Haitao Du

Orcid: 0000-0002-4203-6381

According to our database1, Haitao Du authored at least 39 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A formal security analysis of the fast authentication procedure based on the security context in 5G networks.
Soft Comput., February, 2024

Allspark: Workload Orchestration for Visual Transformers on Processing In-Memory Systems.
CoRR, 2024

2023
Diagnosis of dairy cow diseases by knowledge-driven deep learning based on the text reports of illness state.
Comput. Electron. Agric., February, 2023

DDAM: Data Distribution-Aware Mapping of CNNs on Processing-In-Memory Systems.
ACM Trans. Design Autom. Electr. Syst., 2023

On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks.
Sensors, 2023

Requirements and Potential Key Technologies of Security for 6G Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2023

Research on Secure Access in Converged Satellite and Terrestrial Networks.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

Enhancing Privacy Preservation in Federated Learning via Learning Rate Perturbation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Intent-Driven Network Slicing Security Provision and Management.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

GGPA: A General Graph Processing Architecture with Flexible Execution Paradigm.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023

2022
Attacks Against Security Context in 5G Network.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

PCFBCD: An Innovative Approach to Accelerating Collaborative Filtering.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

Research on 6G Satellite-Terrestrial Integrated Network Architecture.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

Digital Twin Network based Network Slice Security Provision.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2022

2021
Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

A Low-latency NoC Router Priority Scheme for BFS algorithm.
Proceedings of the 2021 IEEE International Conference on Integrated Circuits, 2021

Convoy_DTN: A Security Interaction Engine Design For Digital Twin Network.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2018
Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences.
CoRR, 2018

Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2016
Wind Turbine Dynamic State Prediction Method Based on the Similarity of Historical Data.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

An Intra-Cluster CoMP Based Sleep-Mode Scheme in Dense Heterogeneous Network.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

2015
Cyber Insider Mission Detection for Situation Awareness.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

2014
Attack Projection.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Probabilistic Inference for Obfuscated Network Attack Sequences.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

An Optimized Resource Allocation and CoMP Based Interference Coordination Scheme for LTE-A Het-Net.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Who Shall We Follow in Twitter for Cyber Vulnerability?
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Sequential modeling for obfuscated network attack action sequences.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2011

Characterizing Transition Behaviors in Internet Attack Sequences.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Enhancing situation awareness via automated situation assessment.
IEEE Commun. Mag., 2010

Toward Ensemble Characterization and Projection of Multistage Cyber Attacks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

2009
Toward unsupervised classification of non-uniform cyber attack tracks.
Proceedings of the 12th International Conference on Information Fusion, 2009

2004
MaRS: a macro-pipelined reconfigurable system.
Proceedings of the First Conference on Computing Frontiers, 2004

2003
Algorithm optimizations and mapping scheme for interactive ray tracing on a reconfigurable architecture.
Comput. Graph., 2003

A Component Oriented Simulator for HW/SW Co-Designs.
Proceedings of the First Workshop on Embedded Systems for Real-Time Multimedia, 2003

Low Energy Data Management for Different On-Chip Memory Levels in Multi-Context Reconfigurable Architectures.
Proceedings of the 2003 Design, 2003

Interactive Ray Tracing on Reconfigurable SIMD MorphoSys.
Proceedings of the 2003 Design, 2003

Interactive Ray Tracing on Reconfigurable SIMD Morphosys.
Proceedings of the Embedded Software for SoC, 2003

2002
Interactive Ray Tracing Using a SIMD Reconfigurable Architecture.
Proceedings of the 14th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2002), 2002


  Loading...