Search Results - "Cheng, Qiumei"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Flow Table Saturation Attack against Dynamic Timeout Mechanisms in SDN by Shen, Yi, Wu, Chunming, Kong, Dezhang, Cheng, Qiumei

    Published in Applied sciences (01-06-2023)
    “…Software-defined networking (SDN) enables dynamic management and flexible network control by employing reactive rule installation. Due to high power…”
    Get full text
    Journal Article
  2. 2

    SDN-LIRU: A Lossless and Seamless Method for SDN Inter-Domain Route Updates by Zhou, Haifeng, Wu, Chunming, Cheng, Qiumei, Liu, Qianjun

    Published in IEEE/ACM transactions on networking (01-08-2017)
    “…Maintaining service availability during an inter-domain route update is a challenge in both conventional networks and software-defined networks (SDNs). In the…”
    Get full text
    Journal Article
  3. 3

    Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing by Qiang, Wu, Chunming, Wu, Xincheng, Yan, Qiumei, Cheng

    “…With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network…”
    Get full text
    Journal Article
  4. 4

    Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation by Changting Lin, Chunming Wu, Min Huang, Zhenyu Wen, Qiumei Cheng

    “…IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks…”
    Get full text
    Conference Proceeding
  5. 5

    Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks by Cheng, Qiumei, Wu, Chunming, Zhou, Shiying

    Published in IEEE communications letters (01-05-2021)
    “…The alert correlation process that aggregates computer network security alerts to the same attack scenario provides a coherent view of network status at a…”
    Get full text
    Journal Article
  6. 6

    SDN-RDCD: A Real-Time and Reliable Method for Detecting Compromised SDN Devices by Zhou, Haifeng, Wu, Chunming, Yang, Chengyu, Wang, Pengfei, Yang, Qi, Lu, Zhouhao, Cheng, Qiumei

    Published in IEEE/ACM transactions on networking (01-10-2018)
    “…A software-defined network (SDN) is increasingly deployed in many practical settings, bringing new security risks, e.g., SDN controller and switch hijacking…”
    Get full text
    Journal Article
  7. 7

    Combination Attacks and Defenses on SDN Topology Discovery by Kong, Dezhang, Shen, Yi, Chen, Xiang, Cheng, Qiumei, Liu, Hongyan, Zhang, Dong, Liu, Xuan, Chen, Shuangxi, Wu, Chunming

    Published in IEEE/ACM transactions on networking (01-04-2023)
    “…The topology discovery service in Software-Defined Networking (SDN) provides the controller with a global view of the substrate network topology, allowing for…”
    Get full text
    Journal Article
  8. 8

    Machine learning based malicious payload identification in software-defined networking by Cheng, Qiumei, Wu, Chunming, Zhou, Haifeng, Kong, Dezhang, Zhang, Dong, Xing, Junchi, Ruan, Wei

    “…Deep packet inspection (DPI) has been extensively investigated in software-defined networking (SDN) as complicated attacks may intractably inject malicious…”
    Get full text
    Journal Article
  9. 9

    rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN by Kong, Dezhang, Chen, Xiang, Wu, Chunming, Shen, Yi, Zhou, Zhengyan, Cheng, Qiumei, Liu, Xuan, Yang, Mingliang, Qiu, Yubing, Zhang, Dong, Khan, Muhammad Khurram

    “…The flow table is a critical component of Software-Defined Networking (SDN). However, flow tables' limited capacity makes them highly vulnerable to flow table…”
    Get full text
    Journal Article
  10. 10
  11. 11

    In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks by Kong, Dezhang, Zhou, Zhengyan, Shen, Yi, Chen, Xiang, Cheng, Qiumei, Zhang, Dong, Wu, Chunming

    “…In-band Network Telemetry (INT) is a widely used monitoring framework in modern large-scale networks that provides fine-grained visibility into network…”
    Get full text
    Conference Proceeding
  12. 12

    Meta-analysis of the association of HLA-DRB1 with rheumatoid arthritis in Chinese populations by Yang, Meng, Kuang, Xiaocong, Li, Jianmin, Pan, Yanbin, Tan, Meile, Lu, Binzhu, Cheng, Qiumei, Wu, Lingyan, Pang, Guodong

    Published in BMC musculoskeletal disorders (27-10-2013)
    “…Individual studies have reported different results regarding the association of HLA alleles with RA in Chinese populations. This study was performed to…”
    Get full text
    Journal Article
  13. 13

    Clinicopathological characteristics of vascular endothelial growth factor expression in uveal melanoma: A meta-analysis by YANG, MENG, KUANG, XIAOCONG, PAN, YANBIN, TAN, MEILE, LU, BINZHU, LU, JIAN, CHENG, QIUMEI, LI, JIANMIN

    Published in Molecular and clinical oncology (01-05-2014)
    “…Angiogenesis is a potential prognostic factor that has been extensively investigated in patients with uveal melanoma (UM). Vascular endothelial growth factor…”
    Get full text
    Journal Article
  14. 14
  15. 15

    STEP: Spatial-Temporal Network Security Event Prediction by Cheng, Qiumei, Shen, Yi, Kong, Dezhang, Wu, Chunming

    Published 31-05-2021
    “…Network security events prediction helps network operators to take response strategies from a proactive perspective, and reduce the cost caused by network…”
    Get full text
    Journal Article
  16. 16

    Packet-Level Adversarial Network Traffic Crafting using Sequence Generative Adversarial Networks by Cheng, Qiumei, Zhou, Shiying, Shen, Yi, Kong, Dezhang, Wu, Chunming

    Published 08-03-2021
    “…The surge in the internet of things (IoT) devices seriously threatens the current IoT security landscape, which requires a robust network intrusion detection…”
    Get full text
    Journal Article
  17. 17

    Think That Attackers Think: Using First-Order Theory of Mind in Intrusion Response System by Cheng, Qiumei, Wu, Chunming, Hu, Bin, Kong, Dezhang, Zhou, Boyang

    “…The intrusion response system is dedicated to automatically respond to sophisticated network intrusions, which is a sequential decision-making problem for…”
    Get full text
    Conference Proceeding
  18. 18
  19. 19

    Machine Learning based Malicious Payload Identification in Software-Defined Networking by Cheng, Qiumei, WU, Chunming, Zhou, Haifeng, Kong, Dezhang, Zhang, Dong, Xing, Junchi, Ruan, Wei

    Published 04-01-2021
    “…Deep packet inspection (DPI) has been extensively investigated in software-defined networking (SDN) as complicated attacks may intractably inject malicious…”
    Get full text
    Journal Article