To filter or to authorize: Network-layer DoS defense against multimillion-node botnets X Liu, X Yang, Y Lu Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 195-206, 2008 | 298 | 2008 |
Passport: Secure and Adoptable Source Authentication. X Liu, A Li, X Yang, D Wetherall Nsdi 8, 365-378, 2008 | 234 | 2008 |
Netfence: preventing internet denial of service from inside out X Liu, X Yang, Y Xia ACM SIGCOMM Computer Communication Review 40 (4), 255-266, 2010 | 162 | 2010 |
BlockCAM: a blockchain-based cross-domain authentication model W Wang, N Hu, X Liu 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 92 | 2018 |
Efficient and Secure Source Authentication with Packet Passports. X Liu, X Yang, D Wetherall, TE Anderson SRUTI 6, 2-2, 2006 | 90 | 2006 |
6Tree: Efficient dynamic discovery of active addresses in the IPv6 address space Z Liu, Y Xiong, X Liu, W Xie, P Zhu Computer Networks 155, 31-46, 2019 | 58 | 2019 |
Bootstrapping accountability in the internet we have A Li, X Liu, X Yang 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 11), 2011 | 37 | 2011 |
Blockzone: A blockchain-based dns storage and retrieval scheme W Wang, N Hu, X Liu International Conference on Artificial Intelligence and Security, 155-166, 2019 | 19 | 2019 |
Internet Protocol Made Accountable. X Yang, X Liu Hotnets, 2009 | 17 | 2009 |
A technical approach to net neutrality X Yang, G Tsudik, X Liu IRVINE IS BURNING, 13, 2006 | 15 | 2006 |
StopIt: Mitigating DoS flooding attacks from multi-million botnets X Liu, X Yang, Y Lu Technical report, UC Irvine, 2008. Technical Report 08-05, 2008 | 12 | 2008 |
Change characteristics of soil available nitrogen and phosphorus and heavy metal contents after long-term cultivation of vegetables. Q Zhi, W Jin-shui, W Wen-xue, Q Hong-ling, Z Yi-jun, L Xin-liang, ... Yingyong Shengtai Xuebao 22 (11), 2011 | 10 | 2011 |
构建多元化反贫困政策: 农村低保与扶贫开发政策的有效衔接 向德平, 刘欣 社会工作与管理 14 (3), 54-61, 2014 | 8 | 2014 |
Influence of different coupling modes on the robustness of smart grid under targeted attack WJ Kang, G Hu, PD Zhu, Q Liu, Z Hang, X Liu Sensors 18 (6), 1699, 2018 | 7 | 2018 |
Internet registry mechanism for preventing prefix hijacks 刘欣, 朱培栋, 彭宇行 Journal of Software 20 (3), 620-629, 2009 | 6 | 2009 |
A novel microbe-drug association prediction model based on graph attention networks and bilayer random forest H Kuang, Z Zhang, B Zeng, X Liu, H Zuo, X Xu, L Wang BMC bioinformatics 25 (1), 78, 2024 | 5 | 2024 |
Cross-layer attack path exploration for smart grid based on knowledge of target network WJ Kang, PD Zhu, G Hu, Z Hang, X Liu International conference on knowledge science, engineering and management …, 2018 | 5 | 2018 |
Security evaluation for interdomain routing system in the Internet X Liu, XQ Wang, PD Zhu, YX Peng J Comput Res Dev 46, 1669-1677, 2009 | 5 | 2009 |
Low Frequency VLBI Project IE Molotov, SF Likhachev, AA Chuprikov, A Dementiev, B Lipatov, ... The Universe at Low Radio Frequencies 199, 492, 2002 | 5 | 2002 |
LAMBERT: Leveraging Attention Mechanisms to Improve the BERT Fine-Tuning Model for Encrypted Traffic Classification T Liu, X Ma, L Liu, X Liu, Y Zhao, N Hu, KZ Ghafoor Mathematics 12 (11), 1624, 2024 | 4 | 2024 |