Zimu Li

Orcid: 0000-0003-1473-6492

According to our database1, Zimu Li authored at least 37 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024

4.4 A Highly-Integrated 6-Phase Cell-Reused Digital Transmitter Using 1/3 Duty-Cycle LO Signals for Harmonic Rejection.
Proceedings of the IEEE International Solid-State Circuits Conference, 2024

2023
Three-stage training and orthogonality regularization for spoken language recognition.
EURASIP J. Audio Speech Music. Process., December, 2023

Transformers are efficient hierarchical chemical graph learners.
CoRR, 2023

R-Mixup: Riemannian Mixup for Biological Networks.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

2022
Towards a variational Jordan-Lee-Preskill quantum algorithm.
Mach. Learn. Sci. Technol., December, 2022

Capturing the crack process of the Antarctic A74 iceberg with Sentinel-1 based offset tracking and radar interferometry techniques.
Int. J. Digit. Earth, 2022

Group-Equivariant Neural Networks with Fusion Diagrams.
CoRR, 2022

On the Super-exponential Quantum Speedup of Equivariant Quantum Machine Learning Algorithms with SU(d) Symmetry.
CoRR, 2022

A DDPG-based Transfer Learning Optimization Framework for User Association and Power Control in HetNet.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022

2021
A hybrid GEP and WOA approach to estimate the optimal penetration rate of TBM in granitic rock mass.
Soft Comput., 2021

Speeding up Learning Quantum States through Group Equivariant Convolutional Quantum Ans{ä}tze.
CoRR, 2021

A General DRL-based Optimization Framework of User Association and Power Control for HetNet.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

Unsupervised IoT Fingerprinting Method via Variational Auto-encoder and K-means.
Proceedings of the ICC 2021, 2021

MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2019
A dual CNN-RNN for multiple people tracking.
Neurocomputing, 2019

ALEAP: Attention-based LSTM with Event Embedding for Attack Projection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Purchasing Behavior Analysis Based on Customer's Data Portrait Model.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Fuzzy c-means clustering-based mating restriction for multiobjective optimization.
Int. J. Mach. Learn. Cybern., 2018

Occlusion Handling in Tracking Multiple People Using RNN.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

2017
CEFF: An efficient approach for traffic anomaly detection and classification.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Characterizing and Improving WiFi Latency in Large-Scale Operational Networks.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Understanding the Impact of AP Density on WiFi Performance Through Real-World Deployment.
Proceedings of the IEEE International Symposium on Local and Metropolitan Area Networks, 2016

Your trajectory privacy can be breached even if you walk in groups.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2015
TADOOP: Mining Network Traffic Anomalies with Hadoop.
Proceedings of the Security and Privacy in Communication Networks, 2015

Mining network traffic anomaly based on adjustable piecewise entropy.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Adjustable Piecewise Entropy for network traffic anomaly detection.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

How bad are the rogues' impact on enterprise 802.11 network performance?
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2012
Assessing the vulnerability of network topologies under large-scale regional failures.
J. Commun. Networks, 2012

2011
Evaluation of Topological Vulnerability of the Internet under Regional Failures.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2009
Security and Reliability Design of Olympic Games Network.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2006
Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

P3Cast: A hybrid VoD streaming architecture of proxy with caching, patching, and peering for large-scale deployment.
Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks, 2006

2004
Segment-Based Adaptive Caching for Streaming Media Delivery on the Internet.
Proceedings of the Web Content Caching and Distribution: 9th International Workshop, 2004

An Adaptive Batched Patch Caching Scheme for Multimedia Streaming.
Proceedings of the Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, 2004

Suffix Caching Techniques of Streaming Media Based On Batch Patching.
Proceedings of the 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 2004


  Loading...