Guozi Sun

According to our database1, Guozi Sun authored at least 27 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Network Traffic Anomaly Detection Based on Wavelet Analysis.
Proceedings of the 16th IEEE International Conference on Software Engineering Research, 2018

Stock Prediction based on Bayesian-LSTM.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

P2P Lending Platform Risk Observing Method Based on Short-Time Multi-Source Regression Algorithm.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A security carving approach for AVI video based on frame size and index.
Multimedia Tools Appl., 2017

Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE MultiMedia, 2017

An optimized approach for massive web page classification using entity similarity based on semantic network.
Future Generation Comp. Syst., 2017

Analysis of User's Abnormal Behavior Based on Behavior Sequence in Enterprise Network.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Spam Message Detection Model Based on Bayesian Classification.
Proceedings of the Advances in Internetworking, 2017

A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

A Demonstration of Encrypted Logistics Information System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

Dump and analysis of Android volatile memory on Wechat.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

AppTrace: Dynamic trace on Android devices.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

An opinion leader perceptual model based on PageRank algorithm.
Proceedings of the 2015 International Conference on Behavioral, 2015

A new definition of homomorphic signature for identity management in mobile cloud computing.
J. Comput. Syst. Sci., 2014

An Approach for Intention Perception Based on Knowledge Network.
Proceedings of the 2014 10th International Conference on Semantics, 2014

An Information Classification Approach Based on Knowledge Network.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

A privacy protection policy combined with privacy homomorphism in the Internet of Things.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A method to identify the AVI-type blocks based on their four-character codes and C4.5 algorithm.
Proceedings of the 2014 International Conference on Behavioral, 2014

Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

Data Deduplication in Wireless Multimedia Monitoring Network.
IJDSN, 2013

MapReduce-based frequent itemset mining for analysis of electronic evidence.
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013

Short signature from factoring assumption in the standard model.
J. Internet Serv. Inf. Secur., 2012

Defending Against Jamming Attacks in Wireless Local Area Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007