Zhiping Cai(蔡志平)
TitleCited byYear
Extreme learning machines [trends & controversies]
E Cambria, GB Huang, LLC Kasun, H Zhou, CM Vong, J Lin, J Yin, Z Cai, ...
IEEE intelligent systems 28 (6), 30-59, 2013
2952013
Virtual network embedding for evolving networks
Z Cai, F Liu, N Xiao, Q Liu, Z Wang
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1242010
Flow level detection and filtering of low-rate DDoS
C Zhang, Z Cai, W Chen, X Luo, J Yin
Computer Networks 56 (15), 3417-3431, 2012
922012
RRED: robust RED algorithm to counter low-rate denial-of-service attacks
C Zhang, J Yin, Z Cai, W Chen
IEEE Communications Letters 14 (5), 489-491, 2010
842010
A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering
Z Cai, Z Wang, K Zheng, J Cao
IEEE Transactions on Computers 62 (3), 417-427, 2011
542011
Securing display path for security-sensitive applications on mobile devices
J Cui, Y Zhang, Z Cai, A Liu, Y Li
Computers, Materials and Continua 55 (1), 17, 2018
502018
A RSSI-based self-localization algorithm for wireless sensor networks
W Shanshan, Y Jianping, C Zhiping, Z Guomin
Journal of Computer Research and Development 45 (1), 385-388, 2008
49*2008
A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities
H Teng, Y Liu, A Liu, NN Xiong, Z Cai, T Wang, X Liu
Future Generation Computer Systems 94, 351-367, 2019
412019
Counter tree: A scalable counter architecture for per-flow traffic measurement
M Chen, S Chen, Z Cai
IEEE/ACM Transactions on Networking (TON) 25 (2), 1249-1262, 2017
392017
Applying a new localized generalization error model to design neural networks trained with extreme learning machine
Q Liu, J Yin, VCM Leung, JH Zhai, Z Cai, J Lin
Neural Computing and Applications 27 (1), 59-66, 2016
362016
Security and privacy in the medical internet of things: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Security and Communication Networks 2018, 2018
342018
Multicast service-oriented virtual network embedding in wireless mesh networks
P Lv, Z Cai, J Xu, M Xu
IEEE Communications Letters 16 (3), 375-377, 2012
332012
A survey on security-aware measurement in SDN
H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang
Security and Communication Networks 2018, 2018
312018
网络工程专业课程体系研究与实践
徐明, 曹介南, 姚丹霖, 蔡开裕, 蔡志平
计算机教育 19, 115-118, 2009
312009
Security-aware virtual network embedding
S Liu, Z Cai, H Xu, M Xu
2014 IEEE International Conference on Communications (ICC), 834-840, 2014
292014
Feature selection method based on class discriminative degree for intelligent medical diagnosis
S Fang, Z Cai, W Sun, A Liu, F Liu, Z Liang, G Wang
Comput., Mater. Continua 55 (3), 419-433, 2018
272018
FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs
Q Liu, J Yin, VCM Leung, Z Cai
IEEE Transactions on Wireless Communications 12 (10), 5124-5137, 2013
272013
A secure and practical mechanism of outsourcing extreme learning machine in cloud computing
J Lin, J Yin, Z Cai, Q Liu, K Li, V Leung
IEEE Intelligent Systems 28 (6), 35-38, 2013
252013
虚拟网络映射模型及其优化算法
蔡志平, 刘强, 吕品, 肖侬, 王志英
软件学报 23 (004), 864-877, 2012
252012
DDoS attack detection algorithm using IP address features
J Cheng, J Yin, Y Liu, Z Cai, M Li
International Workshop on Frontiers in Algorithmics, 207-215, 2009
252009
The system can't perform the operation now. Try again later.
Articles 1–20