Name
Affiliation
Papers
ZHITANG LI
Network Center, Huazhong University of Science and Technology, Wuhan, China
74
Collaborators
Citations 
PageRank 
123
226
31.89
Referers 
Referees 
References 
588
985
564
Search Limit
100985
Title
Citations
PageRank
Year
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack00.342021
Three-dimensional histogram shifting for reversible data hiding.30.372018
A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video80.462016
An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video.00.342016
A Steganography Algorithm Based on ±1 DCT Coefficients for H.264/AVC00.342015
A Video Steganalysis Algorithm for H.264/AVC Based on the Markov Features10.362015
A Steganography Algorithm Using Multidimensional Coefficient Matching for H.264/AVC.00.342015
A novel P2P IPTV system for IPv4/v6 networks00.342014
A Data Hiding Algorithm For 3d Videos Based On Inter-Mbs10.352014
A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC50.422014
A robust data hiding algorithm for H.264/AVC video streams140.732013
Characterizing User Behavior in Weibo60.552012
A client/server based mechanism to prevent ARP spoofing attacks00.342012
Forward or ignore: User behavior analysis and prediction on microblogging50.442012
Reversible Data Hiding Scheme Based On H.264/AVC without Distortion Drift.90.552012
LeakProber: a framework for profiling sensitive data leakage paths40.412011
An Empirical Study of the Beezone System00.342011
Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks.60.482011
A novel real-time aggregation method on network security events.00.342011
Sina Microblog: An Information-Driven Online Social Network221.192011
A novel technique of recognising multi-stage attack behaviour40.542010
Measuring the botnet using the second character of bots10.342010
The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection20.392010
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic00.342010
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift230.972010
Using Simulation to Characterize Topology of Peer to Peer Botnets20.382009
An Efficient Worm Defense System Based Signature Extraction00.342009
Dynamic Forensics Based on Intrusion Tolerance20.412009
Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition00.342009
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN10.362009
Security Evaluation Method Based on Host Resource Availability00.342009
A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree30.382009
Measuring Peer-to-Peer Botnets Using Control Flow Stability30.462009
Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance50.522009
Measuring Botnet Size by Using URL and Collaborative MailServers10.362009
Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce20.382008
The Proposition and Certification of P2P Media Streaming Traffic Features00.342008
Design, modeling and simulation of a novel directional MAC protocol for ad hoc networks.00.342008
Mining Network Traffic for Worm Signature Extraction10.402008
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining90.602008
Managing data for evaluating trust in unstructured peer-to-peer networks00.342008
A P2P E-commerce Related Network Security Issue: P2P Worm00.342008
Fault-Tolerant Routing for P2P System with Structured Topology10.382008
The Global Synthetical Processing of Network Security Events10.432007
Assessing Attack Threat by the Probability of Following Attacks90.742007
Detecting botnets by analyzing DNS traffic10.352007
A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers20.702007
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction120.682007
Real-Time Correlation of Network Security Alerts160.832007
A Scalable Multicast Key Management To Expel A Malicious Receiver In Marks00.342007
  • 1
  • 2