Guangwu Hu

Orcid: 0000-0003-3947-9998

According to our database1, Guangwu Hu authored at least 59 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model.
Proceedings of the IEEE Security and Privacy, 2024

Understanding the Influence of Extremely High-Degree Nodes on Graph Anomaly Detection.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning.
Comput. Secur., December, 2023

HGL_GEO: Finer-grained IPv6 geolocation algorithm based on hypergraph learning.
Inf. Process. Manag., November, 2023

GraphNEI: A GNN-based network entity identification method for IP geolocation.
Comput. Networks, November, 2023

GWS-Geo: A graph neural network based model for street-level IPv6 geolocation.
J. Inf. Secur. Appl., June, 2023

TeCre: A Novel Temporal Conflict Resolution Method Based on Temporal Knowledge Graph Embedding.
Inf., 2023

TCGNN: Packet-grained network traffic classification via Graph Neural Networks.
Eng. Appl. Artif. Intell., 2023

A Machine Learning Based Funding Project Evaluation Decision Prediction.
Comput. Syst. Sci. Eng., 2023

A lightweight and high-precision approach for bulky JavaScript engines fuzzing.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Fibonet: A Light-weight and Efficient Neural Network for Image Segmentation.
Proceedings of the IEEE International Conference on Image Processing, 2023

AAP: Defending Against Website Fingerprinting Through Burst Obfuscation.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

ReviewLocator: Enhance User Review-Based Bug Localization with Bug Reports.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

DetOH: An Anchor-Free Object Detector with Only Heatmaps.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
PTrustE: A high-accuracy knowledge graph noise detection method based on path trustworthiness and triple embedding.
Knowl. Based Syst., 2022

Graph Data Augmentation for Node Classification.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

2021
ALBFL: A novel neural ranking model for software fault localization via combining static and dynamic features.
Inf. Softw. Technol., 2021

SAMLDroid: A Static Taint Analysis and Machine Learning Combined High-Accuracy Method for Identifying Android Apps with Location Privacy Leakage Risks.
Entropy, 2021

Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets.
Comput. Secur., 2021

Knowledge Graph-Based Spatial-Aware User Community Preference Query Algorithm for LBSNs.
Big Data Res., 2021

A LambdaMart-Based High-Accuracy Approach for Software Automatic Fault Localization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

A Novel and High-Accuracy Rumor Detection Approach using Kernel Subtree and Deep Learning Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Short and Distort Manipulations in the Cryptocurrency Market: Case Study, Patterns and Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

A Combination of Resampling and Ensemble Method for Text Classification on Imbalanced Data.
Proceedings of the Big Data - BigData 2021, 2021

2020
CNN-MHSA: A Convolutional Neural Network and multi-head self-attention combined approach for detecting phishing websites.
Neural Networks, 2020

RETCAM: An efficient TCAM compression model for flow table of OpenFlow.
J. Commun. Networks, 2020

ABFL: An autoencoder based practical approach for software fault localization.
Inf. Sci., 2020

A proactive auto-scaling scheme with latency guarantees for multi-tenant NFV cloud.
Comput. Networks, 2020

ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic Features.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
ELPKG: A High-Accuracy Link Prediction Approach for Knowledge Graph Completion.
Symmetry, 2019

Android malware detection based on system call sequences and LSTM.
Multim. Tools Appl., 2019

Non-local Self-attention Structure for Function Approximation in Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
New deep learning method to detect code injection attacks on hybrid applications.
J. Syst. Softw., 2018

Social account linking via weighted bipartite graph matching.
Int. J. Commun. Syst., 2018

CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks.
Future Gener. Comput. Syst., 2018

Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack.
IEEE Access, 2018

De-Anonymizing Social Networks With Random Forest Classifier.
IEEE Access, 2018

2017
Modeling and validation of SMS worm propagation over social networks.
J. Comput. Sci., 2017

TrueID: A practical solution to enhance Internet accountability by assigning packets with creditable user identity code.
Future Gener. Comput. Syst., 2017

Design and analysis of <i>SEIQR</i> worm propagation model in mobile internet.
Commun. Nonlinear Sci. Numer. Simul., 2017

SAIDR: A New Dynamic Model for SMS-Based Worm Propagation in Mobile Networks.
IEEE Access, 2017

Balancing User Profile and Social Network Structure for Anchor Link Inferring Across Multiple Online Social Networks.
IEEE Access, 2017

Constrained Random Routing Mechanism for Source Privacy Protection in WSNs.
IEEE Access, 2017

Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
FICUS: Fast Incremental Consistent Update in SDN based on relation graph.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

MSRT: Multi-Source Request and Transmission in Content-Centric Networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

SAVSH: IP source address validation for SDN hybrid networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Routing Model Based on Service Degree and Residual Energy in WSN.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Real-Time Dynamic Decomposition Storage of Routing Tables.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
Reliable Multipath Transmission in Data Center Network.
J. Commun., 2015

2014
Towards evolvable Internet architecture-design constraints and models analysis.
Sci. China Inf. Sci., 2014

2013
A general framework of source address validation and traceback for IPv4/IPv6 transition scenarios.
IEEE Netw., 2013

SuperFlow: A Reliable, Controllable and Scalable Architecture for Large-Scale Enterprise Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
MR-OLSR: A link state routing algorithm in multi-radio/multi-channel Wireless Mesh Networks.
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012

2011
SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011


  Loading...