Yiguo Pu

According to our database1, Yiguo Pu authored at least 10 papers between 2011 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Towards misdirected email detection based on multi-attributes.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
Winnowing Double Structure for Wildcard Query in Payload Attribution.
Proceedings of the Information Security - 17th International Conference, 2014

CAS: Content Attribution System for Network Forensics.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Towards misdirected email detection for preventing information leakage.
Proceedings of the IEEE Symposium on Computers and Communications, 2014

Detecting Insider Threat Based on Document Access Behavior Analysis.
Proceedings of the Web Technologies and Applications, 2014

2013
Data Stolen Trojan Detection based on Network Behaviors.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A Continuous Re-Authentication Approach Using Ensemble Learning.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

2012
A Hierarchical Method for Clustering Binary Text Image.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Intent-Driven Masquerader Detection Framework Based on Data Fusion.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
A Hierarchical Algorithm for Document-Images Fast Matching.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011


  Loading...