Lianhai Wang

According to our database1, Lianhai Wang authored at least 25 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation.
IEEE Trans. Information Forensics and Security, 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019

2018
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
IEEE Trans. on Circuits and Systems, 2018

Secure Virtualization Environment Based on Advanced Memory Introspection.
Security and Communication Networks, 2018

A Sparse Grid Stochastic Collocation Upwind Finite Volume Element Method for the Constrained Optimal Control Problem Governed by Random Convection Diffusion Equations.
J. Sci. Comput., 2018

The Design of a Cloud Forensics Middleware System Base on Memory Analysis.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
IEEE Trans. Information Forensics and Security, 2017

Linking social network accounts by modeling user spatiotemporal habits.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Research on Linux Kernel Version Diversity for Precise Memory Analysis.
Proceedings of the Data Science, 2017

The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
An adaptive approach for Linux memory analysis based on kernel code reconstruction.
EURASIP J. Information Security, 2016

Social Media account linkage using user-generated geo-location data.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Finding another yourself in multiplex networks.
Applied Mathematics and Computation, 2015

2014
Robust palmprint identification based on directional representations and compressed sensing.
Multimedia Tools Appl., 2014

A KVM Virtual Machine Memory Forensics Method Based on VMCS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A High Performance and Secure Palmprint Template Protection Scheme.
JSW, 2012

Robust Palmprint Recognition Based on Directional Representations.
Proceedings of the Intelligent Information Processing VI, 2012

2010
Live Memory Acquisition through FireWire.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Network Connections Information Extraction of 64-Bit Windows 7 Memory Images.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Algorithm for Agent Collaborative Learning Task Allocation Based Graph Framework.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

Windows Memory Analysis Based on KPCR.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...