Seguir
Dezhang Kong
Dezhang Kong
Dirección de correo verificada de zju.edu.cn
Título
Citado por
Citado por
Año
Packet-level adversarial network traffic crafting using sequence generative adversarial networks
Q Cheng, S Zhou, Y Shen, D Kong, C Wu
arXiv preprint arXiv:2103.04794, 2021
312021
Machine learning based malicious payload identification in software-defined networking
Q Cheng, C Wu, H Zhou, D Kong, D Zhang, J Xing, W Ruan
Journal of Network and Computer Applications 192, 103186, 2021
262021
TableGuard: A novel security mechanism against flow table overflow attacks in SDN
D Kong, C Wu, Y Shen, X Chen, H Liu, D Zhang
GLOBECOM 2022-2022 IEEE Global Communications Conference, 4167-4172, 2022
132022
Combination attacks and defenses on sdn topology discovery
D Kong, Y Shen, X Chen, Q Cheng, H Liu, D Zhang, X Liu, S Chen, C Wu
IEEE/ACM Transactions on Networking 31 (2), 904-919, 2022
112022
TPDD: A two-phase DDoS detection system in software-defined networking
Y Shen, C Wu, D Kong, M Yang
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
112020
The impact of the collective influence of search engines on social networks
D Kong, C Fu, J Yang, D Xu, L Han
IEEE Access 5, 24920-24930, 2017
112017
AFTM: An adaptive flow table management scheme for OpenFlow switches
Y Shen, C Wu, Q Cheng, D Kong
2020 IEEE 22nd International Conference on High Performance Computing and …, 2020
92020
Flow table saturation attack against dynamic timeout mechanisms in SDN
Y Shen, C Wu, D Kong, Q Cheng
Applied Sciences 13 (12), 7210, 2023
82023
In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks
D Kong, Z Zhou, Y Shen, X Chen, Q Cheng, D Zhang, C Wu
2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS), 1-10, 2023
52023
Escala: Timely elastic scaling of control channels in network measurement
H Liu, X Chen, Q Huang, D Kong, J Sun, D Zhang, H Zhou, C Wu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1848-1857, 2022
52022
Think that attackers think: Using first-order theory of mind in intrusion response system
Q Cheng, C Wu, B Hu, D Kong, B Zhou
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
42019
STEP: spatial-temporal network security event prediction
Q Cheng, Y Shen, D Kong, C Wu
arXiv preprint arXiv:2105.14932, 2021
32021
RDefender: A lightweight and robust defense against flow table overflow attacks in SDN
D Kong, X Chen, C Wu, Y Shen, Z Zhou, Q Cheng, X Liu, M Yang, Y Qiu, ...
IEEE Transactions on Information Forensics and Security, 2024
22024
An advanced flow table saturation attack against dynamic timeouts in sdn
Y Shen, C Wu, D Kong, Q Cheng
Available at SSRN 4129904, 2022
22022
Elastically Scaling Control Channels in Network Measurement With
H Liu, X Chen, Q Huang, D Kong, D Zhang, C Wu, X Liu
IEEE/ACM Transactions on Networking, 2024
2024
Toward Security-Enhanced In-band Network Telemetry in Programmable Networks
D Kong, X Chen, H Lin, Z Zhou, Y Shen, H Liu, Q Cheng, X Liu, D Zhang, ...
IEEE Transactions on Network and Service Management, 2024
2024
Flowtracker: A Refined and Versatile Data Plane Measurement Approach
X Jiang, C Wu, Z Zhou, D Wang, D Kong, X Liu
Muhammad and Liu, Xuan, Flowtracker: A Refined and Versatile Data Plane …, 0
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–17