


default search action
Zhuyun Qi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j2]Guorui Xie
, Qing Li
, Chupeng Cui, Ruoyu Li
, Lianbo Ma
, Zhuyun Qi, Yong Jiang
:
Intelligent In-Network Attack Detection on Programmable Switches With Soterv2. IEEE Trans. Dependable Secur. Comput. 22(1): 440-456 (2025)
[j1]Qing Li
, Jiaye Lin
, Guorui Xie
, Zhongxu Guan, Zeyu Luan
, Zhuyun Qi, Yong Jiang
, Zhenhui Yuan
:
Distributed Multi-Task In-Network Classification on Programmable Switches by Ensemble Models. IEEE Trans. Netw. 33(6): 3302-3317 (2025)
[c15]Zutao Zhang, Zeyu Luan, Qing Li, Zhuyun Qi, Kejun Li, Yong Jiang, Zhenhui Yuan:
SentinelX: A Lightweight Malicious Traffic Detection System Based on Programmable Switches. INFOCOM 2025: 1-10
[c14]Xingbo Feng
, Zhuyun Qi, Yi Wang, Ziyao Huang
, Yan Liu, Jiashuo Lin, Chenxi Ling, Weichao Li, Jin Zhang, Jianping Wang:
DeSync: Proactive Congestion Control via Random Delay Offsets for Large-Scale ML Training. IWQoS 2025: 1-2
[c13]Chenxi Ling, Zhuyun Qi, Shuangping Zhan, Yan Liu, Xingbo Feng
, Ruide Cao, Jingbin Feng, Jiashuo Lin, Jian Cheng, Yi Wang:
Effective Phase Alignment: Reducing Queuing Delay in Multi-CQF for Deterministic Networking. IWQoS 2025: 1-2
[c12]Yan Liu
, Zhuyun Qi, Xingbo Feng
, Shuangping Zhan, Yao Xin, Jiashuo Lin, Chenxi Ling, Ruide Cao, Weichao Li, Yi Wang:
ReCQF: Enhancing CQF Redundancy with Delay Alignment Scheduling in TSN. IWQoS 2025: 1-2
[i2]Ruide Cao, Zhuyun Qi, Qinyang He, Chenxi Ling, Yi Wang, Guoming Tang:
SAGkit: A Python SAG Toolkit for Response Time Analysis of Hybrid-Triggered Jobs. CoRR abs/2511.17882 (2025)- 2024
[c11]Ruide Cao
, Qinyang He, Yi Wang, Zhuyun Qi:
Poster Abstract: Extending Schedule-Abstraction Graph for Event-Triggered Response-Time Analysis. IPSN 2024: 309-310- 2023
[c10]Guorui Xie, Qing Li, Guanglin Duan, Yong Jiang, Zhuyun Qi, Shuo Liu, Qiaoling Wang:
Efficient Flow Recording with InheritSketch on Programmable Switches. ICDCS 2023: 1-11- 2022
[c9]Guorui Xie
, Qing Li, Chupeng Cui, Peican Zhu
, Dan Zhao, Wanxin Shi
, Zhuyun Qi, Yong Jiang, Xi Xiao:
Soter: Deep Learning Enhanced In-Network Attack Detection Based on Programmable Switches. SRDS 2022: 225-236- 2021
[c8]Feixue Han, Qing Li, Keke Zhu, Jianer Zhou, Yong Jiang, Zhuyun Qi, Fuliang Li:
LAFS: Learning-Based Application-Agnostic Flow Scheduling for Datacenters. IPCCC 2021: 1-8
[c7]Lianjin Ye, Qing Li, Xudong Zuo, Jingyu Xiao
, Yong Jiang, Zhuyun Qi, Chunsheng Zhu:
PUFF: A Passive and Universal Learning-based Framework for Intra-domain Failure Detection. IPCCC 2021: 1-8
[i1]Huimin Zhou, Qing Li, Yong Jiang, Rongwei Yang, Zhuyun Qi:
DGEM: A New Dual-modal Graph Embedding Method in Recommendation System. CoRR abs/2108.04031 (2021)
2010 – 2019
- 2019
[c6]Jiyue Huang, Kai Lei
, Maoyu Du, Hongting Zhao, Huafang Liu, Jin Liu, Zhuyun Qi:
Survey on Blockchain Incentive Mechanism. ICPCSEE (1) 2019: 386-395
[c5]Xu Cheng
, Fulong Chen
, Dong Xie
, Hui Sun
, Cheng Huang
, Zhuyun Qi:
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing. ICPCSEE (1) 2019: 396-411- 2018
[c4]Kai Lei
, Qichao Zhang, Limei Xu, Zhuyun Qi:
Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain. ICPADS 2018: 604-611- 2017
[c3]Yi Wang, Zhuyun Qi, Kai Lei
, Bin Liu, Chen Tian:
Preventing "bad" content dispersal in named data networking. ACM TUR-C 2017: 37:1-37:8
[c2]Yi Wang, Zhuyun Qi, Huichen Dai, Hao Wu, Kai Lei
, Bin Liu:
Statistical Optimal Hash-Based Longest Prefix Match. ANCS 2017: 153-164
[c1]Chen Chen, Zhuyun Qi, Yirui Liu, Kai Lei
:
Using Virtualization for Blockchain Testing. SmartCom 2017: 289-299
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-01 01:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







