Han Zhang

ORCID: 0000-0001-8740-6502
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Network Traffic and Congestion Control
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Advanced Image and Video Retrieval Techniques
  • Advanced Neural Network Applications
  • Advanced Optical Network Technologies
  • Domain Adaptation and Few-Shot Learning
  • IoT and Edge/Fog Computing
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Cooperative Communication and Network Coding
  • Cloud Computing and Resource Management
  • Advanced MIMO Systems Optimization
  • Network Packet Processing and Optimization
  • Interconnection Networks and Systems
  • Blockchain Technology Applications and Security
  • Privacy, Security, and Data Protection
  • Software System Performance and Reliability
  • Mobile Ad Hoc Networks
  • Peer-to-Peer Network Technologies
  • Handwritten Text Recognition Techniques
  • Graph Theory and Algorithms
  • Ferroelectric and Negative Capacitance Devices

Zhengzhou University
2024

Tsinghua University
2014-2024

Carnegie Mellon University
2017-2024

Kyoto College of Graduate Studies for Informatics
2022

Kyoto University
2022

University of Ottawa
2022

Beihang University
2019-2020

National University of Defense Technology
2020

China University of Geosciences
2017

Hangzhou Dianzi University
2017

This paper investigates a phenomenon where query-based object detectors mispredict at the last decoding stage while predicting correctly an intermediate stage. We review training process and attribute overlooked to two limitations: lack of emphasis cascading errors from sequence. design present Selective Query Recollection (SQR), simple effective strategy for detectors. It cumulatively collects queries as stages go deeper selectively forwards downstream aside sequential structure. Such-wise,...

10.1109/cvpr52729.2023.02275 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2023-06-01

10.1109/cvprw63382.2024.00162 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2024-06-17

Traffic engineering is a method to balance the flows and optimize routing in network. Software defined networking new network architecture we can gain great benefit by migrating traditional IP SDN-enabled from perspective of traffic engineering. However, due economical, organizational technical challenges, with full deployment SDN routers impractical short term. It desirable choice deploy incrementally. In this paper, seek search for an optimal migration sequence legacy so that decide where...

10.1109/pccc.2015.7410320 article EN 2015-12-01

10.1016/j.cnsns.2017.05.034 article EN Communications in Nonlinear Science and Numerical Simulation 2017-06-02

Starting from the concept of Cloud Radio Access Network (C-RAN), continuing with virtual (vRAN) and most recently Open RAN (O-RAN) initiative, (RAN) architectures have significantly evolved in past decade. In last few years, wireless industry has witnessed a strong trend towards disaggregated, virtualized open RANs, numerous tests deployments worldwide. One unique aspect that motivates this paper is availability new opportunities arise using machine learning, more specifically multi-agent...

10.3390/s22145375 article EN cc-by Sensors 2022-07-19

Backup is cumbersome. To be effective, backups have to made at regular intervals, forcing users organize and store a growing collection of backup media. In this paper we propose novel peer-to-peer system, PeerStore, that allows the user his on other people's computers instead. PeerStore an adaptive, cost-effective system suitable for all types networks ranging from LAN, WAN large unstable like Internet. The consists two layers: metadata layer symmetric trading layer. Locating blocks...

10.1109/p2p.2004.38 article EN International Conference on Peer-to-Peer Computing 2004-08-25

This paper focuses on a novel and challenging detection scenario: A majority of true objects/instances is unlabeled in the datasets, so these missing-labeled areas will be regarded as background during training. Previous art [1] this problem has proposed to use soft sampling re-weight gradients RoIs based overlaps with positive instances, while their method mainly two-stage detector (i.e. Faster RCNN) which more robust friendly for missing label scenario. In paper, we introduce superior...

10.1109/icassp40776.2020.9053738 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2020-04-09

Bot detection methods that rely on deep packet inspection (DPI) can be foiled by encryption. Encryption, however, increases entropy. This paper investigates whether adding high-entropy detectors to an existing bot tool uses DPI restore some of the visibility. We present two classifiers, and use one them enhance BotHunter. Our results show while BotHunter misses about 50% bots when they employ encryption, our classifier restores most its ability detect bots, even

10.1109/infcomw.2013.6562912 article EN 2013-04-01

Backup is cumbersome. To be effective, backups have to made at regular intervals, forcing users organize and store a growing collection of backup media. In this paper we propose novel peer-to-peer system, PeerStore, that allows the user his on other people's computers instead. PeerStore an adaptive, cost-effective system suitable for all types networks ranging from LAN, WAN large unstable like Internet. The consists two layers: metadata layer symmetric trading layer. Locating blocks...

10.1109/ptp.2004.1334933 article EN 2004-11-08

As Internet-of-Things (IoT) devices rapidly gain popularity, they raise significant privacy concerns given the breadth of sensitive data can capture. These are amplified by fact that in many situations, IoT collect about people other than their owner or administrator, and these stakeholders have no say how is managed, used, shared. To address this, we propose a new model ownership, Ephemeral Ownership (TEO). TEO allows to quickly register with an device for limited period, thus claim...

10.1145/3498361.3539774 article EN 2022-06-16

The internet is playing an increasingly crucial role in both personal and business activities. In addition, with the emergence of real-time, delay sensitive mission-critical applications, stringent network availability requirement put forward for service providers (ISPs). However, commonly deployed intradomain link-state routing protocols react to link failures by globally exchanging state advertisements recalculating table, inevitably causing significant forwarding discontinuity after a...

10.1109/jcn.2019.000056 article EN Journal of Communications and Networks 2020-02-01

Edge Computing (EC) provides delay protection for some delay-sensitive network services by deploying cloud infrastructure with limited resources at the edge of network. In addition, Network Function Virtualization (NFV) implements functions replacing traditional dedicated hardware devices Virtual (VNF) that can run on general servers. NFV environment, Service Chaining (SFC) is regarded as a promising way to reduce cost configuring services. therefore allows deploy in more flexible and...

10.23919/cnsm52442.2021.9615590 article EN 2021-10-25

Inter-DataCenter Wide Area Network (Inter-DC WAN) that connects geographically distributed data centers is becoming one of the most critical network infrastructures. Due to limited bandwidth and inevitable link failures, it highly challenging guarantee availability for services, especially those with stringent demands, over inter-DC WAN. We present BATE, a novel Traffic Engineering (TE) framework (BA) provision, which aims ensure each demand must be satisfied stipulated probability, when...

10.1145/3485983.3494843 article EN 2021-12-02

10.1016/j.future.2017.07.057 article EN Future Generation Computer Systems 2017-08-25

As a typical representative of new generation military information technology, the value and significance Internet Battlefield Things (IoBT) has been widely recognized by world's forces. At same time, is facing serious scalability security challenges. This paper presents basic concept six-domain model IoBT, explains integration framework IoBT blockchain. Furthermore, we design build novel IoT called IoBTChain based on blockchain smart contracts, which adopts credit-based resource management...

10.1109/itnec48623.2020.9085227 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020-05-05

We present simple and flexible drop-in modules in feature pyramids for general object detection, which can be easily generalized to other anchor-free detectors without introducing extra parameters, only involves negligible computational cost on training testing. The proposed detector, called NCMS, inserts a norm calibration (NC) operation between the detection head alleviate balance bias caused by pyramid network (FPN). Furthermore, NCMS leverages an enhanced multi-feature selective strategy...

10.1016/j.cviu.2020.103050 article EN cc-by-nc-nd Computer Vision and Image Understanding 2020-07-27

High entropy (HE) traffic may result from encrypted such as C&C botnet communication. Such also tends to be opaque an IDS. However, line speed calculation is expensive, especially for long flows. In this paper we introduce methodology classify flows HE or low (LE) by considering only the first M packets of flow. We use our classifiers in two ways: (a) improve effectiveness BotHunter, a bot detection tool when presented with traffic, and (b) filter reduce load on implement Snort preprocessor....

10.1109/cns.2015.7346817 article EN 2015-09-01

With an increasing urgent demand for fast recovery routing mechanisms in large-scale networks, minimizing network disruption caused by failure has become critical. However, a large number of relevant studies have show... | Find, read and cite all the research you need on Tech Science Press

10.32604/cmc.2020.013355 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-12-09

Numerous distributed applications are deployed in the cross-datacenter networks (Cross-DC) where geographically data centers (DC) connected by wide area network (WAN). These online will generate both intra-datacenter and inter-datacenter traffic, each with distinct requirements characteristics. We find that existing combined congestion control schemes ignore interaction of two types traffic hybrid fail to accurately estimate cross center extent. In this paper, we propose IDCC a delay based...

10.1109/iwqos57198.2023.10188700 article EN 2023-06-19
Coming Soon ...