Jie Lei

Affiliations:
  • Huazhong University of Science and Technology, Computer Science Department, Wuhan, China


According to our database1, Jie Lei authored at least 15 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Mixture Distribution Graph Network for Few Shot Learning.
IEEE Trans. Cogn. Dev. Syst., 2022

2021
Pose Adaptive Margin Loss for Face Verification.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2019
Deep learning face representation by fixed erasing in facial landmarks.
Multim. Tools Appl., 2019

2017
Hierarchical deep semantic hashing for fast image retrieval.
Multim. Tools Appl., 2017

2016
Hierarchical Joint CNN-Based Models for Fine-Grained Cars Recognition.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2011
A novel real-time aggregation method on network security events.
Kybernetes, 2011

2007
Attack scenario construction with a new sequential mining technique.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Intelligent Agent-Oriented System for Integrating Network Security Devices and Handling Large Amount of Security Events.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Towards Identifying True Threat from Network Security Data.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Assessing Attack Threat by the Probability of Following Attacks.
Proceedings of the International Conference on Networking, 2007

Learning attack strategies through mining and correlation of security alarms.
Proceedings of the Integrated Network Management, 2007

Real-Time Correlation of Network Security Alerts.
Proceedings of ICEBE 2007, 2007

The Global Synthetical Processing of Network Security Events.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
A novel algorithm SF for mining attack scenarios model.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006


  Loading...