Fuxiang Gao

According to our database1, Fuxiang Gao authored at least 28 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Mining Aspects in Online Comments with Attention and Bi-LSTM.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2016
Influence of removable devices on worm propagation under pulse quarantine strategy.
Intell. Autom. Soft Comput., 2016

Privacy Preserving in the Publication of Large-Scale Trajectory Databases.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
iHDFS: A Distributed File System Supporting Incremental Computing.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Group Signature Based Trace Hiding in Web Query.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2013
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine.
Math. Comput. Model., 2013

Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model.
J. Appl. Math., 2013

Location estimation for wireless sensor networks with attack tolerance.
Int. J. Wirel. Mob. Comput., 2013

Pattern Regulator for Wireless Body Sensor Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

RingS: A Novel Structured P2P Network Model with Explicit Locality and High Fault Tolerance.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Parallel Implementation of Xvid Decoder on Multi-Core.
J. Comput., 2012

Cooperative game-based routing approach for wireless sensor network.
Int. J. Comput. Appl. Technol., 2012

Pulse quarantine strategy of internet worm propagation: Modeling and analysis.
Comput. Electr. Eng., 2012

Modeling and Simulation of C2 Systems Based on Entity Relationship.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2011
A Novel Cooperation Mechanism to Enforce Security in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

Research of SIP DoS Defense Mechanism Based on Queue Theory.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
A Security Architecture for Intranet Based on Security Area Division.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Dynamic window based multihop authentication for WSN.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Study on Preemptive Real-Time Scheduling Strategy for Wireless Sensor Networks.
J. Inf. Process. Syst., 2009

A Signature-Behavior-Based P2P Worm Detection Approach.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Design and Implementation of Network Resource Management System Based on SNMP.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Design and Implementation of Workflow System on Bachelor Degree Final Design.
Proceedings of the ETT 2009, 2009

2008
Behavior-Based Worm Detection and Signature Generation.
Proceedings of the International Multisymposiums on Computer and Computational Sciences, 2008

Teaching Plan for Assembly Language and Programming: Conditional Directives and Macro Directives.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A WAW Model of P2P-based Anti-worm.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks.
Proceedings of the Advances in Data and Web Management, 2007

2006
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

2004
Hybrid BP/CNN neural network for intrusion detection.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...