Kun Du

Orcid: 0000-0002-8757-1783

According to our database1, Kun Du authored at least 22 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Scenario reduction-based simulation method for efficient serviceability assessment of earthquake-damaged water distribution systems.
Reliab. Eng. Syst. Saf., 2024

Towards lightweight excavation: Machine learning exploration of rock size distribution prediction after tunnel blasting.
J. Comput. Sci., 2024

Nonlinear energy harvesting based alternate cooperative nonorthogonal multiple access with adaptive interference cancellation.
Comput. Networks, 2024

2023
Enhancing the performance of tunnel water inflow prediction using Random Forest optimized by Grey Wolf Optimizer.
Earth Sci. Informatics, September, 2023

2022
Joint Time and Power Control of Energy Harvesting CRN Based on PPO.
Proceedings of the 2022 Wireless Telecommunications Symposium, 2022

2021
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

An Alternative Method of Backward Fuzzy Interpolation based on Areas of Fuzzy Sets.
Proceedings of the 20th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2021

2020
A Market in Dream: the Rapid Development of Anonymous Cybercrime.
Mob. Networks Appl., 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams.
Proceedings of the Security and Privacy in Communication Networks, 2019

Casino royale: a deep exploration of illegal online gambling.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Theoretical and Experimental Studies of Localization Methodology for AE and Microseismic Sources Without Pre-Measured Wave Velocity in Mines.
IEEE Access, 2017

How to Learn Klingon without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Robust local L2, 1 tracker via red-green-blue color channel fusion.
J. Electronic Imaging, 2016

Multi-band joint local sparse tracking via wavelet transforms.
IET Comput. Vis., 2016

The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO.
Proceedings of the 25th USENIX Security Symposium, 2016

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
Colour compressed sensing imaging via sparse difference and fractal minimisation recovery.
IET Image Process., 2015

2014
Post processing for dense stereo matching by iterative local plane fitting.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Person/vehicle classification based on deep belief networks.
Proceedings of the 10th International Conference on Natural Computation, 2014

Cellular automata model for bacterial information sharing mechanism.
Proceedings of the 10th International Conference on Natural Computation, 2014


  Loading...