Xiaohong Guan

Orcid: 0000-0002-8826-0362

Affiliations:
  • Xi'an Jiaotong University, MOE Key Laboratory of Intelligent Network and Network Security, Xi'an, China


According to our database1, Xiaohong Guan authored at least 396 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2007, "For contributions to optimization of hydrothermal generation scheduling".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sketching Data Distribution by Rotation.
IEEE Trans. Knowl. Data Eng., November, 2024

Robust Approximate Dynamic Programming for Large-Scale Unit Commitment With Energy Storages.
IEEE Trans Autom. Sci. Eng., October, 2024

Two-Phase on-Line Joint Scheduling for Welfare Maximization of Charging Station.
IEEE Trans Autom. Sci. Eng., October, 2024

Online Operation Optimization for Hydrogen-Based Building Energy Systems Under Uncertainties.
IEEE Trans. Smart Grid, September, 2024

Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical Power Grid.
IEEE Trans. Smart Grid, July, 2024

Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures.
IEEE/ACM Trans. Netw., June, 2024

Multi-Stage Adaptive Stochastic-Robust Scheduling Method With Affine Decision Policies for Hydrogen-Based Multi-Energy Microgrid.
IEEE Trans. Smart Grid, May, 2024

GTCAlign: Global Topology Consistency-Based Graph Alignment.
IEEE Trans. Knowl. Data Eng., May, 2024

On Smartly Scanning of the Internet of Things.
IEEE/ACM Trans. Netw., April, 2024

Model-Free Load Frequency Control of Nonlinear Power Systems Based on Deep Reinforcement Learning.
IEEE Trans. Ind. Informatics, April, 2024

EV Charging Scheduling Under Demand Charge: A Block Model Predictive Control Approach.
IEEE Trans Autom. Sci. Eng., April, 2024

Reduction in Energy Consumption of the 5G Communication System and Beyond Through Collaborative Optimization for BS Site Operation: Challenges, Efforts and the New Approach.
IEEE Trans. Ind. Informatics, March, 2024

Energy Management of Networked Microgrids With Real-Time Pricing by Reinforcement Learning.
IEEE Trans. Smart Grid, January, 2024

Seed Selection for Testing Deep Neural Networks.
ACM Trans. Softw. Eng. Methodol., January, 2024

Blockchain-Based Dynamic Cloud Data Integrity Auditing via Non-Leaf Node Sampling of Rank-Based Merkle Hash Tree.
IEEE Trans. Netw. Sci. Eng., 2024

Distinguish Confusion in Legal Judgment Prediction via Revised Relation Knowledge.
CoRR, 2024

A Survey of Deep Learning Library Testing Methods.
CoRR, 2024

Stochastic-Robust Planning of Networked Hydrogen-Electrical Microgrids: A Study on Induced Refueling Demand.
CoRR, 2024

ABC-Channel: An Advanced Blockchain-based Covert Channel.
CoRR, 2024

Distributionally Robust Frequency-Constrained Microgrid Scheduling Towards Seamless Islanding.
CoRR, 2024

SMUG: Sand Mixing for Unobserved Class Detection in Graph Few-Shot Learning.
Proceedings of the ACM on Web Conference 2024, 2024

Memory Disagreement: A Pseudo-Labeling Measure from Training Dynamics for Semi-supervised Graph Learning.
Proceedings of the ACM on Web Conference 2024, 2024

Grand: A Fast and Accurate Graph Retrieval Framework via Knowledge Distillation.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024

DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization.
Proceedings of the IEEE INFOCOM 2024, 2024

Multi-Track Message Passing: Tackling Oversmoothing and Oversquashing in Graph Learning via Preventing Heterophily Mixing.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

A Compact and Accurate Sketch for Estimating a Large Range of Set Difference Cardinalities.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

A Virtual Primary Key Generation Scheme Based on Dimensionality Reduction and Encoding for Digital Fingerprinting.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

A Coordinated Energy Management Method For 5G Base Station Using Multi-Agent Deep Deterministic Policy Gradient.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

An efficient parallel single surrogate objective optimization method for multi-objective black-box problem and its application in processor design.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

Energy-Efficient Placement Optimization of the HVAC System for 5G Base Station with Redundant Configuration.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

Optimizing the Design of Combined Alkaline and Proton Exchange Membrane Electrolyzers to Fully Utilize Fluctuating Renewable Energy.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

Resilience-Based Workforce Routing and Scheduling Problem in Substation System Emergency Operation.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

A Positive-Unlabeled Learning Approach for Detecting Malicious In-app Purchases on the App Store.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

Integrating end-to-end prediction-with-optimization for distributed hydrogen energy system scheduling.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

HAGO-Net: Hierarchical Geometric Massage Passing for Molecular Representation Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Reliable Event-Triggered Load Frequency Control of Uncertain Multiarea Power Systems With Actuator Failures.
IEEE Trans Autom. Sci. Eng., October, 2023

Distributed Observer-Based Event-Triggered Load Frequency Control of Multiarea Power Systems Under Cyber Attacks.
IEEE Trans Autom. Sci. Eng., October, 2023

Robust Constraints-Based Supply-Demand Coordination With Storage Systems of Enterprise Microgrid.
IEEE Trans Autom. Sci. Eng., October, 2023

Multistage Dynamic Planning of Integrated Hydrogen-Electrical Microgrids Under Multiscale Uncertainties.
IEEE Trans. Smart Grid, September, 2023

SocialSift: Target Query Discovery on Online Social Media With Deep Reinforcement Learning.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

Fast Gumbel-Max Sketch and its Applications.
IEEE Trans. Knowl. Data Eng., September, 2023

Sensitive region-aware black-box adversarial attacks.
Inf. Sci., August, 2023

Optimal Planning of Internet Data Centers Decarbonized by Hydrogen-Water-Based Energy Systems.
IEEE Trans Autom. Sci. Eng., July, 2023

A Simulation-Based Primal-Dual Approach for Constrained V2G Scheduling in a Microgrid of Building.
IEEE Trans Autom. Sci. Eng., July, 2023

Extended Moving Target Defense for AC State Estimation in Smart Grids.
IEEE Trans. Smart Grid, May, 2023

Federated Learning Over Coupled Graphs.
IEEE Trans. Parallel Distributed Syst., April, 2023

Intelligent Music Intervention for Mental Disorders: Insights and Perspectives.
IEEE Trans. Comput. Soc. Syst., February, 2023

Goal Orientation in Music Composition and Other Social Behaviors Leading to the Common Quantitative Law.
IEEE Trans. Comput. Soc. Syst., February, 2023

Joint Optimization and Learning Approach for Smart Operation of Hydrogen-Based Building Energy Systems.
IEEE Trans. Smart Grid, 2023

Disentangled Adversarial Domain Adaptation for Phonation Mode Detection in Singing and Speech.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation.
Proc. ACM Manag. Data, 2023

Interpreting Adversarial Examples in Deep Learning: A Review.
ACM Comput. Surv., 2023

An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting.
Proceedings of the 32nd USENIX Security Symposium, 2023

Energy Efficient Thermal Management of 5G Base Station Site Based on Reinforcement Learning.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

Towards Understanding the Instability of Network Embedding (Extended Abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Optimal Scheduling of Hydrogen-Based Building Energy Systems Considering Time-varying Carbon Emissions Responsibility Factor.
Proceedings of the 19th IEEE International Conference on Automation Science and Engineering, 2023

Performance Analysis of Mutiple Energy Storage Units in Hydrogen-Enabled Integrated Energy Systems.
Proceedings of the 19th IEEE International Conference on Automation Science and Engineering, 2023

Optimal Coordination of Hydrogen-Enabled Integrated Energy Systems Considering Geothermal Energy.
Proceedings of the 19th IEEE International Conference on Automation Science and Engineering, 2023

2022
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.
IEEE/ACM Trans. Netw., 2022

Mobile Data Traffic Prediction by Exploiting Time-Evolving User Mobility Patterns.
IEEE Trans. Mob. Comput., 2022

Towards Understanding the Instability of Network Embedding.
IEEE Trans. Knowl. Data Eng., 2022

Heterogeneous Network Crawling: Reaching Target Nodes by Motif-Guided Navigation.
IEEE Trans. Knowl. Data Eng., 2022

Approximately Counting Butterflies in Large Bipartite Graph Streams.
IEEE Trans. Knowl. Data Eng., 2022

Accurately Estimating User Cardinalities and Detecting Super Spreaders Over Time.
IEEE Trans. Knowl. Data Eng., 2022

Erasable Virtual HyperLogLog for Approximating Cumulative Distribution over Data Streams.
IEEE Trans. Knowl. Data Eng., 2022

Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2022

An Event-Triggered Hybrid System Model for Cascading Failure in Power Grid.
IEEE Trans Autom. Sci. Eng., 2022

Formulation and Solution Methodology for Reducing Energy Consumption in Two-Machine Bernoulli Serial Lines.
IEEE Trans Autom. Sci. Eng., 2022

Dynamic Pricing and Prices Spike Detection for Industrial Park With Coupled Electricity and Thermal Demand.
IEEE Trans Autom. Sci. Eng., 2022

Hydrogen-Based Networked Microgrids Planning Through Two-Stage Stochastic Programming With Mixed-Integer Conic Recourse.
IEEE Trans Autom. Sci. Eng., 2022

Channel-State-Based Fingerprinting Against Physical Access Attack in Industrial Field Bus Network.
IEEE Internet Things J., 2022

Infer-AVAE: An attribute inference model based on adversarial variational autoencoder.
Neurocomputing, 2022

A Fast Solution Method for Large-scale Unit Commitment Based on Lagrangian Relaxation and Dynamic Programming.
CoRR, 2022

A Two-phase On-line Joint Scheduling of Pricing and Control for Welfare Maximization of Charging Station.
CoRR, 2022

A Survey of ADMM Variants for Distributed Optimization: Problems, Algorithms and Features.
CoRR, 2022

Multi-stage Moving Target Defense: A Security-enhanced D-FACTS Implementation Approach.
CoRR, 2022

Common quantitative characteristics of music melodies - pursuing the constrained entropy maximization casually in composition.
Sci. China Inf. Sci., 2022

On large action space in EV charging scheduling optimization.
Sci. China Inf. Sci., 2022

Proximal ADMM for nonconvex and nonsmooth optimization.
Autom., 2022

Fault Diagnosis of Microgrids Using Branch Convolution Neural Network and Majority Voting.
Proceedings of the IEEE International Conference on Communications, 2022

A Linear Probabilistic Optimal Power Flow Model with Linearization Error Checking.
Proceedings of the IEEE PES Innovative Smart Grid Technologies - Asia, 2022

Landing Reinforcement Learning onto Smart Scanning of The Internet of Things.
Proceedings of the IEEE INFOCOM 2022, 2022

Accurate and Scalable Graph Neural Networks for Billion-Scale Graphs.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

A Dynamic Cascading Failure Model in Power Grid with Renewable Energy Generation.
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022

2021
Wireless Covert Communications Aided by Distributed Cooperative Jamming Over Slow Fading Channels.
IEEE Trans. Wirel. Commun., 2021

Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings.
IEEE Trans. Smart Grid, 2021

A Fault-Tolerant Distributed Framework for Asynchronous Iterative Computations.
IEEE Trans. Parallel Distributed Syst., 2021

Streaming Algorithms for Estimating High Set Similarities in LogLog Space.
IEEE Trans. Knowl. Data Eng., 2021

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

A Computing Budget Allocation Method for Minimizing EV Charging Cost Using Uncertain Wind Power.
IEEE Trans Autom. Sci. Eng., 2021

Robust Energy Management for a Corporate Energy System With Shift-Working V2G.
IEEE Trans Autom. Sci. Eng., 2021

A real-time explainable traffic collision inference framework based on probabilistic graph theory.
Knowl. Based Syst., 2021

Tracking triadic cardinality distributions for burst detection in high-speed graph streams.
Knowl. Inf. Syst., 2021

Resilient distributed economic dispatch of a cyber-power system under DoS attack.
Frontiers Inf. Technol. Electron. Eng., 2021

A Review of Deep Reinforcement Learning for Smart Building Energy Management.
IEEE Internet Things J., 2021

A General Formulation for Evaluating the Performance of Linear Power Flow Models.
CoRR, 2021

Optimal Operation of a Hydrogen-based Building Multi-Energy System Based on Deep Reinforcement Learning.
CoRR, 2021

Bidirectionally Densifying LSH Sketches with Empty Bins.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Fast Rotation Kernel Density Estimation over Data Streams.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Context-aware Website Fingerprinting over Encrypted Proxies.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Reinforcement Learning based Multistage Optimal PMU Placement Against Data Integrity Attacks in Smart Grid.
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021

LogLog Filter: Filtering Cold Items within a Large Range over High Speed Data Streams.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Multi-zone indoor temperature prediction based on Graph Attention Network and Gated Recurrent Unit.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

An Estimation Method of Transmission Line Parameters Based on Measurements of Injection Power and Voltage Phasor in Power Grid.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

An Event-based Optimization Method for Building Evacuation with Queuing Network Model.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

An Unsupervised-Learning Based Method for Detecting Groups of Malicious Web Crawlers in Internet.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

Optimal Coordination of Human Resources and Tasks in Substation Operation and Maintenance.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

Uncertainty Set Prediction of Aggregated Wind Power Generation based on Bayesian LSTM and Spatio- Temporal Analysis.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

Identifying Vulnerable Set of Cascading Failure in Power Grid Using Deep Learning Framework.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

2020
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis.
IEEE Trans. Syst. Man Cybern. Syst., 2020

We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Moving Target Defense Approach to Detecting Stuxnet-Like Attacks.
IEEE Trans. Smart Grid, 2020

Symmetry Degree Measurement and its Applications to Anomaly Detection.
IEEE Trans. Inf. Forensics Secur., 2020

CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst., 2020

Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020

Randomized Security Patrolling for Link Flooding Attack Detection.
IEEE Trans. Dependable Secur. Comput., 2020

Fluctuation Reduction of Wind Power and Sizing of Battery Energy Storage Systems in Microgrids.
IEEE Trans Autom. Sci. Eng., 2020

Multi-Timescale Decision and Optimization for HVAC Control Systems With Consistency Goals.
IEEE Trans Autom. Sci. Eng., 2020

Online Decentralized and Cooperative Dispatch for Multi-Microgrids.
IEEE Trans Autom. Sci. Eng., 2020

A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model.
Mob. Networks Appl., 2020

Addressing the train-test gap on traffic classification combined subflow model with ensemble learning.
Knowl. Based Syst., 2020

Improving network embedding with partially available vertex and edge content.
Inf. Sci., 2020

Hierarchical and overlapping social circle identification in ego networks based on link clustering.
Neurocomputing, 2020

Passive browser identification with multi-scale Convolutional Neural Networks.
Neurocomputing, 2020

Deferrable Load Scheduling under Demand Charge: A Block Model-Predictive Control Approach.
CoRR, 2020

Deep Reinforcement Learning for Smart Grid Protection Against Coordinated Multistage Transmission Line Attacks.
CoRR, 2020

Deep Reinforcement Learning for Smart Building Energy Management: A Survey.
CoRR, 2020

Data Based Linearization: Least-Squares Based Approximation.
CoRR, 2020

Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach.
CoRR, 2020

Adaptable Switch: A Heterogeneous Switch Architecture for Network-Centric Computing.
IEEE Commun. Mag., 2020

Fast Generating A Large Number of Gumbel-Max Variables.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Node Classification on Graphs with Few-Shot Novel Labels via Meta Transformed Network Embedding.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Harmonics Based Representation in Clarinet Tone Quality Evaluation.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Adversarial Example Detection by Classification for Deep Speech Recognition.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Distributed Economic Dispatch for Cyber Attacked Smart Grid Based on Resilient Event-Triggered Consensus.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

A Dynamic Cascading Failure Model Integrating Relay Protection in Power Grid.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

Group Comfort Models: Predicting Indoor Group Thermal Comfort by Learning Preferences of Multiple Occupants.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

Coordinated Optimization of EVs and Multiple Buildings with Renewable Energy.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

Optimal Scheduling of Distributed Hydrogen-based Multi-Energy Systems for Building Energy Cost and Carbon Emission Reduction.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

2019
Enhanced Hidden Moving Target Defense in Smart Grids.
IEEE Trans. Smart Grid, 2019

Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams.
IEEE Trans. Parallel Distributed Syst., 2019

Detecting a Variety of Long-Term Stealthy User Behaviors on High Speed Links.
IEEE Trans. Knowl. Data Eng., 2019

Digger: Detect Similar Groups in Heterogeneous Social Networks.
ACM Trans. Knowl. Discov. Data, 2019

Decentralized EV-Based Charging Optimization With Building Integrated Wind Energy.
IEEE Trans Autom. Sci. Eng., 2019

SNOD: a fast sampling method of exploring node orbit degrees for large graphs.
Knowl. Inf. Syst., 2019

Practical characterization of large networks using neighborhood information.
Knowl. Inf. Syst., 2019

Fast crawling methods of exploring content distributed over large graphs.
Knowl. Inf. Syst., 2019

Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019

Effectively Linking Persons on Cameras and Mobile Devices on Networks.
IEEE Internet Comput., 2019

Sampling online social networks by random walk with indirect jumps.
Data Min. Knowl. Discov., 2019

Learning edge weights in file co-occurrence graphs for malware detection.
Data Min. Knowl. Discov., 2019

A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Meta Reinforcement Learning with Task Embedding and Shared Policy.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities Over Time.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

REPT: A Streaming Algorithm of Approximating Global and Local Triangle Counts in Parallel.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

A Fast Sketch Method for Mining User Similarities Over Fully Dynamic Graph Streams.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

Optimal Coordination of EVs and HVAC Systems with Uncertain Renewable Supply.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

Simulation-based Sensor Allocation for Dynamic Environment Estimation in Cyber-Physical Building System.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

2018
Distributed Coordination of EV Charging With Renewable Energy in a Microgrid of Buildings.
IEEE Trans. Smart Grid, 2018

Robust Scheduling of EV Charging Load With Uncertain Wind Power Integration.
IEEE Trans. Smart Grid, 2018

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Event-Based HVAC Control - A Complexity-Based Approach.
IEEE Trans Autom. Sci. Eng., 2018

Toward capturing heterogeneity for inferring diffusion networks: A mixed diffusion pattern model.
Knowl. Based Syst., 2018

A fast multi-level algorithm for community detection in directed online social networks.
J. Inf. Sci., 2018

Predicting attributes and friends of mobile users from AP-Trajectories.
Inf. Sci., 2018

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance.
IEEE Intell. Syst., 2018

From big data to knowledge: A spatio-temporal approach to malware detection.
Comput. Secur., 2018

Cyber-physical model for efficient and secured operation of CPES or energy Internet.
Sci. China Inf. Sci., 2018

An Integrated Method for Anomaly Detection From Massive System Logs.
IEEE Access, 2018

Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management.
IEEE Access, 2018

A Co-Evolutionary Model for Inferring Online Social Network User Behaviors.
Proceedings of the 2018 International Conference on Security, 2018

Mining Long-Term Stealthy User Behaviors on High Speed Links.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Regression Model of Wet-Bulb Temperature in an HVAC System.
Proceedings of the Advancements in Smart City and Intelligent Building, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Fast Nonconvex SDP Solver for Large-Scale Power System State Estimation.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

Fluctuation Reduction of Wind Power with Battery Energy Storage Systems.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

A Multi-layered Distributed Cloud Network for Cyber-Physical Energy System.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

Energy Consumption Optimization in Two-Machine Bernoulli Serial Lines.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

A Multi-Timescale and Bilevel Coordination Approach for Matching Uncertain Wind Supply With EV Charging Demand.
IEEE Trans Autom. Sci. Eng., 2017

Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage.
Proc. VLDB Endow., 2017

A feasible graph partition framework for parallel computing of big graph.
Knowl. Based Syst., 2017

Modelling multi-topic information propagation in online social networks based on resource competition.
J. Inf. Sci., 2017

I/O-efficient calculation of H-group closeness centrality over disk-resident graphs.
Inf. Sci., 2017

AL-bitmap: Monitoring network traffic activity graphs on high speed links.
Inf. Sci., 2017

Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Multigraph Streams.
CoRR, 2017

Towards Efficient Node Discoverability Optimization on Large Networks.
CoRR, 2017

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance.
CoRR, 2017

Security importance assessment for system objects and malware detection.
Comput. Secur., 2017

Butler, Not Servant: A Human-Centric Smart Home Energy Management System.
IEEE Commun. Mag., 2017

A bi-level optimization for an HVAC system.
Clust. Comput., 2017

Inferring Demographics and Social Networks of Mobile Device Users on Campus From AP-Trajectories.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

A traffic classification approach based on characteristics of subflows and ensemble learning.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Hidden Moving Target Defense in Smart Grids.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Stochastic coordination of aggregated electric vehicle charging with on-site wind power at multiple buildings.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Parameters analysis of hierarchical evolutionary method with an application of HVAC system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Transmission capacity margin assessment in power systems with uncertain wind integration.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Realizability guaranteed multi-timescale optimization decision for home energy management.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Evaluation of frequency regulation provision by commercial building HVAC systems.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Optimization of sensor location for improving wind power prediction accuracy.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Integrated Energy Exchange Scheduling for Multimicrogrid System With Electric Vehicles.
IEEE Trans. Smart Grid, 2016

Incorporating Price-Responsive Demand in Energy Scheduling Based on Consumer Payment Minimization.
IEEE Trans. Smart Grid, 2016

Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2016

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Hum. Mach. Syst., 2016

Optimal Control of Multiroom HVAC System: An Event-Based Approach.
IEEE Trans. Control. Syst. Technol., 2016

Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.
Sensors, 2016

Estimating user behavior toward detecting anomalous ratings in rating systems.
Knowl. Based Syst., 2016

MIRACLE: A multiple independent random walks community parallel detection algorithm for big graphs.
J. Netw. Comput. Appl., 2016

Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions.
Inf. Sci., 2016

A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs.
CoRR, 2016

User practice in password security: An empirical study of real-life passwords in the wild.
Comput. Secur., 2016

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Modeling multimodal biometric modalities for continuous user authentication.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Rethinking the Design of OpenFlow Switch Counters.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Taming the Flow Table Overflow in OpenFlow Switch.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A new model for nickname detection based on network structure and similarity propagation.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Improving the prediction accuracy of building energy consumption using location of occupant - A case study.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

A decentralized ordinal optimization for energy saving of an HVAC system.
Proceedings of the 2016 American Control Conference, 2016

Coordinating EV charging demand with wind supply in a bi-level energy dispatch framework.
Proceedings of the 2016 American Control Conference, 2016

2015
Matching EV Charging Load With Uncertain Wind: A Simulation-Based Policy Improvement Approach.
IEEE Trans. Smart Grid, 2015

Unbiased Characterization of Node Pairs over Large Graphs.
ACM Trans. Knowl. Discov. Data, 2015

Supply Demand Coordination for Building Energy Saving: Explore the Soft Comfort.
IEEE Trans Autom. Sci. Eng., 2015

A Decentralized Stay-Time Based Occupant Distribution Estimation Method for Buildings.
IEEE Trans Autom. Sci. Eng., 2015

MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring.
IEEE Syst. J., 2015

Calling Network: A New Method for Modeling Software Runtime Behaviors.
ACM SIGSOFT Softw. Eng. Notes, 2015

Analysis of user's behavior and resource characteristics for private trackers.
Peer-to-Peer Netw. Appl., 2015

Robust application identification methods for P2P and VoIP traffic classification in backbone networks.
Knowl. Based Syst., 2015

Exploring community structure of software Call Graph and its applications in class cohesion measurement.
J. Syst. Softw., 2015

Accurate DNS query characteristics estimation via active probing.
J. Netw. Comput. Appl., 2015

Moss: A Scalable Tool for Efficiently Sampling and Counting 4- and 5-Node Graphlets.
CoRR, 2015

A Feasible Graph Partition Framework for Random Walks Implemented by Parallel Computing in Big Graph.
CoRR, 2015

Input extraction via motion-sensor behavior analysis on smartphones.
Comput. Secur., 2015

Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Energy management of cooperative microgrids with P2P energy sharing in distribution networks.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Probabilistic Inference on Integrity for Access Behavior Based Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On motion sensors as source for user input inference in smartphones.
Proceedings of the IEEE International Conference on Identity, 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Timbre identification of instrumental music via energy distribution modeling.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

A tale of three graphs: Sampling design on hybrid social-affiliation networks.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Touch-interaction behavior for continuous user authentication on smartphones.
Proceedings of the International Conference on Biometrics, 2015

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Coordination of wind power and flexible load through demand response options.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Local and global event-based optimization: Performace and complexity.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Multi-timescale optimization between distributed wind generators and electric vehicles in microgrid.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

EV charging load scheduling with high wind power penetration: A robust shortest path approach.
Proceedings of the American Control Conference, 2015

2014
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication.
IEEE Trans. Smart Grid, 2014

Efficiently Estimating Motif Statistics of Large Networks.
ACM Trans. Knowl. Discov. Data, 2014

A New Sketch Method for Measuring Host Connection Degree Distribution.
IEEE Trans. Inf. Forensics Secur., 2014

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014

Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Hum. Mach. Syst., 2014

A new connection degree calculation and measurement method for large scale network monitoring.
J. Netw. Comput. Appl., 2014

Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring.
KSII Trans. Internet Inf. Syst., 2014

Building occupant level estimation based on heterogeneous information fusion.
Inf. Sci., 2014

Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks.
CoRR, 2014

Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Comput. Secur., 2014

Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks.
Comput. Networks, 2014

Measuring and maximizing group closeness centrality over disk-resident graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Detecting community structure for undirected big graphs based on random walks.
Proceedings of the 23rd International World Wide Web Conference, 2014

Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

A Stochastic matching mechanism for wind generation dispatch and load shedding allocation in microgrid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

In-depth measurement and analysis on densification power law of software execution.
Proceedings of the 5th International Workshop on Emerging Trends in Software Metrics, 2014

Exploring the efficiency and mechanism of whistleblowing system on social networking site.
Proceedings of the IEEE International Conference on Communications, 2014

Network recorder and player: FPGA-based network traffic capture and replay.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

A new method to solve large-scale building energy management for energy saving.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Analysis of multi-location PEV charging behaviors based on trip chain generation.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

EV charging load scheduling following uncertain renewable energy supply by stochastic matching.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

A residential load scheduling approach based on load behavior analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Recursive estimation of selective catalyst reduction system parameters using modified Gauss-Newton method.
Proceedings of the American Control Conference, 2014

Centrality metrics of importance in access behaviors and malware detections.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Reconfiguring Networked Infrastructures by Adding Wireless Communication Capabilities to Selected Nodes.
IEEE Trans. Wirel. Commun., 2013

Coordinated Multi-Microgrids Optimal Control Algorithm for Smart Distribution Management System.
IEEE Trans. Smart Grid, 2013

Electrical Load Tracking Analysis for Demand Response in Energy Intensive Enterprise.
IEEE Trans. Smart Grid, 2013

User Authentication Through Mouse Dynamics.
IEEE Trans. Inf. Forensics Secur., 2013

Smart Management of Multiple Energy Systems in Automotive Painting Shop.
IEEE Trans Autom. Sci. Eng., 2013

Web page and image semi-supervised classification with heterogeneous information fusion.
J. Inf. Sci., 2013

Self-balancing dynamic scheduling of electrical energy for energy-intensive enterprises.
Int. J. Syst. Sci., 2013

Boosting regression methods based on a geometric conversion approach: Using SVMs base learners.
Neurocomputing, 2013

Multi-view semi-supervised web image classification via co-graph.
Neurocomputing, 2013

On optimisation of cluster-based sensor network tracking system.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
CoRR, 2013

A Peep on the Interplays between Online Video Websites and Online Social Networks
CoRR, 2013

Sampling Content Distributed Over Graphs.
CoRR, 2013

Efficiently Estimating Subgraph Statistics of Large Networks in the Dark.
CoRR, 2013

Real-time volume control for interactive network traffic replay.
Comput. Networks, 2013

Security risks evaluation toolbox for smart grid devices.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Maximizing topic propagation driven by multiple user nodes in micro-blogging.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A novel method to detect bad data injection attack in smart grid.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Online strategy for scheduling a hydroelectric station during flood season.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Sampling node pairs over large graphs.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

An in-depth measurement and analysis of popular private tracker systems in China.
Proceedings of IEEE International Conference on Communications, 2013

Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

Bad data detection method for smart grids based on distributed state estimation.
Proceedings of IEEE International Conference on Communications, 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

Supply demand coordination for building energy saving.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

A decentralized optimization method for energy saving of HVAC systems.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
Performance Analysis and Comparison on Energy Storage Devices for Smart Building Energy Management.
IEEE Trans. Smart Grid, 2012

Simulation-Based Policy Improvement for Energy Management in Commercial Office Buildings.
IEEE Trans. Smart Grid, 2012

Technical Challenges of the Smart Grid: From a Signal Processing Perspective [From the Guest Editors].
IEEE Signal Process. Mag., 2012

Modeling collective blogging dynamics of popular incidental topics.
Knowl. Inf. Syst., 2012

A systematic method for network topology reconfiguration with limited link additions.
J. Netw. Comput. Appl., 2012

Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition.
KSII Trans. Internet Inf. Syst., 2012

A time-varying propagation model of hot topic on BBS sites and Blog networks.
Inf. Sci., 2012

CARR: a scalable solution for network packet classification.
Expert Syst. J. Knowl. Eng., 2012

A layered classification for malicious function identification and malware detection.
Concurr. Comput. Pract. Exp., 2012

Virtual indexing based methods for estimating node connection degrees.
Comput. Networks, 2012

An Identity Authentication Mechanism Based on Timing Covert Channel.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Model-based real-time volume control for interactive network traffic replay.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Estimation of occupant distribution by detecting the entrance and leaving events of zones in building.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2012

Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network.
Proceedings of the 18th IEEE International Conference on Networks, 2012

On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Who are active? An in-depth measurement on user activity characteristics in sina microblogging.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Behavior spectrum: An effective method for user's web access behavior monitoring and measurement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Continuous authentication for mouse dynamics: A pattern-growth approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

Efficient topology optimization for a wired networked system by adding wireless communication.
Proceedings of the American Control Conference, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links.
IEEE Trans. Inf. Forensics Secur., 2011

Optimization Based Method for Supply Location Selection and Routing in Large-Scale Emergency Material Delivery.
IEEE Trans Autom. Sci. Eng., 2011

Optimal Cognitive Access of Markovian Channels under Tight Collision Constraints.
IEEE J. Sel. Areas Commun., 2011

Monitoring abnormal network traffic based on blind source separation approach.
J. Netw. Comput. Appl., 2011

Tracking a moving object via a sensor network with a partial information broadcasting scheme.
Inf. Sci., 2011

Automatically configuring the network layer of data centers for cloud computing.
IBM J. Res. Dev., 2011

A New Method for Authentication Based on Covert Channel.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A Layered Detection Method for Malware Identification.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A new virtual indexing method for measuring host connection degrees.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Understanding User Generated Content Characteristics: A Hot-Event Perspective.
Proceedings of IEEE International Conference on Communications, 2011

Poster: can it be more practical?: improving mouse dynamics biometric performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Energy-Efficient Buildings Facilitated by Microgrid.
IEEE Trans. Smart Grid, 2010

Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring.
IEEE Trans. Inf. Forensics Secur., 2010

Efficient Simulation Method for General Assembly Systems With Material Handling Based on Aggregated Event-Scheduling.
IEEE Trans Autom. Sci. Eng., 2010

Long-Term Scheduling for Cascaded Hydro Energy Systems With Annual Water Consumption and Release Constraints.
IEEE Trans Autom. Sci. Eng., 2010

Optimization Based Production Planning With Hybrid Dynamics and Constraints.
IEEE Trans. Autom. Control., 2010

Group dynamics in discussing incidental topics over online social networks.
IEEE Netw., 2010

An SVM-based machine learning method for accurate internet traffic classification.
Inf. Syst. Frontiers, 2010

A novel mobility model based on semi-random circular movement in mobile ad hoc networks.
Inf. Sci., 2010

Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Prediction-Based Activation in WSN Tracking.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

Enhancing Web Page Classification via Local Co-training.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A hybrid algorithm for scheduling in job shop problem with flexible resources.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

A Novel IRC Botnet Detection Method Based on Packet Size Sequence.
Proceedings of IEEE International Conference on Communications, 2010

Balance Based Performance Enhancement for Interactive TCP Traffic Replay.
Proceedings of IEEE International Conference on Communications, 2010

Dynamic water resources planning with locational release and annual consumption constraints.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Estimation of occupancy level in indoor environment based on heterogeneous information fusion.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense.
IEEE Netw., 2009

Fast intrusion detection based on a non-negative matrix factorization model.
J. Netw. Comput. Appl., 2009

Hybrid Nested Partitions algorithm for scheduling in job shop problem.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

On the performance of cognitive access with periodic spectrum sensing.
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009

A Video-Based Indoor Occupant Detection and Localization Algorithm for Smart Buildings.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.
Proceedings of IEEE International Conference on Communications, 2009

Monitoring Abnormal Traffic Flows Based on Independent Component Analysis.
Proceedings of IEEE International Conference on Communications, 2009

Propagation Modeling and Analysis of Incidental Topics in Blogosphere.
Proceedings of the Online Communities and Social Computing, 2009

A New Data Streaming Method for Locating Hosts with Large Connection Degree.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Prototype Demonstration: Trojan Detection and Defense System.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

P2P Traffic Identification Based on the Signatures of Key Packets.
Proceedings of the IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2009

Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
An OVAL-based active vulnerability assessment system for enterprise computer networks.
Inf. Syst. Frontiers, 2008

Processing of massive audit data streams for real-time anomaly intrusion detection.
Comput. Commun., 2008

Reliable Transport with Memory Consideration in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Event-based optimization for dispatching policies in material handling systems of general assembly lines.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

Efficient simulation for serial production lines based on aggregated event-scheduling.
Proceedings of the 2008 IEEE International Conference on Automation Science and Engineering, 2008

2007
Energy-Efficient Sensing Coverage and Communication for Wireless Sensor Networks.
J. Syst. Sci. Complex., 2007

Accurate Classification of the Internet Traffic Based on the SVM Method.
Proceedings of IEEE International Conference on Communications, 2007

Traffic Classification - Towards Accurate Real Time Network Applications.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

Optimal Supply Location Selection and Routing for Emergency Material Delivery.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007

2006
Constrained Ordinal Optimization - A Feasibility Model Based Approach.
Discret. Event Dyn. Syst., 2006

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Comput. Secur., 2006

A virtual disk environment for providing file system recovery.
Comput. Secur., 2006

An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Machine learning approach for determining feasible plans of a remanufacturing system.
IEEE Trans Autom. Sci. Eng., 2005

Multiple behavior information fusion based quantitative threat evaluation.
Comput. Secur., 2005

Percentage Coverage Configuration in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Planning Remanufacturing Systems by Constrained Ordinal Optimization Method with Feasibility Model.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

2004
Predicting the intrusion intentions by observing system call sequences.
Comput. Secur., 2004

A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004

A New Gradient-Based Routing Protocol in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Production scheduling with hybrid dynamics and constraints.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2003
A rough set theory based method for anomaly intrusion detection in computer network systems.
Expert Syst. J. Knowl. Eng., 2003

1999
Integrated Resource Scheduling and Bidding in the Deregulated Electric Power Market: New Challenges.
Discret. Event Dyn. Syst., 1999

Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1994
Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown.
Proceedings of the 1994 International Conference on Robotics and Automation, 1994


  Loading...