default search action
Changqing An
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Shuaicong Yu, Shuying Zhuang, Tao Yu, Changqing An, Jilong Wang:
Rumors Stop with the Wise: Unveiling Inbound SAV Deployment through Spoofed ICMP Messages. IMC 2024: 199-213 - [c30]Jun He, Yahui Li, Han Zhang, Changqing An, Jilong Wang:
ROV-GD: Improving the Measurement of ROV Deployment Using Graph Difference. ISCC 2024: 1-7 - [c29]Chengyuan Zhang, Changqing An, Tao Yu, Zhiyan Zheng, Jilong Wang:
Investigate and Improve the Certificate Revocation in Web PKI. NOMS 2024: 1-5 - 2023
- [j11]Luoyi Jin, Zhipeng Wang, Shijie Tian, Jintao Feng, Changqing An, Huirong Xu:
Grasping perception and prediction model of kiwifruit firmness based on flexible sensing claw. Comput. Electron. Agric. 215: 108389 (2023) - [j10]Chao Xu, Jessie Hui Wang, Jilong Wang, Tao Yu, Yipeng Zhou, Yuedong Xu, Di Wu, Changqing An:
Offloading Elastic Transfers to Opportunistic Vehicular Networks Based on Imperfect Trajectory Prediction. IEEE/ACM Trans. Netw. 31(1): 279-293 (2023) - [c28]Jun He, Yahui Li, Han Zhang, Ming Wang, Changqing An, Jilong Wang:
Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors. ICC 2023: 3774-3780 - [c27]Chengwan Zhang, Congcong Miao, Changqing An, Anlun Hong, Ning Wang, Zhiquan Wang, Jilong Wang:
Metis: Detecting Fake AS-PATHs Based on Link Prediction. ISCC 2023: 656-662 - [c26]Allen Hong, Yahui Li, Han Zhang, Ming Wang, Changqing An, Jilong Wang:
A cheap and accurate delay-based IP Geolocation method using Machine Learning and Looking Glass. IFIP Networking 2023: 1-9 - [c25]Yujia Liu, Changqing An, Tao Yu, Zhiyan Zheng, Zidong Pei, Jilong Wang, Chalermpol Charnsripinyo:
Evaluating and Improving Regional Network Robustness from an AS TOPO Perspective. NOMS 2023: 1-7 - 2022
- [c24]Shuaicong Yu, Changqing An, Tao Yu, Ziyi Zhao, Tianshu Li, Jilong Wang:
Phishing Detection Based on Multi-Feature Neural Network. IPCCC 2022: 73-79 - [c23]Ziyi Zhao, Yingya Guo, Jessie Hui Wang, Haibo Wang, Chengyuan Zhang, Changqing An:
CL-ETC: A Contrastive Learning Method for Encrypted Traffic Classification. IFIP Networking 2022: 1-9 - [c22]Kunling He, Changqing An, Jessie Hui Wang, Tianshu Li, Linmei Zu, Fenghua Li:
Multi-hop Precision Time Protocol: an Internet Applicable Time Synchronization Scheme. NOMS 2022: 1-9 - [c21]Shuying Zhuang, Jessie Hui Wang, Jilong Wang, Changqing An, Yuedong Xu, Tianhao Wu:
Predicting Unseen Links Using Learning-based Matrix Completion. NOMS 2022: 1-9 - 2021
- [c20]Chengyuan Zhang, Changqing An, Jessie Hui Wang, Ziyi Zhao, Tao Yu, Jilong Wang:
SAFSN: A Self-Attention Based Neural Network for Encrypted Mobile Traffic Classification. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 330-337
2010 – 2019
- 2019
- [j9]Jessie Hui Wang, Jilong Wang, Changqing An, Qianli Zhang:
A survey on resource scheduling for data transfers in inter-datacenter WANs. Comput. Networks 161: 115-137 (2019) - [j8]Shengchao Liu, Jianping Weng, Jessie Hui Wang, Changqing An, Yipeng Zhou, Jilong Wang:
An Adaptive Online Scheme for Scheduling and Resource Enforcement in Storm. IEEE/ACM Trans. Netw. 27(4): 1373-1386 (2019) - [c19]Yujia Liu, Changqing An:
Cost Efficient Internet Path Tracking Based on Routing Changes Prediction. IPCCC 2019: 1-8 - [i1]Congcong Miao, Jilong Wang, Shuying Zhuang, Changqing An:
A Coordinated View of Cyberspace. CoRR abs/1910.09787 (2019) - 2018
- [j7]Jessie Hui Wang, Changqing An:
A study on geographic properties of internet routing. Comput. Networks 133: 183-194 (2018) - 2016
- [j6]Fuliang Li, Jiahai Yang, Xingwei Wang, Tian Pan, Changqing An, Jianping Wu:
Characteristics analysis at prefix granularity: A case study in an IPv6 network. J. Netw. Comput. Appl. 70: 156-170 (2016) - 2015
- [j5]Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Xingwei Wang:
Towards centralized and semi-automatic VLAN management. Int. J. Netw. Manag. 25(1): 52-73 (2015) - [c18]Fuliang Li, Tian Pan, Jiahai Yang, Changqing An, Xingwei Wang, Jianping Wu:
Investigating the prefix-level characteristics: A case study in an IPv6 network. ICNC 2015: 824-829 - 2014
- [j4]Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Hui Zhang:
A study of traffic from the perspective of a large pure IPv6 ISP. Comput. Commun. 37: 40-52 (2014) - 2013
- [c17]Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Siyang Wang, Ning Jiang:
CSS-VM: A centralized and semi-automatic system for VLAN management. IM 2013: 623-629 - [c16]Miao Li, Jiahai Yang, Changqing An, Chenxi Li, Fuliang Li:
IPv6 network topology discovery method based on novel graph mapping algorithms. ISCC 2013: 554-560 - 2012
- [c15]Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen:
Unravel the characteristics and development of current IPv6 network. LCN 2012: 316-319 - 2011
- [j3]Jessie Hui Wang, Changqing An, Jiahai Yang:
A study of traffic, user behavior and pricing policies in a large campus network. Comput. Commun. 34(16): 1922-1931 (2011) - [j2]Jessie Hui Wang, Chungang Wang, Jiahai Yang, Changqing An:
A study on key strategies in P2P file sharing systems and ISPs' P2P traffic management. Peer-to-Peer Netw. Appl. 4(4): 410-419 (2011) - [c14]Ning Jiang, Changqing An, Jiahai Yang:
Adaptive tuning of operation parameters for automatically learned filter table. APNOMS 2011: 1-8 - [c13]Fuliang Li, Changqing An, Jiahai Yang, Ning Jiang, Jianping Wu:
Investigating the efficiency of fine granularity source address validation in IPv6 networks. APNOMS 2011: 1-8 - [c12]Changqing An, Jessie Hui Wang, Jiahai Yang:
MIB design and application for source address validation improvement protocol. ISCC 2011: 677-680
2000 – 2009
- 2009
- [j1]Jiahai Yang, Hui Zhang, Jinxiang Zhang, Changqing An:
Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. J. Comput. Sci. Technol. 24(3): 482-494 (2009) - [c11]Jianping He, Jiahai Yang, Changqing An, Xuenong Li:
BPR: a bit-level packet recovery in wireless sensor networks. SAC 2009: 59-65 - 2008
- [c10]Shaojun Huang, Changqing An, Jessie Hui Wang, Jiahai Yang:
Understanding IPv6 Usage: Communities and Behaviors. APNOMS 2008: 256-265 - [c9]Jianping He, Jiahai Yang, Changqing An, Hongbo Liu, Xuenong Li:
Analysis on MAC layer retransmission scheme in wireless networks. MOBIWAC 2008: 161-165 - [c8]Jianping He, Jiahai Yang, Changqing An, Xuenong Li:
A study of collisions in wireless network coding system. Wireless Days 2008: 1-5 - [c7]Jianping He, Jiahai Yang, Changqing An, Xuenong Li:
Transmission power selection for ad hoc networks. WICON 2008: 18 - 2007
- [c6]Yunqi Li, Jiahai Yang, Changqing An, Hui Zhang:
Finding hierarchical heavy hitters in network measurement system. SAC 2007: 232-236 - 2006
- [c5]Shijin Kong, Tao He, Xiaoxin Shao, Changqing An, Xing Li:
Scalable Double Filter Structure for Port Scan Detection. ICC 2006: 2177-2182 - [c4]Shijin Kong, Tao He, Xiaoxin Shao, Changqing An, Xing Li:
Time-Out Bloom Filter: A New Sampling Method for Recording More Flows. ICOIN 2006: 590-599 - [c3]Xiaoxin Shao, Tao He, Shijin Kong, Changqing An, Xing Li:
Time-Driven vs Packet-Driven: A Deep Study on Traffic Sampling. ICOIN 2006: 610-619 - [c2]Xiaoxin Shao, Qianli Zhang, Tao He, Shijin Kong, Changqing An, Xing Li:
SANTT: Sharing Anonymized Network Traffic Traces among Researchers. NOMS 2006: 527-533 - 2005
- [c1]Jun Zhang, Jiahai Yang, Changqing An, Jilong Wang:
Traffic Measurement and Analysis of TUNET. CW 2005: 330-334
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint