Li Guo

Orcid: 0000-0002-2529-7643

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing China
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China


According to our database1, Li Guo authored at least 234 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Recursively Summarizing Enables Long-Term Dialogue Memory in Large Language Models.
CoRR, 2023

Learning Structural Co-occurrences for Structured Web Data Extraction in Low-Resource Settings.
Proceedings of the ACM Web Conference 2023, 2023

Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications.
Proceedings of the IFIP Networking Conference, 2023

Confident Slot Iterative Learning for Multi-Domain Dialogue State Tracking.
Proceedings of the 45th Annual Meeting of the Cognitive Science Society, 2023

Divide, Conquer, and Combine: Mixture of Semantic-Independent Experts for Zero-Shot Dialogue State Tracking.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Knowledge Graph Embedding by Double Limit Scoring Loss.
IEEE Trans. Knowl. Data Eng., 2022

Slot Dependency Modeling for Zero-Shot Cross-Domain Dialogue State Tracking.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Knowledge Base Reasoning with Convolutional-Based Recurrent Neural Networks.
IEEE Trans. Knowl. Data Eng., 2021

Direction Relation Transformer for Image Captioning.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Incorporating Specific Knowledge into End-to-End Task-oriented Dialogue Systems.
Proceedings of the International Joint Conference on Neural Networks, 2021

UMVD-FSL: Unseen Malware Variants Detection Using Few-Shot Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

From What to Why: Improving Relation Extraction with Rationale Graph.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
A Compare-Aggregate Model with External Knowledge for Query-Focused Summarization.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Fine-Grained Semantics-Aware Heterogeneous Graph Neural Networks.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

SLGAT: Soft Labels Guided Graph Attention Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Relation-Specific Attention Network for Joint Entity and Relation Extraction.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Towards Aggregated Features: A Novel Proxy Detection Method Using NetFlow Data.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Document-level Relation Extraction with Dual-tier Heterogeneous Graph.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

BPA: The Optimal Placement of Interdependent VNFs in Many-Core System.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

A Knowledge-Aware Attentional Reasoning Network for Recommendation.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Distilling Knowledge from Well-Informed Soft Labels for Neural Relation Extraction.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Mesoscience-based virtual process engineering.
Comput. Chem. Eng., 2019

SAED: A Self-Adaptive Encryption and Decryption Architecture.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Smooth Deep Network Embedding.
Proceedings of the International Joint Conference on Neural Networks, 2019

NeuralAS: Deep Word-Based Spoofed URLs Detection Against Strong Similar Samples.
Proceedings of the International Joint Conference on Neural Networks, 2019

Neighborhood-Aware Attentional Representation for Multilingual Knowledge Graphs.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Deep Active Learning for Anchor User Prediction.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Multilingual Knowledge Graph Embeddings with Neural Networks.
Proceedings of the Data Science - 6th International Conference, 2019

Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Data-Driven Grinding Control Using Reinforcement Learning.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Chinese Social Media Entity Linking Based on Effective Context with Topic Semantics.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

DAN: Deep Attention Neural Network for News Recommendation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Early detection of dynamic harmful cascades in large-scale networks.
J. Comput. Sci., 2018

Modeling Text with Graph Convolutional Network for Cross-Modal Information Retrieval.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Fast and Accurate Typosquatting Domains Evaluation with Siamese Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A Sequence Transformation Model for Chinese Named Entity Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Fine-Grained Correlation Learning with Stacked Co-attention Networks for Cross-Modal Information Retrieval.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Lightweight Convolutional Neural Network with SE Module for Image Super-Resolution.
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018

FraudNE: a Joint Embedding Approach for Fraud Detection.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

iWalk: Interest-Aware Random Walk for Network Embedding.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

User Alignment via Structural Interaction and Propagation.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

Learning Knowledge Graph Embeddings via Generalized Hyperplanes.
Proceedings of the Computational Science - ICCS 2018, 2018

Adversarial Reinforcement Learning for Chinese Text Summarization.
Proceedings of the Computational Science - ICCS 2018, 2018

An Adversarial Training Framework for Relation Classification.
Proceedings of the Computational Science - ICCS 2018, 2018

Hierarchical Attention Networks for User Profile Inference in Social Media Systems.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

SASD: A Self-Adaptive Stateful Decompression Architecture.
Proceedings of the IEEE Global Communications Conference, 2018

Improving Knowledge Graph Embedding Using Simple Constraints.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Social Recommendation with an Essential Preference Space.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Knowledge Graph Embedding With Iterative Guidance From Soft Rules.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Knowledge Graph Embedding: A Survey of Approaches and Applications.
IEEE Trans. Knowl. Data Eng., 2017

SSE: Semantically Smooth Embedding for Knowledge Graphs.
IEEE Trans. Knowl. Data Eng., 2017

Boosting imbalanced data learning with Wiener process oversampling.
Frontiers Comput. Sci., 2017

Inferring User Profiles in Online Social Networks Based on Convolutional Neural Network.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Improving Password Guessing Using Byte Pair Encoding.
Proceedings of the Information Security - 20th International Conference, 2017

CPMF: A collective pairwise matrix factorization model for upcoming event recommendation.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Flexible Expert Finding on the Web via Semantic Hypergraph Learning and Affinity Propagation Model.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Recognizing Compound Entity Phrases in Hybrid Academic Domains in View of Community Division.
Proceedings of the International Conference on Computational Science, 2017

Mining Host Behavior Patterns From Massive Network and Security Logs.
Proceedings of the International Conference on Computational Science, 2017

Learning Robust Low-Rank Approximation for Crowdsourcing on Riemannian Manifold.
Proceedings of the International Conference on Computational Science, 2017

A co-training method for identifying the same person across social networks.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Learning Knowledge Embeddings by Combining Limit-based Scoring Loss.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016

Securing cyberspace.
Concurr. Comput. Pract. Exp., 2016

Towards quantifying visual similarity of domain names for combating typosquatting abuse.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An Unsupervised Framework Towards Sci-Tech Compound Entity Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2016

Riemannian optimization with subspace tracking for low-rank recovery.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Identifying Users across Different Sites using Usernames.
Proceedings of the International Conference on Computational Science 2016, 2016

Jointly Embedding Knowledge Graphs and Logical Rules.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

Ranking-Based Music Recommendation in Online Music Radios.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Image Super-Resolution with Deep Convolutional Neural Network.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Location-aware Friend Recommendation in Event-based Social Networks: A Bayesian Latent Factor Approach.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

On the Minimum Differentially Resolving Set Problem for Diffusion Source Inference in Networks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
On the Upper Bounds of Spread for Greedy Algorithms in Social Network Influence Maximization.
IEEE Trans. Knowl. Data Eng., 2015

E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams.
IEEE Trans. Knowl. Data Eng., 2015

Modelling semantics across multiple time series and its applications.
Knowl. Based Syst., 2015

Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach.
J. Comput. Sci., 2015

Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2015

Topic-aware Source Locating in Social Networks.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Topic-aware Social Influence Minimization.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Feature Selection for Sentiment Classification Using Matrix Factorization.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Online Event Recommendation for Event-based Social Networks.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Fast Search for Distance Dependent Chinese Restaurant Processes.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

MimicHunter: A General Passive Network Protocol Mimicry Detection Framework.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Efficient Sensor Placement Optimization for Early Detection of Contagious Outbreaks in Mobile Social Networks.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

An automatic approach to extract the formats of network and security log messages.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Towards misdirected email detection based on multi-attributes.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Latent sentiment representation for sentiment feature selection.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Optimization-based model for determining words' sentiment orientations.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Knowledge Base Completion Using Embeddings and Rules.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

What is the next step of binary features?
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

Data-oriented multi-index hashing.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Fast Climbing Approach for Diffusion Source Inference in Large Social Networks.
Proceedings of the Data Science - Second International Conference, 2015

Minimizing the Social Influence from a Topic Modeling Perspective.
Proceedings of the Data Science - Second International Conference, 2015

VSEP: A Distributed Algorithm for Graph Edge Partitioning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Context-Dependent Knowledge Graph Embedding.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Sentiment Word Identification with Sentiment Contextual Factors.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Semantically Smooth Knowledge Graph Embedding.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
Contextual Query Expansion for Image Retrieval.
IEEE Trans. Multim., 2014

Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation.
IEEE J. Sel. Areas Commun., 2014

A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Netw. Comput. Appl., 2014

Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol., 2014

Comparative study between incremental and ensemble learning on data streams: Case study.
J. Big Data, 2014

Maximizing the long-term integral influence in social networks under the voter model.
Proceedings of the 23rd International World Wide Web Conference, 2014

An upper bound based greedy algorithm for mining top-k influential nodes in social networks.
Proceedings of the 23rd International World Wide Web Conference, 2014

Combining geographical information of users and content of items for accurate rating prediction.
Proceedings of the 23rd International World Wide Web Conference, 2014

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Topic Block: Mining User Inner Interests for Text and Link Analysis in Social Networks.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Data-Dependent Locality Sensitive Hashing.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

Forward Classification on Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

A Moving Target Framework to Improve Network Service Accessibility.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Text Categorization based on Clustering Feature Selection.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

On the Frequency Distribution of Retweets.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Minimizing the Negative Influence by Blocking Links in Social Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Nonparametric Topic-Aware Sparsification of Influence Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Text Feature Selection Based on Class Subspace.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Latent Factor SVM for Text Categorization.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

A probabilistic approach towards modeling email network with realistic features.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Maximizing the Cumulative Influence through a Social Network when Repeat Activation Exists.
Proceedings of the International Conference on Computational Science, 2014

Discovering Multiple Diffusion Source Nodes in Social Networks.
Proceedings of the International Conference on Computational Science, 2014

A Multi-layer Event Detection Algorithm for Detecting Global and Local Hot Events in Social Networks.
Proceedings of the International Conference on Computational Science, 2014

Improving Collaborative Recommendation via Location-based User-item Subgroup.
Proceedings of the International Conference on Computational Science, 2014

Mining Large-scale Event Knowledge from Web Text.
Proceedings of the International Conference on Computational Science, 2014

A factor-searching-based multiple string matching algorithm for intrusion detection.
Proceedings of the IEEE International Conference on Communications, 2014

A Regularized Competition Model for Question Difficulty Estimation in Community Question Answering Services.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014

CONR: A Novel Method for Sentiment Word Identification.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Delta-K 2-tree for Compact Representation of Web Graphs.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

Toward Identifying and Understanding User-Agent Strings in HTTP Traffic.
Proceedings of the Web Technologies and Applications, 2014

Event Recommendation in Event-Based Social Networks.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Combining Heterogenous Social and Geographical Information for Event Recommendation.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Robust common visual pattern discovery using graph matching.
J. Vis. Commun. Image Represent., 2013

Petascale molecular dynamics simulation of crystalline silicon on Tianhe-1A.
Int. J. High Perform. Comput. Appl., 2013

Research of Intrusion Detection System on Android.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Discovering Semantics from Multiple Correlated Time Series Stream.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Detecting Sybil Nodes in Anonymous Communication Systems.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Bit-Parallel Multiple Approximate String Matching based on GPU.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Distributed OSN Crawling System based on Ajax Simulation.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Data Stolen Trojan Detection based on Network Behaviors.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Behavioral targeting with social regularization.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

An Optimized Strategy for Data Service Response with Template-Based Caching and Compression.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

UBLF: An Upper Bound Based Approach to Discover Influential Nodes in Social Networks.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Unsupervised Clustering Strategy Based on Label Propagation.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Item-Based Top-k Influential User Discovery in Social Networks.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

An empirical analysis of family in the Tor network.
Proceedings of IEEE International Conference on Communications, 2013

Dependency Expansion Model for Sentiment Lexicon Extraction.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013

Personalized influence maximization on social networks.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Parallel auto-encoder for efficient outlier detection.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Mining Hot Topics from Twitter Streams.
Proceedings of the International Conference on Computational Science, 2012

A framework for application-driven classification of data streams.
Neurocomputing, 2012

A novel logic-based automatic approach to constructing compliant security policies.
Sci. China Inf. Sci., 2012

SDFA: Series DFA for Memory-Efficient Regular Expression Matching.
Proceedings of the Implementation and Application of Automata, 2012

Mining Multi-Label Data Streams Using Ensemble-Based Active Learning.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms.
Proceedings of the NETWORKING 2012, 2012

On Accuracy of Early Traffic Classification.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Unobservable Rendezvous Negotiation in P2P Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Real-Time Detection of Encrypted Thunder Traffic Based on Trustworthy Behavior Association.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research of New Words Identification in Social Network for Monitoring Public Opinion.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Finding δ-Closure Property of BitTorrent System and Applications Based on This Property.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Towards Analyzing Traceability of Data Leakage by Malicious Insiders.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Hierarchical Method for Clustering Binary Text Image.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Efficient Ellipse-Shaped Blobs Detection Algorithm for Breaking Facebook CAPTCHA.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Progress in Study of Encrypted Traffic Classification.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Efficient Behavior Targeting Using SVM Ensemble Indexing.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Worm Propagation Model for Heterogeneous Network.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

An empirical study of morphing on network traffic classification.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Group Detection and Relation Analysis Research for Web Social Network.
Proceedings of the Web Technologies and Applications, 2012

Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network.
Proceedings of the Web Technologies and Applications, 2012

A Prefiltering Approach to Regular Expression Matching for Network Security Systems.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Research on Real-time Publish/Subscribe System supported by Data-Integration.
J. Softw., 2011

Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection.
J. Networks, 2011

Robust ensemble learning for mining noisy data streams.
Decis. Support Syst., 2011

Giant complete automaton for uncertain multiple string matching and its high speed construction algorithm.
Sci. China Inf. Sci., 2011

Traffic classification beyond application level: identifying content types from network traces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Improving matching performance of DPI traffic classifier.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

XunleiProbe: A Sensitive and Accurate Probing on a Large-Scale P2SP System.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Biprominer: Automatic Mining of Binary Protocol Features.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Understanding Long-Term Evolution and Lifespan in Peer-to-Peer Systems.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Using Entropy to Classify Traffic More Deeply.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Enabling fast prediction for ensemble models on data streams.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Accelerating DFA Construction by Hierarchical Merging.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Revisiting the swarm evolution: A long term perspective.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

An efficient regular expressions compression algorithm from a new perspective.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Covert Communication Method Based on User-Generated Content Sites.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Enabling Fast Lazy Learning for Data Streams.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

Continuous data stream query in the cloud.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Mining frequent patterns across multiple data streams.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Performance evaluation of Xunlei peer-to-peer network: A measurement study.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Inferring Protocol State Machine from Network Traces: A Probabilistic Approach.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Compressing Regular Expressions' DFA Table by Matrix Decomposition.
Proceedings of the Implementation and Application of Automata, 2010

Inferring Protocol State Machine from Real-World Trace.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Fast and Memory-Efficient Traffic Classification with Deep Packet Inspection in CMP Architecture.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Learning from Multiple Related Data Streams with Asynchronous Flowing Speeds.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

Classifier and Cluster Ensembles for Mining Concept Drifting Data Streams.
Proceedings of the ICDM 2010, 2010

A New Weighted Ensemble Model for Detecting DoS Attack Streams.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

SKIF: a data imputation framework for concept drifting data streams.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Towards lightweight and efficient DDOS attacks detection for web server.
Proceedings of the 18th International Conference on World Wide Web, 2009

An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Simulation Analysis of Probabilistic Timing Covert Channels.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Mining Data Streams with Labeled and Unlabeled Training Examples.
Proceedings of the ICDM 2009, 2009

Load Balancing for Flow-Based Parallel Processing Systems in CMP Architecture.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008

Incremental web page template detection.
Proceedings of the 17th International Conference on World Wide Web, 2008

TCM-KNN scheme for network anomaly detection using feature-based optimizations.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
An active learning based TCM-KNN algorithm for supervised network intrusion detection.
Comput. Secur., 2007

TCM-KNN Algorithm for Supervised Network Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme.
Proceedings of the Advances in Neural Networks, 2007

LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Network anomaly detection based on TCM-KNN algorithm.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Efficient Filtering Query Indexing in Data Stream.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

TTSF: A Novel Two-Tier Spam Filter.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

A traffic-classified technique for filtering spam from bulk delivery E-mails.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Traffic classification-based spam filter.
Proceedings of IEEE International Conference on Communications, 2006

Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Techniques of IP Data Management in Network Address Resource platform.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Building Scale-Free Overlay Mix Networks with Small-World Properties.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...