Guozi Sun

Orcid: 0000-0003-1888-7001

According to our database1, Guozi Sun authored at least 59 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain.
Peer Peer Netw. Appl., November, 2023

From task to evaluation: an automatic text summarization review.
Artif. Intell. Rev., November, 2023

Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window.
J. Database Manag., 2023

Incorporating I Ching Knowledge Into Prediction Task via Data Mining.
J. Database Manag., 2023

A slice-based encryption scheme for IPFS.
Int. J. Secur. Networks, 2023

A Privacy-Preserving Data Sharing Scheme Based on Blockchain for Vehicular Edge Networks.
Proceedings of the IEEE Global Communications Conference, 2023

RPChain: Regulatable Privacy-Preserving Group Data Sharing Based on Consortium Blockchain.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Triplet Embedding Convolutional Recurrent Neural Network for Long Text Semantic Analysis.
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022

Secure File Outsourcing Method Based on Consortium Blockchain.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Self-supervised Learning for Sketch-Based 3D Shape Retrieval.
Proceedings of the Pattern Recognition and Computer Vision - 5th Chinese Conference, 2022

A Method of Garbage Quantity Prediction Based on Population Change.
Proceedings of the Intelligent Information Processing XI, 2022

M-ISFCM: A Semisupervised Method for Anomaly Detection of MOOC Learning Behavior.
Proceedings of the Data Science, 2022

2021
A Residual Learning-Based Network Intrusion Detection System.
Secur. Commun. Networks, 2021

ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing.
J. Syst. Archit., 2021

Judicial Case Determination Methods Based on Event Tuple.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Fine-grained emoji sentiment analysis based on attributes of Twitter users.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

2019
一种基于质心空间的不均衡数据欠采样方法 (Under-sampling Method for Unbalanced Data Based on Centroid Space).
计算机科学, 2019

一种基于小波分析的网络流量异常检测方法 (Network Traffic Anomaly Detection Based on Wavelet Analysis).
计算机科学, 2019

JEDoDF: Judicial Event Discrimination Based on Deep Forest.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019

Sentiment Analysis Based on Bi-LSTM Using Tone.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019

CRQA: Credibility Retrieval for Medical Question Answer Service.
Proceedings of the 2019 IEEE International Conference on Real-time Computing and Robotics, 2019

Chinese Spam Data Filter Model in Mobile Internet.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

Characterization and graph embedding of weighted social networks through Diffusion Wavelets.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
基于行为特征分析的微博恶意用户识别 (Microblogging Malicious User Identification Based on Behavior Characteristic Analysis).
计算机科学, 2018

基于短时多源回归算法的P2P平台风险观测方法 (Risk Observing Method Based on Short-time Multi-source Regression Algorithm on P2P Platform).
计算机科学, 2018

Overdue Prediction of Bank Loans Based on LSTM-SVM.
Proceedings of the 2018 IEEE SmartWorld, 2018

Network Traffic Anomaly Detection Based on Wavelet Analysis.
Proceedings of the 16th IEEE International Conference on Software Engineering Research, 2018

An OpenvSwitch Extension for SDN Traceback.
Proceedings of the Network and System Security - 12th International Conference, 2018

Stock Prediction based on Bayesian-LSTM.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

P2P Lending Platform Risk Observing Method Based on Short-Time Multi-Source Regression Algorithm.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Web attack forensics based on network traffic behavior characteristics and URLs.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

DDoS Attacks and Flash Event Detection Based on Flow Characteristics in SDN.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

The Dynamic Data Integrity Verification and Recovery Scheme based on MHT.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

2017
A security carving approach for AVI video based on frame size and index.
Multim. Tools Appl., 2017

Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE Multim., 2017

An optimized approach for massive web page classification using entity similarity based on semantic network.
Future Gener. Comput. Syst., 2017

Analysis of User's Abnormal Behavior Based on Behavior Sequence in Enterprise Network.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Spam Message Detection Model Based on Bayesian Classification.
Proceedings of the Advances in Internetworking, 2017

A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

A Demonstration of Encrypted Logistics Information System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Design and implementation of a malware detection system based on network behavior.
Secur. Commun. Networks, 2015

Dump and analysis of Android volatile memory on Wechat.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

AppTrace: Dynamic trace on Android devices.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An opinion leader perceptual model based on PageRank algorithm.
Proceedings of the 2015 International Conference on Behavioral, 2015

2014
A new definition of homomorphic signature for identity management in mobile cloud computing.
J. Comput. Syst. Sci., 2014

An Approach for Intention Perception Based on Knowledge Network.
Proceedings of the 2014 10th International Conference on Semantics, 2014

An Information Classification Approach Based on Knowledge Network.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

A privacy protection policy combined with privacy homomorphism in the Internet of Things.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A method to identify the AVI-type blocks based on their four-character codes and C4.5 algorithm.
Proceedings of the 2014 International Conference on Behavioral, 2014

Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Data Deduplication in Wireless Multimedia Monitoring Network.
Int. J. Distributed Sens. Networks, 2013

MapReduce-based frequent itemset mining for analysis of electronic evidence.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

2012
Short signature from factoring assumption in the standard model.
J. Internet Serv. Inf. Secur., 2012

2009
Similarity-Based Feature Selection for Learning from Examples with Continuous Values.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

2007
Defending Against Jamming Attacks in Wireless Local Area Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007


  Loading...