Jianhua Yang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
In Situ Growth of COF/PVA-Carrageenan Hydrogel Using the Impregnation Method for the Purpose of Highly Sensitive Ammonia Detection.
Sensors, July, 2024

ActionMixer: Temporal action detection with Optimal Action Segment Assignment and mixers.
Expert Syst. Appl., March, 2024

Highway Ecological Environmental Assessment Based on Modified Remote Sensing Index - Taking the Lhasa-Nyingchi Motorway as an Example.
Remote. Sens., January, 2024

Near-Infrared Radiance of Vegetation is More Sensitive Than Vegetation Indices for Monitoring NPP of Winter Wheat Under Water Stress.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

The impact of relationship management on manufacturer resilience in emergencies.
Kybernetes, 2024

SPK: Semantic and Positional Knowledge for Zero-Shot Referring Expression Comprehension.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

2023
Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack.
J. Vis. Commun. Image Represent., December, 2023

Cascading spatio-temporal attention network for real-time action detection.
Mach. Vis. Appl., November, 2023

Actions as points: a simple and efficient detector for skeleton-based temporal action detection.
Mach. Vis. Appl., March, 2023

Robust data hiding for JPEG images with invertible neural network.
Neural Networks, 2023

Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2023

YOWOv2: A Stronger yet Efficient Multi-level Detection Framework for Real-time Spatio-temporal Action Detection.
CoRR, 2023

Joint Optimization of Condition-Based Maintenance and Spare Ordering Strategy for a Multistate Competing Failure System.
IEEE Access, 2023

A Novel Approach to Air Quality Monitoring: Towards Miniature, Self-organized, and Low-power Device.
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023

Universal Data Acquisition System for Flexible and MEMS-Based Gas Sensors.
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023

Multitask Graph Neural Network for Knowledge Graph Link Prediction.
Proceedings of the Data Science, 2023

Optimizing Supply Chain Performance of SMEs through Big Data Analytic and IT-enabled Capabilities.
Proceedings of the 7th International Conference on Management Engineering, 2023

Research on the Design Narrative for Medical Popular Science Serious Games: A Case Study of AIDS Prevention Game "Bluebridge Cafe".
Proceedings of the Universal Access in Human-Computer Interaction, 2023

Robust Image Steganography: Hiding Messages in Frequency Coefficients.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Exploring the Ability of Solar-Induced Chlorophyll Fluorescence for Drought Monitoring Based on an Intelligent Irrigation Control System.
Remote. Sens., December, 2022

Intersubjectivity and Virtual Practice in Courses Teaching.
Int. J. Emerg. Technol. Learn., May, 2022

Actor and Action Modular Network for Text-Based Video Segmentation.
IEEE Trans. Image Process., 2022

Long-Term Frequency Stability Analysis for RRFM and Power-Law Noise Determination of the BeiDou-3 Satellite On-Board Atomic Clocks.
IEEE Trans. Instrum. Meas., 2022

Discussions of a2-Drift Variations of BeiDou-3 Satellite Rubidium Atomic Clocks.
IEEE Trans. Instrum. Meas., 2022

Exploring the Potential of Spatially Downscaled Solar-Induced Chlorophyll Fluorescence to Monitor Drought Effects on Gross Primary Production in Winter Wheat.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Night Vision Anti-Halation Method Based on Infrared and Visible Video Fusion.
Sensors, 2022

Improving Soil Moisture Estimation via Assimilation of Remote Sensing Product into the DSSAT Crop Model and Its Effect on Agricultural Drought Monitoring.
Remote. Sens., 2022

High-Accuracy Clock Offsets Estimation Strategy of BDS-3 Using Multi-Source Observations.
Remote. Sens., 2022

A Study on Pseudorange Biases in BDS B1I/B3I Signals and the Impacts on Beidou Wide Area Differential Services.
Remote. Sens., 2022

The Bias in PPP-B2b Real-Time Clock Offset and the Strategy to Reduce It.
Remote. Sens., 2022

Pol3Base: a resource for decoding the interactome, expression, evolution, epitranscriptome and disease variations of Pol III-transcribed ncRNAs.
Nucleic Acids Res., 2022

Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream and Downstream Connections using Packet Crossover.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions.
J. Internet Serv. Inf. Secur., 2022

A novel fast combine-and-conquer object detector based on only one-level feature map.
Comput. Vis. Image Underst., 2022

YOWO-Plus: An Incremental Improvement.
CoRR, 2022

Adaptive Dark Channel Prior Enhancement Algorithm for Different Source Night Vision Halation Images.
IEEE Access, 2022

An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Using VR in Science Subjects: Popularity and Public Attitudes on Twitter.
Proceedings of the IEEE International Conference on e-Business Engineering, 2022

Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Mining Network Traffic with the k -Means Clustering Algorithm for Stepping-Stone Intrusion Detection.
Wirel. Commun. Mob. Comput., 2021

A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation.
Wirel. Commun. Mob. Comput., 2021

Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection.
Sensors, 2021

Sinusoidal Phase-Modulated Angle Interferometer for Angular Vibration Measurement.
Sensors, 2021

deepBase v3.0: expression atlas and interactive analysis of ncRNAs from thousands of deep-sequencing data.
Nucleic Acids Res., 2021

A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics.
Multim. Syst., 2021

Development of the Interactive Rehabilitation Game System for Children with Autism Based on Game Psychology.
Mob. Inf. Syst., 2021

LIFT: lncRNA identification and function-prediction tool.
Int. J. Bioinform. Res. Appl., 2021

JPEG Steganography with Embedding Cost Learning and Side-Information Estimation.
CoRR, 2021

Optimal Condition-Based Maintenance Strategy via an Availability-Cost Hybrid Factor for a Single-Unit System During a Two-Stage Failure Process.
IEEE Access, 2021

The Programming Model of Air-Ground Cooperative Patrol Between Multi-UAV and Police Car.
IEEE Access, 2021

Landmark-RxR: Solving Vision-and-Language Navigation with Fine-Grained Alignment Supervision.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

CMF: Cascaded Multi-Model Fusion For Referring Image Segmentation.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Identify Encrypted Packets to Detect Stepping-Stone Intrusion.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
An Embedding Cost Learning Framework Using GAN.
IEEE Trans. Inf. Forensics Secur., 2020

Exceptional Drought across Southeastern Australia Caused by Extreme Lack of Precipitation and Its Impacts on NDVI and SIF in 2018.
Remote. Sens., 2020

Nonlinear Relationship Between the Yield of Solar-Induced Chlorophyll Fluorescence and Photosynthetic Efficiency in Senescent Crops.
Remote. Sens., 2020

An Integrated Approach for Detection and Prediction of Greening Situation in a Typical Desert Area in China and Its Human and Climatic Factors Analysis.
ISPRS Int. J. Geo Inf., 2020

Educational modules and research surveys on critical cybersecurity topics.
Int. J. Distributed Sens. Networks, 2020

Identification of novel flowering genes using RNA-Seq pipeline employing combinatorial approach in Arabidopsis thaliana time-series apical shoot meristem data.
Int. J. Bioinform. Res. Appl., 2020

Actor and Action Modular Network for Text-based Video Segmentation.
CoRR, 2020

An Automatic Asset Life-Cycle Monitoring System Based on RFID Radio Frequency.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

Global Context Enhanced Multi-modal Fusion for Referring Image Segmentation.
Proceedings of the Pattern Recognition and Computer Vision, Third Chinese Conference, 2020

Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Approaching Optimal Embedding In Audio Steganography With GAN.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Educational Microclimate Mesonet System Design.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
The Impacts of Growth and Environmental Parameters on Solar-Induced Chlorophyll Fluorescence at Seasonal and Diurnal Scales.
Remote. Sens., 2019

JPEG steganalysis with combined dense connected CNNs and SCA-GFR.
Multim. Tools Appl., 2019

PLIT: An alignment-free computational tool for identification of long non-coding RNAs in plant transcriptomic datasets.
Comput. Biol. Medicine, 2019

Minimum-Latency Data Gathering Scheduling in Multi-Channel Wireless Sensor Networks Using Only Secure Links.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Towards Automatic Embedding Cost Learning for JPEG Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Application of Hidden Markov Model on the Prediction of Hepatitis B Incidences.
Proceedings of the Smart Health - International Conference, 2019

Effect of Supply Chain Agility Dimensions on Supply Chain Performance: A Case of Iranian SMEs.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

Positioning and Orientation by the Integrated System for Underwater Acoustic Arrays.
Proceedings of the 12th Asian Control Conference, 2019

2018
Manipulating network traffic to evade stepping-stone intrusion detection.
Internet Things, 2018

The impact of mobile marketing on online consumer buying behaviour: empirical evidence from Pakistan.
Int. J. Mob. Commun., 2018

An Empirical Study to Understand the Effect of Supply Chain Agility on Organizational Operational Performance: SC Agility and Organizational Performance.
Int. J. Inf. Syst. Supply Chain Manag., 2018

Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks.
Int. J. Distributed Sens. Networks, 2018

Realising the decomposition of a multi-frequency signal under the coloured noise background by the adaptive stochastic resonance in the non-linear system with periodic potential.
IET Signal Process., 2018

A research survey in stepping-stone intrusion detection.
EURASIP J. Wirel. Commun. Netw., 2018

Spatial Image Steganography Based on Generative Adversarial Network.
CoRR, 2018

A stacked deep autoencoder model for biomedical figure classification.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Research on Low Carbon Logistics Network in Highway Port Mode.
Proceedings of the 2018 International Conference on Internet and e-Business, 2018

Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Deep Learning with Feature Reuse for JPEG Image Steganalysis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Using Postal Mail System to Teach Packet Switching in Computer Networks.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
A Parallel Strategy for Convolutional Neural Network Based on Heterogeneous Cluster for Mobile Information System.
Mob. Inf. Syst., 2017

The Effect of Mobile Marketing and Email Marketing on Exploratory Information Seeking (EIS) Behavior of the Consumers: Communication Through Wireless Technologies.
Int. J. Enterp. Inf. Syst., 2017

JPEG Steganalysis Based on DenseNet.
CoRR, 2017

Dolphin Swarm Extreme Learning Machine.
Cogn. Comput., 2017

Ensemble of CNN and rich model for steganalysis.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2017

Steganalysis Based on Awareness of Selection-Channel and Deep Learning.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Understanding the effect of E-marketing (eM) on online consumer buying behavior.
Proceedings of the 2017 International Conference on Management Engineering, 2017

An RNA-Seq Bioinformatics Pipeline for Data Processing of Arabidopsis Thaliana Datasets.
Proceedings of the International Conference on Bioinformatics Research and Applications 2017, 2017

Data-driven method of reverse modelling for multi-function radar.
Proceedings of the 25th European Signal Processing Conference, 2017

Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Inject Stenography into Cybersecurity Education.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Dolphin swarm algorithm.
Frontiers Inf. Technol. Electron. Eng., 2016

A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Integrate Hacking Technique into Information Assurance Education.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
A Multi-Constrained Routing Algorithm for Software Defined Network Based on Nonlinear Annealing.
J. Networks, 2015

Denial of service hands-on lab for information assurance education: a case study.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Genetic ensemble of extreme learning machine.
Neurocomputing, 2014

NIM: A Node Influence Based Method for Cancer Classification.
Comput. Math. Methods Medicine, 2014

Enhance learning through developing network security hands-on lab for online students.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

2013
Imaging of Spinning Targets via Narrow-Band T/R-R Bistatic Radars.
IEEE Geosci. Remote. Sens. Lett., 2013

Constructing a Novel Pos-neg Manifold for Global-Based Image Classification.
Proceedings of the Advanced Data Mining and Applications, 9th International Conference, 2013

2012
Study on the Education Investment Risk of Enterprise Human Capital Based on Monte Carlo Simulation Method.
J. Comput., 2012

Bistatic scattering centres of cone-shaped targets and target length estimation.
Sci. China Inf. Sci., 2012

Efficient traffic flow measurement for ISP networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
An equivalent method for blasting vibration simulation.
Simul. Model. Pract. Theory, 2011

Correlating TCP/IP Packet contexts to detect stepping-stone intrusion.
Comput. Secur., 2011

Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An investigation into iPod Touch generation 2.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

A new algorithm of image denoising based on stationary wavelet multi-scale adaptive threshold.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A Colorimetric Sensor for Qualitative Discrimination and Quantitative Detection of Volatile Amines.
Sensors, 2010

Feature Reduction with Inconsistency.
Int. J. Cogn. Informatics Nat. Intell., 2010

Iterative class diagram construction in consideration of modeling granularity.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010

Optimal Sizing Design for Hybrid Renewable Energy Systems in Rural Areas.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

On the construction and implementation methods for performance measurement of reverse supply chain.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Integrative performance evaluation for supply chain system based on logarithm triangular fuzzy number-AHP method.
Kybernetes, 2009

A context quality management infrastructure for complex ubiquitous environment.
Comput. Syst. Sci. Eng., 2009

Research on Multi-Agent Parallel Computing Model of Hydrothermal Economic Dispatch in Power System.
Proceedings of the Advances in Neural Networks, 2009

Fairness Analysis of Electronic Commerce Protocol Based on Strand Space.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Balanced Performance Measurement Scorecard Approach for Product Service Systems.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Mitigate DDoS attack using TTL buckets and host threatening index.
Proceedings of the LCN 2008, 2008

Characterization of HTTP behavior on access networks in Web 2.0.
Proceedings of the 2008 International Conference on Telecommunications, 2008

Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Accurate Online Traffic Classification with Multi-Phases Identification Methodology.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Monitoring Network Traffic to Detect Stepping-Stone Intrusion.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Mining TCP/IP packets to detect stepping-stone intrusion.
Comput. Secur., 2007

Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection.
Comput. Secur., 2007

Schwarz type algorithms for parabolic problems.
Appl. Math. Comput., 2007

Survey on Traffic of Metro Area Network with Measurement On-Line.
Proceedings of the Managing Traffic Performance in Converged Networks, 2007

Fuzzy Integrative Performance Evaluation for Supply Chain System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Self-Similar Characteristic of Traffic in Current Metro Area Network.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Handover Latency of MIPv6 Implementation in Linux.
Proceedings of the Global Communications Conference, 2007

Feedback and Resources Guided Mechanism for Adaptive Packet Sampling.
Proceedings of the Global Communications Conference, 2007

Stepping-Stone Detection Via Request-Response Traffic Analysis.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Hybrid Clustering for Large Sequential Data.
Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, 2007

2006
Modeling and simulation of performance analysis for a cluster-based Web server.
Simul. Model. Pract. Theory, 2006

A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Resistance Analysis to Intruders' Evasion of Detecting Intrusion.
Proceedings of the Information Security, 9th International Conference, 2006

ODSG: An Architecture of Ontology-based Distributed Simulation on Grid.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Hybrid <i>O</i>(<i>n</i> Ö<i>n</i>) Clustering for Sequential Web Usage Mining.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Movement detection delay analysis in mobile IP.
Comput. Commun., 2005

Additive Schwarz methods for parabolic problems.
Appl. Math. Comput., 2005

An NFSv4-Based Security Scheme for NAS.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Improved Thumbprint and Its Application for Intrusion Detection.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Fast and Robust General Purpose Clustering Algorithms.
Data Min. Knowl. Discov., 2004

A real-time algorithm to detect long connection chains of interactive terminal sessions.
Proceedings of the 3rd International Conference on Information Security, 2004

Cluster Validity Through Graph-based Boundary Analysis.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid.
Proceedings of the Grid and Cooperative Computing, 2004

A Secure Model for Network-Attached Storage on the Grid.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Modeling, Implementation and simulation of virtual factory based on colored timed Petri net.
Proceedings of 9th IEEE International Conference on Emerging Technologies and Factory Automation, 2003

Cluster Validity Using Support Vector Machines.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

Measurement-Based Modeling with Adaptive Sampling.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
Clustering Web Visitors by Fast, Robust and Convergent Algorithms.
Int. J. Found. Comput. Sci., 2002

Human Factor and Its Identification in Manufacturing Prediction.
Proceedings of the Knowledge and Skill Chains in Engineering and Manufacturing, 2002

2001
Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs.
Proceedings of the Web Intelligence: Research and Development, 2001

Non-crisp Clustering by Fast, Convergent, and Robust Algorithms.
Proceedings of the Principles of Data Mining and Knowledge Discovery, 2001


  Loading...