Chun Guo

Orcid: 0000-0002-3341-220X

Affiliations:
  • Guizhou University, Guiyang, China
  • Beijing University of Posts and Telecommunications, China (PhD 2014)


According to our database1, Chun Guo authored at least 21 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Beyond k-Means++: Towards better cluster exploration with geometrical information.
Pattern Recognit., February, 2024

Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence.
Comput. Networks, April, 2023

MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023

2022
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022

2021
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy.
Wirel. Commun. Mob. Comput., 2021

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
Secur. Commun. Networks, 2021

Towards DDoS detection mechanisms in Software-Defined Networking.
J. Netw. Comput. Appl., 2021

ADVICE: Towards adaptive scheduling for data collection and DDoS detection in SDN.
J. Inf. Secur. Appl., 2021

Image-based malware classification using section distribution information.
Comput. Secur., 2021

2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021

2020
DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Efficient Training Support Vector Clustering With Appropriate Boundary Information.
IEEE Access, 2019

DataSESec: Security Monitoring for Data Share and Exchange Platform.
Proceedings of the Web and Big Data - Third International Joint Conference, 2019

2017
FRSVC: Towards making support vector clustering consume less.
Pattern Recognit., 2017

一种基于权重属性熵的分类匿名算法 (Classification Anonymity Algorithm Based on Weight Attributes Entropy).
计算机科学, 2017

2016
A two-level hybrid approach for intrusion detection.
Neurocomputing, 2016

Data privacy protection based on sensitive attributes dynamic update.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2014
A distance sum-based hybrid method for intrusion detection.
Appl. Intell., 2014

2013
Efficient intrusion detection using representative instances.
Comput. Secur., 2013


  Loading...