default search action
Hongchao Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Shuyi Li, Hongchao Hu, Shumin Huo, Hao Liang:
Clean, performance-robust, and performance-sensitive historical information based adversarial self-distillation. IET Comput. Vis. 18(5): 591-612 (2024) - [j23]Shuyi Li, Xiaohan Yang, Guozhen Cheng, Wenyan Liu, Hongchao Hu:
SA-MDRAD: sample-adaptive multi-teacher dynamic rectification adversarial distillation. Multim. Syst. 30(4): 225 (2024) - 2023
- [j22]Shuai Zhang, Yunfei Guo, Zehua Guo, Hongchao Hu, Guozhen Chen:
SMAF: a secure and makespan-aware framework for executing serverless workflows. Sci. China Inf. Sci. 66(3) (2023) - [j21]Xin Shi, Yunfei Guo, Hongchao Hu, Yawen Wang, Zhen Gao, Xiaoli Sun:
Blind matching algorithm based proxy distribution against internet censorship. IET Commun. 17(7): 863-877 (2023) - [c13]Yuanbo Li, Hongchao Hu, Shuai Zhang, Guozhen Cheng, Wenyan Liu:
An Active Security Defense Strategy for Microservices based on Deep Reinforcement Learning. ISPA/BDCloud/SocialCom/SustainCom 2023: 410-415 - 2022
- [j20]Huanruo Li, Yunfei Guo, Shumin Huo, Hongchao Hu, Penghao Sun:
Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. Sci. China Inf. Sci. 65(7): 1-19 (2022) - [j19]Dacheng Zhou, Hongchang Chen, Ke Shang, Guozhen Cheng, Jianpeng Zhang, Hongchao Hu:
Cushion: A proactive resource provisioning method to mitigate SLO violations for containerized microservices. IET Commun. 16(17): 2105-2122 (2022) - 2020
- [c12]Soyoung Jung, Hyejin Hannah Kum-Biocca, Frank A. Biocca, SungMu Hong, Mincheol Shin, Hongchao Hu:
Evaluating Global Integrated Transportation Application for Mega Event: Role of Trust and Exchanging Personal Information in Mobility as a Service (MaaS). HCI (49) 2020: 575-584
2010 – 2019
- 2019
- [j18]Chao Yang, Yunfei Guo, Hongchao Hu:
MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks. IEEE Access 7: 2179-2199 (2019) - [j17]Qing Tong, Yunfei Guo, Hongchao Hu, Wenyan Liu, Guozhen Cheng, Ling-shu Li:
A Diversity Metric Based Study on the Correlation between Diversity and Security. IEICE Trans. Inf. Syst. 102-D(10): 1993-2003 (2019) - [j16]Yang Chen, Hongchao Hu, Guozhen Cheng:
Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional network properties. Frontiers Inf. Technol. Electron. Eng. 20(2): 238-252 (2019) - [j15]Chao Yang, Yun-fei Guo, Hongchao Hu, Yawen Wang, Qing Tong, Ling-shu Li:
Driftor: mitigating cloud-based side-channel attacks by switching and migrating multi-executor virtual machines. Frontiers Inf. Technol. Electron. Eng. 20(5): 731-748 (2019) - 2018
- [j14]Hongchao Hu, Jiangxing Wu, Zhenpeng Wang, Guozhen Cheng:
Mimic defense: a designed-in cybersecurity defense framework. IET Inf. Secur. 12(3): 226-237 (2018) - [j13]Chao Yang, Yunfei Guo, Hongchao Hu, Wenyan Liu:
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. KSII Trans. Internet Inf. Syst. 12(12): 6098-6122 (2018) - [j12]Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng:
Scientific workflow execution system based on mimic defense in the cloud environment. Frontiers Inf. Technol. Electron. Eng. 19(12): 1522-1536 (2018) - 2017
- [j11]Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu:
MNOS: a mimic network operating system for software defined networks. IET Inf. Secur. 11(6): 345-355 (2017) - [j10]Hongchao Hu, Fan Zhang, Yu-xing Mao, Zhenpeng Wang:
A forwarding graph embedding algorithm exploiting regional topology information. Frontiers Inf. Technol. Electron. Eng. 18(11): 1854-1866 (2017) - [c11]Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang:
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture. CyberC 2017: 50-53 - [c10]Chao Qi, Jiangxing Wu, Hongchang Chen, Hongtao Yu, Hongchao Hu, Guozhen Cheng:
Game-Theoretic Analysis for Security of Various Software-Defined Networking (SDN) Architectures. VTC Spring 2017: 1-5 - 2016
- [j9]Guozhen Cheng, Hongchang Chen, Hongchao Hu, Julong Lan:
Dynamic switch migration towards a scalable SDN control plane. Int. J. Commun. Syst. 29(9): 1482-1499 (2016) - [c9]Zhiming Wang, Jiangxing Wu, Zehua Guo, Guozhen Cheng, Hongchao Hu:
Secure virtual network embedding to mitigate the risk of covert channel attacks. INFOCOM Workshops 2016: 144-145 - [c8]Chao Qi, Jiangxing Wu, Hongchao Hu, Guozhen Cheng, Wenyan Liu, Jianjian Ai, Chao Yang:
An intensive security architecture with multi-controller for SDN. INFOCOM Workshops 2016: 401-402 - 2015
- [j8]Guozhen Cheng, Hongchang Chen, Hongchao Hu, Zhiming Wang, Julong Lan:
Enabling network function combination via service chain instantiation. Comput. Networks 92: 396-407 (2015) - [j7]Yu Xing Mao, Yunfei Guo, Hongchao Hu, Ming Zhi Wang, Teng Ma:
Sharing Based Virtual Network Embedding Algorithm With Dynamic Resource Block Generation. IEEE Commun. Lett. 19(12): 2126-2129 (2015) - [j6]Guozhen Cheng, Hongchang Chen, Zhiming Wang, Peng Yi, Fengyu Zhang, Hongchao Hu:
Towards Adaptive Network Nodes via Service Chain Construction. IEEE Trans. Netw. Serv. Manag. 12(2): 248-262 (2015) - [c7]Hong Jiang, Shuqiao Chen, Hongchao Hu, Mingming Zhang:
Superpoint-based detection against distributed denial of service (DDoS) flooding attacks. LANMAN 2015: 1-6 - 2014
- [j5]Guozhen Cheng, Hongchang Chen, Shuqiao Chen, Hongchao Hu, Peng Yi:
How to Make Network Nodes Adaptive? IEEE Commun. Lett. 18(3): 515-518 (2014) - 2012
- [j4]Hongchao Hu, Yunfei Guo, Peng Yi, Julong Lan:
Achieve load balancing with a dynamic re-routing CICQ switching scheme. Sci. China Inf. Sci. 55(2): 407-418 (2012) - [j3]Hongchao Hu, Yunfei Guo, Peng Yi, Julong Lan:
Achieving fair service with a hybrid scheduling scheme for CICQ switches. Sci. China Inf. Sci. 55(3): 689-700 (2012) - [c6]Hongchao Hu, Zhihui Xu:
A Load Balanced Differentiated Services Support CICQ Switch. ICDMA 2012: 66-71 - 2011
- [j2]Chengwei Wan, Julong Lan, Hongchao Hu:
Accelerated Adaptive Deterministic Packet Marking. IEICE Trans. Commun. 94-B(12): 3592-3594 (2011) - [j1]Hongchao Hu, Yunfei Guo, Peng Yi, Shuqiao Chen:
Load-balanced differentiated services support switch. IET Commun. 5(13): 1895-1906 (2011) - [c5]Hongchang Chen, Hongchao Hu, Peng Yi, Shuqiao Chen:
Achieve Load Balancing with a Re-routable LB-BvN Switching Scheme. ACIS-ICIS 2011: 35-41 - [c4]Hongchao Hu, Peng Yi, Shuqiao Chen, Julong Lan:
Achieving Fair Service with a Layered Scheduling Scheme for CICQ Switches. ICDMA 2011: 137-142 - 2010
- [c3]Youjun Bu, Hong Guo, Hongchao Hu, Binqiang Wang:
A Traffic Splitting Algorithm Based on Dual Hash Table for Multi-path Internet Routing. MVHI 2010: 397-400
2000 – 2009
- 2009
- [c2]Peng Yi, Hongchao Hu, Binqiang Wang, Hui Li:
PMUF: A High-Performance Scheduling Algorithm for DiffServ Classes. CSO (1) 2009: 344-350 - 2008
- [c1]Hongchao Hu, Peng Yi, Yunfei Guo, Hui Li:
A Fair Service and Dynamic Round Robin scheduling scheme for CICQ switches. ICT 2008: 1-6
Coauthor Index
aka: Guo-zhen Cheng
aka: Yun-fei Guo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint