Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Zhuotao Liu"'
Publikováno v:
Royal Society Open Science, Vol 11, Iss 8 (2024)
Evolutionary theory predicts that the species of an evolutionarily successful taxon would not overlap in spatial distribution. To test the prediction, we document our research on the spatial associations of mustelids, an evolutionarily successful gro
Externí odkaz:
https://doaj.org/article/bc8d8b6227a8410e93660c8c8305d7e9
Publikováno v:
Global Ecology and Conservation, Vol 43, Iss , Pp e02428- (2023)
This paper documents our comparative study on the community environments of giant pandas Ailuropoda melanoleuca between Wolong National Nature Reserve (Wolong NNR), Tangjiahe NNR, and Heizhugou NNR in Sichuan, China using infrared camera data collect
Externí odkaz:
https://doaj.org/article/a010adf7dd6e44dba7fa8053c487111e
Publikováno v:
IEEE Access, Vol 6, Pp 66641-66648 (2018)
Defending against distributed denial of service (DDoS) attacks in the Internet is a fundamental problem. One practical approach to addressing DDoS attacks is to redirect all destination (e.g., via DNS or BGP) to a third-party, DDoS protection-as-a-se
Externí odkaz:
https://doaj.org/article/cab0e617923c47a3a24193c878834e4b
Autor:
Peirui Cao, Shizhen Zhao, Dai Zhang, Zhuotao Liu, Mingwei Xu, Min Yee Teh, Yunzhuo Liu, Xinbing Wang, Chenghu Zhou
Publikováno v:
IEEE/ACM Transactions on Networking. :1-16
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3656-3670
In Website Fingerprinting (WF) attack, a local passive eavesdropper utilizes network flow information to identify which web pages a user is browsing. Previous researchers have demonstrated the effectiveness of WF attacks under a strong Single Page As
Autor:
Jian Shi, Zhuotao Liu, Yih-Chun Hu, Yangxi Xiang, Haoyu Wang, Peng Gao, Bihan Wen, Xusheng Xiao, Qi Li
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2965-2981
Web3.0, often cited to drastically shape our lives, is ubiquitous. However, few literatures have discussed the crucial differentiators that separate Web3.0 from the era we are currently living in. Via a thorough analysis of the recent blockchain infr
Publikováno v:
Proceedings of the ACM Web Conference 2023.
Publikováno v:
IEEE Transactions on Information Forensics and Security. 17:1069-1082
Publikováno v:
IEEE Transactions on Information Forensics and Security. 17:486-499
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 32:2676-2690
Data centers, the critical infrastructure underpinning Cloud computing, often employ Software-Defined Networks (SDN) to manage cluster, wide-area and enterprise networks. As the network forwarding in SDN is dynamically programmed by controllers, it i