Shuhao Li
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Shuhao Li 001 (Fudan University, Shanghai, China)
- Shuhao Lian
- Shuhao Liang
- Shuhao Liao
- Shuhao Lin
- Shuhao Ling
- Shuhao Liu 001 (Shenzhen Institute of Computing Sciences (SICS), Shenzhen, China)
- Shuhao Liu 002 (Shanghai Jiaotong University, Department of Computer Science, Shanghai, China)
- Shuhao Liu 003 (University of Electrical Science and Technology of China, Key Laboratory of Optical Communications, Chengdu, China)
- Shuhao Liu 004 (China University of Geosciences, Wuhan, China)
Bibliography
2024
AC-DNN: An Adaptive Compact DNNs Architecture for Collaborative Learning Among Heterogeneous Smart Devices.
IEEE Internet Things J., June, 2024
An efficient topology optimization method based on adaptive reanalysis with projection reduction.
Eng. Comput., February, 2024
Comput. Secur., February, 2024
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Adv. Eng. Softw., 2024
Improved Sliding Mode Control Strategy Based on Photovoltaic-Energy Storage Virtual Synchronous Generator System.
Proceedings of the 33rd IEEE International Symposium on Industrial Electronics, 2024
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Optimal selling format considering price discount strategy in live-streaming commerce.
Eur. J. Oper. Res., September, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Dynamically configured physics-informed neural network in topology optimization applications.
CoRR, 2023
A novel reduced basis method for adjoint sensitivity analysis of dynamic topology optimization.
CoRR, 2023
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge.
Comput. Secur., 2023
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach.
Comput. Secur., 2023
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Text Classification In The Wild: A Large-Scale Long-Tailed Name Normalization Dataset.
Proceedings of the IEEE International Conference on Acoustics, 2023
2022
Study on the influence of blade on electromagnetic scattering characteristics in the open-ended cavity.
J. Comput. Sci., 2022
An efficient topology optimization based on multigrid assisted reanalysis for heat transfer problem.
CoRR, 2022
Adaptive auxiliary reduced model reanalysis-based efficient topology optimization method.
CoRR, 2022
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
Comput. Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison.
Proceedings of the Security and Privacy in Communication Networks, 2022
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the IECON 2022, 2022
Proceedings of the Web Engineering - 22nd International Conference, 2022
Proceedings of the 12th International Conference on Communication and Network Security, 2022
HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of Packets.
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE Global Communications Conference, 2022
VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
iPro2L-PSTKNC: A Two-Layer Predictor for Discovering Various Types of Promoters by Position Specific of Nucleotide Composition.
IEEE J. Biomed. Health Informatics, 2021
Secur. Commun. Networks, 2021
Proceedings of the ICC 2021, 2021
The Title of the Paper: Decoupled Power Regulation for Dual-Frequency Induction Heating Power Supply with Single Full-Bridge Inversion Topology.
Proceedings of the EEET 2021: 4th International Conference on Electronics and Electrical Engineering Technology, Nanjing, China, December 3, 2021
2020
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020
An two-layer predictive model of ensemble classifier chain for detecting antimicrobial peptides.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020
Author Name Disambiguation on Heterogeneous Information Network with Adversarial Representation Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
2018
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Communications, Signal Processing, and Systems, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
2015
IEEE Trans. Inf. Forensics Secur., 2015
2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
2012
Proceedings of the Information Security and Privacy Research, 2012
2011
J. Softw., 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Formal Methods Syst. Des., 2010
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010
Verification and controller synthesis for resource-constrained real-time systems: Case study of an autonomous truck.
Proceedings of 15th IEEE International Conference on Emerging Technologies and Factory Automation, 2010
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010
Proceedings of the Design, Automation and Test in Europe, 2010
2009
Comput. J., 2009
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009
Proceedings of the FM 2009: Formal Methods, 2009
2008
Proceedings of the Fourth Workshop on Model Based Testing, 2008
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Design, Automation and Test in Europe, 2008
2006
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006
2005
An Optimized Method for Automatic Test Oracle Generation from Real-Time Specification.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Property-Oriented Testing: An Approach to Focusing Testing Efforts on Behaviours of Interest.
Proceedings of the Testing of Component-Based Systems and Software Quality, 2004
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004