Dr. Zhiyuan Tan (谭志远)
TitleCited byYear
A system for denial-of-service attack detection based on multivariate correlation analysis
Z Tan, A Jamdagni, X He, P Nanda, RP Liu
IEEE Transactions on Parallel and Distributed Systems 25 (2), 447 - 456, 2014
1922014
Building an Intrusion Detection System Using a Filter-based Feature Selection Algorithm
MA Ambusaidi, X He, P Nanda, Z Tan
IEEE Transactions on Computers 65 (10), 2986 - 2998, 2016
1792016
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
MA Jan, P Nanda, X He, Z Tan, RP Liu
13th IEEE International Conference on Trust, Security and Privacy in …, 2014
1022014
Repids: A multi tier real-time payload-based intrusion detection system
A Jamdagni, Z Tan, X He, P Nanda, RP Liu
Computer networks 57 (3), 811-824, 2013
802013
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Z Tan, A Jamdagni, X He, P Nanda, RP Liu, J Hu
IEEE Transactions on Computers 64 (9), 2519 - 2533, 2015
752015
Enhancing Big Data Security with Collaborative Intrusion Detection
Z Tan, UT Nagar, X He, P Nanda, RP Liu, S Wang, J Hu
IEEE Cloud Computing, 27-33, 2014
652014
Denial-of-service attack detection based on multivariate correlation analysis
Z Tan, A Jamdagni, X He, P Nanda, RP Liu
International Conference on Neural Information Processing, 756-765, 2011
512011
Improving cloud network security using the Tree-Rule firewall
X He, T Chomsiri, P Nanda, Z Tan
Future generation computer systems 30, 116-126, 2014
492014
Triangle-area-based multivariate correlation analysis for effective denial-of-service attack detection
Z Tan, A Jamdagni, X He, P Nanda, RP Liu
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
422012
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services
S Zhang, X Li, Z Tan, T Peng, G Wang
Future Generation Computer Systems 94, 40-50, 2019
282019
Network intrusion detection based on LDA for payload feature selection
Z Tan, A Jamdagni, X He, P Nanda
2010 IEEE Globecom Workshops, 1545-1549, 2010
272010
Intrusion detection using GSAD model for HTTP traffic on web services
A Jamdagni, Z Tan, P Nanda, X He, RP Liu
The 6th International Wireless Communications and Mobile Computing …, 2010
262010
A Novel Feature Selection Approach for Intrusion Detection Data Classification
MA Ambusaidi, X He, Z Tan, P Nanda, LF Lu, UT Nagar
13th IEEE International Conference on Trust, Security and Privacy in …, 2014
232014
Intrusion detection using geometrical structure
A Jamdagni, Z Tan, P Nanda, X He, RP Liu
Frontier of Computer Science and Technology, 2009. FCST'09. Fourth …, 2009
212009
Security for cyber-physical systems in healthcare
K Saleem, Z Tan, W Buchanan
Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare …, 2017
152017
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait
F Khan, A ur Rehman, M Usman, Z Tan, D Puthal
Mobile Networks and Applications 23 (3), 479–488, 2018
132018
Moving Towards Highly Reliable and Effective Sensor Networks.
MA Jan, Z Tan, X He, W Ni
Ad Hoc & Sensor Wireless Networks 40 (3-4), 163-168, 2018
122018
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning
W Li, W Meng, Z Tan, Y Xiang
13th IEEE International Conference on Trust, Security and Privacy in …, 2014
102014
Building Scalable Cyber-Physical-Social Networking Infrastructure using IoT and Low Power Sensors
RK Lenka, AK Rath, Z Tan, S Sharma, D Puthal, NVR Simha, M Prasad, ...
IEEE Access 6, 30162-30173, 2018
92018
Hybrid Tree-rule Firewall for High Speed Data Transmission
T Chomsiri, X He, P Nanda, Z Tan
IEEE Transactions on Cloud Computing 1, 1, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20