default search action
Pei Zhang 0003
Person information
- affiliation: Beijing University of Posts and Telecommunications, Institute of Network Technology, Beijing, China
- affiliation (2012 - 2014): Tsinghua University, National Laboratory for Information Science and Technology, Beijing, China
- affiliation (PhD 2012): Beijing University of Posts and Telecommunications, Beijing, China
- not to be confused with: Pei Zhang 0007
Other persons with the same name
- Pei Zhang — disambiguation page
- Pei Zhang 0001 — University of Michigan, Ann Arbor, MI, USA (and 2 more)
- Pei Zhang 0002 — University of North Carolina at Chapel Hill, Department of Radiology, Chapel Hill, NC, USA (and 1 more)
- Pei Zhang 0004 — Xi'an Jiaotong University, Department of Applied Physics, Xi'an, China
- Pei Zhang 0005 — University of Southampton, UK
- Pei Zhang 0006 — Xi'an Technological University, China
- Pei Zhang 0007 — Beijing University of Posts and Telecommunications, School of Computer Science, Beijing, China
- Pei Zhang 0008 — National University of Defense Technology, School of Computer, Changsha, China
- Pei Zhang 0009 — Iowa State University, Department of Electrical and Computer Engineering, Ames, IA, USA
- Pei Zhang 0010 — Beijing Jiaotong University, Hanergy School of Renewable Power, Beijing, China (and 3 more)
- Pei Zhang 0011 — Alibaba Group Inc., Hangzhou, China
- Pei Zhang 0012 — Beijing University of Technology, Signal & Information Processing Laboratory, Beijing, China
- Pei Zhang 0013 — CSIP research team @ ICube (UMR-CNRS 7357), Strasbourg , France (and 1 more)
- Pei Zhang 0014 — China University of Mining and Technology, School of Information and Control Engineering, Xuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Tianbo Wang, Huacheng Li, Chunhe Xia, Han Zhang, Pei Zhang:
From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation. IEEE Trans. Inf. Forensics Secur. 18: 1610-1624 (2023) - [j11]Pei Zhang, Fangzhou He, Han Zhang, Jiankun Hu, Xiaohong Huang, Jilong Wang, Xia Yin, Huahong Zhu, Yahui Li:
Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN. IEEE Trans. Inf. Forensics Secur. 18: 2076-2090 (2023) - [j10]Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang:
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee. ACM Trans. Internet Techn. 23(1): 12:1-12:22 (2023) - 2022
- [j9]Man Zeng, Xiaohong Huang, Pei Zhang, Dandan Li:
Understanding the impact of outsourcing mitigation against BGP prefix hijacking. Comput. Networks 202: 108650 (2022) - [j8]Gengbiao Shen, Qing Li, Wanxin Shi, Yong Jiang, Pei Zhang, Liang Gu, Mingwei Xu:
Modeling and optimization of the data plane in the SDN-based DCN by queuing theory. J. Netw. Comput. Appl. 207: 103481 (2022) - [c10]Weizhen Dang, Haibo Wang, Shirui Pan, Pei Zhang, Chuan Zhou, Xin Chen, Jilong Wang:
Predicting Human Mobility via Graph Convolutional Dual-attentive Networks. WSDM 2022: 192-200 - [c9]Wanxin Shi, Qing Li, Chao Wang, Longhao Zou, Gengbiao Shen, Pei Zhang, Yong Jiang:
Learning-based Fuzzy Bitrate Matching at the Edge for Adaptive Video Streaming. WWW 2022: 3289-3297 - 2021
- [i1]Man Zeng, Dandan Li, Pei Zhang, Kun Xie, Xiaohong Huang:
Federated Route Leak Detection in Inter-domain Routing with Privacy Guarantee. CoRR abs/2110.07964 (2021) - 2020
- [j7]Shuying Zhuang, Jessie Hui Wang, Pei Zhang, Jilong Wang:
Understanding the latency to visit websites in China: An infrastructure perspective. Comput. Networks 169: 107102 (2020) - [j6]Xiaohong Huang, Sheng Zeng, Dandan Li, Pei Zhang, Shen Yan, Xinyu Wang:
Fair Computation Efficiency Scheduling in NOMA-Aided Mobile Edge Computing. IEEE Wirel. Commun. Lett. 9(11): 1812-1816 (2020)
2010 – 2019
- 2019
- [j5]Pei Zhang, Kun Xie, Caixia Kou, Xiaohong Huang, Aijun Wang, Qiong Sun:
A Practical Traffic Control Scheme With Load Balancing Based on PCE Architecture. IEEE Access 7: 30648-30658 (2019) - [j4]Pei Zhang, YiRou Gang, Xiaohong Huang, Sheng Zeng, Kun Xie:
Bandwidth Allocation With Utility Maximization in the Hybrid Segment Routing Network. IEEE Access 7: 85253-85261 (2019) - [c8]Liying Tao, Dandan Li, Pei Zhang, Xiao Liang:
Probe Recommendation Algorithm for Link Delay Detection. ICAIS (2) 2019: 369-378 - 2018
- [j3]Xiaohong Huang, Dandan Li, Pei Zhang:
Effects of measurement dependence on tilted CHSH Bell tests. Quantum Inf. Process. 17(11): 291 (2018) - [c7]Liying Cheng, Pei Zhang, Yan Ma:
Route leakage detection algorithm based on new feature discovery. ICCIP 2018: 222-226 - 2017
- [j2]Shen Yan, Xiaohong Huang, Maode Ma, Pei Zhang, Yan Ma:
A Novel Efficient Address Mutation Scheme for IPv6 Networks. IEEE Access 5: 7724-7736 (2017) - [c6]Xiaohong Huang, Tingting Yuan, Maode Ma, Pei Zhang:
Utility-Based Network Bandwidth Allocation in the Hybrid SDNs. GLOBECOM 2017: 1-6 - [c5]Han Li, Pei Zhang, Zhanfeng Wang, Fei Du, Ye Kuang, Ying An:
Changing IP geolocation from arbitrary database query towards multi-databases fusion. ISCC 2017: 1150-1157 - 2016
- [j1]Kun Xie, Xiaohong Huang, Shuai Hao, Maode Ma, Pei Zhang, Dingyuan Hu:
E3MC: Improving Energy Efficiency via Elastic Multi-Controller SDN in Data Center Networks. IEEE Access 4: 6780-6791 (2016) - [c4]Yaodong Huang, Xiaohong Huang, Pei Zhang:
SDN-based container management scheme with flexibly addresses allocation capability. IC-NIDC 2016: 1-5 - [c3]Cun Wang, Zhengmin Li, Xiaohong Huang, Pei Zhang:
Inferring the average as path length of the Internet. IC-NIDC 2016: 391-395 - 2012
- [c2]Hao Wang, Yujie Su, Xiaohong Huang, Pei Zhang:
Algorithm for distributed traffic traces AGGREGATION based on SMC. CCIS 2012: 776-779 - [c1]Pei Zhang, Xiaohong Huang, Xin Sun, Hao Wang, Yan Ma:
Privacy-preserving anomaly detection across multi-domain networks. FSKD 2012: 1066-1070
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint