Shuting Xu

According to our database1, Shuting Xu authored at least 19 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Deep Learning Based Framework for Cloud Masquerade Attack Detection.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Review of control models for human pilot behavior.
Annual Reviews in Control, 2017

Energy-Efficient Dynamic Consolidation of Virtual Machines in Big Data Centers.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Information Security Training Customized by Risk Profile.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
On periodic scheduling of fixed-slot bandwidth reservations for big data transfer.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

A Theoretical Model for Customizable Learning/Training to Enhance Individuals' Systems Security Behavior.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
An Optimal Least Significant Bit Based Image Steganography Algorithm.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

2009
Matrix Decomposition Techniques for Data Privacy.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy preserving churn prediction.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
A novel data distortion approach via selective SSVD for privacy protection.
IJICS, 2008

The relationship between the features of sparse matrix and the matrix solving status.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

An online condition number query system.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
Fast Fourier Transform Based Data Perturbation Method for Privacy Protection.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Enhancing clustering blog documents by utilizing author/reader comments.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Singular value decomposition based data distortion strategy for privacy protection.
Knowl. Inf. Syst., 2006

Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation.
Proceedings of the 2006 International Conference on Information & Knowledge Engineering, 2006

2005
Matrix Condition Number Prediction with SVM Regression and Feature Selection.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Data Distortion for Privacy Protection in a Terrorist Analysis System.
Proceedings of the Intelligence and Security Informatics, 2005

2004
A Parallel Hybrid Web Document Clustering Algorithm and its Performance Study.
The Journal of Supercomputing, 2004


  Loading...