Qing Li
Qing Li
Southern University of Science and Technology, Shenzhen, China
Verified email at sustech.edu.cn - Homepage
Title
Cited by
Cited by
Year
On the scalability of router forwarding tables: Nexthop-selectable FIB aggregation
Q Li, D Wang, M Xu, J Yang
2011 Proceedings IEEE INFOCOM, 321-325, 2011
352011
Towards mitigating link flooding attack via incremental SDN deployment
L Wang, Q Li, Y Jiang, J Wu
2016 IEEE Symposium on Computers and Communication (ISCC), 397-402, 2016
272016
Design and analysis of SEIQR worm propagation model in mobile internet
X Xiao, P Fu, C Dou, Q Li, G Hu, S Xia
Communications in nonlinear science and numerical simulation 43, 341-350, 2017
222017
Detection and prevention of code injection attacks on HTML5-based apps
X Xiao, R Yan, R Ye, Q Li, S Peng, Y Jiang
2015 Third International Conference on Advanced Cloud and Big Data, 254-261, 2015
132015
Session-based access control in information-centric networks: Design and analyses
Y Wang, M Xu, Z Feng, Q Li, Q Li
2014 IEEE 33rd International Performance Computing and Communications …, 2014
132014
Woodpecker: Detecting and Mitigating Link-flooding Attacks via SDN
L Wang, Q Li, Y Jiang, X Jia, J Wu
Elsevier Computer Networks 147, 1-13, 2018
122018
MDTC: An efficient approach to TCAM-based multidimensional table compression
H Zhu, M Xu, Q Li, J Li, Y Yang, S Li
2015 IFIP Networking Conference (IFIP Networking), 1-9, 2015
122015
Toward latency-aware dynamic middlebox scheduling
P Duan, Q Li, Y Jiang, ST Xia
2015 24th International Conference on Computer Communication and Networks …, 2015
112015
A low overhead flow-holding algorithm in software-defined networks
X Jia, Q Li, Y Jiang, Z Guo, J Sun
Computer Networks 124, 170-180, 2017
92017
Joint optimization of content replication and Traffic Engineering in ICN
Z Feng, M Xu, Y Yang, Q Li, Y Wang, Q Li, B Ohlman, M Chen
2015 IEEE 40th Conference on Local Computer Networks (LCN), 55-63, 2015
92015
Quokka: Latency-Aware Middlebox Scheduling with dynamic resource allocation
Q Li, Y Jiang, P Duan, M Xu, X Xiao
Journal of Network and Computer Applications 78, 253-266, 2017
82017
A declarative failure recovery system in software defined networks
H Li, Q Li, Y Jiang, T Zhang, L Wang
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
82016
ANNs on Co-occurrence Matrices for Mobile Malware Detection.
X Xiao, Z Wang, Q Li, Q Li, Y Jiang
TIIS 9 (7), 2736-2754, 2015
82015
Towards Adaptive Elastic Distributed Software Defined Networking
Y Chen, Q Li, Y Yang, Q Li, Y Jiang, X Xiao
IPCCC 2015, 2015
82015
A dynamic execution offloading model for efficient mobile cloud computing
Y Jiang, J He, Q Li, X Xiao
2014 IEEE Global Communications Conference, 2302-2307, 2014
72014
Detecting mobile malware with TMSVM
X Xiao, X Xiao, Y Jiang, Q Li
International Conference on Security and Privacy in Communication Networks …, 2014
62014
Minimum Protection Cost Tree: A tunnel-based IP Fast Reroute Scheme
M Xu, Q Li, L Pan, Q Li, D Wang
Computer Communications 35 (17), 2082-2092, 2012
62012
A smart routing scheme for named data networks
Q Li, Z Zhao, M Xu, Y Jiang, Y Yang
Computer Communications 103 (C), 83-93, 2017
52017
Two effective methods to detect mobile malware
X Xiao, P Fu, X Xiao, Y Jiang, Q Li, R Lu
2015 4th International Conference on Computer Science and Network Technology …, 2015
52015
RAPIT: RTT-aware pending interest table for content centric networking
Y Tan, Q Li, Y Jiang, S Xia
2015 IEEE 34th International Performance Computing and Communications …, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20