Tongge Xu

Orcid: 0000-0002-0135-7226

According to our database1, Tongge Xu authored at least 25 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A new methodology for anomaly detection of attacks in IEC 61850-based substation system.
J. Inf. Secur. Appl., 2022

Construction of Social Community Knowledge Graph from Wikipedia.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Sessionvideo: A Novel Approach for Encrypted Traffic Classification via 3D-CNN Model.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
Robust Social Event Detection via Deep Clustering.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Semantic Social Event Evolution Discovering.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Adaptive Beam Search Decoding for Discrete Keyphrase Generation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks.
Int. J. Sens. Networks, 2020

Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application.
IEEE Access, 2020

Orbital Debris Threat for Space Sustainability and Way Forward (Review Article).
IEEE Access, 2020

An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack.
IEEE Access, 2020

Hierarchical and Pairwise Document Embedding for Plagiarism Detection.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

2019
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
Ad Hoc Networks, 2019

Air Traffic Surveillance Using IP-Based Space Information Network.
Proceedings of the 28th Wireless and Optical Communications Conference, 2019

IP-based Space Air Ground Information Network for Air Traffic Control Communication.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

An Encoding Strategy Based Word-Character LSTM for Chinese NER.
Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2019

The Parallel CMAC Synthetic Initialization Vector Algorithm Implementation on FPGA.
Proceedings of the Second International Conference on Latest trends in Electrical Engineering and Computing Technologies, 2019

Traceable Decentralized Anonymous E-Cash System Against Active Attackers.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Two-Layer Group Signature and Application to E-Cash.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
An efficient latent-factor-based approach to social relationship recommendation.
Proceedings of the 15th IEEE International Conference on Networking, Sensing and Control, 2018

2016
A Short Text Similarity Algorithm for Finding Similar Police 110 Incidents.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

2015
Network Traffic Classification with Improved Random Forest.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

DDoS Attack Detection Using Flow Entropy and Clustering Technique.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
Visualization of Police Intelligence Data Based on Word Clouds.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2012
Design and implementation of IP network behaviour analysis system based on NetFlow.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012


  Loading...