default search action
Zhitang Li
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Zhitang Li, Henry Xu, Ruxia Lyu:
Effectiveness analysis of the data-driven strategy of AI chips supply chain considering blockchain traceability with capacity constraints. Comput. Ind. Eng. 189: 109947 (2024) - [j25]Zhitang Li, Cuihua Zhang, Ruxia Lyu, Yong Ma:
The optimal encroachment strategy of private-label considering the quality effort and platform's e-word-of-mouth. Electron. Commer. Res. 24(3): 1681-1712 (2024) - 2023
- [j24]Ruxia Lyu, Cuihua Zhang, Zhitang Li, Xiaolin Zou:
Impact of regulatory intervention on green technology and innovation investment of the NEV automaker. Comput. Ind. Eng. 184: 109439 (2023) - [j23]Ruxia Lyu, Cuihua Zhang, Zhitang Li, Chunyu Li:
Who benefits from offline investment: an analysis of strategic interactions between e-book pricing and bookstores' investment. Electron. Commer. Res. 23(4): 2605-2645 (2023) - 2022
- [j22]Ruxia Lyu, Cuihua Zhang, Zhitang Li, Yanting Li:
Manufacturers' integrated strategies for emission reduction and recycling: The role of government regulations. Comput. Ind. Eng. 163: 107769 (2022) - [j21]Zhitang Li, Cuihua Zhang, Xiaoxu Wang, Ruxia Lyu:
The optimal integration strategy and authorization mechanism of AI chip with the architecture design capacity. Comput. Ind. Eng. 168: 108027 (2022) - 2021
- [j20]Haider Salim, Zhitang Li:
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack. IT Prof. 23(1): 72-85 (2021)
2010 – 2019
- 2018
- [j19]Juan Zhao, Zhitang Li:
Three-dimensional histogram shifting for reversible data hiding. Multim. Syst. 24(1): 95-109 (2018) - 2016
- [j18]Juan Zhao, Zhitang Li, Bing Feng:
A novel two-dimensional histogram modification for reversible data embedding into stereo H.264 video. Multim. Tools Appl. 75(10): 5959-5980 (2016) - [c70]Liyun Qian, Zhitang Li, Pei Zhou, Jian Chen:
An Improved Matrix Encoding Steganography Algorithm Based on H.264 Video. CSCloud 2016: 256-260 - 2015
- [j17]Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang:
Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack. Comput. J. 58(4): 973-985 (2015) - [j16]Guanghua Song, Zhitang Li, Juan Zhao, Jun Hu, Hao Tu:
A reversible video steganography algorithm for MVC based on motion vector. Multim. Tools Appl. 74(11): 3759-3782 (2015) - [c69]Xiu Nan, Zhou Pei, Zhitang Li:
A Steganography Algorithm Based on ±1 DCT Coefficients for H.264/AVC. FCST 2015: 259-263 - [c68]Ting Da, Zhitang Li, Bing Feng:
A Video Steganalysis Algorithm for H.264/AVC Based on the Markov Features. ICIC (2) 2015: 47-59 - [c67]Liyun Qian, Zhitang Li, Bing Feng:
A Steganography Algorithm Using Multidimensional Coefficient Matching for H.264/AVC. ICIC (2) 2015: 216-225 - 2014
- [j15]Yunxia Liu, Zhitang Li, Xiaojing Ma, Jian Liu:
A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC. Multim. Tools Appl. 72(1): 613-636 (2014) - [j14]Zhengbiao Guo, Zhitang Li, Hao Tu, Shuyu Liu:
A novel P2P IPTV system for IPv4/v6 networks. Multim. Tools Appl. 72(1): 967-986 (2014) - [j13]Zhengbiao Guo, Zhitang Li, Hao Tu, Da Xie:
Weibo: An Information-Driven Online Social Network. Trans. Comput. Sci. 22: 3-16 (2014) - [c66]Mingguang Zou, Zhitang Li:
A Wav-Audio Steganography Algorithm Based on Amplitude Modifying. CIS 2014: 489-493 - [c65]Guanghua Song, Zhitang Li, Juan Zhao, Hao Tu, Junxia Cheng:
A video steganography algorithm for MVC without distortion drift. ICAILP 2014: 738-742 - [c64]Guanghua Song, Zhitang Li, Juan Zhao, Mingguang Zou:
A Data Hiding Algorithm for 3D Videos Based on Inter-MBs. ICIC (1) 2014: 541-552 - 2013
- [j12]Yunxia Liu, Zhitang Li, Xiaojing Ma, Jian Liu:
A robust data hiding algorithm for H.264/AVC video streams. J. Syst. Softw. 86(8): 2174-2183 (2013) - 2012
- [j11]Yunxia Liu, Zhitang Li, Xiaojing Ma:
Reversible Data Hiding Scheme Based On H.264/AVC without Distortion Drift. J. Softw. 7(5): 1059-1065 (2012) - [c63]Guanghua Song, Zhitang Li, Hao Tu:
Forward or ignore: User behavior analysis and prediction on microblogging. CSCWD 2012: 678-684 - [c62]Guanghua Song, Zhitang Li, Hao Tu:
Forward or Ignore: User Behavior Analysis and Prediction on Microblogging. IEA/AIE 2012: 231-241 - [c61]Zhengbiao Guo, Zhitang Li, Hao Tu, Long Li:
Characterizing User Behavior in Weibo. MUSIC 2012: 60-65 - [c60]Haider Salim, Zhitang Li, Hao Tu, Zhengbiao Guo:
A Client/Server Based Mechanism to Prevent ARP Spoofing Attacks. ICSI (2) 2012: 254-263 - 2011
- [j10]Jie Ma, Zhitang Li, Bingbing Wang:
Application of Singular Spectrum Analysis to the Noise Reduction of Intrusion Detection Alarms. J. Comput. 6(8): 1715-1722 (2011) - [j9]Zhitang Li, Yang-ming Ma, Li Wang, Jie Lei, Jie Ma:
A novel real-time aggregation method on network security events. Kybernetes 40(5/6): 912-920 (2011) - [j8]Huaiqing Lin, Zhitang Li, Qingfeng Huang:
Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks. Peer-to-Peer Netw. Appl. 4(4): 376-390 (2011) - [c59]Junfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li:
LeakProber: a framework for profiling sensitive data leakage paths. CODASPY 2011: 75-84 - [c58]Zhengbiao Guo, Zhitang Li, Hao Tu:
Sina Microblog: An Information-Driven Online Social Network. CW 2011: 160-167 - [c57]Shuyu Liu, Zhengbiao Guo, Zhitang Li, Hao Tu:
An Empirical Study of the Beezone System. PDCAT 2011: 146-151 - 2010
- [j7]Li Wang, Yao Li, Zhitang Li:
A novel technique of recognising multi-stage attack behaviour. Int. J. High Perform. Comput. Netw. 6(3/4): 174-180 (2010) - [j6]Zhitang Li, Jun Hu, Zhengbing Hu, Bingbing Wang, Liang Tang, Xin Yi:
Measuring the botnet using the second character of bots. J. Networks 5(1): 98-105 (2010) - [j5]Zhitang Li, Binbin Wang, Dong Li, Hao Chen, Feng Liu, ZhengBin Hu:
The Aggregation and Stability Analysis of Network Traffic for Structured-P2P-based Botnet Detection. J. Networks 5(5): 517-526 (2010) - [j4]Feng Liu, Zhitang Li, Zhengbing Hu, Lijuan Zhou, Bin Liu, Junfeng Yu:
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic. J. Networks 5(5): 577-585 (2010) - [j3]Xiaojing Ma, Zhitang Li, Hao Tu, Bochao Zhang:
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift. IEEE Trans. Circuits Syst. Video Technol. 20(10): 1320-1330 (2010)
2000 – 2009
- 2009
- [j2]Hao Tu, Zhitang Li, Bin Liu, Yejiang Zhang:
An Efficient Worm Defense System Based Signature Extraction. Int. J. Distributed Sens. Networks 5(1): 23 (2009) - [c56]Binbin Wang, Zhitang Li, Hao Tu, Jie Ma:
Measuring Peer-to-Peer Botnets Using Control Flow Stability. ARES 2009: 663-669 - [c55]Lin Chen, Zhitang Li, Cuixia Gao, Yingshu Liu:
Modeling and Analyzing Dynamic Forensics System Based on Intrusion Tolerance. CIT (2) 2009: 230-235 - [c54]Meizhen Wang, Zhitang Li, Sheng Zhong:
A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree. CIT (2) 2009: 236-241 - [c53]Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou:
Using Simulation to Characterize Topology of Peer to Peer Botnets. ICCMS 2009: 78-83 - [c52]Jun Hu, Zhitang Li, Dezhong Yao, Junfeng Yu:
Measuring Botnet Size by Using URL and Collaborative MailServers. ICNS 2009: 161-164 - [c51]Meizhen Wang, Zhitang Li, Sheng Zhong:
Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition. ISPA 2009: 463-468 - [c50]Lin Chen, Zhitang Li, Cuixia Gao, Lan Liu:
Dynamic Forensics Based on Intrusion Tolerance. ISPA 2009: 469-473 - [c49]Cuixia Gao, Zhitang Li, Haigang Song:
Security Evaluation Method Based on Host Resource Availability. MUE 2009: 499-504 - [c48]Yunhe Zhang, Zhitang Li, Song Mei, Cai Fu:
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN. MUE 2009: 505-510 - 2008
- [j1]Jun Fan, Zhitang Li, Wei Nie:
Design, modeling and simulation of a novel directional MAC protocol for ad hoc networks. Kybernetes 37(9/10): 1287-1296 (2008) - [c47]Feng Liu, Zhitang Li:
A Measurement and Modeling Study of P2P IPTV Applications. CIS (1) 2008: 114-119 - [c46]Chuiwei Lu, Zhitang Li, Huaiqing Lin, Qingfeng Huang:
Fault-Tolerant Routing for P2P System with Structured Topology. CSSE (3) 2008: 102-105 - [c45]Zhengbing Hu, Zhitang Li, Junqi Wu:
A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. e-Forensics 2008: 45 - [c44]Hao Tu, Zhitang Li, Bin Liu:
Mining Network Traffic for Worm Signature Extraction. FSKD (4) 2008: 327-331 - [c43]Jie Ma, Zhitang Li, Weiming Li:
Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. FSKD (4) 2008: 379-384 - [c42]Zhitang Li, Huaiqing Lin, Chuiwei Lu, Yejiang Zhang:
Managing Data for Evaluating Trust in Unstructured Peer-to-Peer Networks. GPC 2008: 308-318 - [c41]Li-Juan Zhou, Zhitang Li, Bin Liu:
The Proposition and Certification of P2P Media Streaming Traffic Features. ICNC (5) 2008: 281-285 - [c40]Huaiqing Lin, Zhitang Li, Yejiang Zhang, Chuiwei Lu:
Hierarchical Fuzzy Trust Management for Customer-to-Customer in Peer-to-Peer eCommerce. ISCSCT (2) 2008: 175-179 - [c39]Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin:
A P2P E-commerce Related Network Security Issue: P2P Worm. ISECS 2008: 114-117 - [c38]Dong Li, Zhitang Li, Jie Ma:
Processing Intrusion Detection Alerts in Large-scale Network. ISECS 2008: 545-548 - [c37]Hui Liu, Zhitang Li:
Methodology of Network Intrusion Detection System Penetration Testing. WAIM 2008: 546-551 - [c36]Zhengbing Hu, Zhitang Li, Junqi Wu:
A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. WKDD 2008: 10-16 - 2007
- [c35]Zhitang Li, Shudong Shi:
A Secure Routing Protocol for Mobile Ad hoc Networks. ACIS-ICIS 2007: 153-157 - [c34]Zhitang Li, Aifang Zhang, Dong Li, Li Wang:
Discovering Novel Multistage Attack Strategies. ADMA 2007: 45-56 - [c33]Dong Li, Zhitang Li, Li Wang:
Reducing False Positives Based on Time Sequence Analysis. FSKD (4) 2007: 67-71 - [c32]Zhitang Li, Jie Lei, Li Wang, Dong Li:
A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. FSKD (4) 2007: 307-311 - [c31]Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li:
The Global Synthetical Processing of Network Security Events. FSKD (2) 2007: 492-496 - [c30]Sisi Huang, Zhitang Li, Li Wang:
Mining Attack Correlation Scenarios Based on Multi-agent System. HCI (8) 2007: 632-641 - [c29]Zhitang Li, Aifang Zhang, Jie Lei, Li Wang:
Real-Time Correlation of Network Security Alerts. ICEBE 2007: 73-80 - [c28]Li Wang, Zhitang Li, Jie Lei:
Learning attack strategies through mining and correlation of security alarms. Integrated Network Management 2007: 713-716 - [c27]Zhitang Li, Jun Fan, Wei Nie, Li Wang, Yuan Chen:
A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control. MUE 2007: 347-352 - [c26]Qingfeng Huang, Zhitang Li, Yejing Zhang, Chuiwei Lu:
A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur Integers. MUE 2007: 729-732 - [c25]Zhitang Li, Jie Lei, Li Wang, Dong Li:
Assessing Attack Threat by the Probability of Following Attacks. IEEE NAS 2007: 91-100 - [c24]Aifang Zhang, Zhitang Li, Dong Li, Li Wang:
Discovering Novel Multistage Attack Patterns in Alert Streams. IEEE NAS 2007: 115-121 - [c23]Xiaojing Ma, Zhitang Li, Yao Li, Jiping Zhang:
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. IEEE NAS 2007: 265-266 - [c22]Zhitang Li, Jie Lei, Li Wang, Dong Li, Yang-ming Ma:
Towards Identifying True Threat from Network Security Data. PAISI 2007: 160-171 - [c21]Yang-ming Ma, Zhitang Li, Jie Lei, Li Wang, Dong Li:
An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events. PAISI 2007: 316-317 - [c20]Hao Tu, Zhitang Li, Bin Liu:
Detecting Botnets by Analyzing DNS Traffic. PAISI 2007: 323-324 - [c19]Li-Juan Zhou, Zhitang Li, Hao Tu:
Proposion and Analysis of a TCP Feature of P2P Traffic. PAKDD 2007: 1148-1155 - [c18]Qingfeng Huang, Zhitang Li, Huaiqing Lin, Yejiang Zhang:
A Modified CCC for More Efficient Keyword Search in DHT-Based Peer-to-Peer Network. SKG 2007: 462-466 - [c17]Li Wang, Zhitang Li, Dong Li, Jie Lei:
Attack scenario construction with a new sequential mining technique. SNPD (1) 2007: 872-877 - [c16]Li Wang, Zhitang Li, Jie Ma, Yang-ming Ma, Aifang Zhang:
Automatic attack plan recognition from intrusion alerts. SNPD (3) 2007: 1170-1175 - 2006
- [c15]Lan Liu, Jun Lin, Zhitang Li, Jiachun Li:
State Machine Based CDMA Stress Testing Service System. APSCC 2006: 625-628 - [c14]Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li:
Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. ATC 2006: 398-407 - [c13]Zhitang Li, Xue Cui, Lin Chen:
Analysis And Classification of IPSec Security Policy Conflicts. FCST 2006: 83-88 - [c12]Li Wang, Zhitang Li, Jie Lei, Yao Li:
A novel algorithm SF for mining attack scenarios model. ICEBE 2006: 55-61 - [c11]Yao Li, Zhitang Li, Li Wang:
Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. ICIC (1) 2006: 553-562 - [c10]Lijuan Zhou, Zhitang Li, Bin Liu:
P2P Traffic Identification by TCP Flow Analysis. IWNAS 2006: 47-50 - [c9]Li Wang, Zhitang Li, Qi-hong Wang:
A novel technique of recognizing multi-stage attack behaviour. IWNAS 2006: 188-193 - [c8]Lingfang Zeng, Ke Zhou, Zhan Shi, Dan Feng, Fang Wang, Changsheng Xie, Zhitang Li, Zhanwu Yu, Jianya Gong, Qiang Cao, Zhongying Niu, Lingjun Qin, Qun Liu, Yao Li:
Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid. SC 2006: 325 - [c7]Yao Li, Zhitang Li, Shuyu Liu:
A Fuzzy Anomaly Detection Algorithm for IPv6. SKG 2006: 67 - 2005
- [c6]Lan Liu, Zhitang Li, Yong Xu, Chenggang Mei, Xiaoling Tan:
A wavelet based distributed ID model. IEEE SCC 2005: 261-263 - [c5]Zhanchun Li, Zhitang Li, Yao Li, Bin Liu:
Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. CIS (2) 2005: 309-314 - [c4]Bin Liu, Zhitang Li, Zhanchun Li:
An Image Hiding Algorithm Based on Bit Plane. CIS (2) 2005: 611-616 - [c3]Yao Li, Zhitang Li, Hao Tu:
Dynamic immune intrusion detection system for IPv6. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 374- - [c2]Zhitang Li, Wei Guo, Fuquan Xu:
Dependable Propagating Routing Information in MANET. ICCNMC 2005: 772-780 - [c1]Liu Bin, Zhitang Li, Yao Li:
An Image Hiding Method Based on Correlation Analysis and Image Fusion. PDCAT 2005: 1049-1051
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint