Weizhen Dang

ORCID: 0000-0003-2390-7978
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Networks and Protocols
  • Green IT and Sustainability
  • Interconnection Networks and Systems
  • Logic, programming, and type systems
  • Crime, Illicit Activities, and Governance
  • Graph Theory and Algorithms
  • Internet Traffic Analysis and Secure E-voting
  • Imbalanced Data Classification Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Distributed and Parallel Computing Systems
  • Spam and Phishing Detection
  • Simulation Techniques and Applications
  • Nutritional Studies and Diet
  • Advanced Wireless Network Optimization
  • Advanced MIMO Systems Optimization
  • Human Mobility and Location-Based Analysis
  • Logic, Reasoning, and Knowledge
  • Network Traffic and Congestion Control
  • Cloud Computing and Resource Management
  • Urban Transport and Accessibility
  • AI-based Problem Solving and Planning

Tencent (China)
2024

Tsinghua University
2018-2023

Center for Information Technology
2021

National Engineering Research Center for Information Technology in Agriculture
2020

National University of Defense Technology
2014

Fraud detection is of great importance because fraudulent behaviors may mislead consumers or bring huge losses to enterprises. Due the lockstep feature behaviors, fraud problem can be viewed as finding suspicious dense blocks in attributed bipartite graph. In reality, existing attribute-based methods are not adversarially robust, fraudsters take some camouflage actions cover their behavior attributes normal. More importantly, structural information based only consider shallow topology...

10.1109/icdm.2018.00072 article EN 2021 IEEE International Conference on Data Mining (ICDM) 2018-11-01

Human mobility prediction is of great importance for various applications such as smart transportation and personalized recommender systems. Although many traditional pattern-based methods deep models ($e.g.,$ recurrent neural networks) based have been developed this task, they essentially do not well cope with the sparsity inaccuracy trajectory data complicated high-order nature sequential dependency, which are typical challenges in prediction. To solve problems, paper proposes a novel...

10.1145/3488560.3498400 article EN Proceedings of the Fifteenth ACM International Conference on Web Search and Data Mining 2022-02-11

Anycast has been increasingly deployed for content delivery networks to map clients their nearby replicas, which relies on the underlying routing. However, simplicity of operation comes at cost less precise client-mapping control. Although many works have measured anycast DNS, CDNs, with different service goals and engineering, are still not fully understood. In this paper, we design novel methods combine large-scale traceroute HTTP measurement evaluate overall client-proximity inefficient...

10.1145/3326285.3329049 article EN 2019-06-14

Dynamic Host Configuration Protocol (DHCP) is widely used to dynamically assign IP addresses. However, due little knowledge on the behavior and performance of DHCP, it challenging configure a proper lease time in complicated wireless network. In this paper, we conduct largest known measurement DHCP based network T University (TWLAN). TWLAN has more than 59,000 users, 10,000 access points 130,000 We find far from satisfactory: (1) The non-authenticated devices lead waste 25% addresses at rush...

10.1109/infocom.2018.8486299 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2018-04-01

Dynamic Host Configuration Protocol (DHCP) is widely used to dynamically assign IP addresses users. However, due little knowledge on the behavior and performance of DHCP, it challenging configure lease time divide for address pools properly in large-scale wireless networks. In this paper, we conduct largest known measurement DHCP network T University (TWLAN). We find far from satisfactory: (1) The non-authenticated devices lead a waste 25% at rush hour. (2) Address pool utilization varies...

10.1109/tnet.2020.2971551 article EN IEEE/ACM Transactions on Networking 2020-03-10

Welcome to the WIT Press eLibrary - home of Transactions Wessex Institute collection, providing on-line access papers presented at Institute's prestigious international conferences and from its State-of-the-Art in Science & Engineering publications.

10.2495/cta20140281 article EN WIT transactions on information and communication technologies 2014-10-07

WiFi has become one of the most popular ways to access Internet. However, in large-scale campus wireless networks, it is challenging for network administrators provide optimized quality without knowledge on fine-grained traffic characteristics and real performance. In this paper, we implement PerfMon, a performance measurement diagnosis system, which integrates collected multi-source datasets analysis methods. Based first conduct comprehensive application-level patterns behaviors from...

10.23919/jcc.2023.03.021 article EN China Communications 2023-03-01

In recent years, more and wireless networks support both 2.4GHz 5GHz bands. However, in large-scale dual-band networks, lack of understanding on the behavior performance makes network diagnosis optimization extremely challenging. this paper, we conduct a comprehensive measurement to characterize (TD WLAN). We make several meaningful observations. (1) Although band outperforms band, 60% devices tend be associated with band. The device association has large impact performance. (2) Rogue...

10.1109/icnp52444.2021.9651921 article EN 2021-11-01
Coming Soon ...