Xiaohong Guan

According to our database1, Xiaohong Guan authored at least 277 papers between 1994 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2007, "For contributions to optimization of hydrothermal generation scheduling".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis.
IEEE Trans. Syst. Man Cybern. Syst., 2020

We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Moving Target Defense Approach to Detecting Stuxnet-Like Attacks.
IEEE Trans. Smart Grid, 2020

Symmetry Degree Measurement and its Applications to Anomaly Detection.
IEEE Trans. Inf. Forensics Secur., 2020

CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst., 2020

Pattern-Growth Based Mining Mouse-Interaction Behavior for an Active User Authentication System.
IEEE Trans. Dependable Secur. Comput., 2020

Randomized Security Patrolling for Link Flooding Attack Detection.
IEEE Trans. Dependable Secur. Comput., 2020

Fluctuation Reduction of Wind Power and Sizing of Battery Energy Storage Systems in Microgrids.
IEEE Trans Autom. Sci. Eng., 2020

Multi-Timescale Decision and Optimization for HVAC Control Systems With Consistency Goals.
IEEE Trans Autom. Sci. Eng., 2020

Online Decentralized and Cooperative Dispatch for Multi-Microgrids.
IEEE Trans Autom. Sci. Eng., 2020

A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model.
Mob. Networks Appl., 2020

Addressing the train-test gap on traffic classification combined subflow model with ensemble learning.
Knowl. Based Syst., 2020

Improving network embedding with partially available vertex and edge content.
Inf. Sci., 2020

Hierarchical and overlapping social circle identification in ego networks based on link clustering.
Neurocomputing, 2020

Passive browser identification with multi-scale Convolutional Neural Networks.
Neurocomputing, 2020

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
CoRR, 2020

Deep Reinforcement Learning for Smart Building Energy Management: A Survey.
CoRR, 2020

Node Classification on Graphs with Few-Shot Novel Labels via Meta Transformed Network Embedding.
CoRR, 2020

Data Based Linearization: Least-Squares Based Approximation.
CoRR, 2020

Multi-Agent Deep Reinforcement Learning for HVAC Control in Commercial Buildings.
CoRR, 2020

Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach.
CoRR, 2020

Fast Generating A Large Number of Gumbel-Max Variables.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Harmonics Based Representation in Clarinet Tone Quality Evaluation.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Adversarial Example Detection by Classification for Deep Speech Recognition.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Enhanced Hidden Moving Target Defense in Smart Grids.
IEEE Trans. Smart Grid, 2019

Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams.
IEEE Trans. Parallel Distrib. Syst., 2019

Detecting a Variety of Long-Term Stealthy User Behaviors on High Speed Links.
IEEE Trans. Knowl. Data Eng., 2019

Digger: Detect Similar Groups in Heterogeneous Social Networks.
ACM Trans. Knowl. Discov. Data, 2019

Decentralized EV-Based Charging Optimization With Building Integrated Wind Energy.
IEEE Trans Autom. Sci. Eng., 2019

SNOD: a fast sampling method of exploring node orbit degrees for large graphs.
Knowl. Inf. Syst., 2019

Practical characterization of large networks using neighborhood information.
Knowl. Inf. Syst., 2019

Fast crawling methods of exploring content distributed over large graphs.
Knowl. Inf. Syst., 2019

Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019

Effectively Linking Persons on Cameras and Mobile Devices on Networks.
IEEE Internet Comput., 2019

Sampling online social networks by random walk with indirect jumps.
Data Min. Knowl. Discov., 2019

Learning edge weights in file co-occurrence graphs for malware detection.
Data Min. Knowl. Discov., 2019

A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Meta Reinforcement Learning with Task Embedding and Shared Policy.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities Over Time.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

REPT: A Streaming Algorithm of Approximating Global and Local Triangle Counts in Parallel.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

A Fast Sketch Method for Mining User Similarities Over Fully Dynamic Graph Streams.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

Optimal Coordination of EVs and HVAC Systems with Uncertain Renewable Supply.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

Simulation-based Sensor Allocation for Dynamic Environment Estimation in Cyber-Physical Building System.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

2018
Distributed Coordination of EV Charging With Renewable Energy in a Microgrid of Buildings.
IEEE Trans. Smart Grid, 2018

Robust Scheduling of EV Charging Load With Uncertain Wind Power Integration.
IEEE Trans. Smart Grid, 2018

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Networks Learn. Syst., 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Event-Based HVAC Control - A Complexity-Based Approach.
IEEE Trans Autom. Sci. Eng., 2018

Toward capturing heterogeneity for inferring diffusion networks: A mixed diffusion pattern model.
Knowl. Based Syst., 2018

A fast multi-level algorithm for community detection in directed online social networks.
J. Inf. Sci., 2018

Predicting attributes and friends of mobile users from AP-Trajectories.
Inf. Sci., 2018

Performance evaluation of implicit smartphones authentication via sensor-behavior analysis.
Inf. Sci., 2018

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance.
IEEE Intell. Syst., 2018

From big data to knowledge: A spatio-temporal approach to malware detection.
Comput. Secur., 2018

Cyber-physical model for efficient and secured operation of CPES or energy Internet.
Sci. China Inf. Sci., 2018

An Integrated Method for Anomaly Detection From Massive System Logs.
IEEE Access, 2018

Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management.
IEEE Access, 2018

A Co-Evolutionary Model for Inferring Online Social Network User Behaviors.
Proceedings of the 2018 International Conference on Security, 2018

Mining Long-Term Stealthy User Behaviors on High Speed Links.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Can We Learn what People are Doing from Raw DNS Queries?
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Regression Model of Wet-Bulb Temperature in an HVAC System.
Proceedings of the Advancements in Smart City and Intelligent Building, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Fast Nonconvex SDP Solver for Large-Scale Power System State Estimation.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

Fluctuation Reduction of Wind Power with Battery Energy Storage Systems.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

A Multi-layered Distributed Cloud Network for Cyber-Physical Energy System.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

Energy Consumption Optimization in Two-Machine Bernoulli Serial Lines.
Proceedings of the 14th IEEE International Conference on Automation Science and Engineering, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

A Multi-Timescale and Bilevel Coordination Approach for Matching Uncertain Wind Supply With EV Charging Demand.
IEEE Trans Autom. Sci. Eng., 2017

Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage.
Proc. VLDB Endow., 2017

A feasible graph partition framework for parallel computing of big graph.
Knowl. Based Syst., 2017

Modelling multi-topic information propagation in online social networks based on resource competition.
J. Inf. Sci., 2017

I/O-efficient calculation of H-group closeness centrality over disk-resident graphs.
Inf. Sci., 2017

AL-bitmap: Monitoring network traffic activity graphs on high speed links.
Inf. Sci., 2017

Mining repeating pattern in packet arrivals: Metrics, models, and applications.
Inf. Sci., 2017

Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Multigraph Streams.
CoRR, 2017

Towards Efficient Node Discoverability Optimization on Large Networks.
CoRR, 2017

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance.
CoRR, 2017

Security importance assessment for system objects and malware detection.
Comput. Secur., 2017

Butler, Not Servant: A Human-Centric Smart Home Energy Management System.
IEEE Commun. Mag., 2017

A bi-level optimization for an HVAC system.
Cluster Computing, 2017

Inferring Demographics and Social Networks of Mobile Device Users on Campus From AP-Trajectories.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

A traffic classification approach based on characteristics of subflows and ensemble learning.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Hidden Moving Target Defense in Smart Grids.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Stochastic coordination of aggregated electric vehicle charging with on-site wind power at multiple buildings.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Parameters analysis of hierarchical evolutionary method with an application of HVAC system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Transmission capacity margin assessment in power systems with uncertain wind integration.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Realizability guaranteed multi-timescale optimization decision for home energy management.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Evaluation of frequency regulation provision by commercial building HVAC systems.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Optimization of sensor location for improving wind power prediction accuracy.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Big-data analysis of multi-source logs for anomaly detection on network-based system.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Integrated Energy Exchange Scheduling for Multimicrogrid System With Electric Vehicles.
IEEE Trans. Smart Grid, 2016

Incorporating Price-Responsive Demand in Energy Scheduling Based on Consumer Payment Minimization.
IEEE Trans. Smart Grid, 2016

Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2016

MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System.
IEEE Trans. Hum. Mach. Syst., 2016

Optimal Control of Multiroom HVAC System: An Event-Based Approach.
IEEE Trans. Control. Syst. Technol., 2016

Performance Analysis of Motion-Sensor Behavior for User Authentication on Smartphones.
Sensors, 2016

Estimating user behavior toward detecting anomalous ratings in rating systems.
Knowl. Based Syst., 2016

MIRACLE: A multiple independent random walks community parallel detection algorithm for big graphs.
J. Netw. Comput. Appl., 2016

Modeling heterogeneous and correlated human dynamics of online activities with double Pareto distributions.
Inf. Sci., 2016

A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs.
CoRR, 2016

User practice in password security: An empirical study of real-life passwords in the wild.
Comput. Secur., 2016

Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Modeling multimodal biometric modalities for continuous user authentication.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Rethinking the Design of OpenFlow Switch Counters.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Taming the Flow Table Overflow in OpenFlow Switch.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

A new model for nickname detection based on network structure and similarity propagation.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Improving the prediction accuracy of building energy consumption using location of occupant - A case study.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

A decentralized ordinal optimization for energy saving of an HVAC system.
Proceedings of the 2016 American Control Conference, 2016

Coordinating EV charging demand with wind supply in a bi-level energy dispatch framework.
Proceedings of the 2016 American Control Conference, 2016

2015
Matching EV Charging Load With Uncertain Wind: A Simulation-Based Policy Improvement Approach.
IEEE Trans. Smart Grid, 2015

Unbiased Characterization of Node Pairs over Large Graphs.
ACM Trans. Knowl. Discov. Data, 2015

Supply Demand Coordination for Building Energy Saving: Explore the Soft Comfort.
IEEE Trans Autom. Sci. Eng., 2015

A Decentralized Stay-Time Based Occupant Distribution Estimation Method for Buildings.
IEEE Trans Autom. Sci. Eng., 2015

MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring.
IEEE Syst. J., 2015

Calling Network: A New Method for Modeling Software Runtime Behaviors.
ACM SIGSOFT Softw. Eng. Notes, 2015

Analysis of user's behavior and resource characteristics for private trackers.
Peer Peer Netw. Appl., 2015

Robust application identification methods for P2P and VoIP traffic classification in backbone networks.
Knowl. Based Syst., 2015

Exploring community structure of software Call Graph and its applications in class cohesion measurement.
J. Syst. Softw., 2015

Accurate DNS query characteristics estimation via active probing.
J. Netw. Comput. Appl., 2015

Moss: A Scalable Tool for Efficiently Sampling and Counting 4- and 5-Node Graphlets.
CoRR, 2015

A Feasible Graph Partition Framework for Random Walks Implemented by Parallel Computing in Big Graph.
CoRR, 2015

Input extraction via motion-sensor behavior analysis on smartphones.
Comput. Secur., 2015

Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Energy management of cooperative microgrids with P2P energy sharing in distribution networks.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Probabilistic Inference on Integrity for Access Behavior Based Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On motion sensors as source for user input inference in smartphones.
Proceedings of the IEEE International Conference on Identity, 2015

Modeling repeating behaviors in packet arrivals: Detection and measurement.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Timbre identification of instrumental music via energy distribution modeling.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

A tale of three graphs: Sampling design on hybrid social-affiliation networks.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Touch-interaction behavior for continuous user authentication on smartphones.
Proceedings of the International Conference on Biometrics, 2015

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Coordination of wind power and flexible load through demand response options.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Local and global event-based optimization: Performace and complexity.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Multi-timescale optimization between distributed wind generators and electric vehicles in microgrid.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

EV charging load scheduling with high wind power penetration: A robust shortest path approach.
Proceedings of the American Control Conference, 2015

2014
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication.
IEEE Trans. Smart Grid, 2014

Efficiently Estimating Motif Statistics of Large Networks.
ACM Trans. Knowl. Discov. Data, 2014

A New Sketch Method for Measuring Host Connection Degree Distribution.
IEEE Trans. Inf. Forensics Secur., 2014

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints.
IEEE Trans. Inf. Forensics Secur., 2014

Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach.
IEEE Trans. Hum. Mach. Syst., 2014

A new connection degree calculation and measurement method for large scale network monitoring.
J. Netw. Comput. Appl., 2014

Exploring Flow Characteristics in IPv6: A Comparative Measurement Study with IPv4 for Traffic Monitoring.
KSII Trans. Internet Inf. Syst., 2014

Building occupant level estimation based on heterogeneous information fusion.
Inf. Sci., 2014

Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks.
CoRR, 2014

Performance evaluation of anomaly-detection algorithms for mouse dynamics.
Comput. Secur., 2014

Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks.
Comput. Networks, 2014

Measuring and maximizing group closeness centrality over disk-resident graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Detecting community structure for undirected big graphs based on random walks.
Proceedings of the 23rd International World Wide Web Conference, 2014

Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

A Stochastic matching mechanism for wind generation dispatch and load shedding allocation in microgrid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

In-depth measurement and analysis on densification power law of software execution.
Proceedings of the 5th International Workshop on Emerging Trends in Software Metrics, 2014

Exploring the efficiency and mechanism of whistleblowing system on social networking site.
Proceedings of the IEEE International Conference on Communications, 2014

Network recorder and player: FPGA-based network traffic capture and replay.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

A new method to solve large-scale building energy management for energy saving.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Analysis of multi-location PEV charging behaviors based on trip chain generation.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

EV charging load scheduling following uncertain renewable energy supply by stochastic matching.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

A residential load scheduling approach based on load behavior analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Recursive estimation of selective catalyst reduction system parameters using modified Gauss-Newton method.
Proceedings of the American Control Conference, 2014

Centrality metrics of importance in access behaviors and malware detections.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Reconfiguring Networked Infrastructures by Adding Wireless Communication Capabilities to Selected Nodes.
IEEE Trans. Wirel. Commun., 2013

Coordinated Multi-Microgrids Optimal Control Algorithm for Smart Distribution Management System.
IEEE Trans. Smart Grid, 2013

Electrical Load Tracking Analysis for Demand Response in Energy Intensive Enterprise.
IEEE Trans. Smart Grid, 2013

User Authentication Through Mouse Dynamics.
IEEE Trans. Inf. Forensics Secur., 2013

Smart Management of Multiple Energy Systems in Automotive Painting Shop.
IEEE Trans Autom. Sci. Eng., 2013

Web page and image semi-supervised classification with heterogeneous information fusion.
J. Inf. Sci., 2013

Self-balancing dynamic scheduling of electrical energy for energy-intensive enterprises.
Int. J. Syst. Sci., 2013

Boosting regression methods based on a geometric conversion approach: Using SVMs base learners.
Neurocomputing, 2013

Multi-view semi-supervised web image classification via co-graph.
Neurocomputing, 2013

On optimisation of cluster-based sensor network tracking system.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
CoRR, 2013

A Peep on the Interplays between Online Video Websites and Online Social Networks
CoRR, 2013

Sampling Content Distributed Over Graphs.
CoRR, 2013

Efficiently Estimating Subgraph Statistics of Large Networks in the Dark.
CoRR, 2013

Real-time volume control for interactive network traffic replay.
Comput. Networks, 2013

Security risks evaluation toolbox for smart grid devices.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Maximizing topic propagation driven by multiple user nodes in micro-blogging.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

On User Interaction Behavior as Evidence for Computer Forensic Analysis.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A novel method to detect bad data injection attack in smart grid.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

Online strategy for scheduling a hydroelectric station during flood season.
Proceedings of the IEEE International Conference on Information and Automation, 2013

Sampling node pairs over large graphs.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

An in-depth measurement and analysis of popular private tracker systems in China.
Proceedings of IEEE International Conference on Communications, 2013

Boosting practicality of DNS cache probing: A general estimator based on Bayesian forecasting.
Proceedings of IEEE International Conference on Communications, 2013

Bad data detection method for smart grids based on distributed state estimation.
Proceedings of IEEE International Conference on Communications, 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

Supply demand coordination for building energy saving.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

A decentralized optimization method for energy saving of HVAC systems.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
Performance Analysis and Comparison on Energy Storage Devices for Smart Building Energy Management.
IEEE Trans. Smart Grid, 2012

Simulation-Based Policy Improvement for Energy Management in Commercial Office Buildings.
IEEE Trans. Smart Grid, 2012

Technical Challenges of the Smart Grid: From a Signal Processing Perspective [From the Guest Editors].
IEEE Signal Process. Mag., 2012

Modeling collective blogging dynamics of popular incidental topics.
Knowl. Inf. Syst., 2012

A systematic method for network topology reconfiguration with limited link additions.
J. Netw. Comput. Appl., 2012

Enhancing the Robustness and Efficiency of Scale-free Network with Limited Link Addition.
KSII Trans. Internet Inf. Syst., 2012

A time-varying propagation model of hot topic on BBS sites and Blog networks.
Inf. Sci., 2012

CARR: a scalable solution for network packet classification.
Expert Syst. J. Knowl. Eng., 2012

A layered classification for malicious function identification and malware detection.
Concurr. Comput. Pract. Exp., 2012

Virtual indexing based methods for estimating node connection degrees.
Comput. Networks, 2012

An Identity Authentication Mechanism Based on Timing Covert Channel.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Model-based real-time volume control for interactive network traffic replay.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Estimation of occupant distribution by detecting the entrance and leaving events of zones in building.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2012

Empirical analysis and comparison of IPv4-IPv6 traffic: A case study on the campus network.
Proceedings of the 18th IEEE International Conference on Networks, 2012

On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study.
Proceedings of the 5th IAPR International Conference on Biometrics, 2012

Who are active? An in-depth measurement on user activity characteristics in sina microblogging.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Behavior spectrum: An effective method for user's web access behavior monitoring and measurement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Towards active measurement for DNS query behavior of botnets.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Continuous authentication for mouse dynamics: A pattern-growth approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

Efficient topology optimization for a wired networked system by adding wireless communication.
Proceedings of the American Control Conference, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links.
IEEE Trans. Inf. Forensics Secur., 2011

Optimization Based Method for Supply Location Selection and Routing in Large-Scale Emergency Material Delivery.
IEEE Trans Autom. Sci. Eng., 2011

Optimal Cognitive Access of Markovian Channels under Tight Collision Constraints.
IEEE J. Sel. Areas Commun., 2011

Monitoring abnormal network traffic based on blind source separation approach.
J. Netw. Comput. Appl., 2011

Tracking a moving object via a sensor network with a partial information broadcasting scheme.
Inf. Sci., 2011

Automatically configuring the network layer of data centers for cloud computing.
IBM J. Res. Dev., 2011

A New Method for Authentication Based on Covert Channel.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A Layered Detection Method for Malware Identification.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A new virtual indexing method for measuring host connection degrees.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Understanding User Generated Content Characteristics: A Hot-Event Perspective.
Proceedings of IEEE International Conference on Communications, 2011

Poster: can it be more practical?: improving mouse dynamics biometric performance.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Energy-Efficient Buildings Facilitated by Microgrid.
IEEE Trans. Smart Grid, 2010

Dynamic Feature Analysis and Measurement for Large-Scale Network Traffic Monitoring.
IEEE Trans. Inf. Forensics Secur., 2010

Efficient Simulation Method for General Assembly Systems With Material Handling Based on Aggregated Event-Scheduling.
IEEE Trans Autom. Sci. Eng., 2010

Long-Term Scheduling for Cascaded Hydro Energy Systems With Annual Water Consumption and Release Constraints.
IEEE Trans Autom. Sci. Eng., 2010

Optimization Based Production Planning With Hybrid Dynamics and Constraints.
IEEE Trans. Autom. Control., 2010

Group dynamics in discussing incidental topics over online social networks.
IEEE Netw., 2010

An SVM-based machine learning method for accurate internet traffic classification.
Inf. Syst. Frontiers, 2010

A novel mobility model based on semi-random circular movement in mobile ad hoc networks.
Inf. Sci., 2010

Sensing and Communication Tradeoff for Cognitive Access of Continues-Time Markov Channels.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Prediction-Based Activation in WSN Tracking.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

Enhancing Web Page Classification via Local Co-training.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A hybrid algorithm for scheduling in job shop problem with flexible resources.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

A Novel IRC Botnet Detection Method Based on Packet Size Sequence.
Proceedings of IEEE International Conference on Communications, 2010

Balance Based Performance Enhancement for Interactive TCP Traffic Replay.
Proceedings of IEEE International Conference on Communications, 2010

Dynamic water resources planning with locational release and annual consumption constraints.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Estimation of occupancy level in indoor environment based on heterogeneous information fusion.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense.
IEEE Netw., 2009

Fast intrusion detection based on a non-negative matrix factorization model.
J. Netw. Comput. Appl., 2009

Hybrid Nested Partitions algorithm for scheduling in job shop problem.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

On the performance of cognitive access with periodic spectrum sensing.
Proceedings of the 2009 ACM Workshop on Cognitive Radio Networks, CoRoNet 2009, Beijing, 2009

A Video-Based Indoor Occupant Detection and Localization Algorithm for Smart Buildings.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring.
Proceedings of IEEE International Conference on Communications, 2009

Monitoring Abnormal Traffic Flows Based on Independent Component Analysis.
Proceedings of IEEE International Conference on Communications, 2009

Propagation Modeling and Analysis of Incidental Topics in Blogosphere.
Proceedings of the Online Communities and Social Computing, 2009

A New Data Streaming Method for Locating Hosts with Large Connection Degree.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Prototype Demonstration: Trojan Detection and Defense System.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

P2P Traffic Identification Based on the Signatures of Key Packets.
Proceedings of the IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2009

Users' Behavior Character Analysis and Classification Approaches in Enterprise Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
An OVAL-based active vulnerability assessment system for enterprise computer networks.
Inf. Syst. Frontiers, 2008

Processing of massive audit data streams for real-time anomaly intrusion detection.
Comput. Commun., 2008

Reliable Transport with Memory Consideration in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Event-based optimization for dispatching policies in material handling systems of general assembly lines.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

Efficient simulation for serial production lines based on aggregated event-scheduling.
Proceedings of the 2008 IEEE International Conference on Automation Science and Engineering, 2008

2007
Energy-Efficient Sensing Coverage and Communication for Wireless Sensor Networks.
J. Syst. Sci. Complex., 2007

Accurate Classification of the Internet Traffic Based on the SVM Method.
Proceedings of IEEE International Conference on Communications, 2007

Traffic Classification - Towards Accurate Real Time Network Applications.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

Optimal Supply Location Selection and Routing for Emergency Material Delivery.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007

2006
Constrained Ordinal Optimization - A Feasibility Model Based Approach.
Discret. Event Dyn. Syst., 2006

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Comput. Secur., 2006

A virtual disk environment for providing file system recovery.
Comput. Secur., 2006

An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Machine learning approach for determining feasible plans of a remanufacturing system.
IEEE Trans Autom. Sci. Eng., 2005

Percentage Coverage Configuration in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2004
Predicting the intrusion intentions by observing system call sequences.
Comput. Secur., 2004

A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004

A New Gradient-Based Routing Protocol in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, First International Conference, 2004

2003
A rough set theory based method for anomaly intrusion detection in computer network systems.
Expert Syst. J. Knowl. Eng., 2003

1999
Integrated Resource Scheduling and Bidding in the Deregulated Electric Power Market: New Challenges.
Discret. Event Dyn. Syst., 1999

Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1994
Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown.
Proceedings of the 1994 International Conference on Robotics and Automation, 1994


  Loading...