default search action
Ning Weng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Minxiao Wang, Ning Yang, Nicolas J. Forcade-Perkins, Ning Weng:
ProGen: Projection-Based Adversarial Attack Generation Against Network Intrusion Detection. IEEE Trans. Inf. Forensics Secur. 19: 5476-5491 (2024) - [j21]Minxiao Wang, Ning Yang, Ning Weng:
K-GetNID: Knowledge-Guided Graphs for Early and Transferable Network Intrusion Detection. IEEE Trans. Inf. Forensics Secur. 19: 7147-7160 (2024) - 2023
- [j20]Minxiao Wang, Ning Yang, Dulaj Gunasinghe, Ning Weng:
On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective. Comput. 12(10): 209 (2023) - [c34]Cheng-Liang Hsieh, Ning Yang, Ning Weng:
Network Function-enabled Switch for Scalable Network Service Function Chaining. AIIoT 2023: 167-176 - [c33]Minxiao Wang, Ning Yang, Ning Weng:
Exploring the Impact of Early Detection on DL-Based NIDSs Models. UEMCON 2023: 684-691 - 2022
- [j19]Hasibul Jamil, Ning Yang, Ning Weng:
Many-field packet classification with decomposition and reinforcement learning. IET Networks 11(3-4): 112-127 (2022) - [i2]Hasibul Jamil, Ning Yang, Ning Weng:
Many Field Packet Classification with Decomposition and Reinforcement Learning. CoRR abs/2205.07973 (2022) - [i1]Hasibul Jamil, Ning Weng:
Multibit Tries Packet Classification with Deep Reinforcement Learning. CoRR abs/2205.08606 (2022) - 2021
- [c32]Hasibul Jamil, Ning Yang, Ning Weng:
Securing Home IoT Network with Machine Learning Based Classifiers. WF-IoT 2021: 289-294 - 2020
- [c31]Hasibul Jamil, Ning Weng:
Multibit Tries Packet Classification with Deep Reinforcement Learning. HPSR 2020: 1-6
2010 – 2019
- 2019
- [j18]Cheng-Liang Hsieh, Ning Weng, Wei Wei:
Scalable Many-Field Packet Classification for Traffic Steering in SDN Switches. IEEE Trans. Netw. Serv. Manag. 16(1): 348-361 (2019) - 2018
- [j17]Claudio Copello, Ning Weng:
Adaptive scheduling to enhance data security and energy efficiency on energy harvesting platform. Microprocess. Microsystems 60: 24-37 (2018) - 2017
- [c30]Cheng-Liang Hsieh, Ning Weng:
NF-switch: VNFs-enabled SDN switches for high performance service function chaining. ICNP 2017: 1-6 - 2016
- [j16]Mini Mathew, Ning Weng:
Adaptive Sensor Node Sleep Scheduling for Quality-of-Experience Enhancement. Int. J. Distributed Sens. Networks 12: 6960876:1-6960876:11 (2016) - [j15]Cheng-Liang Hsieh, Lucas Vespa, Ning Weng:
A high-throughput DPI engine on GPU via algorithm/implementation co-optimization. J. Parallel Distributed Comput. 88: 46-56 (2016) - [c29]Cheng-Liang Hsieh, Ning Weng:
Many-Field Packet Classification for Software-Defined Networking Switches. ANCS 2016: 13-24 - [c28]Cheng-Liang Hsieh, Ning Weng:
Virtual Network Functions Instantiation on SDN Switches for Policy-Aware Traffic Steering. ANCS 2016: 119-120 - 2015
- [c27]Cheng-Liang Hsieh, Ning Weng:
Scalable Many-Field Packet Classification using Multidimensional-Cutting Via Selective Bit-Concatenation. ANCS 2015: 187-188 - 2014
- [c26]Cheng-Liang Hsieh, Ning Weng:
High performance multi-field packet classification using bucket filtering and GPU processing. ANCS 2014: 233-234 - 2013
- [j14]Yueran Gao, Haibo Wang, Ning Weng, Lucas Vespa:
Enhancing Sensor Network Data Quality via Collaborated Circuit and Network Operations. J. Sens. Actuator Networks 2(2): 196-212 (2013) - 2012
- [j13]Lucas Vespa, Ritam Chakrovorty, Ning Weng:
Lightweight testbed for evaluating worm containment systems. Int. J. Secur. Networks 7(1): 6-16 (2012) - [c25]Mini Mathew, Ning Weng, Lucas Vespa:
Quality-of-information modeling and adapting for delay-sensitive sensor network applications. IPCCC 2012: 471-477 - 2011
- [j12]Lucas Vespa, Ning Weng, Ramaswamy Ramaswamy:
MS-DFA: Multiple-Stride Pattern Matching for Scalable Deep Packet Inspection. Comput. J. 54(2): 285-303 (2011) - [j11]Ning Weng, Luke Vespa, Benfano Soewito:
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system. Comput. Networks 55(8): 1648-1661 (2011) - [j10]Ning Weng, I-Hung Li, Lucas Vespa:
Information quality model and optimization for 802.15.4-based wireless sensor networks. J. Netw. Comput. Appl. 34(6): 1773-1783 (2011) - [j9]Benfano Soewito, Lucas Vespa, Ning Weng, Haibo Wang:
Hybrid pattern matching for trusted intrusion detection. Secur. Commun. Networks 4(1): 33-43 (2011) - [j8]Lucas Vespa, Ning Weng:
Deterministic finite automata characterization and optimization for scalable pattern matching. ACM Trans. Archit. Code Optim. 8(1): 4:1-4:31 (2011) - [c24]Lucas Vespa, Ning Weng:
GPEP: Graphics Processing Enhanced Pattern-Matching for High-Performance Deep Packet Inspection. iThings/CPSCom 2011: 74-81 - 2010
- [c23]Lucas Vespa, Ning Weng:
Quality-aware scheduling metrics for adaptive sensor networks. LCN 2010: 528-535
2000 – 2009
- 2009
- [j7]Benfano Soewito, Ning Weng:
Concurrent workload mapping for multicore security systems. Concurr. Comput. Pract. Exp. 21(10): 1281-1306 (2009) - [j6]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Analysis of network processing workloads. J. Syst. Archit. 55(10-12): 421-433 (2009) - [j5]Lucas Vespa, Ning Weng, Benfano Soewito:
Optimized memory based accelerator for scalable pattern matching. Microprocess. Microsystems 33(7-8): 469-482 (2009) - [j4]Benfano Soewito, Lucas Vespa, Atul Mahajan, Ning Weng, Haibo Wang:
Self-addressable memory-based FSM: a scalable intrusion detection engine. IEEE Netw. 23(1): 14-21 (2009) - [j3]Ning Weng, Tilman Wolf:
Analytic modeling of network processors for parallel workload mapping. ACM Trans. Embed. Comput. Syst. 8(3): 18:1-18:29 (2009) - [c22]Lucas Vespa, Ning Weng:
Theoretic analysis of finite automata for memory-based pattern matching. ANCS 2009: 82-83 - [c21]Ritam Chakrovorty, Lucas Vespa, Ning Weng:
Testbed for evaluating worm containment systems. ANCS 2009: 175-176 - [c20]Lucas Vespa, Mini Mathew, Ning Weng:
P3FSM: Portable Predictive Pattern Matching Finite State Machine. ASAP 2009: 219-222 - [c19]Lucas Vespa, Ning Weng:
Scalable Regular Expression Matching for Network Intrusion Detection Systems. ESA 2009: 39-46 - [c18]Lucas Vespa, Ning Weng:
Split-DFA (SDFA) for Scalable Pattern Matching in Network Security. Security and Management 2009: 469-474 - [c17]Lucas Vespa, Mini Mathew, Ning Weng:
Predictive Pattern Matching for Scalable Network Intrusion Detection. ICICS 2009: 254-267 - [c16]Lucas Vespa, Ning Weng:
Deterministic Finite Automata Characterization for Memory-Based Pattern Matching. ICICS 2009: 268-282 - [c15]Lucas Vespa, Ning Weng, Benfano Soewito:
Reconfigurable String Matching Engine for Network Intrusion Detection. PDPTA 2009: 756-762 - [c14]Ning Weng, Luke Vespa, Benfano Soewito:
Multicore-Based Self-Adapting Pattern Detection Engine. PDPTA 2009: 790-796 - 2008
- [j2]Ning Weng, Benfano Soewito:
Evaluating DNA sequence searching algorithms on multicore. Int. J. Comput. Biol. Drug Des. 1(3): 313-327 (2008) - [c13]Benfano Soewito, Ning Weng:
Methodology for evaluating string matching algorithms on multiprocessor. AICCSA 2008: 20-27 - [c12]Ning Weng, Nandeesh Kumar, Satish Dechu, Benfano Soewito:
Mapping task graphs onto Network Processors using genetic algorithm. AICCSA 2008: 481-488 - [c11]Satish Dechu, Ning Weng, Benfano Soewito:
Mapping Parallel Workload onto Network Processors Using Simulated Annealing. ESA 2008: 62-68 - [c10]Benfano Soewito, Ning Weng:
Approximate Packet Pre-filtering to Accelerate Pattern Matching. Security and Management 2008: 203-209 - [c9]Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng, Haibo Wang:
Implementing high-speed string matching hardware for network intrusion detection systems. FPGA 2008: 264 - [c8]Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng, Haibo Wang:
Implementing High-Speed String Matching Hardware for Network Intrusion Detection Systems. PDPTA 2008: 157-163 - 2007
- [j1]Tilman Wolf, Ning Weng:
Runtime Support for Multicore Packet Processing Systems. IEEE Netw. 21(4): 29-37 (2007) - [c7]Benfano Soewito, Ning Weng:
Methodology for Evaluating DNA Pattern Searching Algorithms on Multiprocessor. BIBE 2007: 570-577 - 2005
- [c6]Tilman Wolf, Ning Weng, Chia-Hui Tai:
Design considerations for network processor operating systems. ANCS 2005: 71-80 - [c5]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Analysis of Network Processing Workloads. ISPASS 2005: 226-235 - [c4]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
A Network Processor Based Passive Measurement Node. PAM 2005: 337-340 - [c3]Ning Weng, Tilman Wolf:
Profiling and mapping of parallel workloads on network processors. SAC 2005: 890-896 - 2004
- [c2]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Characterizing network processing delay. GLOBECOM 2004: 1629-1634 - 2003
- [c1]Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf:
Considering processing cost in network simulations. MoMeTools@SIGCOMM 2003: 47-56
Coauthor Index
aka: Luke Vespa
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint