - [c185]Meiqi Wang, Muqian Chen, Zeyu Li, Xuebin Wang, Jinqiao Shi, Binxing Fang:
Deanonymize Tor Hidden Services Using Remote Website Fingerprinting. TrustCom 2023: 998-1005 - 2022
- [j74]Zhongda Xia, Yu Zhang, Binxing Fang:
Exploiting Knowledge for Better Mobility Support in the Future Internet. Mob. Networks Appl. 27(4): 1671-1687 (2022) - [j73]Yali Gao, Xiaoyong Li, Hao Peng, Binxing Fang, Philip S. Yu:
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network. IEEE Trans. Knowl. Data Eng. 34(2): 708-722 (2022) - [c184]Donglei Wu, Xiangyu Zou, Shuyu Zhang, Haoyu Jin, Wen Xia, Binxing Fang:
SmartIdx: Reducing Communication Cost in Federated Learning by Exploiting the CNNs Structures. AAAI 2022: 4254-4262 - [c183]Liyan Shen, Ye Dong, Binxing Fang, Jinqiao Shi, Xuebin Wang, Shengli Pan, Ruisheng Shi:
ABNN2: secure two-party arbitrary-bitwidth quantized neural network predictions. DAC 2022: 361-366 - [c182]Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang:
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. DSC 2022: 71-78 - [c181]Wei Liu, Yutao Huang, Yibing Guo, Ye Wang, Binxing Fang, Qing Liao:
Topic Modeling for Short Texts Via Dual View Collaborate optimization. DSC 2022: 160-166 - [c180]Tong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang:
Automated Vulnerability Discovery System Based on Hybrid Execution. DSC 2022: 234-241 - [c179]Heyan Chai, Siyu Tang, Jinhao Cui, Ye Ding, Binxing Fang, Qing Liao:
Improving Multi-task Stance Detection with Multi-task Interaction Network. EMNLP 2022: 2990-3000 - [c178]Siyu Tang, Heyan Chai, Ziyi Yao, Ye Ding, Cuiyun Gao, Binxing Fang, Qing Liao:
Affective Knowledge Enhanced Multiple-Graph Fusion Networks for Aspect-based Sentiment Analysis. EMNLP 2022: 5352-5362 - [c177]Heyan Chai, Weijun Su, Siyu Tang, Ye Ding, Binxing Fang, Qing Liao:
Improving Anomaly Detection with a Self-Supervised Task Based on Generative Adversarial Network. ICASSP 2022: 3563-3567 - [c176]Chuanwang Ma, Yu Zhang, Binxing Fang, Hongli Zhang:
DWBFT: A Weighted Byzantine Fault Tolerant Protocol with Decentralized Trust. ICC 2022: 5384-5390 - [c175]Baoke Li, Cong Cao, Fangfang Yuan, Yanbing Liu, Baohui Li, Binxing Fang:
EPGraph: An Efficient Graph Computing Model in Persistent Memory System. ISPA/BDCloud/SocialCom/SustainCom 2022: 9-17 - [c174]Yuntao Zhang, Yanhao Wang, Yuwei Liu, Zhengyuan Pang, Binxing Fang:
PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph. QRS 2022: 537-548 - [c173]Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song:
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. TrustCom 2022: 159-166 - 2021
- [j72]Mingtao Lei, Xi Zhang, Lingyang Chu, Zhefeng Wang, Philip S. Yu, Binxing Fang:
Finding Route Hotspots in Large Labeled Networks. IEEE Trans. Knowl. Data Eng. 33(6): 2479-2492 (2021) - [j71]Yu Zhang, Wenfeng Liu, Zhongda Xia, Zhongze Wang, Lu Liu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things. Wirel. Commun. Mob. Comput. 2021: 6620236:1-6620236:20 (2021) - [c172]Xuebin Wang, Meiqi Wang, Jinqiao Shi, Zeyu Li, Kexin Zou, Binxing Fang:
Efficient Classification of Darknet Access Activity with Partial Traffic. CNCERT 2021: 113-128 - [c171]Baoke Li, Cong Cao, Yuhai Lu, Yanbing Liu, Baohui Li, Binxing Fang, Jianhui Fu:
D2Graph: An Efficient and Unified Out-of-Core Graph Computing Model. ISPA/BDCloud/SocialCom/SustainCom 2021: 193-201 - [c170]Zhongda Xia, Yu Zhang, Teng Liang, Xinggong Zhang, Binxing Fang:
Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks. MSWiM 2021: 207-216 - [c169]Yuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang:
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities. TrustCom 2021: 569-576 - [c168]Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. TrustCom 2021: 783-790 - 2020
- [j70]Peiyi Han, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan, Zekun Cao, Binxing Fang:
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 8: 68449-68459 (2020) - [j69]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. Comput. Commun. 150: 455-462 (2020) - [j68]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun, Zhihong Tian:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j67]Jing Qiu, Zhihong Tian, Chunlai Du, Qi Zuo, Shen Su, Binxing Fang:
A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 7(6): 4682-4696 (2020) - [j66]Tiantian Ji, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j65]Mingtao Lei, Lingyang Chu, Zhefeng Wang, Jian Pei, Caifeng He, Xi Zhang, Binxing Fang:
Mining top-k sequential patterns in transaction database graphs. World Wide Web 23(1): 103-130 (2020) - [j64]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Binxing Fang:
Scene text reading based cloud compliance access. World Wide Web 23(4): 2633-2647 (2020) - [c167]Tian Tian, Yudong Liu, Xiaoyu Yang, Yuefei Lyu, Xi Zhang, Binxing Fang:
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection. CIKM 2020: 1445-1454 - [c166]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, Binxing Fang:
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. ESORICS (1) 2020: 419-439 - [c165]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model. HPCC/DSS/SmartCity 2020: 465-474 - [c164]Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. ISCC 2020: 1-7 - [c163]Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. TrustCom 2020: 699-706 - [i12]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Jiawen Diao, Tian Wang, Weiqiang Yu:
First Step Towards Modeling Unbreakable Malware. CoRR abs/2008.06163 (2020) - [i11]Tian Tian, Yudong Liu, Xiaoyu Yang, Yuefei Lyu, Xi Zhang, Binxing Fang:
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection. CoRR abs/2009.03823 (2020)
2010 – 2019
- 2019
- [j63]Mingtao Lei, Xi Zhang, Jincui Yang, Binxing Fang:
Efficiently Approximating Top- $k$ Sequential Patterns in Transactional Graphs. IEEE Access 7: 62817-62832 (2019) - [j62]Shang Li, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction. IEEE Access 7: 151144-151155 (2019) - [j61]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:
A competitive model of popularity prediction using correlation matrix. Clust. Comput. 22(Supplement): 2747-2759 (2019) - [j60]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang:
SAVM: A practical secure external approach for automated in-VM management. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j59]Jinlin Wang, Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu:
DRAV: Detection and repair of data availability violations in Internet of Things. Int. J. Distributed Sens. Networks 15(11) (2019) - [j58]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang, Zhihong Tian:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j57]Jirui Li, Xiaoyong Li, Jie Yuan, Rui Zhang, Binxing Fang:
Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things. IEEE Internet Things J. 6(2): 2778-2796 (2019) - [j56]Xi Zhang, Yixuan Li, Senzhang Wang, Binxing Fang, Philip S. Yu:
Enhancing stock market prediction with extended coupled hidden Markov model over multi-sourced data. Knowl. Inf. Syst. 61(2): 1071-1090 (2019) - [j55]Zhongru Wang, Yuntao Zhang, Zhihong Tian, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j54]Zhongru Wang, Binxing Fang:
Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J. Supercomput. 75(9): 5965 (2019) - [j53]Xi Zhang, Yuan Su, Siyu Qu, Sihong Xie, Binxing Fang, Philip S. Yu:
IAD: Interaction-Aware Diffusion Framework in Social Networks. IEEE Trans. Knowl. Data Eng. 31(7): 1341-1354 (2019) - [c162]Yue Wu, Zhongru Wang, Qiang Ruan, Jinyu Shi, Binxing Fang:
Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain. BigComp 2019: 1-7 - [c161]Jieyun Huang, Xi Zhang, Binxing Fang:
CoStock: A DeepFM Model for Stock Market Prediction with Attentional Embeddings. IEEE BigData 2019: 5522-5531 - [c160]Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. CNS 2019: 46-54 - [c159]Mingtao Lei, Xi Zhang, Jincui Yang, Binxing Fang:
PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs. DASFAA (3) 2019: 254-258 - [c158]Yuan Su, Xi Zhang, Senzhang Wang, Binxing Fang, Tianle Zhang, Philip S. Yu:
Understanding Information Diffusion via Heterogeneous Information Network Embeddings. DASFAA (1) 2019: 501-516 - [c157]Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:
AutoDE: Automated Vulnerability Discovery and Exploitation. DSC 2019: 46-53 - [c156]Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:
Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. DSC 2019: 373-380 - [c155]Jie Lin, Chuanyi Liu, Xinyi Zhang, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. DSC 2019: 528-535 - [c154]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. DSC 2019: 686-693 - [c153]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory. HPCC/SmartCity/DSS 2019: 1743-1748 - [c152]Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Gongzhu Yin, Ximiao Yu:
EDCleaner: Data Cleaning for Entity Information in Social Network. ICC 2019: 1-7 - [c151]Wenfeng Liu, Yu Zhang, Yongyue Li, Binxing Fang:
Modeling, Measuring, and Analyzing the Resolution Process of Popular Domains. ICC 2019: 1-7 - [c150]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Binxing Fang:
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash. ICC 2019: 1-7 - [c149]Di Wu, Binxing Fang, Junnan Wang, Qixu Liu, Xiang Cui:
Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. ICC 2019: 1-6 - [c148]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. ICC 2019: 1-6 - [c147]Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. ICCCN 2019: 1-8 - [c146]Shang Li, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang:
Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation. ICAIS (1) 2019: 148-158 - [c145]Jie Lin, Chuanyi Liu, Binxing Fang:
Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile. ICITEE 2019: 144:1-144:5 - [c144]Shang Li, Boyang Liu, Lin Ye, Hongli Zhang, Binxing Fang:
Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges. ICTAI 2019: 660-667 - [c143]Muqian Chen, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Zelin Yin, Binxing Fang:
SignalCookie: Discovering Guard Relays of Hidden Services in Parallel. ISCC 2019: 1-7 - [c142]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic. ISCC 2019: 1-7 - [i10]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. CoRR abs/1902.05135 (2019) - [i9]Mingtao Lei, Xi Zhang, Lingyang Chu, Zhefeng Wang, Philip S. Yu, Binxing Fang:
Finding Route Hotspots in Large Labeled Networks. CoRR abs/1911.11354 (2019) - 2018
- [j52]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Peiyi Han, Hezhong Pan, Binxing Fang:
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications. IEEE Access 6: 2908-2921 (2018) - [j51]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [j50]Xi Zhang, Siyu Qu, Jieyun Huang, Binxing Fang, Philip S. Yu:
Stock Market Prediction via Multi-Source Multiple Instance Learning. IEEE Access 6: 50720-50728 (2018) - [j49]Jirui Li, Xiaoyong Li, Yunquan Gao, Jie Yuan, Binxing Fang:
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things. IEEE Access 6: 74579-74597 (2018) - [j48]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. Future Gener. Comput. Syst. 88: 209-219 (2018) - [j47]Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:
Exploiting investors social network for stock prediction in China's market. J. Comput. Sci. 28: 294-303 (2018) - [j46]Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:
Improving stock market prediction via heterogeneous information fusion. Knowl. Based Syst. 143: 236-247 (2018) - [j45]Lihua Yin, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. Secur. Commun. Networks 2018: 7412627:1-7412627:13 (2018) - [j44]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du:
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach. Soft Comput. 22(23): 7977-7987 (2018) - [c141]Liyan Shen, Xiaojun Chen, Dakui Wang, Binxing Fang, Ye Dong:
Efficient and Private Set Intersection of Human Genomes. BIBM 2018: 761-764 - [c140]Zhongyue Pei, Xi Zhang, Fangwei Zhang, Binxing Fang:
Attributed Multi-layer Network Embedding. IEEE BigData 2018: 3701-3710 - [c139]Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:
Topic Analysis Model for Online Social Network. DSC 2018: 39-44 - [c138]Yan Jia, Qiang Liu, Binxing Fang, Bin Zhou, Lu Deng, Yong Quan:
Virtual Community Detection Model and Related Research in Online Social Networks. DSC 2018: 61-68 - [c137]Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui:
SLBot: A Serverless Botnet Based on Service Flux. DSC 2018: 181-188 - [c136]Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. DSC 2018: 242-249 - [c135]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
Predicting the Popularity of Online Content Based on the Weak Ties Theory. DSC 2018: 386-391 - [c134]Shang Li, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. DSC 2018: 392-397 - [c133]Pin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. DSC 2018: 659-664 - [c132]Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
Evaluation on Availability of Entity Information in Cyberspace. DSC 2018: 811-818 - [c131]Fangfang Yuan, Yanan Cao, Yanmin Shang, Yanbing Liu, Jianlong Tan, Binxing Fang:
Insider Threat Detection with Deep Neural Network. ICCS (1) 2018: 43-54 - [c130]Pin Lv, Jing Ya, Tingwen Liu, Jinqiao Shi, Binxing Fang, Zhaojun Gu:
You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse. ICCS (1) 2018: 221-233 - [c129]Yanwei Sun, Lihua Yin, Zhen Wang, Yunchuan Guo, Binxing Fang:
Identifying the Propagation Sources of Stealth Worms. ICCS (3) 2018: 811-817 - [c128]Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang:
Hashing Incomplete and Unordered Network Streams. IFIP Int. Conf. Digital Forensics 2018: 199-224 - [c127]Chao Zheng, Qiuwen Lu, Jia Li, Qinyun Liu, Binxing Fang:
A flexible and efficient container-based NFV platform for middlebox networking. SAC 2018: 989-995 - [c126]Yan Jia, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu, Lu Deng:
Individual Analysis Model and Related Research in Social Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1837-1843 - [i8]Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:
Improving Stock Market Prediction via Heterogeneous Information Fusion. CoRR abs/1801.00588 (2018) - [i7]Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:
Exploiting Investors Social Network for Stock Prediction in China's Market. CoRR abs/1801.00597 (2018) - [i6]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. CoRR abs/1804.01633 (2018) - [i5]Xi Zhang, Yixuan Li, Senzhang Wang, Binxing Fang, Philip S. Yu:
Enhancing Stock Market Prediction with Extended Coupled Hidden Markov Model over Multi-Sourced Data. CoRR abs/1809.00306 (2018) - [i4]Jinyu Shi, Zhongru Wang, Qiang Ruan, Yue Wu, Binxing Fang:
Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method. CoRR abs/1811.10857 (2018) - [i3]Yu Han, Zhongru Wang, Qiang Ruan, Binxing Fang:
Sapiens Chain: A Blockchain-based Cybersecurity Framework. CoRR abs/1811.10868 (2018) - 2017
- [j43]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
Succinct and practical greedy embedding for geometric routing. Comput. Commun. 114: 51-61 (2017) - [j42]Qiu Tang, Lei Jiang, Qiong Dai, Majing Su, Hongtao Xie, Binxing Fang:
RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j41]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Zhikai Xu:
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach. IEICE Trans. Inf. Syst. 100-D(10): 2307-2318 (2017) - [j40]Binxing Fang, Yan Jia, Xiaoyong Li, Aiping Li, Xindong Wu:
Big Search in Cyberspace. IEEE Trans. Knowl. Data Eng. 29(9): 1793-1805 (2017) - [c125]Yuan Su, Xi Zhang, Sihong Xie, Philip S. Yu, Binxing Fang:
Efficient Revenue Maximization for Viral Marketing in Social Networks. ADMA 2017: 209-224 - [c124]Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
A Survey on Data Cleaning Methods in Cyberspace. DSC 2017: 74-81 - [c123]Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:
Predicting the Popularity of News Based on Competitive Matrix. DSC 2017: 151-155 - [c122]Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017: 1-6 - [c121]Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li, Binxing Fang:
Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ICA3PP 2017: 313-327 - [c120]Shang Li, Zhigang Zhou, Hongli Zhang, Binxing Fang:
An approximate search framework for big data. ICC 2017: 1-6 - [c119]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang:
A closer look at Eclipse attacks against Tor hidden services. ICC 2017: 1-6 - [c118]Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang:
A Cloud Access Security Broker based approach for encrypted data search and sharing. ICNC 2017: 422-426 - [c117]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. SecureComm 2017: 530-549 - [c116]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
SafeBox: A scheme for searching and sharing encrypted data in cloud applications. SPAC 2017: 648-653 - [i2]Xi Zhang, Yuan Su, Siyu Qu, Sihong Xie, Binxing Fang, Philip S. Yu:
IAD: Interaction-Aware Diffusion Framework in Social Networks. CoRR abs/1709.01773 (2017) - 2016
- [j39]Yuan Su, Xi Zhang, Lixin Liu, Shouyou Song, Binxing Fang:
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective. Frontiers Comput. Sci. 10(3): 518-531 (2016) - [j38]Shen Su, Binxing Fang:
Towards Route Dynamics in AS-Level Path Prediction. IEICE Trans. Commun. 99-B(2): 412-421 (2016) - [j37]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
SNGR: Scalable Name-Based Geometric Routing for ICN. IEICE Trans. Commun. 99-B(8): 1835-1845 (2016) - [j36]Xi Yin, Binxing Fang, Shuyuan Jin, Meikang Qiu, Athanasios V. Vasilakos, Yongjun Xu:
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G. Int. J. Commun. Syst. 29(16): 2375-2387 (2016) - [j35]Peiyi Han, Chuanyi Liu, Binxing Fang, Guofeng Wang, Xiaobao Song, Lei Wan:
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective. Sci. Program. 2016: 8057208:1-8057208:9 (2016) - [c115]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Shen Su:
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI. ICC 2016: 1-6 - [c114]Yuan Su, Xi Zhang, Philip S. Yu, Wen Hua, Xiaofang Zhou, Binxing Fang:
Understanding Information Diffusion under Interactions. IJCAI 2016: 3875-3881 - [c113]Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. MILCOM 2016: 1004-1009 - [c112]Jiali Dong, Xiaoyong Li, Binxing Fang:
A Recommendation System Based on Multi-attribute. ICSS 2016: 165-169 - [c111]Jiali Dong, Xiaoyong Li, Binxing Fang:
Community-Based Recommendations: A Solution to the Vulnerability Problem. SKG 2016: 150-153 - 2015
- [c110]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Xiaojiang Du:
Geometric Routing on Flat Names for ICN. GLOBECOM 2015: 1-6 - [c109]Qingfeng Tan, Jinqiao Shi, Binxing Fang, Wentao Zhang, Xuebin Wang:
StegoP2P: Oblivious user-driven unobservable communications. ICC 2015: 7126-7131 - [c108]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi:
An ICN-Oriented Name-Based Routing Scheme. ICYCSEE 2015: 101-108 - [c107]Peng Wang, Chuan Zhou, Peng Zhang, Weiwei Feng, Li Guo, Binxing Fang:
Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data. PAKDD (2) 2015: 79-91 - 2014
- [j34]Chenye Qiu, Chunlu Wang, Binxing Fang, Xingquan Zuo:
A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis. Appl. Artif. Intell. 28(6): 555-576 (2014) - [j33]Yi Han, Binxing Fang, Yan Jia:
Predicting the topic influence trends in social media with multiple models. Neurocomputing 144: 463-470 (2014) - [j32]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Liu Yan:
Designing robust routing protocols to protect base stations in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(17): 1613-1626 (2014) - [c106]Zhi Qiao, Peng Zhang, Yanan Cao, Chuan Zhou, Li Guo, Binxing Fang:
Combining Heterogenous Social and Geographical Information for Event Recommendation. AAAI 2014: 145-151 - [c105]Licai Liu, Bingxing Fang, Beiting Yi:
A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things. APWeb Workshophs 2014: 312-324 - [c104]Jie Lin, Chuanyi Liu, Zhichun Ning, Binxing Fang:
Detecting the run time attacks in the cloud with an evidence collection based approach. CCIS 2014: 514-518 - [c103]Jie Lin, Chuanyi Liu, Binxing Fang:
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. CCS 2014: 1466-1468 - [c102]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
EAC: A Framework of Authentication Property for the IOTs. CyberC 2014: 102-105 - [c101]Shen Su, Hongli Zhang, Binxing Fang, Lin Ye:
Quantifying AS-level routing policy changes. ICC 2014: 1148-1153 - [c100]Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang:
Utility-based cooperative decision in cooperative authentication. INFOCOM 2014: 1006-1014 - [c99]Lei Jiang, Qiong Dai, Qiu Tang, Jianlong Tan, Binxing Fang:
A fast regular expression matching engine for NIDS applying prediction scheme. ISCC 2014: 1-7 - [c98]Jinqiao Shi, Xiao Wang, Binxing Fang, Li Guo:
A Moving Target Framework to Improve Network Service Accessibility. NAS 2014: 281-286 - [c97]Peng Wang, Peng Zhang, Yanan Cao, Li Guo, Binxing Fang:
Forward Classification on Data Streams. PAKDD (1) 2014: 261-272 - [c96]Shen Su, Beichuan Zhang, Binxing Fang:
Online Detection of Concurrent Prefix Hijacks. SecureComm (2) 2014: 69-83 - [c95]Jinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan, Li Guo:
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy. SecureComm (1) 2014: 535-540 - [c94]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
Bargaining-Based Dynamic Decision for Cooperative Authentication in MANETs. TrustCom 2014: 212-220 - 2013
- [j31]Chuanyi Liu, Jie Lin, Binxing Fang:
T-YUN: Trustworthiness Verification and Audit on the Cloud Providers. IEICE Trans. Inf. Syst. 96-D(11): 2344-2353 (2013) - [j30]Yu Cui, Zhihong Tian, Binxing Fang, Hongli Zhang, Weizhe Zhang:
Data Spoofing Attacks by IPv6 Tunnels. IEICE Trans. Commun. 96-B(11): 2875-2882 (2013) - [j29]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani:
A Measurement Study on the Topologies of BitTorrent Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 338-347 (2013) - [c93]Xiao Wang, Jinqiao Shi, Binxing Fang, Li Guo:
An empirical analysis of family in the Tor network. ICC 2013: 1995-2000 - [c92]Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. SecureComm 2013: 53-68 - 2012
- [j28]Yibao Bao, Lihua Yin, Binxing Fang, Li Guo:
A novel logic-based automatic approach to constructing compliant security policies. Sci. China Inf. Sci. 55(1): 149-164 (2012) - [j27]Haining Yu, Hongli Zhang, Binxing Fang, Xiang-Zhan Yu:
A Large Scale Code Resolution Service Network in the Internet of Things. Sensors 12(11): 15206-15243 (2012) - [j26]Juan Chen, Xiaojiang Du, Binxing Fang:
An efficient anonymous communication protocol for wireless sensor networks. Wirel. Commun. Mob. Comput. 12(14): 1302-1312 (2012) - [c91]Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang:
A Prefiltering Approach to Regular Expression Matching for Network Security Systems. ACNS 2012: 363-380 - [c90]Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen:
A content delivery strategy based on resource popularity for P4P architecture. CCIS 2012: 559-562 - [c89]Haining Yu, Binxing Fang, Xiang-Zhan Yu, Juan Chen:
Semantic surface representation of physical entity in the WEB of things. CCIS 2012: 1032-1036 - [c88]Xiang Cui, Binxing Fang, Peng Liao, Chaoge Liu:
Advanced triple-channel botnets: model and implementation. CCS 2012: 1019-1021 - [c87]Majing Su, Hongli Zhang, Binxing Fang, Ning Yan:
A measurement. CyberC 2012: 512-518 - [c86]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani:
Understanding the topologies of BitTorrent networks: A measurement view. GLOBECOM 2012: 1994-1999 - [c85]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Haining Yu, Xiang-Zhan Yu:
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks. GLOBECOM 2012: 5356-5361 - [c84]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Yan Liu, Haining Yu:
Base station location protection in wireless sensor networks: Attacks and defense. ICC 2012: 554-559 - [c83]Majing Su, Hongli Zhang, Binxing Fang, Xiaojiang Du:
DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense. ICC 2012: 1048-1052 - [c82]Qiao Li, Hui He, Binxing Fang, Hongli Zhang:
A Novel Cache Replacement Policy for ISP Merged CDN. ICPADS 2012: 708-709 - [c81]Jinyu Wu, Lihua Yin, Binxing Fang:
A Novel Dynamic Self-adaptive Framework for Network Security Evaluation. ISCTCS 2012: 604-612 - [c80]Yong Zhao, Zhibin Zhang, Ting He, Alex X. Liu, Li Guo, Binxing Fang:
A Task-Based Model for the Lifespan of Peer-to-Peer Swarms. Networking (2) 2012: 71-83 - [c79]Jinyu Wu, Lihua Yin, Binxing Fang:
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). RAID 2012: 378-379 - [c78]Tingwen Liu, Yong Sun, Li Guo, Binxing Fang:
SDFA: Series DFA for Memory-Efficient Regular Expression Matching. CIAA 2012: 337-344 - 2011
- [j25]Yu Zhang, Binxing Fang, Yongzheng Zhang:
Parallelizing weighted frequency counting in high-speed network monitoring. Comput. Commun. 34(4): 536-547 (2011) - [j24]Kaipeng Liu, Binxing Fang, Weizhe Zhang:
Exploring Social Relations for Personalized Tag Recommendation in Social Tagging Systems. IEICE Trans. Inf. Syst. 94-D(3): 542-551 (2011) - [j23]Kefu Xu, Jianlong Tan, Li Guo, Binxing Fang:
Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection. J. Networks 6(5): 799-806 (2011) - [c77]Yong Zhao, Zhibin Zhang, Yipeng Wang, Li Guo, Binxing Fang:
Performance evaluation of Xunlei peer-to-peer network: A measurement study. CCNC 2011: 257-261 - [c76]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiang-Zhan Yu:
Towards Efficient Anonymous Communications in Sensor Networks. GLOBECOM 2011: 1-5 - [c75]Yong Zhao, Zhibin Zhang, Li Guo, Binxing Fang:
Revisiting the swarm evolution: A long term perspective. ISCC 2011: 1062-1067 - [c74]Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - [c73]Yong Zhao, Zhibin Zhang, Li Guo, Binxing Fang:
XunleiProbe: A Sensitive and Accurate Probing on a Large-Scale P2SP System. PDCAT 2011: 62-67 - [c72]Tingwen Liu, Yong Sun, Li Guo, Binxing Fang:
Improving matching performance of DPI traffic classifier. SAC 2011: 514-519 - [c71]Chenye Qiu, Chunlu Wang, Xingquan Zuo, Binxing Fang:
A Bayesian regularized neural network approach to short-term traffic speed prediction. SMC 2011: 2215-2220 - 2010
- [j22]Binxing Fang, Yunchuan Guo, Yuan Zhou:
Information content security on the Internet: the control model and its evaluation. Sci. China Inf. Sci. 53(1): 30-49 (2010) - [j21]Yu Zhang, Binxing Fang, Yongzheng Zhang:
Identifying heavy hitters in high-speed network monitoring. Sci. China Inf. Sci. 53(3): 659-676 (2010) - [j20]Yu Zhang, Binxing Fang, Hao Luo:
Identifying High-Rate Flows Based on Sequential Sampling. IEICE Trans. Inf. Syst. 93-D(5): 1162-1174 (2010) - [j19]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Efficient Distributed Web Crawling Utilizing Internet Resources. IEICE Trans. Inf. Syst. 93-D(10): 2747-2762 (2010) - [j18]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Exploring Web Partition in DHT-Based Distributed Web Crawling. IEICE Trans. Inf. Syst. 93-D(11): 2907-2921 (2010) - [j17]Lihua Yin, Binxing Fang, Yunchuan Guo, Hui He:
Formalization and Quantitative Analysis of Controllability on Internet Information Security. Int. J. Web Appl. 2(2): 109-120 (2010) - [j16]Kaipeng Liu, Binxing Fang, Weizhe Zhang:
Incorporating Relevance and Importance for Dynamic Ranking in Folksonomies. J. Convergence Inf. Technol. 5(8): 100-112 (2010) - [j15]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs. J. Comput. 5(11): 1646-1654 (2010) - [j14]Kaipeng Liu, Binxing Fang, Weizhe Zhang:
Unsupervised Tag Sense Disambiguation in Folksonomies. J. Comput. 5(11): 1715-1722 (2010) - [c70]Yunchuan Guo, Lihua Yin, Yuan Zhou, Binxing Fang:
Quantifying Information Leakage for Fully Probabilistic Systems. CIT 2010: 589-595 - [c69]Kaipeng Liu, Binxing Fang, Weizhe Zhang:
Ontology emergence from folksonomies. CIKM 2010: 1109-1118 - [c68]Wei-ling Chang, Binxing Fang, Xiao-chun Yun, Shupeng Wang, Xiang-Zhan Yu:
A Pseudo-Random Number Generator Based on LZSS. DCC 2010: 524 - [c67]Kaipeng Liu, Binxing Fang, Weizhe Zhang:
Speak the same language with your friends: augmenting tag recommenders with social relations. HT 2010: 45-50 - [c66]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System. NPC 2010: 91-105 - [i1]Wei-ling Chang, Binxing Fang, Xiao-chun Yun, Shupeng Wang, Xiang-Zhan Yu:
Randomness Testing of Compressed Data. CoRR abs/1001.3485 (2010)
2000 – 2009
- 2009
- [j13]Weimin Zheng, Binxing Fang:
Structure-independent disaster recovery: Concept, architecture and implementations. Sci. China Ser. F Inf. Sci. 52(5): 813-823 (2009) - [j12]Shuzhuang Zhang, Hao Luo, Binxing Fang, Xiao-chun Yun:
Fast and Memory-Efficient Regular Expression Matching Using Transition Sharing. IEICE Trans. Inf. Syst. 92-D(10): 1953-1960 (2009) - [c65]Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang:
The Block LZSS Compression Algorithm. DCC 2009: 439 - [c64]Yu Wang, Binxing Fang, Yan Guo:
Combining Similarity and Distribution Features to Match Attributes. Web Intelligence/IAT Workshops 2009: 299-302 - [c63]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang, Xinran Liu:
A Forwarding-Based Task Scheduling Algorithm for Distributed Web Crawling over DHTs. ICPADS 2009: 854-859 - [c62]Yu Zhang, Binxing Fang:
A Novel Approach to Scan Detection on the Backbone. ITNG 2009: 16-21 - [c61]Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
Optimal Network Security Strengthening Using Attack-Defense Game Model. ITNG 2009: 475-480 - [c60]Yu Jiang, Jian Ren, Yuhong Zhao, Binxing Fang:
Using Mixed and Hybrid TCP Probe Methods in Forward IP Paths Inference. PDCAT 2009: 175-179 - [c59]Yang Li, Li Guo, Binxing Fang, Xiangtao Liu, Lin Qi:
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection. RAID 2009: 346-347 - 2008
- [j11]Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu:
An Effective Anomaly Detection Method in SMTP Traffic. Int. J. Netw. Secur. 6(3): 321-330 (2008) - [c58]Yu Zhang, Binxing Fang, Hongli Zhang:
On Destination Set in IP-Level Topology Measurement. ICN 2008: 168-173 - [c57]Yuanzhe Yao, Binxing Fang, Xinran Liu, Hong Zhang:
Autonomic Grid Node Organization and Management in RNMS. ICYCS 2008: 223-228 - [c56]Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. ISCC 2008: 332-339 - [c55]Jian-Wei Ye, Binxing Fang, Jinqiao Shi, Zhi-Gang Wu:
Protecting Mobile Codes Using the Decentralized Label Model. WAIM 2008: 493-500 - [c54]Shuzhuang Zhang, Binxing Fang, Hao Luo:
A Scalable Framework of Network Traffic Identification. WAIM 2008: 508-511 - [c53]Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li:
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. WAIM 2008: 558-563 - [c52]Yu Wang, Binxing Fang, Xueqi Cheng, Li Guo, Hongbo Xu:
Incremental web page template detection. WWW 2008: 1247-1248 - 2007
- [j10]Ping Wang, Binxing Fang, Xiao-chun Yun, Jun Zheng:
A User-Habit Property: Haunting of Users in IP Networks. IEICE Trans. Inf. Syst. 90-D(1): 371-373 (2007) - [j9]Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng:
Towards an analysis of WonGoo performance. Int. J. Pervasive Comput. Commun. 3(2): 159-174 (2007) - [j8]Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng:
How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007) - [c51]Yang Li, Binxing Fang, Li Guo, You Chen:
Network anomaly detection based on TCM-KNN algorithm. AsiaCCS 2007: 13-19 - [c50]Yu Jiang, Ni Zhang, Binxing Fang:
An Email Geographic Path-Based Technique for Spam Filtering. CIS 2007: 750-753 - [c49]Yang Li, Binxing Fang:
A Lightweight Online Network Anomaly Detection Scheme Based on Data Mining Methods. ICNP 2007: 340-341 - [c48]Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen:
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach. IPCCC 2007: 348-355 - [c47]Zhibin Zhang, Yanjun Zhang, Li Guo, Binxing Fang:
LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems. ISCC 2007: 87-93 - [c46]Yang Li, Binxing Fang, Li Guo:
A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme. ISNN (1) 2007: 1286-1292 - [c45]Yang Li, Binxing Fang, Li Guo, You Chen:
TCM-KNN Algorithm for Supervised Network Intrusion Detection. PAISI 2007: 141-151 - 2006
- [j7]Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao:
Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments. Sci. China Ser. F Inf. Sci. 49(6): 906-926 (2006) - [j6]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
A parallel programming interface for out-of-core cluster applications. Clust. Comput. 9(3): 321-327 (2006) - [j5]Jinqiao Shi, Binxing Fang, Li-Jie Shao:
n-1) attack.">Regroup-And-Go mixes to counter the (n-1) attack. Internet Res. 16(2): 213-223 (2006) - [c44]Tingting Chen, Yi Wang, Binxing Fang, Jun Zheng:
Detecting Lasting and Abrupt Bursts in Data Streams Using Two-Layered Wavelet Tree. AICT/ICIW 2006: 30 - [c43]Hongjie Sun, Binxing Fang, Hongli Zhang:
User-Perceived Web QoS Measurement and Evaluation System. APWeb 2006: 157-165 - [c42]Lihua Yin, Binxing Fang, Xiang-Zhan Yu:
Distributed Group Membership Algorithm in Intrusion-Tolerant System. APWeb Workshops 2006: 511-515 - [c41]Wei Wang, Binxing Fang:
Grid Service Based Parallel Debugging Environment. APWeb Workshops 2006: 971-978 - [c40]Xiangwen Liao, Binxing Fang, Weihua Luo, Bin Wang:
Experimental Performance Study of a User Intensive and Large-scale Digital Library Framework. DIAL 2006: 332-339 - [c39]Ni Zhang, Yu Jiang, Binxing Fang, Xueqi Cheng, Li Guo:
Traffic classification-based spam filter. ICC 2006: 2130-2135 - [c38]Ping Wang, Binxing Fang, Xiao-chun Yun:
A User Habit Based Approach to Detect and Quarantine Worms. ICC 2006: 2148-2152 - [c37]Yang Li, Binxing Fang, Li Guo, Shen Wang:
Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach. ICNS 2006: 86 - [c36]Ni Zhang, Yu Jiang, Binxing Fang, Li Guo, Xueqi Cheng:
A traffic-classified technique for filtering spam from bulk delivery E-mails. IPCCC 2006 - [c35]Chen Bo, Binxing Fang, Xiao-chun Yun:
Adaptive Method for Monitoring Network and Early Detection of Internet Worms. ISI 2006: 178-189 - [c34]Hao Luo, Binxing Fang, Xiao-chun Yun:
A Counting-Based Method for Massive Spam Mail Classification. ISPEC 2006: 45-56 - [c33]Ping Wang, Binxing Fang, Xiao-chun Yun:
Model and Estimation of Worm Propagation Under Network Partition. ISPEC 2006: 57-66 - [c32]Hao Luo, Binxing Fang, Xiao-chun Yun:
Anomaly Detection in SMTP Traffic. ITNG 2006: 408-413 - [c31]Yang Li, Binxing Fang, Li Guo:
TTSF: A Novel Two-Tier Spam Filter. PDCAT 2006: 503-508 - 2005
- [j4]Xiuguo Bao, Binxing Fang, Mingzeng Hu, Binbin Xu:
Heterogeneous Search in Unstructured Peer-to-Peer Networks. IEEE Distributed Syst. Online 6(2) (2005) - [j3]Yu Jiang, Binxing Fang, Ming-Zeng Hu, Xiang Cui:
Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement. J. Comput. Sci. Technol. 20(5): 689-701 (2005) - [j2]Longtao He, Binxing Fang, Jie Sui:
The wide window string matching algorithm. Theor. Comput. Sci. 332(1-3): 391-404 (2005) - [c30]Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng:
Performance Analysis ofWonGoo System. CIT 2005: 716-723 - [c29]Xunxun Chen, Binxing Fang, Lei Li, Yu Jiang:
WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm. APPT 2005: 515-523 - [c28]Ping Wang, Binxing Fang, Xiao-chun Yun:
A New User-Habit Based Approach for Early Warning of Worms. CIS (2) 2005: 212-219 - [c27]Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph. CIS (2) 2005: 415-420 - [c26]Bailing Wang, Binxing Fang, Xiao-chun Yun:
A Worm Behavioral Approach to Susceptible Host Detection. GCC 2005: 77-83 - [c25]A-Ning Du, Binxing Fang, Bin Li:
A Biased Support Vector Machine Approach to Web Filtering. ICAPR (1) 2005: 363-370 - [c24]Tianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo:
Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. ICCNMC 2005: 853-862 - [c23]Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo:
Building Scale-Free Overlay Mix Networks with Small-World Properties. ICITA (2) 2005: 529-534 - [c22]Ping Wang, Binxing Fang, Xiao-chun Yun:
A New Approach to Automatically Detect Worms. PDCAT 2005: 259-263 - [c21]Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen:
Worm Detection in Large Scale Network by Traffic. PDCAT 2005: 270-273 - [c20]Hongjie Sun, Binxing Fang, Hongli Zhang:
A Distributed Architecture for Network Performance Measurement and Evaluation System. PDCAT 2005: 471-475 - [c19]Xiaofeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang:
A Model for Estimating the Performance of Synchronous Parallel Network Simulation. IASTED PDCS 2005: 548-553 - [c18]Ni Zhang, Binxing Fang, Li Guo:
Techniques of IP Data Management in Network Address Resource platform. PDPTA 2005: 540-545 - 2004
- [j1]Wu Yang, Binxing Fang, Bo Liu, Hongli Zhang:
Intrusion detection system for high-speed network. Comput. Commun. 27(13): 1288-1294 (2004) - [c17]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
Developing a user-level middleware for out-of-core computation on Grids. CCGRID 2004: 686-690 - [c16]Wei Wang, Binxing Fang, Hongli Zhang, Yuanzhe Yao:
Ad Hoc Debugging Environment for Grid Applications. GCC 2004: 113-120 - [c15]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang:
Measurement and Modeling of Large-Scale Peer-to-Peer Storage System. GCC Workshops 2004: 270-277 - [c14]Xiuguo Bao, Binxing Fang, Mingzeng Hu:
Cocktail Search in Unstructured P2P Networks. GCC Workshops 2004: 286-293 - [c13]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang:
Network Performance Measurement Methodologies in PGMS. GCC Workshops 2004: 466-473 - [c12]Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang:
Anomaly Detection Using Fast SOFM. GCC Workshops 2004: 530-537 - [c11]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang:
PGMS: A P2P-Based Grid Monitoring System. GCC 2004: 903-906 - [c10]Weizhe Zhang, Binxing Fang, Hui He, Hongli Zhang, Mingzeng Hu:
Multisite Resource Selection and Scheduling Algorithm on Computational Grid. IPDPS 2004 - [c9]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
The Practice of I/O Optimizations for Out-of-Core Computation. PDCAT 2004: 81-85 - [c8]Yu Jiang, Binxing Fang, Mingzeng Hu:
Techniques in Mapping Router-Level Internet Topology from Multiple Vantage Points. PDCAT 2004: 410-415 - [c7]Jinqiao Shi, Binxing Fang, Bin Li:
Towards an Analysis of Source-Rewriting Anonymous Systems in a Lossy Environment. PDCAT 2004: 613-618 - [c6]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang:
Explaining BitTorrent Traffic Self-Similarity. PDCAT 2004: 839-843 - [c5]Wei Wang, Binxing Fang, Hongli Zhang:
Grid-Enabled Parallel Debugging Environment: A Portal Solution. PDPTA 2004: 856-862 - [c4]Tianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng:
WonGoo: A Peer-to-Peer Protocol for Anonymous Communication. PDPTA 2004: 1102-1106 - [c3]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
A parallel out-of-core computing system using PVFS for Linux clusters. SNAPI@PACT 2004: 33-39 - [c2]Longtao He, Binxing Fang:
Linear Nondeterministic Dawg String Matching Algorithm. SPIRE 2004: 70-71 - [c1]Zhihong Tian, Binxing Fang, Xiao-chun Yun:
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. Web Intelligence 2004: 24-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint