default search action
Yongzhong Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c19]Yuanyi Qi, Lamei Wang, Yongzhong Zhang:
Research on the Design of Data-Driven Teacher Support. ICETC 2022: 330-336 - 2021
- [j2]Yongzhong Zhang, Yonghui Dai, Haijian Chen:
Analysis of entrepreneur mental model and construction of its portrait. Comput. Sci. Inf. Syst. 18(4): 1239-1252 (2021) - 2020
- [c18]Yuanyi Qi, Jianhua Yang, Yongzhong Zhang:
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking. AINA 2020: 980-993
2010 – 2019
- 2018
- [c17]Jianhua Yang, Yongzhong Zhang:
Using Postal Mail System to Teach Packet Switching in Computer Networks. AINA Workshops 2018: 1-5 - [c16]Jianhua Yang, Yongzhong Zhang, Robert King, Tim Tolbert:
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection. AINA Workshops 2018: 515-520 - 2017
- [c15]Jianhua Yang, Yongzhong Zhang, Guoqing Zhao:
Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum. AINA Workshops 2017: 1-6 - 2015
- [c14]Jianhua Yang, Yongzhong Zhang:
RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion. AINA 2015: 558-563 - 2014
- [j1]Wei Feng, Suili Feng, Yuehua Ding, Yongzhong Zhang:
Prediction-Based Cross-Layer Resource Allocation for Wireless Multi-Hop Networks with Outdated CSI. IEICE Trans. Commun. 97-B(4): 746-754 (2014) - 2013
- [i1]Dian Yu, Haibo Li, Taylor Cassidy, Qi Li, Hongzhao Huang, Zheng Chen, Heng Ji, Yongzhong Zhang, Dan Roth:
RPI-BLENDER TAC-KBP2013 Knowledge Base Population System. TAC 2013 - 2012
- [c13]Yingjie Sheng, Yongzhong Zhang, Jianhua Yang:
Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion. AINA 2012: 862-867 - 2010
- [c12]Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang:
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. AINA 2010: 1101-1107 - [c11]Yongzhong Zhang, Qi Li, Zhangxi Lin:
A Novel Reputation Computing Model - (Work-in-Progress). INTRUST 2010: 316-325
2000 – 2009
- 2006
- [c10]Jianhua Yang, Yongzhong Zhang:
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. ACNS 2006: 18-32 - [c9]Yongzhong Zhang, Jianhua Yang, Chunming Ye:
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ATC 2006: 477-486 - [c8]Jianhua Yang, Byong Lee, Yongzhong Zhang:
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. CANS 2006: 303-317 - [c7]Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang:
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ISC 2006: 383-397 - [c6]Guohua Gao, Yongzhong Zhang, Yu Zhu, Guanghuang Duan:
Data Fusion and Multi-fault Classification Based On Support Vector Machines. JCIS 2006 - 2005
- [c5]Tao Han, Yaohui Li, Hui Han, Yongzhong Zhang, Yujie Wang:
Land cover classification in Western Loess Plateau of China with MODIS imagery. IGARSS 2005: 4 - [c4]Yongzhong Zhang, E. Youhao, Tao Han, Songbing Zou, Jihe Wang:
A CA-based information system for surface fire spreading simulation. IGARSS 2005: 3484-3487 - [c3]Tao Han, Yaohui Li, Hui Han, Yongzhong Zhang, Yujie Wang:
Automatic detection of dust storm in the northwest of China using decision tree classifier based on MODIS visible bands data. IGARSS 2005: 3603-3606 - [c2]Changbin Li, Zhaodong Feng, Songbing Zou, Hui Han, Yongzhong Zhang, Youhao E, Min Feng:
GIS-based improvement of C. O. Clark method for simulating watershed-scale overland flow in the Chinese Loess plateau. IGARSS 2005: 4399-4402 - 2004
- [c1]Yongzhong Zhang, Zhaodong Feng, Tao Han, Liyu Wu, Kegong Li, Xin Duan:
Simulating wildfire spreading processes in a spatially heterogeneous landscapes using an improved cellular automaton model. IGARSS 2004: 3371-3374
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint