default search action
Guiran Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j22]Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao:
Modelling, analysis and containment of passive worms in P2P networks. Int. J. Internet Protoc. Technol. 8(2/3): 130-142 (2014) - [j21]Chunguang Tan, Guiran Chang, Chunxiao Liu, Xingwei Wang, Dawei Sun:
Integration of P4P and IMS-based IPTV. Int. J. Wirel. Mob. Comput. 7(1): 61-67 (2014) - 2013
- [j20]Dawei Sun, Guiran Chang, Chunguang Tan, Xingwei Wang, Rui Guo:
Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective. Int. J. Wirel. Mob. Comput. 6(4): 331-337 (2013) - [j19]Changsheng Miao, Lu Meng, Changqing Yuan, Xingwei Wang, Guiran Chang:
Traffic classification combining flow correlation and ensemble classifier. Int. J. Wirel. Mob. Comput. 6(6): 556-563 (2013) - [j18]Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:
Analyzing, modeling and evaluating dynamic adaptive fault tolerance strategies in cloud computing environments. J. Supercomput. 66(1): 193-228 (2013) - 2012
- [j17]Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang:
Modeling access control for cyber-physical systems using reputation. Comput. Electr. Eng. 38(5): 1088-1101 (2012) - [j16]Dawei Sun, Guiran Chang, Dong Chen, Xingwei Wang:
Modelling, evaluating, designing and maximising resource allocation revenue by an auction mechanism in cloud computing environments. Int. J. Comput. Appl. Technol. 43(4): 385-392 (2012) - [j15]Fengyun Li, Guiran Chang, Lan Yao, Fuxiang Gao:
Cooperative game-based routing approach for wireless sensor network. Int. J. Comput. Appl. Technol. 44(2): 101-108 (2012) - [j14]Lizhong Jin, Guiran Chang, Dawei Sun, Na Zhou, Jie Jia, Chunxiao Liu:
Research on hierarchical routing protocol based on optimal clustering head for wireless sensor networks. Int. J. Model. Identif. Control. 15(4): 331-337 (2012) - [j13]Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:
Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments. Int. J. Secur. Networks 7(4): 196-210 (2012) - [j12]Dong Chen, Guiran Chang, Dawei Sun, Jie Jia, Xingwei Wang:
Lightweight key management scheme to enhance the security of internet of things. Int. J. Wirel. Mob. Comput. 5(2): 191-198 (2012) - [j11]Dong Chen, Guiran Chang:
A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. KSII Trans. Internet Inf. Syst. 6(1): 24-45 (2012) - [j10]Dong Chen, Guiran Chang, Jie Jia:
AC4E: An Access Control Model for Emergencies of Mission-Critical Cyber-Physical Systems. KSII Trans. Internet Inf. Syst. 6(9): 2052-2072 (2012) - [j9]Dawei Sun, Guiran Chang, Shang Gao, Lizhong Jin, Xingwei Wang:
Modeling a Dynamic Data Replication Strategy to Increase System Availability in Cloud Computing Environments. J. Comput. Sci. Technol. 27(2): 256-272 (2012) - [c53]Xiumei Liu, Junjiang Liu, Guiran Chang:
nPAKE: An Improved Group PAKE Protocol. WISA 2012: 115-118 - [c52]Dawei Sun, Guiran Chang, Changsheng Miao, Xingwei Wang:
Building a High Serviceability Model by Checkpointing and Replication Strategy in Cloud Computing Environments. ICDCS Workshops 2012: 578-587 - [c51]Xiumei Liu, Junjiang Liu, Guiran Chang:
A Four-Party Password-Based Authentication Key Exchange Protocol. ICGEC 2012: 280-283 - [c50]Changsheng Miao, Fengling Cao, Dong Chen, Guiran Chang:
A Lightweight Group-Key Management Protocol for Ad Hoc Networks. ICGEC 2012: 288-291 - 2011
- [j8]Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, Xingwei Wang:
TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8(4): 1207-1228 (2011) - [j7]Dawei Sun, Guiran Chang, Qiang Guo, Xingwei Wang:
Modelling, evaluating and designing virtual machine scheduling by a clustering mechanism in cloud computing environments. Int. J. Wirel. Mob. Comput. 5(1): 70-76 (2011) - [j6]Wei Yang, Guiran Chang, Yu Yao, Xiao-meng Shen:
Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense. J. Networks 6(1): 153-162 (2011) - [j5]Dong Chen, Guiran Chang, Xiuying Zheng, Dawei Sun, Jiajia Li, Xingwei Wang:
A Novel P2P Based Grid Resource Discovery Model. J. Networks 6(10): 1390-1397 (2011) - [c49]Chunxiao Liu, Guiran Chang, Jie Jia, Lizhong Jin, Fengyun Li:
A Load Balanced Routing Protocol Based on Ant Colony Algorithm for Wireless Mesh Networks. ICGEC 2011: 295-298 - [c48]Chengjun Jin, Guiran Chang, Wei Cheng, Huiyan Jiang:
Improved Particle Swarm Optimization for Fuzzy Neural Network Traning. ICGEC 2011: 299-302 - [c47]Dong Chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, Fengyun Li:
A Novel Secure Architecture for the Internet of Things. ICGEC 2011: 311-314 - [c46]Fengyun Li, Guiran Chang, Fuxiang Gao, Lan Yao:
A Novel Cooperation Mechanism to Enforce Security in Wireless Sensor Networks. ICGEC 2011: 341-344 - 2010
- [j4]Jie Jia, Jian Chen, Guiran Chang, Jie Li:
Find the maximum k-disjoint coverage sets in WSN using genetic algorithm. Int. J. Model. Identif. Control. 9(1/2): 43-52 (2010) - [j3]Wei Cheng, Zhenhua Tan, Zhiliang Zhu, Guiran Chang:
The Design of Serial ATA Bus Control Chip. J. Comput. 5(4): 524-532 (2010) - [c45]Zhenhua Tan, Guangming Yang, Zhiliang Zhu, Wei Cheng, Guiran Chang:
K-BRiR: An Efficient and Self-organized Routing Mechanism for Structured Peer-to-Peer Service Networks. CETS 2010: 61-74
2000 – 2009
- 2009
- [j2]Jie Jia, Jian Chen, Guiran Chang, Zhenhua Tan:
Energy efficient coverage control in wireless sensor networks based on multi-objective genetic algorithm. Comput. Math. Appl. 57(11-12): 1756-1766 (2009) - [j1]Jie Jia, Jian Chen, Guiran Chang, Yingyou Wen, Jingping Song:
Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius. Comput. Math. Appl. 57(11-12): 1767-1775 (2009) - [c44]Lizhong Jin, Jie Jia, Guiran Chang, Xingwei Wang:
Restoration of coverage blind spots in wireless sensor networks based on ant colony algorithm. GEC Summit 2009: 847-850 - [c43]Lizhong Jin, Guiran Chang, Dan Jiang, Xingwei Wang:
Research on the Discovery of Blind Spots in Wireless Sensor Networks Based on Voronoi Diagram. HIS (2) 2009: 209-214 - [c42]Jie Jia, Ruiyun Yu, Jie Li, Linliang Zhao, Guiran Chang:
Sleep Scheduling Based on Probabilistic Detection Model for Wireless Sensor Networks. HIS (2) 2009: 250-255 - [c41]Chuan Wang, Guiran Chang, Xingwei Wang, Yan Ma, Haitao Ma:
A User Motivation Model for Web Search Engine. HIS (2) 2009: 327-331 - [c40]Hang Yin, Guiran Chang, Xingwei Wang:
A Cold-Start Recommendation Algorithm Based on New User's Implicit Information and Multi-attribute Rating Matrix. HIS (2) 2009: 353-358 - [c39]Zhenhua Tan, Guiran Chang, Wei Cheng, Yi Ma:
An Improved Peer-to-Peer Routing Algorithm K-CSSP Based on Communication History Clustered by K-means. HIS (2) 2009: 381-385 - [c38]Wei Yang, Wei Ying, Guiran Chang, Zhuoqun Zhang:
Research on the Epidemic Model in P2P File-Sharing System. HIS (2) 2009: 386-390 - [c37]Yi Ma, Zhenhua Tan, Guiran Chang, Xiaoxing Gao:
A P2P Network Topology Optimized Algorithm Based on Minimum Maximum K-Means Principle. HIS (2) 2009: 396-399 - [c36]Tianhua Liu, Ming-yu Bao, Guiran Chang, Zhenhua Tan:
The Improved Research of Chord Based on File-Partition Replication Strategy. HIS (2) 2009: 411-414 - [c35]Yi Ma, Zhenhua Tan, Guiran Chang, Xiaoxing Gao:
A P2P Overlay Network Routing Algorithm Based on Group-Average Agglomerative Clustering Topology. HIS (2) 2009: 445-448 - [c34]Chunguang Tan, Chuan Zhu, Xingwei Wang, Guiran Chang:
An EPG Recommender Framework with Information Exchange between Users. HIS (2) 2009: 453-456 - [c33]Dong Chen, Zhenhua Tan, Guiran Chang, Xingwei Wang:
An Improvement to the Chord-Based P2P Routing Algorithm. SKG 2009: 266-269 - 2008
- [c32]Dan Peng, Guiran Chang, Rui Guo, Yuhai Qin:
DG-Based DDoS Detection Using Hybrid Strategy. FSKD (5) 2008: 420-424 - [c31]Xiuying Zheng, Guiran Chang, Cuihua Tian, Zhen Li:
A Model for Resource Discovery among Grids. HPCC 2008: 678-682 - [c30]Anhui Wang, Guiran Chang, Minghan Hu:
A Color Visualization Method to the Isochores of DNA Sequences. ICNC (5) 2008: 3-7 - [c29]Chuan Zhu, Matthew Y. Ma, Chunguang Tan, Guiran Chang, Jingbo Zhu, Qiaozhe An:
A Recommender Handoff Framework for a Mobile Device. WMMP 2008: 137-153 - [c28]Guiran Chang, Chunguang Tan, Guanhua Li, Chuan Zhu:
Developing Mobile Applications on the Android Platform. WMMP 2008: 264-286 - [c27]Tianhua Liu, Hongfeng Zhu, Guiran Chang, Chuansheng Zhou:
The Design and Implementation of Zero-Copy for Linux. ISDA (1) 2008: 121-126 - [c26]Wei Cheng, Zhenhua Tan, Xiaoxing Gao, Guiran Chang, Jia Wen:
High Speed Serial Interface & Some Key Technology Research. ISECS 2008: 562-566 - [c25]Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng:
DG-Based Active Defense Strategy to Defend against DDoS. MUE 2008: 191-196 - [c24]Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang:
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. NPC Workshops 2008: 82-87 - [c23]Dongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo:
Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow. NPC 2008: 86-93 - [c22]Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng:
Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model. WKDD 2008: 566-569 - 2007
- [c21]Jiehong Wu, Yujie Zhang, Xiaowei Wang, Guiran Chang:
A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology. CIS 2007: 912-916 - [c20]Cuihua Tian, Guiran Chang, Xiaoxing Gao, Changsheng Miao, Wei Jia:
A Framework for Traffic Information Service Grid. GCC 2007: 650-658 - [c19]Rui Guo, Guiran Chang, Ruidong Hou, Yuhai Qin, Baojing Sun, An Liu, Yan Jia, Dan Peng:
Research on Counter Bandwidth Depletion DDoS Attacks Based on Genetic Algorithm. ICNC (4) 2007: 155-159 - [c18]Jiehong Wu, Guiran Chang, Jia Li:
A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Data and Time Checking Technology. IIH-MSP 2007: 221-224 - [c17]Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:
A Method for Making Three-Party Password-Based Key Exchange Resilient to Server Compromise. IIH-MSP 2007: 546-549 - [c16]Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. PRDC 2007: 405-408 - [c15]Jiehong Wu, Xiaochun Guo, Cuihua Tian, Hang Yin, Guiran Chang:
The study for protecting mobile agents based on time checking technology. ROBIO 2007: 2013-2017 - [c14]Rui Guo, Guiran Chang, Ruidong Hou, Baojing Sun, An Liu, Bencheng Zhang:
Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . WOSIS 2007: 73-81 - 2006
- [c13]Xindong You, Guiran Chang, Xueyao Chen, Cuihua Tian, Chuan Zhu:
Utility-Based Replication Strategies in Data Grids. GCC 2006: 500-507 - [c12]Hongfeng Zhu, Tianhua Liu, Chuansheng Zhou, Guiran Chang:
Research and Implementation of Zero-Copy Technology Based on Device Driver in Linux. IMSCCS (2) 2006: 129-134 - [c11]Tianhua Liu, Hongfeng Zhu, Chuansheng Zhou, Guiran Chang:
A New Method of TOE Architecture Based on the ML403 Development Board in Linux. IMSCCS (2) 2006: 160-166 - [c10]Guiran Chang, Chuan Zhu, Matthew Y. Ma, Weiguo Zhu, Jingbo Zhu:
Implementing a SIP-based Device Communication Middleware for OSGi Framework with Extension to Wireless Networks. IMSCCS (2) 2006: 603-310 - [c9]Dongming Chen, Zhiliang Zhu, Guiran Chang:
An Algorithm of Signal De-noising by Using Wavelet Analysis. ISDA (3) 2006: 51-55 - 2005
- [c8]Wandan Zeng, Guiran Chang, Dengke Zhang, Xiuying Zheng:
G-RSVPM: A Grid Resource Reservation Model. SKG 2005: 79 - [c7]Wandan Zeng, Guiran Chang, Dengke Zhang, Yu Guo:
Mobile Agent Implemented Grid Resource Reservation. SOAS 2005: 256-263 - 2004
- [c6]Shao Hua, Guiran Chang, Zhao Hong:
The Consistency between the Attribute Relationships and Time-Serial Count Operators. CBMS 2004: 529-534 - [c5]Xindong You, Guiran Chang, Wei Yang, Wandan Zeng, Xueyao Chen:
Replica Location Mechanism Based on DHT and the Small-World Theory. GCC Workshops 2004: 319-328 - 2003
- [c4]Wandan Zeng, Guiran Chang, Xingwei Wang, Shoubin Wang, Guangjie Han, Xubo Zhou:
A QoS Model for Grid Computing Based on DiffServ Protocol. GCC (2) 2003: 549-556 - [c3]Jiyue Wen, Guiran Chang:
Research on the Financial Information Grid. GCC (2) 2003: 698-701 - [c2]Bo Dai, Guiran Chang, Wandan Zeng, Jiyue Wen, Qiang Guo:
Some Views on Building Computational Grids Infrastructure. GCC (1) 2003: 813-816 - 2001
- [c1]Xiaohui Zhang, Huayong Wang, Guiran Chang, Zhao Hong:
An autonomous system-based distribution system for web search. SMC 2001: 435-440
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint