Minzhe Guo

Orcid: 0000-0002-5502-9172

According to our database1, Minzhe Guo authored at least 34 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring Low-Dimensional Subspaces in Diffusion Models for Controllable Image Editing.
CoRR, 2024

The Emergence of Reproducibility and Consistency in Diffusion Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
The Emergence of Reproducibility and Consistency in Diffusion Models.
CoRR, 2023

2021
Enhancing Robustness of Neural Networks through Fourier Stabilization.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
An Incentive Compatible Mechanism for Replica Placement in Peer-Assisted Content Distribution.
Int. J. Softw. Sci. Comput. Intell., 2020

Towards Robustness against Unsuspicious Adversarial Examples.
CoRR, 2020

2016
Hands-On Labs for Learning Mobile and NoSQL Database Security.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
SINCERA: A Pipeline for Single-Cell RNA-Seq Profiling Analysis.
PLoS Comput. Biol., 2015

A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Web Service-Enabled Spam Filtering with Naïve Bayes Classification.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

2014
Learning Mobile Security with Labware.
IEEE Secur. Priv., 2014

Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014

Diverse virtual replicas for improving intrusion tolerance in cloud.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Learning mobile security with android security labware.
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Android-Based Mobile Sensory System Labware for Embedded System Education.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Authentic learning of mobile security with case studies.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
Measuring and ranking attacks based on vulnerability analysis.
Inf. Syst. E Bus. Manag., 2012

Mechanism Design Based Secure Data Object Replication.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Work in progress: Real world relevant security labware for mobile threat analysis and protection experience.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
Live Programming Learning Objects on Cloud.
Proceedings of the ICALT 2011, 2011

A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011

A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011

2010
Design of Online Runtime and Testing Environment for Instant Java Programming Assessment.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Measuring Similarity for Security Vulnerabilities.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Ranking Attacks Based on Vulnerability Analysis.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Vulnerability categorization using Bayesian networks.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Environmental Metrics for Software Security Based on a Vulnerability Ontology.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Security Data Mining in an Ontology for Vulnerability Management.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

Ontology-based security assessment for software products.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

OVM: an ontology for vulnerability management.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Security metrics for software systems.
Proceedings of the 47th Annual Southeast Regional Conference, 2009


  Loading...