Xiaohong Guan

According to our database1, Xiaohong Guan authored at least 223 papers between 1994 and 2018.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2007, "For contributions to optimization of hydrothermal generation scheduling".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Distributed Coordination of EV Charging With Renewable Energy in a Microgrid of Buildings.
IEEE Trans. Smart Grid, 2018

Robust Scheduling of EV Charging Load With Uncertain Wind Power Integration.
IEEE Trans. Smart Grid, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Information Forensics and Security, 2018

Event-Based HVAC Control - A Complexity-Based Approach.
IEEE Trans. Automation Science and Engineering, 2018

Toward capturing heterogeneity for inferring diffusion networks: A mixed diffusion pattern model.
Knowl.-Based Syst., 2018

A fast multi-level algorithm for community detection in directed online social networks.
J. Information Science, 2018

Predicting attributes and friends of mobile users from AP-Trajectories.
Inf. Sci., 2018

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance.
IEEE Intelligent Systems, 2018

From big data to knowledge: A spatio-temporal approach to malware detection.
Computers & Security, 2018

An Integrated Method for Anomaly Detection From Massive System Logs.
IEEE Access, 2018

Mining Long-Term Stealthy User Behaviors on High Speed Links.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

A Multi-Timescale and Bilevel Coordination Approach for Matching Uncertain Wind Supply With EV Charging Demand.
IEEE Trans. Automation Science and Engineering, 2017

Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage.
PVLDB, 2017

Modelling multi-topic information propagation in online social networks based on resource competition.
J. Information Science, 2017

I/O-efficient calculation of H-group closeness centrality over disk-resident graphs.
Inf. Sci., 2017

AL-bitmap: Monitoring network traffic activity graphs on high speed links.
Inf. Sci., 2017

Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Multigraph Streams.
CoRR, 2017

Sampling Online Social Networks by Random Walk with Indirect Jumps.
CoRR, 2017

Towards Efficient Node Discoverability Optimization on Large Networks.
CoRR, 2017

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance.
CoRR, 2017

Security importance assessment for system objects and malware detection.
Computers & Security, 2017

Butler, Not Servant: A Human-Centric Smart Home Energy Management System.
IEEE Communications Magazine, 2017

A bi-level optimization for an HVAC system.
Cluster Computing, 2017

Inferring Demographics and Social Networks of Mobile Device Users on Campus From AP-Trajectories.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

A traffic classification approach based on characteristics of subflows and ensemble learning.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Hidden Moving Target Defense in Smart Grids.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Stochastic coordination of aggregated electric vehicle charging with on-site wind power at multiple buildings.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Parameters analysis of hierarchical evolutionary method with an application of HVAC system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Transmission capacity margin assessment in power systems with uncertain wind integration.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Realizability guaranteed multi-timescale optimization decision for home energy management.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Evaluation of frequency regulation provision by commercial building HVAC systems.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Optimization of sensor location for improving wind power prediction accuracy.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Integrated Energy Exchange Scheduling for Multimicrogrid System With Electric Vehicles.
IEEE Trans. Smart Grid, 2016

Incorporating Price-Responsive Demand in Energy Scheduling Based on Consumer Payment Minimization.
IEEE Trans. Smart Grid, 2016

Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Information Forensics and Security, 2016

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Human-Machine Systems, 2016

Optimal Control of Multiroom HVAC System: An Event-Based Approach.
IEEE Trans. Contr. Sys. Techn., 2016

Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.
Sensors, 2016

Estimating user behavior toward detecting anomalous ratings in rating systems.
Knowl.-Based Syst., 2016

MIRACLE: A multiple independent random walks community parallel detection algorithm for big graphs.
J. Network and Computer Applications, 2016

Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions.
Inf. Sci., 2016

A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs.
CoRR, 2016

User practice in password security: An empirical study of real-life passwords in the wild.
Computers & Security, 2016

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Modeling multimodal biometric modalities for continuous user authentication.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Rethinking the Design of OpenFlow Switch Counters.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Taming the Flow Table Overflow in OpenFlow Switch.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A new model for nickname detection based on network structure and similarity propagation.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

A decentralized ordinal optimization for energy saving of an HVAC system.
Proceedings of the 2016 American Control Conference, 2016

Coordinating EV charging demand with wind supply in a bi-level energy dispatch framework.
Proceedings of the 2016 American Control Conference, 2016

2015
Matching EV Charging Load With Uncertain Wind: A Simulation-Based Policy Improvement Approach.
IEEE Trans. Smart Grid, 2015

Unbiased Characterization of Node Pairs over Large Graphs.
TKDD, 2015

Supply Demand Coordination for Building Energy Saving: Explore the Soft Comfort.
IEEE Trans. Automation Science and Engineering, 2015

A Decentralized Stay-Time Based Occupant Distribution Estimation Method for Buildings.
IEEE Trans. Automation Science and Engineering, 2015

MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring.
IEEE Systems Journal, 2015

Calling Network: A New Method for Modeling Software Runtime Behaviors.
ACM SIGSOFT Software Engineering Notes, 2015

Analysis of user's behavior and resource characteristics for private trackers.
Peer-to-Peer Networking and Applications, 2015

Robust application identification methods for P2P and VoIP traffic classification in backbone networks.
Knowl.-Based Syst., 2015

Exploring community structure of software Call Graph and its applications in class cohesion measurement.
Journal of Systems and Software, 2015

Accurate DNS query characteristics estimation via active probing.
J. Network and Computer Applications, 2015

Moss: A Scalable Tool for Efficiently Sampling and Counting 4- and 5-Node Graphlets.
CoRR, 2015

A Feasible Graph Partition Framework for Random Walks Implemented by Parallel Computing in Big Graph.
CoRR, 2015

Input extraction via motion-sensor behavior analysis on smartphones.
Computers & Security, 2015

Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Energy management of cooperative microgrids with P2P energy sharing in distribution networks.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Probabilistic Inference on Integrity for Access Behavior Based Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On motion sensors as source for user input inference in smartphones.
Proceedings of the IEEE International Conference on Identity, 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Timbre identification of instrumental music via energy distribution modeling.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

A tale of three graphs: Sampling design on hybrid social-affiliation networks.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Touch-interaction behavior for continuous user authentication on smartphones.
Proceedings of the International Conference on Biometrics, 2015

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Coordination of wind power and flexible load through demand response options.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Local and global event-based optimization: Performace and complexity.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Multi-timescale optimization between distributed wind generators and electric vehicles in microgrid.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

EV charging load scheduling with high wind power penetration: A robust shortest path approach.
Proceedings of the American Control Conference, 2015

2014
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication.
IEEE Trans. Smart Grid, 2014

Efficiently Estimating Motif Statistics of Large Networks.
TKDD, 2014

A New Sketch Method for Measuring Host Connection Degree Distribution.
IEEE Trans. Information Forensics and Security, 2014

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Information Forensics and Security, 2014

Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Human-Machine Systems, 2014

A new connection degree calculation and measurement method for large scale network monitoring.
J. Network and Computer Applications, 2014

Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring.
TIIS, 2014

Building occupant level estimation based on heterogeneous information fusion.
Inf. Sci., 2014

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
CoRR, 2014

Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks.
CoRR, 2014

Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Computers & Security, 2014

Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks.
Computer Networks, 2014

Measuring and maximizing group closeness centrality over disk-resident graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Detecting community structure for undirected big graphs based on random walks.
Proceedings of the 23rd International World Wide Web Conference, 2014

Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

A Stochastic matching mechanism for wind generation dispatch and load shedding allocation in microgrid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

In-depth measurement and analysis on densification power law of software execution.
Proceedings of the 5th International Workshop on Emerging Trends in Software Metrics, 2014

Exploring the efficiency and mechanism of whistleblowing system on social networking site.
Proceedings of the IEEE International Conference on Communications, 2014

Network recorder and player: FPGA-based network traffic capture and replay.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

A new method to solve large-scale building energy management for energy saving.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Analysis of multi-location PEV charging behaviors based on trip chain generation.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

EV charging load scheduling following uncertain renewable energy supply by stochastic matching.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

A residential load scheduling approach based on load behavior analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Recursive estimation of selective catalyst reduction system parameters using modified Gauss-Newton method.
Proceedings of the American Control Conference, 2014

Centrality metrics of importance in access behaviors and malware detections.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Reconfiguring Networked Infrastructures by Adding Wireless Communication Capabilities to Selected Nodes.
IEEE Trans. Wireless Communications, 2013

Coordinated Multi-Microgrids Optimal Control Algorithm for Smart Distribution Management System.
IEEE Trans. Smart Grid, 2013

Electrical Load Tracking Analysis for Demand Response in Energy Intensive Enterprise.
IEEE Trans. Smart Grid, 2013

User Authentication Through Mouse Dynamics.
IEEE Trans. Information Forensics and Security, 2013

Smart Management of Multiple Energy Systems in Automotive Painting Shop.
IEEE Trans. Automation Science and Engineering, 2013

Web page and image semi-supervised classification with heterogeneous information fusion.
J. Information Science, 2013

Self-balancing dynamic scheduling of electrical energy for energy-intensive enterprises.
Int. J. Systems Science, 2013

Boosting regression methods based on a geometric conversion approach: Using SVMs base learners.
Neurocomputing, 2013

Multi-view semi-supervised web image classification via co-graph.
Neurocomputing, 2013

On optimisation of cluster-based sensor network tracking system.
IJAHUC, 2013

Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
CoRR, 2013

A Peep on the Interplays between Online Video Websites and Online Social Networks
CoRR, 2013

Sampling Content Distributed Over Graphs.
CoRR, 2013

Practical Characterization of Large Networks Using Neighborhood Information.
CoRR, 2013

Efficiently Estimating Subgraph Statistics of Large Networks in the Dark.
CoRR, 2013

Real-time volume control for interactive network traffic replay.
Computer Networks, 2013

Security risks evaluation toolbox for smart grid devices.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Maximizing topic propagation driven by multiple user nodes in micro-blogging.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A novel method to detect bad data injection attack in smart grid.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

A novel method to detect bad data injection attack in smart grid.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Sampling node pairs over large graphs.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

An in-depth measurement and analysis of popular private tracker systems in China.
Proceedings of IEEE International Conference on Communications, 2013

Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

Bad data detection method for smart grids based on distributed state estimation.
Proceedings of IEEE International Conference on Communications, 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

Supply demand coordination for building energy saving.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

A decentralized optimization method for energy saving of HVAC systems.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
Performance Analysis and Comparison on Energy Storage Devices for Smart Building Energy Management.
IEEE Trans. Smart Grid, 2012

Simulation-Based Policy Improvement for Energy Management in Commercial Office Buildings.
IEEE Trans. Smart Grid, 2012

Technical Challenges of the Smart Grid: From a Signal Processing Perspective [From the Guest Editors].
IEEE Signal Process. Mag., 2012

Modeling collective blogging dynamics of popular incidental topics.
Knowl. Inf. Syst., 2012

A systematic method for network topology reconfiguration with limited link additions.
J. Network and Computer Applications, 2012

Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition.
TIIS, 2012

A time-varying propagation model of hot topic on BBS sites and Blog networks.
Inf. Sci., 2012

CARR: a scalable solution for network packet classification.
Expert Systems, 2012

A layered classification for malicious function identification and malware detection.
Concurrency and Computation: Practice and Experience, 2012

Virtual indexing based methods for estimating node connection degrees.
Computer Networks, 2012

An Identity Authentication Mechanism Based on Timing Covert Channel.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Model-based real-time volume control for interactive network traffic replay.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Estimation of occupant distribution by detecting the entrance and leaving events of zones in building.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2012

Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network.
Proceedings of the 18th IEEE International Conference on Networks, 2012

On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Who are active? An in-depth measurement on user activity characteristics in sina microblogging.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Behavior spectrum: An effective method for user's web access behavior monitoring and measurement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Continuous authentication for mouse dynamics: A pattern-growth approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

Efficient topology optimization for a wired networked system by adding wireless communication.
Proceedings of the American Control Conference, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links.
IEEE Trans. Information Forensics and Security, 2011

Optimization Based Method for Supply Location Selection and Routing in Large-Scale Emergency Material Delivery.
IEEE Trans. Automation Science and Engineering, 2011

Optimal Cognitive Access of Markovian Channels under Tight Collision Constraints.
IEEE Journal on Selected Areas in Communications, 2011

Monitoring abnormal network traffic based on blind source separation approach.
J. Network and Computer Applications, 2011

Tracking a moving object via a sensor network with a partial information broadcasting scheme.
Inf. Sci., 2011

Automatically configuring the network layer of data centers for cloud computing.
IBM Journal of Research and Development, 2011

A New Method for Authentication Based on Covert Channel.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A Layered Detection Method for Malware Identification.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A new virtual indexing method for measuring host connection degrees.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Understanding User Generated Content Characteristics: A Hot-Event Perspective.
Proceedings of IEEE International Conference on Communications, 2011

Poster: can it be more practical?: improving mouse dynamics biometric performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Energy-Efficient Buildings Facilitated by Microgrid.
IEEE Trans. Smart Grid, 2010

Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring.
IEEE Trans. Information Forensics and Security, 2010

Efficient Simulation Method for General Assembly Systems With Material Handling Based on Aggregated Event-Scheduling.
IEEE Trans. Automation Science and Engineering, 2010

Long-Term Scheduling for Cascaded Hydro Energy Systems With Annual Water Consumption and Release Constraints.
IEEE Trans. Automation Science and Engineering, 2010

Optimization Based Production Planning With Hybrid Dynamics and Constraints.
IEEE Trans. Automat. Contr., 2010

An SVM-based machine learning method for accurate internet traffic classification.
Information Systems Frontiers, 2010

A novel mobility model based on semi-random circular movement in mobile ad hoc networks.
Inf. Sci., 2010

Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Prediction-Based Activation in WSN Tracking.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

Enhancing Web Page Classification via Local Co-training.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A hybrid algorithm for scheduling in job shop problem with flexible resources.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

A Novel IRC Botnet Detection Method Based on Packet Size Sequence.
Proceedings of IEEE International Conference on Communications, 2010

Optimal Cognitive Access of Markovian Channels under Tight Collision Constraints.
Proceedings of IEEE International Conference on Communications, 2010

Dynamic water resources planning with locational release and annual consumption constraints.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Estimation of occupancy level in indoor environment based on heterogeneous information fusion.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense.
IEEE Network, 2009

Fast intrusion detection based on a non-negative matrix factorization model.
J. Network and Computer Applications, 2009

Hybrid Nested Partitions algorithm for scheduling in job shop problem.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

On the performance of cognitive access with periodic spectrum sensing.
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009

A Video-Based Indoor Occupant Detection and Localization Algorithm for Smart Buildings.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.
Proceedings of IEEE International Conference on Communications, 2009

Monitoring Abnormal Traffic Flows Based on Independent Component Analysis.
Proceedings of IEEE International Conference on Communications, 2009

Propagation Modeling and Analysis of Incidental Topics in Blogosphere.
Proceedings of the Online Communities and Social Computing, 2009

A New Data Streaming Method for Locating Hosts with Large Connection Degree.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Tracking moving object via a sensor network with partial information broadcasting scheme.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

P2P Traffic Identification Based on the Signatures of Key Packets.
Proceedings of the IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2009

Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
An OVAL-based active vulnerability assessment system for enterprise computer networks.
Information Systems Frontiers, 2008

Processing of massive audit data streams for real-time anomaly intrusion detection.
Computer Communications, 2008

Reliable Transport with Memory Consideration in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Event-based optimization for dispatching policies in material handling systems of general assembly lines.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

Efficient simulation for serial production lines based on aggregated event-scheduling.
Proceedings of the 2008 IEEE International Conference on Automation Science and Engineering, 2008

2007
Energy-Efficient Sensing Coverage and Communication for Wireless Sensor Networks.
J. Systems Science & Complexity, 2007

Accurate Classification of the Internet Traffic Based on the SVM Method.
Proceedings of IEEE International Conference on Communications, 2007

Traffic Classification - Towards Accurate Real Time Network Applications.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

Optimal Supply Location Selection and Routing for Emergency Material Delivery.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007

2006
Constrained Ordinal Optimization - A Feasibility Model Based Approach.
Discrete Event Dynamic Systems, 2006

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Computers & Security, 2006

A virtual disk environment for providing file system recovery.
Computers & Security, 2006

An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Machine learning approach for determining feasible plans of a remanufacturing system.
IEEE Trans. Automation Science and Engineering, 2005

Percentage Coverage Configuration in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2004
Predicting the intrusion intentions by observing system call sequences.
Computers & Security, 2004

A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004

A New Gradient-Based Routing Protocol in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

2003
A rough set theory based method for anomaly intrusion detection in computer network systems.
Expert Systems, 2003

1999
Integrated Resource Scheduling and Bidding in the Deregulated Electric Power Market: New Challenges.
Discrete Event Dynamic Systems, 1999

Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1994
Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown.
Proceedings of the 1994 International Conference on Robotics and Automation, 1994


  Loading...