scispace - formally typeset
M

Min Zhang

Researcher at University of Science and Technology Beijing

Publications -  21
Citations -  106

Min Zhang is an academic researcher from University of Science and Technology Beijing. The author has contributed to research in topics: Smart grid & Cloud computing. The author has an hindex of 5, co-authored 21 publications receiving 70 citations.

Papers
More filters
Journal ArticleDOI

A genetic algorithm‐based task scheduling for cloud resource crowd‐funding model

TL;DR: A new task scheduling algorithm, RC‐GA (genetic algorithm for task scheduling based on a resource crowd‐funding model), designed to increase the stability of task execution and reduce power consumption at the same time is proposed.
Journal ArticleDOI

HTTP-SoLDiER: An HTTP-flooding attack detection scheme with the large deviation principle

TL;DR: A novel detection scheme for HTTP-flooding (HTTP-SoLDiER), which quantifies the consistency between web users surfing preference and the webpage popularity with large-deviation principle and designs a reversible exponentially weighted moving average (EWMA) algorithm to solve the problem.
Journal ArticleDOI

HTTP-sCAN: Detecting HTTP-flooding attack by modeling multi-features of web browsing behavior from noisy web-logs

TL;DR: This paper proposes a novel web-crawling traces-tolerated method to build baseline profile, and designs a new anomaly-based HTTP-flooding detection scheme (abbr. HTTP-sCAN), which is immune to the interferences of unknown web- crawling traces, and can detect all HTTP-Flooding attacks.
Proceedings ArticleDOI

HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset

TL;DR: Wang et al. as mentioned in this paper proposed a novel anomaly-based HTTP-flooding detection scheme (HTTP-sCAN), which can eliminate the influence of the Web crawling traces with the cluster algorithm.
Journal ArticleDOI

A Secure and Anonymous Communication Scheme for Charging Information in Vehicle-to-Grid

TL;DR: The proposed scheme is more resistant to traffic analysis since it preserves the anonymity of charging information by splitting and forwarding them pseudo-randomly, and it can achieve high cryptography capability as traditional communication schemes do.