Hao Tu

According to our database1, Hao Tu authored at least 20 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Applicability of Hadamard relaxation method to MMW and THz Imaging with compressive sensing.
Signal, Image and Video Processing, 2017

2015
A reversible video steganography algorithm for MVC based on motion vector.
Multimedia Tools Appl., 2015

2014
Weibo: An Information-Driven Online Social Network.
Trans. Computational Science, 2014

A novel P2P IPTV system for IPv4/v6 networks.
Multimedia Tools Appl., 2014

A scalable flow rule translation implementation for software defined security.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

A dynamic taint tracking based method to detect sensitive information leaking.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2012
A Client/Server Based Mechanism to Prevent ARP Spoofing Attacks.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

Characterizing User Behavior in Weibo.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Forward or Ignore: User Behavior Analysis and Prediction on Microblogging.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Forward or ignore: User behavior analysis and prediction on microblogging.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
An Empirical Study of the Beezone System.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Sina Microblog: An Information-Driven Online Social Network.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

2010
A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift.
IEEE Trans. Circuits Syst. Video Techn., 2010

2009
Measuring Peer-to-Peer Botnets Using Control Flow Stability.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A P2P E-commerce Related Network Security Issue: P2P Worm.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Mining Network Traffic for Worm Signature Extraction.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Proposion and Analysis of a TCP Feature of P2P Traffic.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Detecting Botnets by Analyzing DNS Traffic.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

2005
Ubicast: An Enhanced Application-Level Multicast Protocol.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Dynamic immune intrusion detection system for IPv6.
Proceedings of the Data Mining, 2005


  Loading...