Guoqiang Shu

Orcid: 0000-0003-1165-1936

According to our database1, Guoqiang Shu authored at least 16 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Amplitude transformed quantum convolutional neural network.
Appl. Intell., September, 2023

One for All, All for One: Learning and Transferring User Embeddings for Cross-Domain Recommendation.
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023

2022
A Hybrid Quantum Image-Matching Algorithm.
Entropy, December, 2022

RecGURU: Adversarial Learning of Generalized User Representations for Cross-Domain Recommendation.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

2011
A Formal Methodology for Network Protocol Fingerprinting.
IEEE Trans. Parallel Distributed Syst., 2011

2008
Patterns: from system design to software testing.
Innov. Syst. Softw. Eng., 2008

VCSTC: Virtual Cyber Security Testing Capability - An Application Oriented Paradigm for Network Infrastructure Protection.
Proceedings of the Testing of Software and Communicating Systems, 2008

A model-based approach to security flaw detection of network protocol implementations.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2008

2007
Testing Patterns.
Proceedings of the 31st Annual IEEE / NASA Software Engineering Workshop (SEW-31 2007), 2007

Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking.
Proceedings of the Testing of Communicating Systems, 2006

A note on broadcast encryption key management with applications to large scale emergency alert systems.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Network Protocol System Fingerprinting - A Formal Approach.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Defending against Instant Messaging Worms.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2002
Validating Objected-Oriented Prototype of Real-Time Systems with Timed Automata.
Proceedings of the 13th IEEE International Workshop on Rapid System Prototyping (RSP 2002), 2002


  Loading...