Li Guo
Orcid: 0000-0002-2529-7643Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing China
- Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
According to our database1,
Li Guo
authored at least 234 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
CoRR, 2023
Learning Structural Co-occurrences for Structured Web Data Extraction in Low-Resource Settings.
Proceedings of the ACM Web Conference 2023, 2023
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications.
Proceedings of the IFIP Networking Conference, 2023
Proceedings of the 45th Annual Meeting of the Cognitive Science Society, 2023
Divide, Conquer, and Combine: Mixture of Semantic-Independent Experts for Zero-Shot Dialogue State Tracking.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
IEEE Trans. Knowl. Data Eng., 2022
Proceedings of the 29th International Conference on Computational Linguistics, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 28th International Conference on Computational Linguistics, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the Data Science - 6th International Conference, 2019
Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
J. Comput. Sci., 2018
Modeling Text with Graph Convolutional Network for Cross-Modal Information Retrieval.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the Knowledge Science, Engineering and Management, 2018
Fine-Grained Correlation Learning with Stacked Co-attention Networks for Cross-Modal Information Retrieval.
Proceedings of the Knowledge Science, Engineering and Management, 2018
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
IEEE Trans. Knowl. Data Eng., 2017
IEEE Trans. Knowl. Data Eng., 2017
Frontiers Comput. Sci., 2017
Inferring User Profiles in Online Social Networks Based on Convolutional Neural Network.
Proceedings of the Knowledge Science, Engineering and Management, 2017
Proceedings of the Information Security - 20th International Conference, 2017
CPMF: A collective pairwise matrix factorization model for upcoming event recommendation.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Flexible Expert Finding on the Web via Semantic Hypergraph Learning and Affinity Propagation Model.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017
Recognizing Compound Entity Phrases in Hybrid Academic Domains in View of Community Division.
Proceedings of the International Conference on Computational Science, 2017
Proceedings of the International Conference on Computational Science, 2017
Proceedings of the International Conference on Computational Science, 2017
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
2016
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016
Towards quantifying visual similarity of domain names for combating typosquatting abuse.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the Knowledge Science, Engineering and Management, 2016
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
Proceedings of the International Conference on Computational Science 2016, 2016
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Location-aware Friend Recommendation in Event-based Social Networks: A Bayesian Latent Factor Approach.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
On the Minimum Differentially Resolving Set Problem for Diffusion Source Inference in Networks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
On the Upper Bounds of Spread for Greedy Algorithms in Social Network Influence Maximization.
IEEE Trans. Knowl. Data Eng., 2015
IEEE Trans. Knowl. Data Eng., 2015
Knowl. Based Syst., 2015
Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach.
J. Comput. Sci., 2015
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 24th International Conference on World Wide Web Companion, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Efficient Sensor Placement Optimization for Early Detection of Contagious Outbreaks in Mobile Social Networks.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the Data Science - Second International Conference, 2015
Proceedings of the Data Science - Second International Conference, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015
2014
IEEE J. Sel. Areas Commun., 2014
A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Netw. Comput. Appl., 2014
J. Comput. Sci. Technol., 2014
Comparative study between incremental and ensemble learning on data streams: Case study.
J. Big Data, 2014
Maximizing the long-term integral influence in social networks under the voter model.
Proceedings of the 23rd International World Wide Web Conference, 2014
An upper bound based greedy algorithm for mining top-k influential nodes in social networks.
Proceedings of the 23rd International World Wide Web Conference, 2014
Combining geographical information of users and content of items for accurate rating prediction.
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Topic Block: Mining User Inner Interests for Text and Link Analysis in Social Networks.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Maximizing the Cumulative Influence through a Social Network when Repeat Activation Exists.
Proceedings of the International Conference on Computational Science, 2014
Proceedings of the International Conference on Computational Science, 2014
A Multi-layer Event Detection Algorithm for Detecting Global and Local Hot Events in Social Networks.
Proceedings of the International Conference on Computational Science, 2014
Proceedings of the International Conference on Computational Science, 2014
Proceedings of the International Conference on Computational Science, 2014
Proceedings of the IEEE International Conference on Communications, 2014
A Regularized Competition Model for Question Difficulty Estimation in Community Question Answering Services.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
2013
J. Vis. Commun. Image Represent., 2013
Int. J. High Perform. Comput. Appl., 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
An Optimized Strategy for Data Service Response with Template-Based Caching and Compression.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013
UBLF: An Upper Bound Based Approach to Discover Influential Nodes in Social Networks.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013
Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
2012
Proceedings of the International Conference on Computational Science, 2012
Neurocomputing, 2012
Sci. China Inf. Sci., 2012
Proceedings of the Implementation and Application of Automata, 2012
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the NETWORKING 2012, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Research of New Words Identification in Social Network for Monitoring Public Opinion.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Finding δ-Closure Property of BitTorrent System and Applications Based on This Property.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
Proceedings of the Web Technologies and Applications, 2012
Proceedings of the Web Technologies and Applications, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
J. Softw., 2011
J. Networks, 2011
Giant complete automaton for uncertain multiple string matching and its high speed construction algorithm.
Sci. China Inf. Sci., 2011
Traffic classification beyond application level: identifying content types from network traces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011
Proceedings of the 11th IEEE International Conference on Data Mining, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Implementation and Application of Automata, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Fast and Memory-Efficient Traffic Classification with Deep Packet Inspection in CMP Architecture.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010
Proceedings of the ICDM 2010, 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010
2009
Proceedings of the 18th International Conference on World Wide Web, 2009
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
Proceedings of the ICDM 2009, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of The 2008 IEEE International Conference on Networking, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
2007
An active learning based TCM-KNN algorithm for supervised network intrusion detection.
Comput. Secur., 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme.
Proceedings of the Advances in Neural Networks, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Techniques of IP Data Management in Network Address Resource platform.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005