default search action
Xing Li 0001
Person information
- affiliation: Tsinghua University, Department of Electronic Engineering, China
- affiliation (former): Drexel University, Department of Electrical Engineering, Philadelphia, PA, USA
Other persons with the same name
- Xing Li — disambiguation page
- Xing Li 0002 — Nanjing University of Information Science and Technology, KLME / ILCEC / CIC-FEMD, China
- Xing Li 0003 — FU Berlin, Germany
- Xing Li 0004 — Broadcom, Irvine, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j41]Yining Qi, Yubo Luo, Yongfeng Huang, Xing Li:
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation. Comput. Syst. Sci. Eng. 45(1): 183-199 (2023) - 2022
- [c111]Deliang Chang, Joann Qiongna Chen, Zhou Li, Xing Li:
Hide and Seek: Revisiting DNS-based User Tracking. EuroS&P 2022: 188-205 - [c110]Ruiyu Fang, Guoliang Han, Xin Wang, CongXiao Bao, Xing Li, Yang Chen:
Speeding Up IPv4 Connections via IPv6 Infrastructure. MSN 2022: 555-562 - 2021
- [j40]Zhen Yang, Yingying Chen, Yongfeng Huang, Xing Li:
Chapter Six - Protecting personal sensitive data security in the cloud with blockchain. Adv. Comput. 120: 195-231 (2021) - [j39]Deliang Chang, Shanshan Hao, Zhou Li, Baojun Liu, Xing Li:
DNSWeight: Quantifying Country-Wise Importance of Domain Name System. IEEE Access 9: 133240-133257 (2021) - [j38]Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, Shigeng Zhang:
Securing middlebox policy enforcement in SDN. Comput. Networks 193: 108099 (2021) - [j37]Xuanmei Qin, Yongfeng Huang, Zhen Yang, Xing Li:
LBAC: A lightweight blockchain-based access control scheme for the internet of things. Inf. Sci. 554: 222-235 (2021) - [j36]Xuanmei Qin, Yongfeng Huang, Zhen Yang, Xing Li:
A Blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J. Syst. Archit. 112: 101854 (2021) - [j35]Zhen Yang, Wenyu Wang, Yongfeng Huang, Xing Li:
A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality. Mob. Networks Appl. 26(2): 842-850 (2021) - [c109]Chenhuan Liu, Qiankun Liu, Shanshan Hao, CongXiao Bao, Xing Li:
IPv6-Darknet Network Traffic Detection. ICAIS (2) 2021: 231-241 - [c108]Ruiyu Fang, Guoliang Han, Xin Wang, CongXiao Bao, Xing Li, Yang Chen:
Speeding up IPv4 connections via IPv6 infrastructure. SIGCOMM Posters and Demos 2021: 76-78 - 2020
- [j34]Renjie Liu, Zhe Weng, Shanshan Hao, Deliang Chang, CongXiao Bao, Xing Li:
Addressless: Enhancing IoT Server Security Using IPv6. IEEE Access 8: 90294-90315 (2020) - [j33]Xiaochun Wu, Kaiyu Hou, Xue Leng, Xing Li, Yinbo Yu, Bo Wu, Yan Chen:
State of the Art and Research Challenges in the Security Technologies of Network Function Virtualization. IEEE Internet Comput. 24(1): 25-35 (2020) - [j32]Xuanmei Qin, Yongfeng Huang, Xing Li:
An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks. Soft Comput. 24(24): 18881-18891 (2020) - [c107]Sixing Wu, Fang Chen, Fangzhao Wu, Yongfeng Huang, Xing Li:
A Multi-Task Learning Neural Network for Emotion-Cause Pair Extraction. ECAI 2020: 2212-2219 - [i12]Shanshan Hao, Renjie Liu, Zhe Weng, Deliang Chang, CongXiao Bao, Xing Li:
Addressless: A New Internet Server Model to Prevent Network Scanning. CoRR abs/2009.12754 (2020)
2010 – 2019
- 2019
- [j31]Yinbo Yu, Xing Li, Kai Bu, Yan Chen, Jianfeng Yang:
Falcon: Differential fault localization for SDN control plane. Comput. Networks 162 (2019) - [j30]Yinbo Yu, Xing Li, Xue Leng, Libin Song, Kai Bu, Yan Chen, Jianfeng Yang, Liang Zhang, Kang Cheng, Xin Xiao:
Fault Management in Software-Defined Networking: A Survey. IEEE Commun. Surv. Tutorials 21(1): 349-392 (2019) - [j29]Sixing Wu, Yuanfan Xu, Fangzhao Wu, Zhigang Yuan, Yongfeng Huang, Xing Li:
Aspect-based sentiment analysis via fusing multiple sources of textual knowledge. Knowl. Based Syst. 183 (2019) - [c106]Xuanmei Qin, Yongfeng Huang, Zhen Yang, Xing Li:
An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor. ICT 2019: 249-253 - [c105]Xing Li, Yinbo Yu, Kai Bu, Yan Chen, Jianfeng Yang, Ruijie Quan:
Thinking inside the Box: Differential Fault Localization for SDN Control Plane. IM 2019: 353-359 - [c104]Wenjie Xu, Deliang Chang, Xing Li:
On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation. IM 2019: 654-658 - [i11]Wenjie Xu, Deliang Chang, Xing Li:
On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation. CoRR abs/1903.06860 (2019) - 2018
- [c103]Jun Zhao, CongXiao Bao, Xing Li:
Building a Tunnel through NAT Using OpenFlow. IMCOM 2018: 17:1-17:4 - [c102]Chenhuan Liu, Chen Su, Xing Li:
Monitoring Network Traffic of Different OSes in Different IP Protocols. ICVISP 2018: 56:1-56:6 - [c101]Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, Shigeng Zhang:
FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking. INFOCOM 2018: 396-404 - 2017
- [j28]Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Value and Misinformation in Collaborative Investing Platforms. ACM Trans. Web 11(2): 8:1-8:32 (2017) - 2016
- [j27]Song Li, Hai-Xin Duan, Zhiliang Wang, Jinjin Liang, Xing Li:
An accurate distributed scheme for detection of prefix interception. Sci. China Inf. Sci. 59(5): 052105:1-052105:17 (2016) - [j26]Bing-kun Wang, Yongfeng Huang, Xing Li:
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating. Comput. Intell. Neurosci. 2016: 5968705:1-5968705:11 (2016) - [j25]Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
The power of comments: fostering social interactions in microblog networks. Frontiers Comput. Sci. 10(5): 889-907 (2016) - [j24]Bing-kun Wang, Yongfeng Huang, Zhigang Yuan, Xing Li:
A multi-granularity fuzzy computing model for sentiment classification of Chinese reviews. J. Intell. Fuzzy Syst. 30(3): 1445-1460 (2016) - [i10]CongXiao Bao, Xing Li, Fred Baker, Tore Anderson, Fernando Gont:
IP/ICMP Translation Algorithm. RFC 7915: 1-34 (2016) - 2015
- [j23]Bing-kun Wang, Yongfeng Huang, Xian Wu, Xing Li:
A Fuzzy Computing Model for Identifying Polarity of Chinese Sentiment Words. Comput. Intell. Neurosci. 2015: 525437:1-525437:13 (2015) - [j22]Guoliang Han, CongXiao Bao, Xing Li:
A scalable and efficient IPv4 address sharing approach in IPv6 transition scenarios. Frontiers Inf. Technol. Electron. Eng. 16(8): 634-645 (2015) - [c100]Guoliang Han, CongXiao Bao, Xing Li, Shuo Liu:
IPv6 Transition for the Other Billions. ICCCN 2015: 1-10 - [c99]Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li:
Route Leaks Identification by Detecting Routing Loops. SecureComm 2015: 313-329 - [i9]Ole Troan, Wojciech Dec, Xing Li, CongXiao Bao, Satoru Matsushima, Tetsuya Murakami, Tom Taylor:
Mapping of Address and Port with Encapsulation (MAP-E). RFC 7597: 1-35 (2015) - [i8]Xing Li, CongXiao Bao, Wojciech Dec, Ole Troan, Satoru Matsushima, Tetsuya Murakami:
Mapping of Address and Port using Translation (MAP-T). RFC 7599: 1-27 (2015) - 2014
- [c98]Qianli Zhang, Yunlong Ma, Jilong Wang, Xing Li:
UDP traffic classification using most distinguished port. APNOMS 2014: 1-4 - [c97]Rong Jin, CongXiao Bao, Xing Li:
Provide IPv4 Service Using Pure IPv6 Servers with Stateless NAT64 Translator. NAS 2014: 14-23 - 2013
- [c96]Bing-kun Wang, Yulin Min, Yongfeng Huang, Xing Li, Fangzhao Wu:
Review rating prediction based on the content and weighting strong social relation of reviewers. UnstructureNLP@CIKM 2013: 23-30 - [c95]Haitao Zhang, Xing Li, CongXiao Bao:
An Evolvable Locator/ID Separation Internet Architecture (ELISIA). NAS 2013: 141-150 - [c94]Kun Yu, CongXiao Bao, Xing Li:
Pathperf: Path Bandwidth Estimation Utilizing Websites. PAM 2013: 270-272 - [c93]Tianyi Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao:
Characterizing and detecting malicious crowdsourcing. SIGCOMM 2013: 537-538 - 2012
- [j21]Jiuling Zhang, Beixing Deng, Xing Li, Xiao-Lei Zhang:
Secure Ranking over Encrypted Documents. IEICE Trans. Inf. Syst. 95-D(12): 2954-2955 (2012) - [j20]Bing-kun Wang, Yongfeng Huang, Wanxia Yang, Xing Li:
Short text classification based on strong feature thesaurus. J. Zhejiang Univ. Sci. C 13(9): 649-659 (2012) - [c92]Wentao Shang, CongXiao Bao, Xing Li:
IVI-based Locator/ID Separation Architecture for IPv4/IPv6 Transition. NAS 2012: 144-153 - [c91]Jiuling Zhang, Beixing Deng, Xing Li:
Additive Order Preserving Encryption Based Encrypted Documents Ranking in Secure Cloud Storage. ICSI (2) 2012: 58-65 - [i7]Xing Li, CongXiao Bao, Dan Wing, Ramji Vaithianathan, Geoff Huston:
Stateless Source Address Mapping for ICMPv6 Packets. RFC 6791: 1-6 (2012) - 2011
- [j19]Yang Chen, Xiao Wang, Cong Shi, Eng Keong Lua, Xiaoming Fu, Beixing Deng, Xing Li:
Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization. IEEE Trans. Netw. Serv. Manag. 8(4): 334-347 (2011) - [c90]Zhuo Chen, Yang Chen, Yibo Zhu, Cong Ding, Beixing Deng, Xing Li:
Tarantula: Towards an Accurate Network Coordinate System by Handling Major Portion of TIVs. GLOBECOM 2011: 1-6 - [c89]Tianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, Xing Li:
Understanding Graph Sampling Algorithms for Social Network Analysis. ICDCS Workshops 2011: 123-128 - [c88]Zheng Yang, Jingfang Xu, Xing Li:
Data Selection for User Topic Model in Twitter-Like Service. ICPADS 2011: 847-852 - [c87]Long Jin, Yang Chen, Pan Hui, Cong Ding, Tianyi Wang, Athanasios V. Vasilakos, Beixing Deng, Xing Li:
Albatross sampling: robust and effective hybrid vertex sampling for social graphs. HotPlanet@MobiSys 2011: 11-16 - [c86]Yu Zhai, CongXiao Bao, Xing Li:
Transition from IPv4 to IPv6: A Translation Approach. NAS 2011: 30-39 - [c85]Zhuo Chen, Yang Chen, Cong Ding, Beixing Deng, Xing Li:
Pomelo: accurate and decentralized shortest-path distance estimation in social graphs. SIGCOMM 2011: 406-407 - [i6]Fred Baker, Xing Li, CongXiao Bao, Kevin Yin:
Framework for IPv4/IPv6 Translation. RFC 6144: 1-31 (2011) - [i5]Xing Li, CongXiao Bao, Fred Baker:
IP/ICMP Translation Algorithm. RFC 6145: 1-33 (2011) - [i4]Xing Li, CongXiao Bao, Maoke Chen, Hong Zhang, Jianping Wu:
The China Education and Research Network (CERNET) IVI Translation Design and Deployment for the IPv4/IPv6 Coexistence and Transition. RFC 6219: 1-22 (2011) - 2010
- [j18]Lin Cong, Guohan Lu, Yang Chen, Beixing Deng, Xing Li:
Network congestion estimation using packet time series analysis. IET Commun. 4(8): 980-989 (2010) - [j17]Guohan Lu, Yan Chen, Stefan Birrer, Fabián E. Bustamante, Xing Li:
POPI: a user-level tool for inferring router packet forwarding priority. IEEE/ACM Trans. Netw. 18(1): 1-14 (2010) - [j16]Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li:
Thwarting zero-day polymorphic worms with network-level length-based signature generation. IEEE/ACM Trans. Netw. 18(1): 53-66 (2010) - [c84]Qianli Zhang, Jilong Wang, Xing Li:
Evaluation of bulk traffic mitigation practices in campus network. AINTEC 2010: 9-15 - [c83]Zhuo Chen, Yibo Zhu, Yang Chen, Beixing Deng, Xing Li:
Reducing TIV interference in network coordinate systems. StudentWorkshop@CoNEXT 2010: 6:1-6:2 - [c82]Yibo Zhu, Yang Chen, Zengbin Zhang, Xiaoming Fu, Dan Li, Beixing Deng, Xing Li:
Taming the triangle inequality violations with network coordinate system on real internet. ReArch@CoNEXT 2010: 7:1-7:6 - [c81]Peng Wu, Yong Cui, Mingwei Xu, Jianping Wu, Xing Li, Chris Metz, Shengling Wang:
PET: Prefixing, Encapsulation and Translation for IPv4-IPv6 Coexistence. GLOBECOM 2010: 1-5 - [c80]Xuan Zhang, Chongrong Li, Xing Li:
Multi-party Videoconferencing Based on Hybrid Multicast with Peer-Forwarding. ICPADS 2010: 812-816 - [c79]Chengbo Dong, Guodong Wang, Yang Chen, Beixing Deng, Xing Li:
Handling triangle inequality violations in Euclidean distance based network coordinate systems. IWQoS 2010: 1-2 - [c78]Hongqiang Liu, Yongqiang Xiong, CongXiao Bao, Xing Li, Guobin Shen, Dan Li:
WIND: A scalable and lightweight network topology service for peer-to-peer applications. NOMS 2010: 797-800 - [c77]Zhiqiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, Xing Li:
HATS: High Accuracy Timestamping System Based on NetFPGA. AST/UCMA/ISA/ACN 2010: 183-195 - [c76]Tianyi Wang, Yang Chen, Zengbin Zhang, Peng Sun, Beixing Deng, Xing Li:
Unbiased sampling in directed social graph. SIGCOMM 2010: 401-402 - [i3]Jianping Wu, Yong Cui, Xing Li, Mingwei Xu, Chris Metz:
4over6 Transit Solution Using IP Encapsulation and MP-BGP Extensions. RFC 5747: 1-15 (2010) - [i2]CongXiao Bao, Christian Huitema, Marcelo Bagnulo, Mohamed Boucadair, Xing Li:
IPv6 Addressing of IPv4/IPv6 Translators. RFC 6052: 1-18 (2010)
2000 – 2009
- 2009
- [j15]Xing Li, CongXiao Bao:
Address switching: Reforming the architecture and traffic of Internet. Sci. China Ser. F Inf. Sci. 52(7): 1203-1216 (2009) - [j14]Yang Chen, Yongqiang Xiong, Xiaohui Shi, Jiwen Zhu, Beixing Deng, Xing Li:
Pharos: accurate and decentralised network coordinate system. IET Commun. 3(4): 539-548 (2009) - [j13]Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing Li:
Handling node churn in decentralised network coordinate system. IET Commun. 3(10): 1578-1586 (2009) - [c75]Zimu Li, Xing Li, Jianping Wu, Haibin Wang:
Security and Reliability Design of Olympic Games Network. APNOMS 2009: 444-447 - [c74]Xiaoxiao Song, Xiaohan Zhao, Eng Keong Lua, Zengbin Zhang, Beixing Deng, Xing Li:
SLINCS: A Social Link Based Evaluation System for Network Coordinate Systems. CCNC 2009: 1-2 - [c73]Zengbin Zhang, Yuan Lin, Yang Chen, Yongqiang Xiong, Jacky Shen, Hongqiang Liu, Beixing Deng, Xing Li:
Experimental Study of Broadcatching in BitTorrent. CCNC 2009: 1-5 - [c72]Lin Cong, Guohan Lu, Yang Chen, Beixing Deng, Xing Li:
What level of estimating accuracy does TCP need and can TCP achieve. StudentWorkshop@CoNEXT 2009: 21-22 - [c71]Chengbo Dong, Guodong Wang, Xuan Zhang, Beixing Deng, Jia Liu, Xing Li:
Two-layer network coordinate system for Internet distance prediction. ICUMT 2009: 1-6 - [c70]Yao Li, Beixing Deng, Xuan Zhang, Rui Wang, Xing Li:
An empirical study on Embeddable Overlay Networks. ICUMT 2009: 1-6 - [c69]Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li:
Experimental study on neighbor selection policy for Phoenix Network Coordinate system. ICUMT 2009: 1-5 - [c68]Yang Chen, Xiao Wang, Xiaoxiao Song, Eng Keong Lua, Cong Shi, Xiaohan Zhao, Beixing Deng, Xing Li:
Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. Networking 2009: 313-325 - [c67]Jiuling Zhang, Zuoda Liu, Beixing Deng, Xing Li:
Concept based Query and Document Expansion using Hidden Markov Model. WEBIST 2009: 697-700 - 2008
- [j12]Jianping Wu, Gang Ren, Xing Li:
Building a next generation Internet with source address validation architecture. Sci. China Ser. F Inf. Sci. 51(11): 1681-1691 (2008) - [j11]Yong Cui, Mingwei Xu, Jianping Wu, Xing Li:
IETF softwire unicast and multicast framework for IPv6 transition. Sci. China Ser. F Inf. Sci. 51(11): 1692-1702 (2008) - [j10]Lanjia Wang, Hai-Xin Duan, Xing Li:
Dynamic emulation based modeling and detection of polymorphic shellcode at the network level. Sci. China Ser. F Inf. Sci. 51(11): 1883-1897 (2008) - [j9]Jilong Wang, ZhongHui Li, Guohan Lu, Caiping Jiang, Xing Li, Qianli Zhang:
DRAGON-Lab - Next generation internet technology experiment platform. Sci. China Ser. F Inf. Sci. 51(11): 1908-1918 (2008) - [c66]Xiao Wang, Yang Chen, Beixing Deng, Xing Li:
Nonlinear modeling of the internet delay structure. CoNEXT 2008: 31 - [c65]Xuan Zhang, Chongrong Li, Xing Li, CongXiao Bao:
Multicast Congestion Control on Many-to-Many Videoconferencing. FGCN (1) 2008: 260-263 - [c64]Weiyu Wu, Yang Chen, Xinyi Zhang, Xiaohui Shi, Lin Cong, Beixing Deng, Xing Li:
LDHT: Locality-aware Distributed Hash Tables. ICOIN 2008: 1-5 - [c63]Lin Cong, Guohan Lu, Yang Chen, Beixing Deng, Xing Li:
pathWave: Combined estimation of network link capacity and available bandwidth using statistical signal processing. ICON 2008: 1-6 - [c62]Wu Liu, Hai-Xin Duan, Tao Lin, Xing Li, Jian-Ping Wu:
Attacking Test and Online Forensics in IPv6 Networks. IMF 2008: 87-106 - [c61]Xuan Zhang, Chongrong Li, Xing Li:
Hybrid Multicast Scheme for Many-to-Many Videoconferencing. NCM (2) 2008: 482-487 - [i1]Jianping Wu, Jun Bi, Xing Li, Gang Ren, Ke Xu, Mark I. Williams:
A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience. RFC 5210: 1-25 (2008) - 2007
- [c60]Xuan Zhang, Xing Li, Chongrong Li:
Controllable Multi-party Audio/Video Collaboration Based on Multicast over CERNET. Edutainment 2007: 819-828 - [c59]Lin Cong, Yang Chen, Xiaohui Shi, Ye Wang, Weiyu Wu, Beixing Deng, Xing Li:
Telemeter: Network Distance Prediction Base on Network Topology. GCC 2007: 34-41 - [c58]Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng, Xing Li:
Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction. GLOBECOM 2007: 421-426 - [c57]Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Zhijia Chen:
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts. GLOBECOM 2007: 559-564 - [c56]Xuan Zhang, Dongtao Liu, Xing Li:
Design and Implement Controllable Multicast Based Audio/Video Collaboration. International Conference on Computational Science (4) 2007: 701-704 - [c55]Xuan Zhang, Xing Li, Qingguo Zhao:
Service and Management for Multicast Based Audio/Video Collaboration System on CERNET. International Conference on Computational Science (4) 2007: 853-856 - [c54]Jun Lv, Xing Li, Tong Li:
Network Traffic Prediction and Applications Based on Time Series Model. ICIC (2) 2007: 1306-1315 - [c53]Qianli Zhang, Jilong Wang, Xing Li:
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. ICICS 2007: 177-188 - [c52]Jun Lv, Xing Li, Tong Li:
Web-Based Application for Traffic Anomaly Detection Algorithm. ICIW 2007: 44 - [c51]Jun Lv, Xing Li, Tong Li:
The New Detection Algorithms for Network Traffic Anomalies. ICN 2007: 52 - [c50]Jianping Wu, Gang Ren, Xing Li:
Source Address Validation: Architecture and Protocol Design. ICNP 2007: 276-283 - [c49]Yixuan Wang, Ye Wang, Maoke Chen, Xing Li:
Inter-Domain Access Volume Model: Ranking Autonomous Systems. ICOIN 2007: 482-491 - [c48]Yang Chen, Genyi Zhao, Ang Li, Beixing Deng, Xing Li:
Myth: An Accurate and Scalable Network Coordinate System under High Node Churn Rate. ICON 2007: 143-148 - [c47]Dan Hong, Ye Wang, Junxiu Lu, Maoke Chen, Xing Li:
Building A Robust and Economical Internet Testbed: 6PlanetLab. ICON 2007: 289-294 - [c46]Guohan Lu, Yan Chen, Stefan Birrer, Fabián E. Bustamante, C. Y. Cheung, Xing Li:
End-to-End Inference of Router Packet Forwarding Priority. INFOCOM 2007: 1784-1792 - [c45]Dongtao Liu, CongXiao Bao, Xing Li, Xuan Zhang:
DV-Based Extensible Video Transport Terminal for Standard-Definition Video Conference. IPC 2007: 146-149 - [c44]Xiangbin Cheng, Jun Bi, Xing Li, Jianping Wu:
A Tunnels-Between-Hosts Based Method for IPv4 Application over Native IPv6 Network. IPC 2007: 260-267 - [c43]Xuan Zhang, Xing Li, Chongrong Li, Dongtao Liu:
Construct Intra-Cluster Load-Balancing Overlay. IPC 2007: 264-267 - [c42]Jun Lv, Tong Li, Xing Li:
Research on Network Traffic Anomaly Detection Algorithm. ISCC 2007: 95-100 - [c41]Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang:
NTS6: IPv6 based Network Topology Service System of CERNET2. MUE 2007: 1010-1015 - [c40]Hui Liu, Wenfeng Feng, Yongfeng Huang, Xing Li:
A Peer-To-Peer Traffic Identification Method Using Machine Learning. IEEE NAS 2007: 155-160 - [c39]Jingfang Xu, Xing Li:
Learning to rank collections. SIGIR 2007: 765-766 - [c38]Jingfang Xu, Sheng Wu, Xing Li:
Estimating collection size with logistic regression. SIGIR 2007: 789-790 - 2006
- [j8]Jianping Wu, Yong Cui, Xing Li, Chris Metz:
The Transition to IPv6, Part 1: 4over6 for the China Education and Research Network. IEEE Internet Comput. 10(3): 80-85 (2006) - [j7]Yong Cui, Jianping Wu, Xing Li, Mingwei Xu, Chris Metz:
The Transition to IPv6, Part II: The Softwire Mesh Framework Solution. IEEE Internet Comput. 10(5): 76-80 (2006) - [j6]Xin-Jing Wang, Wei-Ying Ma, Xing Li:
Exploring statistical correlations for image retrieval. Multim. Syst. 11(4): 340-351 (2006) - [c37]Yang Chen, Beixing Deng, Xing Li:
Rainbow: A Locality-aware Peer-to-Peer Overlay Multicast System. GCC Workshops 2006: 151-155 - [c36]Xiaohui Shi, Yang Chen, Beixing Deng, Xing Li:
Network Distance Prediction based on Network Coordinate System. GCC Workshops 2006: 170-175 - [c35]Shijin Kong, Tao He, Xiaoxin Shao, Changqing An, Xing Li:
Scalable Double Filter Structure for Port Scan Detection. ICC 2006: 2177-2182 - [c34]Shijin Kong, Tao He, Xiaoxin Shao, Changqing An, Xing Li:
Time-Out Bloom Filter: A New Sampling Method for Recording More Flows. ICOIN 2006: 590-599 - [c33]Xiaoxin Shao, Tao He, Shijin Kong, Changqing An, Xing Li:
Time-Driven vs Packet-Driven: A Deep Study on Traffic Sampling. ICOIN 2006: 610-619 - [c32]Yang Chen, Beixing Deng, Xing Li:
Canicula: An Improved Hybrid Overlay Networks. ICON 2006: 1-6 - [c31]Jun Lv, Xing Li, Quang-Anh Tran, Tong Li:
A New Algorithm for Network Traffic Prediction. ISCC 2006: 1006-1012 - [c30]Maoke Chen, Xing Li, Ang Li, Yong Cui:
Forwarding IPv4 Traffics in Pure IPv6 Backbone with Stateless Address Mapping. NOMS 2006: 260-270 - [c29]Xiaoxin Shao, Qianli Zhang, Tao He, Shijin Kong, Changqing An, Xing Li:
SANTT: Sharing Anonymized Network Traffic Traces among Researchers. NOMS 2006: 527-533 - 2005
- [j5]Feng Yang, Hai-Xin Duan, Xing Li:
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation. Sci. China Ser. F Inf. Sci. 48(1): 91-106 (2005) - [j4]Quang-Anh Tran, Xing Li, Hai-Xin Duan:
Efficient performance estimate for one-class support vector machine. Pattern Recognit. Lett. 26(8): 1174-1182 (2005) - [j3]Ruixiong Tian, Qian Zhang, Zhe Xiang, Yongqiang Xiong, Xing Li, Wenwu Zhu:
Robust and efficient path diversity in application-layer multicast for video streaming. IEEE Trans. Circuits Syst. Video Technol. 15(8): 961-972 (2005) - [c28]Yue Li, Xing Li, Jingfang Xu:
Systematic Study on Query Expansion. ASIAN 2005: 276-277 - [c27]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
PDTM: A Policy-Driven Trust Management Framework in Distributed Systems. CIS (2) 2005: 518-525 - [c26]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Algorithm Mining Intrusion Patterns. FSKD (2) 2005: 774-777 - [c25]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
New Method for Intrusion Features Mining in IDS. ICIC (1) 2005: 429-437 - [c24]Lanjia Wang, Hai-Xin Duan, Xing Li:
Port Scan Behavior Diagnosis by Clustering. ICICS 2005: 243-255 - [c23]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li:
The Authorization Service in Dynamic Trust Domains. ICITA (2) 2005: 564-567 - [c22]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li:
Improved Marking Model ERPPM Tracing Back to DDoS Attacker. ICITA (2) 2005: 759-762 - [c21]Jingfang Xu, Yangbo Zhu, Xing Li:
An Article Language Model for BBS Search. ICWE 2005: 152-160 - [c20]Ruixiong Tian, Yongqiang Xiong, Qian Zhang, Bo Li, Ben Y. Zhao, Xing Li:
Hybrid Overlay Structure Based on Random Walks. IPTPS 2005: 152-162 - [c19]Yi Wang, Shaozhi Ye, Xing Li:
Understanding Current IPv6 Performance: A Measurement Study. ISCC 2005: 71-76 - [c18]Hanghang Tong, Chongrong Li, Jingrui He, Jiajian Chen, Quang-Anh Tran, Hai-Xin Duan, Xing Li:
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. ISNN (3) 2005: 476-481 - [c17]Xin-Jing Wang, Wei-Ying Ma, Lei Zhang, Xing Li:
Multi-graph enabled active learning for multimodal web image retrieval. Multimedia Information Retrieval 2005: 65-72 - [c16]Xin-Jing Wang, Wei-Ying Ma, Lei Zhang, Xing Li:
Iteratively clustering web images based on link and attribute reinforcements. ACM Multimedia 2005: 122-131 - 2004
- [j2]Jiahai Yang, Hai-Xin Duan, Jianping Wu, Xing Li:
Workflow Oriented Network Management - A Web/Java Approach. J. Netw. Syst. Manag. 12(4): 431-439 (2004) - [c15]Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li, Ping Ren:
XML Based X.509 Authorization in CERNET Grid. GCC 2004: 325-332 - [c14]Wu Liu, Hai-Xin Duan, Jianping Wu, Xing Li, Ping Ren:
Algorithms for Congestion Detection and Control. GCC Workshops 2004: 374-381 - [c13]Jiang Liu, Tao He, Xing Li:
An Accounting System Building on Network Processor. ICCCN 2004: 543 - [c12]Xin-Jing Wang, Wei-Ying Ma, Xing Li:
Data-driven approach for bridging the cognitive gap in image retrieval. ICME 2004: 2231-2234 - [c11]Yi Wang, Guohan Lu, Xing Li:
A Study of Internet Packet Reordering. ICOIN 2004: 350-359 - [c10]Maoke Chen, Tao He, Xing Li:
A Mean-Field Theory of Cellular Automata Model for Distributed Packet Networks. ICOIN 2004: 773-783 - [c9]Xin-Jing Wang, Wei-Ying Ma, Qi-Cai He, Xing Li:
Grouping web image search result. ACM Multimedia 2004: 436-439 - [c8]Xin-Jing Wang, Wei-Ying Ma, Gui-Rong Xue, Xing Li:
Multi-model similarity propagation and its application for web image retrieval. ACM Multimedia 2004: 944-951 - [c7]Xin-Jing Wang, Wei-Ying Ma, Xing Li:
Learning Image Manifold Using Web Data. PCM (2) 2004: 907-914 - [c6]Jingfang Xu, Shaozhi Ye, Xing Li:
Query Based Chinese Phrase Extraction for Site Search. WISE 2004: 125-134 - 2003
- [c5]Jinxiang Zhang, Jilong Wang, Jianping Wu, Xing Li:
A Distributed Network Management Framework Based on NGI. APPT 2003: 430-434 - [c4]Guohan Lu, Xing Li:
On the correspondency between TCP acknowledgment packet and data packet. Internet Measurement Conference 2003: 259-272 - [c3]Chongrong Li, Xing Li, Jianping Wu, Yue You, Maoke Chen:
IPv6 Development in China. SAINT Workshops 2003: 153-156 - [c2]Quang-Anh Tran, Qianli Zhang, Xing Li:
Evolving training model method for one-class SVM. SMC 2003: 2388-2393 - 2001
- [j1]Yuqing Zhang, Chunling Wang, Jianping Wu, Xing Li:
Using SMV for Cryptographic Protocol Analysis: A Case Study. ACM SIGOPS Oper. Syst. Rev. 35(2): 43-50 (2001) - 2000
- [c1]Hai-Xin Duan, Jianping Wu, Xing Li:
Policy based access control framework for large networks. ICON 2000: 267-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint