Guowei Shen
Orcid: 0000-0002-1329-4058
According to our database1,
Guowei Shen
authored at least 30 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024
Comput. Secur., 2024
2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence.
Comput. Networks, April, 2023
MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023
2022
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT.
IEEE Internet Things J., 2022
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022
2021
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy.
Wirel. Commun. Mob. Comput., 2021
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
Secur. Commun. Networks, 2021
J. Netw. Comput. Appl., 2021
Comput. Secur., 2021
2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security.
Wirel. Commun. Mob. Comput., 2020
DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF.
Frontiers Inf. Technol. Electron. Eng., 2019
HiPower: A High-Performance RDMA Acceleration Solution for Distributed Transaction Processing.
Proceedings of the Network and Parallel Computing, 2019
Proceedings of the Web and Big Data - Third International Joint Conference, 2019
2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
2014
Information Diffusion and Influence Measurement Based on Interaction in Microblogging.
Proceedings of the Social Media Processing - Third National Conference, 2014
Proceedings of the Social Media Processing - Third National Conference, 2014
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014
2013
IEEE Trans. Geosci. Remote. Sens., 2013
2010
EURASIP J. Wirel. Commun. Netw., 2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Evaluation of requirements for UWB localization systems in home-entertainment applications.
Proceedings of the 2010 International Conference on Indoor Positioning and Indoor Navigation, 2010
2008
Performance comparison of TOA and TDOA based location estimation algorithms in LOS environment.
Proceedings of the 5th Workshop on Positioning, Navigation and Communication, 2008