Service overlay networks: SLAs, QoS, and bandwidth provisioning Z Duan, ZL Zhang, YT Hou IEEE/ACM Transactions on networking 11 (6), 870-883, 2003 | 510 | 2003 |
A core stateless bandwidth broker architecture for scalable support of guaranteed services Z Duan, ZL Zhang, YT Hou, L Gao IEEE Transactions on parallel and distributed Systems 15 (2), 167-182, 2004 | 325* | 2004 |
Controlling IP spoofing through interdomain packet filters Z Duan, X Yuan, J Chandrashekar IEEE transactions on Dependable and Secure computing 5 (1), 22-36, 2008 | 289* | 2008 |
Limiting path exploration in BGP J Chandrashekar, Z Duan, ZL Zhang, J Krasky Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 141 | 2005 |
On scalable design of bandwidth brokers ZL Zhang, Z Duan, YT Hou IEICE transactions on communications 84 (8), 2011-2025, 2001 | 129 | 2001 |
Detecting spam zombies by monitoring outgoing messages Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011 | 126 | 2011 |
Virtual time reference system: A unifying scheduling framework for scalable support of guaranteed services ZL Zhang, Z Duan, YT Hou IEEE Journal on Selected Areas in Communications 18 (12), 2684-2695, 2000 | 98 | 2000 |
On properties of internet exchange points and their impact on as topology and relationship K Xu, Z Duan, ZL Zhang, J Chandrashekar International Conference on Research in Networking, 284-295, 2004 | 80 | 2004 |
Fundamental trade-offs in aggregate packet scheduling Z Duan, ZL Zhang, YT Hou IEEE Transactions on Parallel and Distributed Systems 16 (12), 1166-1177, 2005 | 79* | 2005 |
FRR: a proportional and worst-case fair round robin scheduler X Yuan, Z Duan Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 71 | 2005 |
Fair round-robin: A low complexity packet schduler with proportional and worst-case fairness X Yuan, Z Duan IEEE Transactions on Computers 58 (3), 365-379, 2008 | 66 | 2008 |
Method and apparatus for a bandwidth broker in a packet network ZL Zhang, YT Hou, Z Duan US Patent 7,257,632, 2007 | 65 | 2007 |
Behavioral characteristics of spammers and their network reachability properties Z Duan, K Gopalan, X Yuan 2007 IEEE International Conference on Communications, 164-171, 2007 | 48 | 2007 |
DMTP: Controlling spam through message delivery differentiation Z Duan, Y Dong, K Gopalan Computer Networks 51 (10), 2616-2630, 2007 | 45 | 2007 |
A traceback attack on freenet G Tian, Z Duan, T Baumeister, Y Dong IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015 | 43 | 2015 |
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic. Z Duan, K Gopalan, Y Dong SRUTI 5, 25-30, 2005 | 43 | 2005 |
Oblivious routing for fat-tree based system area networks with uncertain traffic demands X Yuan, W Nienaber, Z Duan, R Melhem Proceedings of the 2007 ACM SIGMETRICS international conference on …, 2007 | 42 | 2007 |
Oblivious routing in fat-tree based system area networks with uncertain traffic demands X Yuan, W Nienaber, Z Duan, R Melhem IEEE/ACM Transactions on Networking 17 (5), 1439-1452, 2009 | 39 | 2009 |
A sender-centric approach to detecting phishing emails F Sanchez, Z Duan 2012 international conference on cyber security, 32-39, 2012 | 36 | 2012 |
Incorporating accountability into internet email W Liu, S Aggarwal, Z Duan Proceedings of the 2009 ACM symposium on Applied Computing, 875-882, 2009 | 29 | 2009 |