Li Guo

According to our database1, Li Guo
  • authored at least 159 papers between 2005 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Boosting imbalanced data learning with Wiener process oversampling.
Frontiers of Computer Science, 2017

Inferring User Profiles in Online Social Networks Based on Convolutional Neural Network.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Mining Host Behavior Patterns From Massive Network and Security Logs.
Proceedings of the International Conference on Computational Science, 2017

Learning Robust Low-Rank Approximation for Crowdsourcing on Riemannian Manifold.
Proceedings of the International Conference on Computational Science, 2017

Learning Knowledge Embeddings by Combining Limit-based Scoring Loss.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016

Securing cyberspace.
Concurrency and Computation: Practice and Experience, 2016

Towards quantifying visual similarity of domain names for combating typosquatting abuse.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

An Unsupervised Framework Towards Sci-Tech Compound Entity Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2016

Riemannian optimization with subspace tracking for low-rank recovery.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Identifying Users across Different Sites using Usernames.
Proceedings of the International Conference on Computational Science 2016, 2016

Jointly Embedding Knowledge Graphs and Logical Rules.
Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, 2016

Ranking-Based Music Recommendation in Online Music Radios.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Image Super-Resolution with Deep Convolutional Neural Network.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Location-aware Friend Recommendation in Event-based Social Networks: A Bayesian Latent Factor Approach.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

On the Minimum Differentially Resolving Set Problem for Diffusion Source Inference in Networks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
On the Upper Bounds of Spread for Greedy Algorithms in Social Network Influence Maximization.
IEEE Trans. Knowl. Data Eng., 2015

E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams.
IEEE Trans. Knowl. Data Eng., 2015

Modelling semantics across multiple time series and its applications.
Knowl.-Based Syst., 2015

Locating multiple sources in social networks under the SIR model: A divide-and-conquer approach.
J. Comput. Science, 2015

Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Network Syst. Manage., 2015

Topic-aware Source Locating in Social Networks.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Topic-aware Social Influence Minimization.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Feature Selection for Sentiment Classification Using Matrix Factorization.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Online Event Recommendation for Event-based Social Networks.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Fast Search for Distance Dependent Chinese Restaurant Processes.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

MimicHunter: A General Passive Network Protocol Mimicry Detection Framework.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Efficient Sensor Placement Optimization for Early Detection of Contagious Outbreaks in Mobile Social Networks.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

An automatic approach to extract the formats of network and security log messages.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Towards misdirected email detection based on multi-attributes.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Latent sentiment representation for sentiment feature selection.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Optimization-based model for determining words' sentiment orientations.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Knowledge Base Completion Using Embeddings and Rules.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

What is the next step of binary features?
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

Data-oriented multi-index hashing.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Fast Climbing Approach for Diffusion Source Inference in Large Social Networks.
Proceedings of the Data Science - Second International Conference, 2015

Minimizing the Social Influence from a Topic Modeling Perspective.
Proceedings of the Data Science - Second International Conference, 2015

VSEP: A Distributed Algorithm for Graph Edge Partitioning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Context-Dependent Knowledge Graph Embedding.
Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 2015

Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

A Self-learning Rule-Based Approach for Sci-tech Compound Phrase Entity Recognition.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Sentiment Word Identification with Sentiment Contextual Factors.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Semantically Smooth Knowledge Graph Embedding.
Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing, 2015

2014
Contextual Query Expansion for Image Retrieval.
IEEE Trans. Multimedia, 2014

Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation.
IEEE Journal on Selected Areas in Communications, 2014

A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Network and Computer Applications, 2014

Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol., 2014

Maximizing the long-term integral influence in social networks under the voter model.
Proceedings of the 23rd International World Wide Web Conference, 2014

An upper bound based greedy algorithm for mining top-k influential nodes in social networks.
Proceedings of the 23rd International World Wide Web Conference, 2014

Combining geographical information of users and content of items for accurate rating prediction.
Proceedings of the 23rd International World Wide Web Conference, 2014

Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Topic Block: Mining User Inner Interests for Text and Link Analysis in Social Networks.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Data-Dependent Locality Sensitive Hashing.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

Forward Classification on Data Streams.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

A Moving Target Framework to Improve Network Service Accessibility.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Text Categorization based on Clustering Feature Selection.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

On the Frequency Distribution of Retweets.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Text Feature Selection Based on Class Subspace.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Latent Factor SVM for Text Categorization.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

A probabilistic approach towards modeling email network with realistic features.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Maximizing the Cumulative Influence through a Social Network when Repeat Activation Exists.
Proceedings of the International Conference on Computational Science, 2014

Discovering Multiple Diffusion Source Nodes in Social Networks.
Proceedings of the International Conference on Computational Science, 2014

A Multi-layer Event Detection Algorithm for Detecting Global and Local Hot Events in Social Networks.
Proceedings of the International Conference on Computational Science, 2014

Improving Collaborative Recommendation via Location-based User-item Subgroup.
Proceedings of the International Conference on Computational Science, 2014

Mining Large-scale Event Knowledge from Web Text.
Proceedings of the International Conference on Computational Science, 2014

A factor-searching-based multiple string matching algorithm for intrusion detection.
Proceedings of the IEEE International Conference on Communications, 2014

A Regularized Competition Model for Question Difficulty Estimation in Community Question Answering Services.
Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, 2014

CONR: A Novel Method for Sentiment Word Identification.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Delta-K 2-tree for Compact Representation of Web Graphs.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

Toward Identifying and Understanding User-Agent Strings in HTTP Traffic.
Proceedings of the Web Technologies and Applications, 2014

Event Recommendation in Event-Based Social Networks.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Combining Heterogenous Social and Geographical Information for Event Recommendation.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Robust common visual pattern discovery using graph matching.
J. Visual Communication and Image Representation, 2013

Petascale molecular dynamics simulation of crystalline silicon on Tianhe-1A.
IJHPCA, 2013

Research of Intrusion Detection System on Android.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Discovering Semantics from Multiple Correlated Time Series Stream.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Detecting Sybil Nodes in Anonymous Communication Systems.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Bit-Parallel Multiple Approximate String Matching based on GPU.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Distributed OSN Crawling System based on Ajax Simulation.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Data Stolen Trojan Detection based on Network Behaviors.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Behavioral targeting with social regularization.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

UBLF: An Upper Bound Based Approach to Discover Influential Nodes in Social Networks.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Unsupervised Clustering Strategy Based on Label Propagation.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Item-Based Top-k Influential User Discovery in Social Networks.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

An empirical analysis of family in the Tor network.
Proceedings of IEEE International Conference on Communications, 2013

Dependency Expansion Model for Sentiment Lexicon Extraction.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2013

Personalized influence maximization on social networks.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Parallel auto-encoder for efficient outlier detection.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Design and Evaluation of Access Control Model Based on Classification of Users' Network Behaviors.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
Mining Hot Topics from Twitter Streams.
Proceedings of the International Conference on Computational Science, 2012

A framework for application-driven classification of data streams.
Neurocomputing, 2012

A novel logic-based automatic approach to constructing compliant security policies.
SCIENCE CHINA Information Sciences, 2012

SDFA: Series DFA for Memory-Efficient Regular Expression Matching.
Proceedings of the Implementation and Application of Automata, 2012

Mining Multi-Label Data Streams Using Ensemble-Based Active Learning.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms.
Proceedings of the NETWORKING 2012, 2012

On Accuracy of Early Traffic Classification.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Efficient Behavior Targeting Using SVM Ensemble Indexing.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Worm Propagation Model for Heterogeneous Network.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Group Detection and Relation Analysis Research for Web Social Network.
Proceedings of the Web Technologies and Applications, 2012

Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network.
Proceedings of the Web Technologies and Applications, 2012

A Prefiltering Approach to Regular Expression Matching for Network Security Systems.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Research on Real-time Publish/Subscribe System supported by Data-Integration.
JSW, 2011

Traffic-Aware Frequent Elements Matching Algorithms for Deep Packet Inspection.
JNW, 2011

Robust ensemble learning for mining noisy data streams.
Decision Support Systems, 2011

Giant complete automaton for uncertain multiple string matching and its high speed construction algorithm.
SCIENCE CHINA Information Sciences, 2011

Traffic classification beyond application level: identifying content types from network traces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Improving matching performance of DPI traffic classifier.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

XunleiProbe: A Sensitive and Accurate Probing on a Large-Scale P2SP System.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Biprominer: Automatic Mining of Binary Protocol Features.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Understanding Long-Term Evolution and Lifespan in Peer-to-Peer Systems.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Using Entropy to Classify Traffic More Deeply.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Enabling fast prediction for ensemble models on data streams.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Accelerating DFA Construction by Hierarchical Merging.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Revisiting the swarm evolution: A long term perspective.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

An efficient regular expressions compression algorithm from a new perspective.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Covert Communication Method Based on User-Generated Content Sites.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Enabling Fast Lazy Learning for Data Streams.
Proceedings of the 11th IEEE International Conference on Data Mining, 2011

Continuous data stream query in the cloud.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Mining frequent patterns across multiple data streams.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Inferring Protocol State Machine from Network Traces: A Probabilistic Approach.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Compressing Regular Expressions' DFA Table by Matrix Decomposition.
Proceedings of the Implementation and Application of Automata, 2010

Inferring Protocol State Machine from Real-World Trace.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Fast and Memory-Efficient Traffic Classification with Deep Packet Inspection in CMP Architecture.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Learning from Multiple Related Data Streams with Asynchronous Flowing Speeds.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

Classifier and Cluster Ensembles for Mining Concept Drifting Data Streams.
Proceedings of the ICDM 2010, 2010

A New Weighted Ensemble Model for Detecting DoS Attack Streams.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

SKIF: a data imputation framework for concept drifting data streams.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Towards lightweight and efficient DDOS attacks detection for web server.
Proceedings of the 18th International Conference on World Wide Web, 2009

An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Simulation Analysis of Probabilistic Timing Covert Channels.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Mining Data Streams with Labeled and Unlabeled Training Examples.
Proceedings of the ICDM 2009, 2009

Load Balancing for Flow-Based Parallel Processing Systems in CMP Architecture.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Computer Communications, 2008

Incremental web page template detection.
Proceedings of the 17th International Conference on World Wide Web, 2008

TCM-KNN scheme for network anomaly detection using feature-based optimizations.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
An active learning based TCM-KNN algorithm for supervised network intrusion detection.
Computers & Security, 2007

TCM-KNN Algorithm for Supervised Network Intrusion Detection.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme.
Proceedings of the Advances in Neural Networks, 2007

LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Network anomaly detection based on TCM-KNN algorithm.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Efficient Filtering Query Indexing in Data Stream.
Proceedings of the Web Information Systems - WISE 2006 Workshops, 2006

TTSF: A Novel Two-Tier Spam Filter.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

A traffic-classified technique for filtering spam from bulk delivery E-mails.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Traffic classification-based spam filter.
Proceedings of IEEE International Conference on Communications, 2006

Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Techniques of IP Data Management in Network Address Resource platform.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

Building Scale-Free Overlay Mix Networks with Small-World Properties.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...