Name
Papers
Collaborators
ZHI-LI ZHANG
259
388
Citations 
PageRank 
Referers 
4063
317.10
8260
Referees 
References 
4402
2891
Search Limit
1001000
Title
Citations
PageRank
Year
SCCS: Smart Cloud Commuting System With Shared Autonomous Vehicles00.342022
VeerEdge: Towards an Edge-Centric IoT Gateway00.342021
Introduction to the Special Issue on Urban Computing and Smart Cities00.342021
AggreFlow: Achieving Power Efficiency, Load Balancing, and Quality of Service in Data Center Networks00.342021
Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput60.412020
Enhancing Performance, Security, and Management in Network Function Virtualization00.342020
A Closer Look at NFV Execution Models00.342019
Performance Estimation and Evaluation Framework for Caching Policies in Hierarchical Caches00.342019
Clairvoyant Networks.00.342019
Stability and Generalization of Graph Convolutional Neural Networks70.442019
CityLines: Designing Hybrid Hub-and-Spoke Transit System with Urban Big Data00.342019
Joint Switch Upgrade and Controller Deployment in Hybrid Software-Defined Networks60.462019
Mining latent patterns in geoMobile data via EPIC.00.342019
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, CoNEXT 2019, Orlando, FL, USA, December 09-12, 2019.00.342019
Towards a Graph Signal Processing Framework for Modeling Power System Dynamics00.342019
Making content caching policies 'smart' using the deepcache framework.30.402018
Learning and Management for Internet-of-Things: Accounting for Adaptivity and Scalability.20.362018
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model.20.382018
R-BBG2: Recursive Bipartition of Bi-connected Graphs.00.342018
Avoidance Markov Metrics and Node Pivotality Ranking.00.342018
Hunt For The Unique, Stable, Sparse And Fast Feature Learning On Graphs.100.572017
BIG Cache Abstraction for Cache Networks10.352017
Multi-touch Authentication Using Hand Geometry and Behavioral Information80.452017
From Fingerprint to Footprint: Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs.00.342017
Network-Assisted Raft Consensus Algorithm20.482017
ParaBox: Exploiting Parallelism for Virtual Network Functions in Service Chaining.170.882017
Network delay guarantee for differentiated services in content-centric networking80.482016
Most Calls Are Local (But Some Are Regional): Dissecting Cellular Communication Patterns.00.342016
Sampling Big Trajectory Data50.412015
Voter Model On Signed Social Networks120.772015
Application-aware data plane processing in SDN110.782014
Experience in Implementing & Deploying a Non-IP Routing Protocol VIRO in GENI00.342014
Towards Network-level Efficiency for Cloud Storage Services311.152014
Detecting malicious HTTP redirections using trees of user browsing activity40.482014
Secgras: Security Group Analysis as a Cloud Service30.422014
Achieving Efficient Flooding by Utilizing Link Correlation in Wireless Sensor Networks130.612013
Energy-synchronized computing for sustainable sensor networks110.692013
Understanding the complexity of 3G UMTS network performance60.512013
Exploring venue popularity in Foursquare240.862013
Challenges, Designs, and Performances of Large-Scale Open-P2SP Content Distribution40.442013
Mosaic: quantifying privacy leakage in mobile networks170.942013
Are call detail records biased for sampling human mobility?351.522012
Achieving long-term operation with a capacitor-driven energy storage and sharing network80.502012
A Modular Machine Learning System for Flow-Level Traffic Classification in Large Networks361.402012
Cloud transcoder: bridging the format and resolution gap between internet videos and mobile devices512.172012
Maximizing the bandwidth multiplier effect for hybrid cloud-P2P content distribution40.452012
Digraph Laplacian And The Degree Of Asymmetry70.512012
How do you 'Tube'10.402011
A cloud queuing service with strong consistency and high availability10.352011
Where Do You "Tube"? Uncovering YouTube Server Selection Strategy341.842011
  • 1
  • 2