Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Duan, Zhenhai
add a person with the name Duan, Zhenhai
 

Other publications of authors with the same name

A Differentiated Message Delivery Architecture to Control Spam., , and . ICPADS (2), page 255-259. IEEE Computer Society, (2005)Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming., , and . ICME, page 1230-1233. IEEE Computer Society, (2005)Fundamental Trade-Offs in Aggregate Packet Scheduling., , and . IEEE Trans. Parallel Distrib. Syst., 16 (12): 1166-1177 (2005)Blocking spam by separating end-user machines from legitimate mail server machines., , and . Security and Communication Networks, 9 (4): 316-326 (2016)The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)., , , , , , and . ACSAC, page 141-150. IEEE Computer Society, (2007)On Properties of Internet Exchange Points and Their Impact on AS Topology and Relationship., , , and . NETWORKING, volume 3042 of Lecture Notes in Computer Science, page 284-295. Springer, (2004)Accurately Redirecting a Malicious Drone., , and . CCNC, page 827-834. IEEE, (2022)Detecting Spam Zombies by Monitoring Outgoing Messages., , , , , and . IEEE Trans. Dependable Sec. Comput., 9 (2): 198-210 (2012)Fundamental Trade-offs in Aggregate Packet Scheduling., , and . ICNP, page 129-137. IEEE Computer Society, (2001)LID Assignment in InfiniBand Networks., , and . IEEE Trans. Parallel Distrib. Syst., 20 (4): 484-497 (2009)