Guiling Zhang

According to our database1, Guiling Zhang authored at least 15 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2019
Evaluation of Machine Learning Approaches for Android Energy Bugs Detection With Revision Commits.
IEEE Access, 2019

2011
Improvments of Payload-based Intrusion Detection Models by Using Noise Against Fuzzy SVM.
J. Networks, 2011

2010
Theoretical studies on the reactions CH<sub>3</sub>SCH<sub>3</sub> with OH, CF<sub>3</sub>, and CH<sub>3</sub> radicals.
J. Comput. Chem., 2010

Theoretical study and rate constants calculation for the reactions of SiH<sub>3</sub> radical with SiH<sub>3</sub>CH<sub>3</sub> and SiH<sub>2</sub>(CH<sub>3</sub>)<sub>2</sub>.
J. Comput. Chem., 2010

A Distributed Dynamic Parallel Algorithm for SIFT Feature Extraction.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

2009
Theoretical study on the reaction of SiH(CH<sub>3</sub>)<sub>3</sub> with SiH<sub>3</sub> radical.
J. Comput. Chem., 2009

Evaluating Genetic Diversity and Differentiation of Marsupenaeus Japonicus Populations by Allozyme Analyses.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

2008
Theoretical study on the OH + CH<sub>3</sub>NHC(O)OCH<sub>3</sub> reaction.
J. Comput. Chem., 2008

2007
Theoretical study on the Br + CH<sub>3</sub>SCH<sub>3</sub> reaction.
J. Comput. Chem., 2007

Substitution effect on the geometry and electronic structure of the ferrocene.
J. Comput. Chem., 2007

2006
A Novel Network Intrusion Attempts Prediction Model Based on Fuzzy Neural Network.
Proceedings of the Computational Science, 2006

Grid intrusion detection based on soft computing by modeling real-user's normal behaviors.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Applying Fuzzy Neural Network to Intrusion Detection Based on Sequences of System Calls.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005


  Loading...