Hongli Zhang

Learn More
Although traceroute has the potential to discover AS links that are invisible to existing BGP monitors, it is well known that the common approach for mapping router IP address to AS number (IP2AS) based on the longest prefix matching is highly error-prone. In this paper we conduct a systematic investigation into the potential errors of the IP2AS mapping for(More)
Named Data Networking (NDN) natively supports the mobility of data consumers through its data-centric design and stateful forwarding plane. However, the mobility support for data producers remains open in the original proposal. In this paper, we introduce Kite, a design of mobility support for NDN. Kite leverages the state of the Pending Interest Table(More)
Intrusion Detection System (IDS) is a security technology that attempts to identify intrusions. Defending against multi-step intrusions which prepare for each other is a challenging task. In this paper, we propose a novel approach to alert post-processing and correlation, the Alerts Parser. Different from most other alert correlation methods, our approach(More)
Through time, we have seen mobile phones transform into multifaceted devices, adapted to meet and exceed our everyday needs. These needs range from something as personal as a health care manager to something as purely analytical as an environment monitor. In effect, mobile phones have come into our lives, making life easier, smarter, and more efficient. In(More)
With the advent of cloud computing, data owner is motivated to outsource their data to the cloud platform for great flexibility and economic savings. However, the development is hampered by data privacy concerns: Data owner may have privacy data and the data cannot be outsourced to cloud directly. Previous solutions mainly use encryption. However,(More)
The intrusion detection systems (IDSs) generate large number of alarms most of which are false positives. Fortunately, there are reasons for triggering alarms where most of these reasons are not attacks. In this paper, a new data mining technique has been developed to group alarms and to produce clusters. Hereafter, each cluster abstracted as a generalized(More)
The Intrusion Detection Systems (IDSs) are one of robust systems which can effectively detect penetrations and attacks. However, they generate large number of alarms most of which are false positives. Fortunately, there are reasons for triggering alarms where most of these reasons are not attacks. In this paper, a new approximation algorithm has developed(More)
Recent studies report SF3B1 mutations in about 20% of persons of European descent with myelodysplastic syndromes (MDS). Mutations are especially common in persons with ring sideroblasts (RS). SF3B1 mutation state was determined in 104 Chinese with MDS-RS. SF3B1 mutations were found in 55 subjects (53%) including 25 of 39 with refractory anemia and RS(More)