Guowei Shen

Orcid: 0000-0002-1329-4058

According to our database1, Guowei Shen authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024

SNDMI: Spyware network traffic detection method based on inducement operations.
Comput. Secur., 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence.
Comput. Networks, April, 2023

MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023

2022
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT.
IEEE Internet Things J., 2022

Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022

2021
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy.
Wirel. Commun. Mob. Comput., 2021

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
Secur. Commun. Networks, 2021

Towards DDoS detection mechanisms in Software-Defined Networking.
J. Netw. Comput. Appl., 2021

Image-based malware classification using section distribution information.
Comput. Secur., 2021

2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021

METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security.
Wirel. Commun. Mob. Comput., 2020

DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF.
Frontiers Inf. Technol. Electron. Eng., 2019

HiPower: A High-Performance RDMA Acceleration Solution for Distributed Transaction Processing.
Proceedings of the Network and Parallel Computing, 2019

DataSESec: Security Monitoring for Data Share and Exchange Platform.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

2015
Anomaly Detection in Microblogging via Co-Clustering.
J. Comput. Sci. Technol., 2015

Heterogeneous Sparse Relational Data Co-clustering in Social Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

FRID: Indoor Fine-Grained Real-Time Passive Human Motion Detection.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Information Diffusion and Influence Measurement Based on Interaction in Microblogging.
Proceedings of the Social Media Processing - Third National Conference, 2014

Detecting Anomalies in Microblogging via Nonnegative Matrix Tri-Factorization.
Proceedings of the Social Media Processing - Third National Conference, 2014

Agglomerative Hierarchical Co-clustering Based on Bregman Divergence.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

Detecting Bots in Follower Markets.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014

2013
Ultra-Wideband MIMO Ambiguity Function and Its Factorability.
IEEE Trans. Geosci. Remote. Sens., 2013

2010
Range-Based Localization for UWB Sensor Networks in Realistic Environments.
EURASIP J. Wirel. Commun. Netw., 2010

Ultrawideband Channel Sounding within an Airbus 319.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Evaluation of requirements for UWB localization systems in home-entertainment applications.
Proceedings of the 2010 International Conference on Indoor Positioning and Indoor Navigation, 2010

2008
Performance comparison of TOA and TDOA based location estimation algorithms in LOS environment.
Proceedings of the 5th Workshop on Positioning, Navigation and Communication, 2008


  Loading...