海南大学计算机与网络空间安全学院官网,网络空间安全学院

[1]Xiaoyan Hu, Jian Gong, Guang Cheng, Guoqiang Zhang, Chengyu Fan,Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities, IEEE Access 6 (2018): 39692-39704, Aug. 2018

[2]胡晓艳,郑少琦,龚俭,程光,臧小东.基于网络编码的信息中心网络研究.通信学报(录用)

[3]Xiaoyan Hu, Jian Gong.Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking. 11th International Conference on Future Internet Technologies, p1~4, Jun. 2016

[4]Xiaoyan Hu, Jian Gong, Guang Cheng, Weiwei Zhang, Ahmad Jakalan. Design and Implementation of Not So Cooperative Caching System, China Communication, Vol. 12, No. 7, p36-51, Jul. 2015

[5]Xiaoyan Hu and Jian Gong. Opportunistic On-path Caching for Named Data Networking. IEICE Transactions on Communications, Vol. E97-B, No.11, p2360-2367, Nov. 2014

[6]Xiaoyan Hu and Jian Gong. Study on the Theoretical Framework of Not So Cooperative Caching. Journal of Internet Technology, Vol. 15, No.3, p351-362, Apr. 2014

[7]Xiaoyan Hu and Jian Gong. PhD Forum: Not So Cooperative Caching (Problem Statement). The 21st International Conference on Network Protocols (ICNP 2013) PhD Forum, p1-3, 2013

[8]Xiaoyan Hu, Jian Gong, Guang Cheng and Chengyu Fan. Enhancing In-network Caching by Coupling Cache Placement, Replacement and Location. 2015 IEEE International Conference on Communications (ICC 2015), p1-7, June, 2015

[9]Xiaoyan Hu, Christos Papadopoulos, Jian Gong and Dan Massey. Not So Cooperative Caching in Named Data Networking. IEEE GLOBECOM 2013 Technical Symposia, p2285-2290, 2013

[10]Xiaoyan Hu, Jian Gong. CANR: Cache-Aware Name-based Routing. 2014 IEEE 3rd International Conference on Cloud Computing and Intelligent Systems (CCIS2014), p212-217, Nov 2014

[11]Xiaoyan Hu and Jian Gong. Multipath Inter-domain Routing for Named Data Networking. Journal on Communications, Vol. 36, No. 10, p211-223, 2015. (in Chinese)

[12]Xiaoyan Hu and Jian Gong. Exploring the Roles of In-Network Caching in ICN. Telecommunications Science, Vol. 30, No. 3, p67-71, 2014. (in Chinese)

[13]Ahmad Jakalan, Jian Gong, Qi Su, Xiaoyan Hu, and Abdeldime MS Abdelgder. Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary. Computer Networks 100 (2016): 12-27

[14]Qi Su, Jian Gong, Xiaoyan Hu. RTT Estimation with Sampled Flow Data, IEICE Transactions on Communications, vol. E98-B, No. 9, pp.1848-1857, 2015

[15]张维维,龚俭,刘茜,刘尚东,胡晓艳. (2016).基于词素特征的轻量级域名检测算法.软件学报, 27(9), 2348-2364.

[16]张维维,龚俭,刘尚东,胡晓艳. (2017).面向主干网的dns流量监测.软件学报, 28(9), 2370-2387.

[17]龚俭,臧小东,苏琪,胡晓艳, &徐杰. (2017).网络安全态势感知综述.软件学报, 28(4), 1010-1026.

专利

1.一种缓解命名数据网络中内容毒害攻击的方法,申请号:2018101446484

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值