Ziling Wei
YOU?
Author Swipe
View article: PSSketch: Finding Persistent and Sparse Flow with High Accuracy and Efficiency
PSSketch: Finding Persistent and Sparse Flow with High Accuracy and Efficiency Open
Finding persistent sparse (PS) flow is critical to early warning of many threats. Previous works have predominantly focused on either heavy or persistent flows, with limited attention given to PS flows. Although some recent studies pay att…
View article: Effects of dietary oxidative balance score on diabetic nephropathy and renal function: insights from retrospective and cross-sectional studies
Effects of dietary oxidative balance score on diabetic nephropathy and renal function: insights from retrospective and cross-sectional studies Open
Background The relationship between dietary oxidative balance score (DOBS) and diabetes-related renal events remains unclear. Methods In this study, the associations between serum micronutrients and diabetic nephropathy (DN) in participant…
View article: HybriDC: A Resource-Efficient CPU-FPGA Heterogeneous Acceleration System for Lossless Data Compression
HybriDC: A Resource-Efficient CPU-FPGA Heterogeneous Acceleration System for Lossless Data Compression Open
Lossless data compression is a crucial and computing-intensive application in data-centric scenarios. To reduce the CPU overhead, FPGA-based accelerators have been proposed to offload compression workloads. However, most existing schemes h…
View article: Moving direction‐based adaptive task migration in MEC
Moving direction‐based adaptive task migration in MEC Open
Edge computing is expected to be a promising paradigm to provide low‐latency services. Tasks from resource‐limited users can be offloaded to edge servers for efficient execution within a limit time. This innovative technique has attracted …
View article: HAGDetector: Heterogeneous DGA domain name detection model
HAGDetector: Heterogeneous DGA domain name detection model Open
The botnet relies on the Command and Control (C&C) channels to conduct its malicious activities remotely. The Domain Generation Algorithm (DGA) is often used by botnets to hide their Command and Control (C&C) server and evade take-down att…
View article: Statistical Feature‐Based Personal Information Detection in Mobile Network Traffic
Statistical Feature‐Based Personal Information Detection in Mobile Network Traffic Open
With the popularity of smartphones, mobile applications (apps) have penetrated the daily life of people. Although apps provide rich functionalities, they also access a large amount of personal information simultaneously. As a result, priva…
View article: Statistical Feature-based Personal Information Detection in Mobile Network Traffic
Statistical Feature-based Personal Information Detection in Mobile Network Traffic Open
With the popularity of smartphones, mobile applications (apps) have penetrated the daily life of people. Although apps provide rich functionalities, they also access a large amount of personal information simultaneously. As a result, priva…
View article: PF : Website Fingerprinting Attack Using Probabilistic Topic Model
PF : Website Fingerprinting Attack Using Probabilistic Topic Model Open
Website fingerprinting (WFP) attack enables identifying the websites a user is browsing even under the protection of privacy-enhancing technologies (PETs). Previous studies demonstrate that most machine-learning attacks need multiple types…
View article: CMT: An Efficient Algorithm for Scalable Packet Classification
CMT: An Efficient Algorithm for Scalable Packet Classification Open
Packet classification plays an essential role in diverse network functions such as quality of service, firewall filtering and load balancer. However, implementing an efficient packet classifier is a challenging problem. The problem even ge…
View article: A Deep Reinforcement Learning Based Approach for Energy-Efficient Channel Allocation in Satellite Internet of Things
A Deep Reinforcement Learning Based Approach for Energy-Efficient Channel Allocation in Satellite Internet of Things Open
Recently, Satellite Internet of Things (SIoT), a space network that consists of numerous Low Earth Orbit (LEO) satellites, is regarded as a promising technique since it is the only solution to provide 100% global coverage for the whole ear…
View article: Optimal Slot Length Configuration in Cognitive Radio Networks
Optimal Slot Length Configuration in Cognitive Radio Networks Open
In cognitive radio networks, a slotted time structure is widely adopted. Accordingly, the slot length is a factor that can largely affect the performance of cognitive radio networks. In this paper, a slot length configuration scheme is pro…
View article: Spectrum Efficiency Enhancement in Wireless Communication Networks
Spectrum Efficiency Enhancement in Wireless Communication Networks Open
With the fast growth of mobile data traffic, spectrum scarcity has become a serious problem to the development of wireless networks. Due to the limited available spectrum resources, it is critical to improve the spectrum efficiency. Cognit…
View article: Optimal Offloading in Fog Computing Systems With Non-Orthogonal Multiple Access
Optimal Offloading in Fog Computing Systems With Non-Orthogonal Multiple Access Open
Fog computing has recently become a promising method to meet the increasing computation demands from mobile applications in the Internet of Things (IoT). In fog computing, the computation tasks of an IoT device can be offloaded to fog node…