Остановите войну!
for scientists:
default search action
Ming Chen 0003
- > Home > Persons > Ming Chen 0003
Publications
- 2023
- [j31]Wentao Wang, Xianglin Wei, Yingchao Jia, Ming Chen:
UAV relay network deployment through the area with barriers. Ad Hoc Networks 149: 103222 (2023) - [j30]Li Deng, Xianglin Wei, Yan Gao, Guang Cheng, Liang Liu, Ming Chen:
NFV-empowered digital twin cyber platform: Architecture, prototype, and a use case. Comput. Commun. 210: 163-173 (2023) - 2022
- [c31]Penghui Su, Yan Gao, Ming Chen:
A Novel Firewalls ConFigure Fault and Its Repair Method. CBD 2022: 228-233 - [c30]Yingchao Jia, Ming Chen, Yan Gao, Huibin Wang:
A Distributed Method to Form UAV Swarm based on Moncular Vision. ICPADS 2022: 41-48 - [c29]Xiulei Wang, Yan Gao, Li Deng, Ming Chen:
DTCPN: A Digital Twin Cyber Platform Based on NFV. WoWMoM 2022: 579-583 - 2021
- [j29]Ming Chen, Jing Chen, Xianglin Wei, Bing Chen:
Is low-rate distributed denial of service a great threat to the Internet? IET Inf. Secur. 15(5): 351-363 (2021) - [j28]Huibin Wang, Ming Chen, Ping Fu:
A distributed fault-tolerant mechanism for mission-oriented unmanned aerial vehicle swarms. Int. J. Commun. Syst. 34(8) (2021) - [j27]Ming Chen, Hanlu Chu, Xianglin Wei:
Flocking Control Algorithms Based on the Diffusion Model for Unmanned Aerial Vehicle Systems. IEEE Trans. Green Commun. Netw. 5(3): 1271-1282 (2021) - 2020
- [j26]Ming Chen, Huibin Wang, Chih-Yung Chang, Xianglin Wei:
SIDR: A Swarm Intelligence-Based Damage-Resilient Mechanism for UAV Swarm Networks. IEEE Access 8: 77089-77105 (2020) - [j25]Yiming Mao, Ming Chen, Xianglin Wei, Bing Chen:
Obstacle Recognition and Avoidance for UAVs Under Resource-Constrained Environments. IEEE Access 8: 169408-169422 (2020) - [j24]Huan Lu, Xianglin Wei, Hongyan Qian, Ming Chen:
A cost-efficient elastic UAV relay network construction method with guaranteed QoS. Ad Hoc Networks 107: 102219 (2020) - [j23]Ming Chen, Shunkang Zhang, Hai Deng, Bing Chen, Chang-you Xing, Bo Xu:
Automatic deployment and control of network services in NFV environments. J. Netw. Comput. Appl. 164: 102677 (2020) - [c28]Jun Li, Ming Chen:
QMPS: Q-learning based Message Prioritizing and Scheduling Algorithm for Flying Ad hoc Networks. NaNA 2020: 265-270 - 2019
- [j22]Jing Chen, Ming Chen, Xianglin Wei, Bing Chen:
Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks. IEEE Access 7: 29320-29331 (2019) - [j21]Fei Dai, Ming Chen, Xianglin Wei, Huibin Wang:
Swarm Intelligence-Inspired Autonomous Flocking Control in UAV Networks. IEEE Access 7: 61786-61796 (2019) - [j20]Pengfei Li, Ming Chen, Li Deng, Hongyan Qian:
一种基于NFV的检测OSPF双LSA攻击的方法 (NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol). 计算机科学 46(6A): 343-347 (2019) - 2018
- [j19]Ming Chen, Fei Dai, Huibin Wang, Lei Lei:
DFM: A Distributed Flocking Model for UAV Swarm Networks. IEEE Access 6: 69141-69150 (2018) - [j18]Hui Hu, Bo Liu, Chao Hu, Ming Chen, Guang Cheng, Chang-you Xing:
Fudp: an SDN-based Mechanism for Controlling UDP flows. Int. J. Robotics Autom. 33(5) (2018) - 2017
- [j17]Ming Chen, Ke Ding, Jie Hao, Chao Hu, Gaogang Xie, Chang-you Xing, Bing Chen:
LCMSC: A lightweight collaborative mechanism for SDN controllers. Comput. Networks 121: 65-75 (2017) - 2016
- [j16]Chang-you Xing, Ke Ding, Chao Hu, Ming Chen:
Sample and Fetch-Based Large Flow Detection Mechanism in Software Defined Networks. IEEE Commun. Lett. 20(9): 1764-1767 (2016) - [j15]Xiulei Wang, Ming Chen, Chang-you Xing, Tingting Zhang:
Defending DDoS Attacks in Software-Defined Networking Based on Legitimate Source and Destination IP Address Database. IEICE Trans. Inf. Syst. 99-D(4): 850-859 (2016) - [j14]Chang-you Xing, Ke Ding, Chao Hu, Ming Chen, Bo Xu:
SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking. KSII Trans. Internet Inf. Syst. 10(5): 2267-2285 (2016) - [j13]Bo Liu, Bo Xu, Chao Hu, Hui Hu, Ming Chen:
OFPT: OpenFlow based Parallel Transport in Datacenters. KSII Trans. Internet Inf. Syst. 10(10): 4787-4807 (2016) - [j12]Bo Liu, Ming Chen, Bo Xu, Hui Hu, Chao Hu, Qingyun Zuo, Chang-you Xing:
An OpenFlow-based performance-oriented multipath forwarding scheme in datacenters. Frontiers Inf. Technol. Electron. Eng. 17(7): 647-660 (2016) - [c27]Chao Hu, Bo Liu, Chang-you Xing, Zhenjun Yue, Lihua Song, Ming Chen:
Queueing model based analysis on flow scheduling in information-agnostic datacenter networks. ICC 2016: 1-6 - 2015
- [j11]Xiulei Wang, Ming Chen, Xianglin Wei, Guomin Zhang:
Defending DDoS attacks in software defined networking based on improved Shiryaev-Roberts detection algorithm. J. High Speed Networks 21(4): 285-298 (2015) - [c26]Junqing Wu, Ming Chen, Chao Hu, Guomin Zhang:
FC-WiFi: An OpenFlow Based WiFi Network with Free Configuration. FCST 2015: 52-58 - [c25]Xiulei Wang, Ming Chen, Chang-you Xing:
SDSNM: A Software-Defined Security Networking Mechanism to Defend against DDoS Attacks. FCST 2015: 115-121 - 2014
- [j10]Chao Hu, Ming Chen, Chang-you Xing, Guomin Zhang:
Exploring the optimal substream scheduling and distribution mechanism for data-driven P2P media streaming. Comput. Commun. 44: 14-25 (2014) - [j9]Ming Chen, Huali Bai, Yuming Zhou, Zhanfeng Wang, Peicheng Jiang:
A novel network performance evaluation method based on maximizing deviations. Telecommun. Syst. 55(1): 149-158 (2014) - [c24]Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang:
A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems. 3PGCIC 2014: 463-468 - 2013
- [j8]Chao Hu, Ming Chen, Chang-you Xing:
Towards efficient video chunk dissemination in peer-to-peer live streaming. Comput. Networks 57(15): 3009-3024 (2013) - [j7]Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, Al-Sakib Khan Pathan:
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems. Int. J. Commun. Networks Inf. Secur. 5(1) (2013) - [j6]Chang-you Xing, Ming Chen, Chao Hu:
Capacity Aware Scalable Video Coding in P2P on Demand Streaming Systems. KSII Trans. Internet Inf. Syst. 7(9): 2268-2283 (2013) - [j5]Zhanfeng Wang, Ming Chen, Chang-you Xing, Jing Feng, Xianglin Wei, Huali Bai:
Multi-manifold model of the Internet delay space. J. Netw. Comput. Appl. 36(1): 211-218 (2013) - [j4]Xianglin Wei, Ming Chen, Chaogang Tang, Huali Bai, Guomin Zhang, Zhanfeng Wang:
iRep: indirect reciprocity reputation based efficient content delivery in BT-like systems. Telecommun. Syst. 54(1): 47-60 (2013) - [j3]Guangsong Zhao, Ming Chen, Xianglin Wei:
RIS: A Reciprocal Incentive Scheme in Selfish Opportunistic Networks. Wirel. Pers. Commun. 70(4): 1711-1734 (2013) - [c23]Ming Chen, Xi Weng, Xiulei Wang, Chang-you Xing, Guomin Zhang:
A Mechanism of Information-Centric Networking Based on Data Centers. CBD 2013: 40-45 - 2012
- [j2]Huali Bai, Ming Chen:
CCIPCA-OPCSC: An online method for detecting shared congestion paths. Comput. Networks 56(1): 399-411 (2012) - [j1]Chao Hu, Ming Chen, Chang-you Xing, Bo Xu:
EUE principle of resource scheduling for live streaming systems underlying CDN-P2P hybrid architecture. Peer-to-Peer Netw. Appl. 5(4): 312-322 (2012) - [c22]Xianglin Wei, Tarem Ahmed, Ming Chen, Al-Sakib Khan Pathan:
PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA. ICNC 2012: 815-819 - [c21]Xianglin Wei, Guomin Zhang, Jianhua Fan, Ming Chen:
BSU: A Biased Seed Unchoking Algorithm for P2P Systems. IDCS 2012: 174-187 - 2011
- [c20]Lidong Yu, Ming Chen, Chang-you Xing:
Quantifying Downloading Performance of Locality-Aware BitTorrent Protocols. ICCSA (5) 2011: 562-576 - [c19]Lidong Yu, Chang-you Xing, Huali Bai, Ming Chen, Mingwei Xu:
Detecting shared congestion paths based on PCA. IWQoS 2011: 1-9 - 2010
- [c18]Jun Zhou, Ming Chen, Huan Xiong:
A More Accurate Space Saving Algorithm for Finding the Frequent Items. DBTA 2010: 1-5 - [c17]Chang-you Xing, Li Yang, Ming Chen:
NPA-BT: A Network Performance Aware BitTorrent Traffic Optimization Mechanism. NPC 2010: 165-176 - 2009
- [c16]Chang-you Xing, Ming Chen:
Research on Optimizing Embedding Space Dimension in Network Coordinate System. ACIS-ICIS 2009: 240-245 - [c15]Chang-you Xing, Ming Chen:
Characteristics of Internet Latency and Their Impact on Distance Prediction Accuracy. CNSR 2009: 171-177 - [c14]Chang-you Xing, Ming Chen, Li Yang:
Predicting Available Bandwidth of Internet Path with Ultra Metric Space-Based Approaches. GLOBECOM 2009: 1-6 - 2008
- [c13]Chang-you Xing, Ming Chen:
A Virtual Node Based Network Distance Prediction Mechanism. GLOBECOM 2008: 1611-1615 - [c12]Huan Xiong, Ming Chen:
Study on Traffic Characteristics of BGP Misconfiguration. ICC 2008: 5751-5755 - [c11]Chang-you Xing, Ming Chen:
Impact of Network Topology on Distance Prediction Accuracy. ICNSC 2008: 1425-1429 - [c10]Guomin Zhang, Na Wang, Ming Chen, Xiaofeng Qiu:
Modal Policy Management Framework for Management of Distributed Systems. ICNSC 2008: 1753-1757 - 2007
- [c9]Lihua Song, Haitao Wang, Ming Chen:
RAUU: Rate Adaptation for Unreliable Unicast Traffic in High Speed Networks. IPOM 2007: 107-118 - [c8]Chang-you Xing, Ming Chen:
HNDP: A Novel Network Distance Prediction Mechanism. NPC 2007: 425-434 - [c7]Huan Xiong, Ming Chen:
E2E performance based AS-level internet modeling. SpringSim (1) 2007: 33-38 - [c6]Ming Chen, Lingbo Pei, Wen Liang:
Three propositions about distributions of network traffic. SpringSim (1) 2007: 187-192 - [c5]Lingbo Pei, Ming Chen, Jun Zhou:
A binomial measure method for traffic modeling. VALUETOOLS 2007: 34 - 2006
- [c4]Guomin Zhang, Yong Zhang, Ming Chen, Huan Xiong:
Domain-Based Dynamic Resource Management Mechanism Supporting Large-Scale Grid Application. IIH-MSP 2006: 282-288 - 2004
- [c3]Lihua Song, Haitao Wang, Ming Chen:
A Measurement-Based TCP Congestion Control Scheme. AWCC 2004: 112-119 - 2001
- [c2]Yongxin Li, Ming Chen, Xuping Jiang, Lihua Song:
A Logic-based Policy Definition Language for Network Management. DSOM 2001: 257-264 - [c1]Yongxin Li, Ming Chen, Xuping Jiang, Lihua Song:
A Logic-Based Policy Definition Language for Network Management. LCN 2001: 34-40
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint