于明
个人信息Personal Information
副教授
硕士生导师
性别:男
毕业院校:西安电子科技大学
学位:博士
所在单位:信息与通信工程学院
办公地点:大连理工大学创新园大厦B509
电子邮箱:yu_ming1111@dlut.edu.cn
扫描关注
- [1]于明.随机公平队列对UDP洪流的抑制效果分析[J],计算机科学,2022,9:67-69
- [2]于明.An adaptive method for source-end detection of pulsing DoS attacks[J],International Journal of Security and its Applications,2022,7(5):279-288
- [3]Liu C., 于明, 章艳.A nonparametric multivariate method for performance analysis of virtual machines in cloud computi...[A],IASTED International Conference on Modelling, Identification and Control, MIC 2014,2022,95-98
- [4]于明.A Probabilistic Drop Scheme for Mitigating SYN Flooding Attacks[A],International Conference on Networks Security, Wireless Communications and Trusted Computing,2022,1:732-734
- [5]于明, Zheng, Feifei, Ma, Junwei, Zhang, Jingying.Blind recognition of binary BCH codes based on Euclidean algorithm[J],ELECTRONICS LETTERS,2022,56(21):1154-+
- [6]颜超, 于明.基于 BCH 码的信息隐藏方法[J],信息网络安全,2014,11:26-29
- [7]于明, 王振安, 王东菊.基于Bloom滤波器的快速路由查找方法[J],哈尔滨工程大学学报,2014,10:1247-1252
- [8]于明, 王东菊.TCPDDoS攻击流的源端网络可检测性分析[J],山东大学学报 理学版,2012,47(11):50-53,66
- [9]于明, 朱超.利用半监督近邻传播聚类算法实现P2P流量识别[J],哈尔滨工程大学学报,2013,5:653-657,661
- [10]于明, 张雨, 刘畅, 张丹丹.云环境下基于多属性信息熵的虚拟机异常检测[J],华中科技大学学报 自然科学版,2015,5:63-67
- [11]于明, Zheng, Feifei, Ma, Junwei, Zhang, Jingying.Blind recognition of binary BCH codes based on Euclidean algorithm[J],ELECTRONICS LETTERS,2021,56(21):1154-+
- [12]于明, 张雨, 刘畅, 张丹丹.云环境下基于多属性信息熵的虚拟机异常检测[J],华中科技大学学报(自然科学版),2015,43(5):63-67
- [13]颜超, 于明.基于 BCH 码的信息隐藏方法[J],信息网络安全,2014,11:26-29
- [14]于明, 王振安, 王东菊, Yu, Ming.基于Bloom滤波器的快速路由查找方法[J],哈尔滨工程大学学报,2014,35(10):1247-1252
- [15]Liu C., Yu M., Zhang Y..A nonparametric multivariate method for performance analysis of virtual machines in cloud computi...[A],2014,95-98
- [16]于明, 朱超, Yu, M.(yu_ming1111@dlut.edu.cn).利用半监督近邻传播聚类算法实现P2P流量识别[J],哈尔滨工程大学学报,2013,34(5):653-657,661
- [17]Yu M., Yu, M., School of Information, Communication Engineering, Dalian University of Technology, Dalian, China, email: yu_ming1111@dlut.edu.cn.An adaptive method for source-end detection of pulsing DoS attacks[J],International Journal of Security and its Applications,2013,7(5):279-288
- [18]于明, 王东菊.TCPDDoS攻击流的源端网络可检测性分析[J],山东大学学报:理学版,2012,47(11):50-53,66
- [19]于明, Yu, M., School of Information, Communication Engineering, Dalian University of Technology, Dalian 116024, China, email: yu_ming1111@dlut.edu.cn.随机公平队列对脉冲式拒绝服务攻击的抑制效果分析[J],南京理工大学学报,2012,36(suppl.1):231-235
- [20]Yu M., Li X., Yu, M., School of Information, Communication Engineering, Dalian University of Technology, Dalian, China, email: yu_ming1111@dlut.edu.cn.Source-end detection and restraint of pulsing DoS attacks: A simulation study[J],Journal of Convergence Information Technology,2012,7(22):110-117