Jing Tao

According to our database1, Jing Tao
  • authored at least 46 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

2017
Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage.
PVLDB, 2017

AL-bitmap: Monitoring network traffic activity graphs on high speed links.
Inf. Sci., 2017

Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Alterations in resting-state functional connectivity of the default mode network in amnestic mild cognitive impairment: an fMRI study.
BMC Medical Imaging, 2017

Inferring Demographics and Social Networks of Mobile Device Users on Campus From AP-Trajectories.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

APK-DFS: An Automatic Interaction System Based on Depth-First-Search for APK.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

An Android Malware Detection System Based on Behavior Comparison Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

2016
On flow isolation mechanism for different applications in NFV controller.
IJHPSA, 2016

A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs.
CoRR, 2016

A study on the assessment of power system security risk based on grey clustering and maximum entropy theory.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

2015
Accurate DNS query characteristics estimation via active probing.
J. Network and Computer Applications, 2015

Moss: A Scalable Tool for Efficiently Sampling and Counting 4- and 5-Node Graphlets.
CoRR, 2015

Local Government Debt Risk Evaluation Based on Metabolic GM (1, 1) Model.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
A New Sketch Method for Measuring Host Connection Degree Distribution.
IEEE Trans. Information Forensics and Security, 2014

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Information Forensics and Security, 2014

MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Bumpless interconnects formed with nanowire ACF for 3D applications.
Proceedings of the 2014 International 3D Systems Integration Conference, 2014

2013
A Peep on the Interplays between Online Video Websites and Online Social Networks
CoRR, 2013

A simple multi-symbol detector for CPM signals.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Facility layouts based on differential evolution algorithm.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

A Novel Resource Allocation Heuristic for a Power Constrained Data Center.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

2012
Virtual indexing based methods for estimating node connection degrees.
Computer Networks, 2012

Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Towards Practical IPSec over Challenged Networks.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
A metadata-driven approach to loading and querying heterogeneous scientific data.
Ecological Informatics, 2010

A Novel IRC Botnet Detection Method Based on Packet Size Sequence.
Proceedings of IEEE International Conference on Communications, 2010

Construction of virtual experiment platform for research about vehicle driving control at energy-saving.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

A Fast Global Fuzzy Clustering Algorithm for the Chemical Gray Box Modeling.
Proceedings of the Fuzzy Information and Engineering 2010, 2010

2009
An Improvement of HSMM-Based Speech Synthesis by Duration-Dependent State Transition Probabilities.
Proceedings of the Advances in Neural Networks, 2009

A Study on Estimation of Aboveground Wet Biomass based on the Microwave Vegetation Indices.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

2008
Monitoring Vegetation Water Content Using Microwave Vegetation Indices.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Traffic Shaping in BitTorrent Systems by Centralized Hierarchical Peer-Node Assignment.
Proceedings of IEEE International Conference on Communications, 2008

2007
Cyberinfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment.
Cluster Computing, 2007

Microwave vegetation indexes derived from satellite microwave radiometers.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

2006
Scientific workflow management and the Kepler system.
Concurrency and Computation: Practice and Experience, 2006

Implementation of time management in a runtime infrastructure.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Development of a runtime infrastructure for large-scale distributed simulations.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

Integrating Data Grid and Web Services for E-Science Applications: A Case Study of Exploring Species Distributions.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

CyberInfrastructure for the analysis of ecological acoustic sensor data: a use case study in grid deployment.
Proceedings of the 2006 IEEE Challenges of Large Applications in Distributed Environments, 2006

2005
Incorporating Semantics in Scientific Workflow Authoring.
Proceedings of the 17th International Conference on Scientific and Statistical Database Management, 2005


  Loading...