Zhiping Cai(蔡志平)
Cited by
Cited by
Extreme learning machines [trends & controversies]
E Cambria, GB Huang, LLC Kasun, H Zhou, CM Vong, J Lin, J Yin, Z Cai, ...
IEEE intelligent systems 28 (6), 30-59, 2013
Virtual network embedding for evolving networks
Z Cai, F Liu, N Xiao, Q Liu, Z Wang
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
Security and privacy in the medical internet of things: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Security and Communication Networks 2018, 2018
Flow level detection and filtering of low-rate DDoS
C Zhang, Z Cai, W Chen, X Luo, J Yin
Computer Networks 56 (15), 3417-3431, 2012
RRED: robust RED algorithm to counter low-rate denial-of-service attacks
C Zhang, J Yin, Z Cai, W Chen
IEEE Communications Letters 14 (5), 489-491, 2010
A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities
H Teng, Y Liu, A Liu, NN Xiong, Z Cai, T Wang, X Liu
Future Generation Computer Systems 94, 351-367, 2019
A RSSI-based self-localization algorithm for wireless sensor networks
W Shanshan, Y Jianping, C Zhiping, Z Guomin
Journal of Computer Research and Development 45 (1), 385-388, 2008
A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering
Z Cai, Z Wang, K Zheng, J Cao
IEEE Transactions on Computers 62 (3), 417-427, 2011
Securing display path for security-sensitive applications on mobile devices
J Cui, Y Zhang, Z Cai, A Liu, Y Li
Computers, Materials and Continua 55 (1), 17, 2018
Network intrusion detection through stacking dilated convolutional autoencoders
Y Yu, J Long, Z Cai
Security and Communication Networks 2017, 2017
Data processing and text mining technologies on electronic medical records: a review
W Sun, Z Cai, Y Li, F Liu, S Fang, G Wang
Journal of healthcare engineering 2018, 2018
Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks
X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu, Z Cai
Journal of Parallel and Distributed Computing 135, 140-155, 2020
Counter tree: A scalable counter architecture for per-flow traffic measurement
M Chen, S Chen, Z Cai
IEEE/ACM Transactions on Networking 25 (2), 1249-1262, 2016
A survey on security-aware measurement in SDN
H Zhang, Z Cai, Q Liu, Q Xiao, Y Li, CF Cheang
Security and Communication Networks 2018, 2018
Applying a new localized generalization error model to design neural networks trained with extreme learning machine
Q Liu, J Yin, VCM Leung, JH Zhai, Z Cai, J Lin
Neural Computing and Applications 27 (1), 59-66, 2016
A survey on edge computing systems and tools
F Liu, G Tang, Y Li, Z Cai, X Zhang, T Zhou
Proceedings of the IEEE 107 (8), 1537-1562, 2019
Feature selection method based on class discriminative degree for intelligent medical diagnosis
S Fang, Z Cai, W Sun, A Liu, F Liu, Z Liang, G Wang
Computers, Materials & Continua 55 (3), 419-433, 2018
FADE: Forwarding assessment based detection of collaborative grey hole attacks in WMNs
Q Liu, J Yin, VCM Leung, Z Cai
IEEE Transactions on Wireless Communications 12 (10), 5124-5137, 2013
Security-aware virtual network embedding
S Liu, Z Cai, H Xu, M Xu
2014 IEEE International Conference on Communications (ICC), 834-840, 2014
Multicast service-oriented virtual network embedding in wireless mesh networks
P Lv, Z Cai, J Xu, M Xu
IEEE Communications Letters 16 (3), 375-377, 2012
The system can't perform the operation now. Try again later.
Articles 1–20