Shyhtsun Felix Wu
Orcid: 0000-0001-6033-5353Affiliations:
- University of California, Davis, USA
According to our database1,
Shyhtsun Felix Wu
authored at least 137 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
2021
The implementation of data storage and analytics platform for big data lake of electricity usage with spark.
J. Supercomput., 2021
2020
Proceedings of the Information Management and Big Data, 2020
2019
A data-driven metric learning-based scheme for unsupervised network anomaly detection.
Comput. Electr. Eng., 2019
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
Proceedings of the 13th IEEE International Conference on Semantic Computing, 2019
2018
CoRR, 2018
CoRR, 2018
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the New Trends in Computer Technologies and Applications, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015
Proceedings of the 2015 Second European Network Intelligence Conference, 2015
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015
Proceedings of the ASE BigData & SocialInformatics 2015, 2015
2014
Comput. Commun. Rev., 2014
2013
SmartWiki: A reliable and conflict-refrained Wiki model based on reader differentiation and social context analysis.
Knowl. Based Syst., 2013
Inf. Serv. Use, 2013
Int. J. Commun. Networks Distributed Syst., 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
The influence of feedback with different opinions on continued user participation in online newsgroups.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
On a Triadic Approach to Connect Microstructural Properties to Social Macrostructural Patterns.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
Soc. Netw. Anal. Min., 2011
J. Commun. Networks, 2011
Int. J. Soc. Comput. Cyber Phys. Syst., 2011
Inter-domain collaborative routing (IDCR): Server selection for optimal client performance.
Comput. Commun., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
The Evolution of Ego-Centric Triads: A Microscopic Approach toward Predicting Macroscopic Network Properties.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011
2010
Proceedings of the Social Informatics - Second International Conference, 2010
Proceedings of the Social Informatics - Second International Conference, 2010
Proceedings of the Social Informatics - Second International Conference, 2010
Proceedings of the Social Informatics - Second International Conference, 2010
Proceedings of the Advances in Web Technologies and Applications, 2010
2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Comput. Sci., 2009
Proceedings of the Wireless Algorithms, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks.
Proceedings of the Complex Sciences, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.
Proceedings of the Second International Conference on Emerging Security Information, 2008
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008
2007
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007
Filter-Based RFD: Can We Stabilize Network Without Sacrificing Reachability Too Much?
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
Proceedings of the IP Operations and Management, 7th IEEE International Workshop, 2007
Proceedings of the Integrated Network Management, 2007
Proceedings of the Integrated Network Management, 2007
2006
ACM Trans. Archit. Code Optim., 2006
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006
2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Design, Implementation, and Evaluation of "FRiTrace".
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2005
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
IEEE Computer Graphics and Applications, 2004
Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Panel three: Monitoring and controlling networks: Have we lost control of our networks?
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the NETWORKING 2004, 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
Proceedings of the 14th IEEE Visualization Conference, 2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Self-Managing Distributed Systems, 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 13th IEEE Visualization Conference, 2002
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002
Proceedings of the Global Telecommunications Conference, 2002
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
Proceedings of the Computer Security, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
ACM Trans. Inf. Syst. Secur., 2001
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Policies for Distributed Systems and Networks, 2001
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop, 2001
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001
Proceedings of the Operations & Management, 2001
2000
Intrusion-detection for incident-response, using a military battlefield-intelligence process.
Comput. Networks, 2000
ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol.
Proceedings of the Networked Planet: Management Beyond 2000, 2000
Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000
1999
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999
Intrusion detection for link state routing protocol through integrated network management.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999
1998
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998
1997
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997
1996
Proceedings of the Computer Security, 1996
1991
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991
1990
Proceedings of the Workshop on Object-based Concurrent Programming, 1990
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990
1989
MELDing Multiple Granularities of Parallelism.
Proceedings of the ECOOP '89: Proceedings of the Third European Conference on Object-Oriented Programming, 1989