His main research concerns Data mining, Computer network, Denial-of-service attack, Artificial intelligence and Network security. The Data mining study combines topics in areas such as Traffic classification, Statistical classification and Honeypot. The concepts of his Computer network study are interwoven with issues in Hash function, Mobile RFID and IP traceback.
His studies deal with areas such as Computer security, Crowds and Anomaly detection as well as Denial-of-service attack. He has researched Artificial intelligence in several fields, including Network topology, Machine learning and Speech recognition. His Network security study combines topics in areas such as Scheme, Information distance, Web service and Cloud computing.
Computer network, Computer security, Data mining, Distributed computing and Artificial intelligence are his primary areas of study. As part of his studies on Computer network, Wanlei Zhou often connects relevant areas like The Internet. Computer security is often connected to Denial-of-service attack in his work.
His research integrates issues of Classifier and Traffic classification in his study of Data mining. His Artificial intelligence study combines topics from a wide range of disciplines, such as Machine learning and Computer vision. His Differential privacy research integrates issues from Recommender system, Information privacy, Information sensitivity and Noise.
Wanlei Zhou spends much of his time researching Differential privacy, Computer security, Artificial intelligence, Data mining and Computer network. His study on Differential privacy also encompasses disciplines like
His research in Artificial intelligence focuses on subjects like Machine learning, which are connected to Classifier. His Data mining study frequently draws parallels with other fields, such as Noise. His Computer network study integrates concerns from other disciplines, such as Wireless, Cloud computing and Vehicular ad hoc network.
His primary areas of investigation include Differential privacy, Computer network, Server, Computer security and Artificial intelligence. His research on Differential privacy also deals with topics like
His work carried out in the field of Server brings together such families of science as Cloud computing, Task, Network packet and IP traceback. His study in Computer security is interdisciplinary in nature, drawing from both Proxy and Constant. His studies deal with areas such as Machine learning and Pattern recognition as well as Artificial intelligence.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Teaching and learning online with wikis
Naomi Augar;Ruth Raitman;Wanlei Zhou.
Australasian Society for Computers in Learning in Tertiary Education. Conference (21st : 2004 : Perth, W.A.) (2004)
Teaching and learning online with wikis
Naomi Augar;Ruth Raitman;Wanlei Zhou.
Australasian Society for Computers in Learning in Tertiary Education. Conference (21st : 2004 : Perth, W.A.) (2004)
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Yanli Yu;Keqiu Li;Wanlei Zhou;Ping Li.
Journal of Network and Computer Applications (2012)
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Yanli Yu;Keqiu Li;Wanlei Zhou;Ping Li.
Journal of Network and Computer Applications (2012)
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
Yang Xiang;Ke Li;Wanlei Zhou.
IEEE Transactions on Information Forensics and Security (2011)
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
Yang Xiang;Ke Li;Wanlei Zhou.
IEEE Transactions on Information Forensics and Security (2011)
Network Traffic Classification Using Correlation Information
Jun Zhang;Yang Xiang;Yu Wang;Wanlei Zhou.
IEEE Transactions on Parallel and Distributed Systems (2013)
Network Traffic Classification Using Correlation Information
Jun Zhang;Yang Xiang;Yu Wang;Wanlei Zhou.
IEEE Transactions on Parallel and Distributed Systems (2013)
Robust network traffic classification
Jun Zhang;Xiao Chen;Yang Xiang;Wanlei Zhou.
IEEE ACM Transactions on Networking (2015)
Robust network traffic classification
Jun Zhang;Xiao Chen;Yang Xiang;Wanlei Zhou.
IEEE ACM Transactions on Networking (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Swinburne University of Technology
University of Technology Sydney
Swinburne University of Technology
Deakin University
University of Illinois at Chicago
Beijing Normal University
Xidian University
University of California, Los Angeles
City University of Hong Kong
National Institutes of Health
Carnegie Mellon University
Adobe Systems (United States)
Aix-Marseille University
University of California, Los Angeles
University of Alabama in Huntsville
Rutgers, The State University of New Jersey
Chinese Academy of Sciences
University of Duisburg-Essen
University of British Columbia
Washington State University
General Electric (United States)
Oswaldo Cruz Foundation
Utrecht University
University of California, San Diego
Centre for Mental Health
École Normale Supérieure