Wanlei Zhou
Wanlei Zhou
Professor and Head of School of Computer Science in University of Technology Sydney
Verified email at uts.edu.au - Homepage
Title
Cited by
Cited by
Year
Teaching and learning online with wikis
N Augar, R Raitman, W Zhou
Beyond the comfort zone: proceedings of the 21st ASCILITE Conference, Perth …, 2004
5622004
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Y Yu, K Li, W Zhou, P Li
Journal of Network and computer Applications 35 (3), 867-880, 2012
3692012
Low-rate DDoS attacks detection and traceback by using new information metrics
Y Xiang, K Li, W Zhou
IEEE transactions on information forensics and security 6 (2), 426-437, 2011
3142011
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
Parallel and Distributed Systems, IEEE Transactions on 24 (1), 104-117, 2013
2852013
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
A Chonka, Y Xiang, W Zhou, A Bonti
Journal of Network and Computer Applications 34 (4), 1097-1107, 2011
2682011
Discriminating DDoS attacks from flash crowds using flow correlation coefficient
S Yu, W Zhou, W Jia, S Guo, Y Xiang, F Tang
IEEE transactions on parallel and distributed systems 23 (6), 1073-1080, 2012
2282012
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
2102014
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
Y Xiang, W Zhou, M Guo
IEEE Transactions on Parallel and Distributed systems 20 (4), 567-580, 2008
2052008
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
IEEE transactions on parallel and distributed systems 22 (3), 412-425, 2010
2012010
Employing wikis for online collaboration in the e-learning environment: Case study
R Raitman, N Augar, W Zhou
Third International Conference on Information Technology and Applications …, 2005
1882005
Stochastic assembly leads to alternative communities with distinct functions in a bioreactor microbial community
J Zhou, W Liu, Y Deng, YH Jiang, K Xue, Z He, JD Van Nostrand, L Wu, ...
MBio 4 (2), 2013
1452013
Internet traffic classification by aggregating correlated naive bayes predictions
J Zhang, C Chen, Y Xiang, W Zhou
Information Forensics and Security, IEEE Transactions on 8 (1), 5-15, 2013
1442013
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
1352013
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
1132016
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1122014
Differentially private data publishing and analysis: A survey
T Zhu, G Li, W Zhou, SY Philip
IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017
1092017
Chaos theory based detection against network mimicking DDoS attacks
A Chonka, J Singh, W Zhou
IEEE Communications Letters 13 (9), 717-719, 2009
1072009
Correlated differential privacy: Hiding information in non-IID data set
T Zhu, P Xiong, G Li, W Zhou
IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014
1042014
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
1032014
Modeling propagation dynamics of social network worms
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 24 (8), 1633-1643, 2012
1022012
The system can't perform the operation now. Try again later.
Articles 1–20