1 |
An Efficient Approximation of Betweenness Centrality for Uncertain Graphs
|
期刊论文 |
Wang Chenxu;Lin Ziyuan |
2 |
Fast Generating A Large Number of Gumbel-Max Variables
|
会议论文 |
Yiyan Qi;Pinghui Wang;Yuanming Zhang;Junzhou Zhao;Guangjian Tian;Xiaohong Guan |
3 |
Waving Gesture Analysis for User Authentication in the Mobile Environment
|
期刊论文 |
Shen Chao;Wang Zhao;Si Chengxiang;Chen Yufei;Su Xiaojie |
4 |
A Fast Sketch Method for Mining User Similarities over Fully Dynamic Graph Streams
|
会议论文 |
Jia Peng;Wang Pinghui;Tao Jing;Guan Xiaohong |
5 |
何梁何利科学与技术进步奖
|
奖励 |
管晓宏 |
6 |
A Cross-chain Gateway for Efficient Supply Chain Data Management
|
会议论文 |
Chenxu Wang;Xinxin Sang;Lang Gao |
7 |
融合静态与动态建模的网络事件聚合方法
|
期刊论文 |
张敏华;杜友田;王倩 |
8 |
Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference
|
期刊论文 |
Shen Chao;Chen Yufei;Liu Yao;Guan Xiaohong |
9 |
Towards Understanding the Instability of Network Embedding
|
期刊论文 |
Chenxu Wang;Wei Rao;Wenna Guo;Pinghui Wang;Jun Liu;Xiaohong Guan |
10 |
A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets
|
会议论文 |
Wang Pinghui;Qi Yiyan;Zhang Yuanming;Zhai Qiaozhu;Wang Chenxu;Lui John C. S.;Guan Xiaohong |
11 |
DIGGER: Detect Similar Groups in Heterogeneous Social Networks
|
期刊论文 |
Liu Xiaoming;Shen Chao;Guan Xiaohong;Zhou Yadong |
12 |
Slop: Towards An Efficient and Universal Streaming Log Parser
|
会议论文 |
赵志远;王晨旭;饶巍 |
13 |
Static Output Feedback Control of Switched Nonlinear Systems With Actuator Faults
|
期刊论文 |
Zhang Meng;Shi Peng;Shen Chao;Wu Zheng-Guang |
14 |
Learning edge weights in file co-occurrence graphs for malware detection
|
期刊论文 |
Mao Weixuan;Cai Zhongmin;Zeng Bo;Guan Xiaohong |
15 |
Detecting concurrency vulnerabilities based on partial orders of memory and thread events
|
会议论文 |
Kunpeng Yu;Chenxu Wang;Yan Cai;Xiapu Luo;Zijiang Yang |
16 |
Payment-Guard: Detecting fraudulent in-app purchases in iOS system
|
期刊论文 |
Yadong Zhou;Tianyi Yue;Xiaoming Liu;Lingling Tong;Zhihao Ding;Chao Shen |
17 |
Advertisement Extraction from Content Marketing Articles via Segment-Aware Sentence Classification
|
会议论文 |
Xiaoming Fan;Chenxu Wang |
18 |
Bidirectionally Densifying LSH Sketches with Empty Bins
|
会议论文 |
Jia Peng;Wang Pinghui;Zhao Junzhou;Zhang Shuo;Qi Yiyan;Hu Min;Deng Chao;Guan Xiaohong |
19 |
Learning to Check Contract Inconsistencies
|
会议论文 |
Zhang Shuo;Zhao Junzhou;Wang Pinghui;Xu Nuo;Yang Yang;Liu Yiting;Huang Yi;Feng Junlan |
20 |
Fast Rotation Kernel Density Estimation over Data Streams
|
会议论文 |
Lei Runze;Wang Pinghui;Li Rundong;Jia Peng;Zhao Junzhou;Guan Xiaohong;Deng Chao |
21 |
一种自动化生成用户隐私策略的方法及其装置、手持设备
|
专利 |
张鹏;谭宇超;王换招;胡成臣;陈佳星;沈植元 |
22 |
一种基于词嵌入的日志参数异常检测方法
|
专利 |
王换招;王肖晨;张鹏;单丹枫 |
23 |
Randomized Security Patrolling for Link Flooding Attack Detection
|
期刊论文 |
Ma Xiaobo;An Bo;Zhao Mengchen;Luo Xiapu;Xue Lei;Li Zhenhua;Miu Tony T. N.;Guan Xiaohong |
24 |
Streaming Algorithms for Estimating High Set Similarities in LogLog Space
|
期刊论文 |
Yiyan Qi;Pinghui Wang;Yuanming Zhang;Qiaozhu Zhai;Chenxu Wang;Guangjian Tian;John C.S. Lui;Xiaohong Guan |
25 |
Discriminative Streaming Network Embedding
|
期刊论文 |
Qi Yiyan;Cheng Jiefeng;Chen Xiaojun;Cheng Reynold;Bifet Albert;Wang Pinghui |
26 |
Toward Hand-Dominated Activity Recognition Systems With Wristband-Interaction Behavior Analysis
|
期刊论文 |
Chao Shen;Yufei Chen;Gengshan Yang;Xiaohong Guan |
27 |
非数值化特征的条件概率区域划分(CZT)编码方法
|
期刊论文 |
贺亮;徐正国;李赟;沈超 |
28 |
FOCES: Detecting Forwarding Anomalies in Software Defined Networks
|
会议论文 |
Peng Zhang;Shimin Xu;Zuoru Yang;Hao Li;Qi Li;Huanzhao Wang;Chengchen Hu |
29 |
Towards Understanding the Instability of Network Embedding
|
期刊论文 |
Chenxu Wang;Wei Rao;Wenna Guo;Pinghui Wang;Jun Liu;Xiaohong Guan |
30 |
Distinguish Confusing Law Articles for Legal Judgment Prediction
|
会议论文 |
Xu Nuo;Wang Pinghui;Chen Long;Pan Li;Wang Xiaoyan;Zhao Junzhou |
31 |
使用新预测模型的动态多目标优化算法
|
期刊论文 |
李智翔;李赟;贺亮;沈超 |
32 |
信息物理融合系统综合安全威胁与防御研究
|
期刊论文 |
刘烃;田决;王稼舟;吴宏宇;孙利民;周亚东;沈超;管晓宏 |
33 |
一种跨链网关交互系统和方法以及供应链数据管理方法
|
专利 |
王晨旭;高浪;管晓宏;陶敬;马小博;秦涛 |
34 |
Enhanced Hidden Moving Target Defense in Smart Grids
|
期刊论文 |
Tian Jue;Tan Rui;Guan Xiaohong;Liu Ting |
35 |
Coordinating the operations of smart buildings in smart grids
|
期刊论文 |
Liu Yang;Yu Nanpeng;Wang Wei;Guan Xiaohong;Xu Zhanbo;Dong Bing;Liu Ting |
36 |
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
|
期刊论文 |
Zhou Yadong;Chen Kaiyue;Zhang Junjie;Leng Junyuan;Tang Yazhe |
37 |
一种针对用户隐式反馈数据的集合排序音乐推荐方法
|
专利 |
王晨旭;杨煜;郭晨野;索凯强;管晓宏 |
38 |
一种动态时空事件预测方法及系统
|
专利 |
刘晓明;张占伟;吴少聪;张兆晗;沈超 |
39 |
一种基于网站流量日志数据与优化谱聚类算法的恶意爬虫检测方法
|
专利 |
周亚东;岳天一;刘晓明;沈超 |
40 |
一种SDN中采用多路搜索缩减规则依赖的缓存方法
|
专利 |
王换招;冯琳;张鹏;唐亚哲;李沛;梅凡 |
41 |
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids
|
期刊论文 |
Liu Yang;Liu Ting;Sun Hong;Zhang Kehuan;Liu Pengfei |
42 |
Improving network embedding with partially available vertex and edge content
|
期刊论文 |
Lan Lin;Wang Pinghui;Zhao Junzhou;Tao Jing;Lui John C. S.;Guan Xiaohong |
43 |
Accurately Estimating User Cardinalities and Detecting Super Spreaders over Time
|
期刊论文 |
Peng Jia;Pinghui Wang;Yuchao Zhang;Xiangliang Zhang;Jing Tao;Jianwei Ding;Xiaohong Guan;Don Towsley |
44 |
A Design of Reward Function in Multi-Target Trajectory Recovery with Deep Reinforcement Learning
|
会议论文 |
He Liang;Chu Yanjie;Shen Chao |
45 |
教育部霍英东青年教师奖一等奖
|
奖励 |
沈超 |
46 |
Modeling rumor propagation and mitigation across multiple social networks
|
期刊论文 |
Wang Chenxu;Wang Gaoshuai;Luo Xiapu;Li Hui |
47 |
A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management
|
期刊论文 |
Jiang Yiming;Wang Chenxu;Wang Yawei;Gao Lang |
48 |
麻省理工科技评论年度中国科技青年( MIT TR35)
|
奖励 |
沈超 |
49 |
Dissipative Filtering for Switched Fuzzy Systems With Missing Measurements
|
期刊论文 |
Zhang Meng;Shen Chao;Wu Zheng-Guang;Zhang Dan |
50 |
一种流式在线日志解析方法
|
专利 |
王晨旭;赵志远;饶巍;陶敬;马小博;秦涛 |
51 |
一种基于拓扑结构信息的大规模网络匹配方法
|
专利 |
王晨旭;王阳;赵志远;秦栋;管晓宏;秦涛;陶敬 |
52 |
Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Graph Streams
|
期刊论文 |
Junzhou Zhao;Pinghui Wang;Zhouguo Chen;Jianwei Ding;John CS Lui;Don Towsley;Xiaohong Guan |
53 |
一种基于图网络结构分析的软广检测和广告抽取方法
|
专利 |
王晨旭;梁潇 |
54 |
多源异构关系网络的群体发现方法、系统、设备及介质
|
专利 |
刘晓明;詹明威;简禧彦;沈超;周亚东 |
55 |
一种基于流属性的数据包路径编码的生成方法及系统
|
专利 |
张鹏;沈植元;张方政 |
56 |
We Know Who You Are: Discovering Similar Groups Across Multiple Social Networks
|
期刊论文 |
Xiaoming Liu;Chao Shen;Xiaohong Guan;Yadong Zhou |
57 |
Hand-Interactive Behavior Analysis for User Authentication Systems with Wrist-Worn Devices
|
会议论文 |
Chao Shen;Qi Lv;Zhao Wang;Yufei Chen;Xiaohong Guan |
58 |
Addressing the train–test gap on traffic classification combined subflow model with ensemble learning
|
期刊论文 |
Changyu Wang;Xiaohong Guan;Tao Qin;Pinghui Wang;Jing Tao;Yongwei Meng;Jingyuan Liu |
59 |
Hierarchical and overlapping social circle identification in ego networks based on link clustering
|
期刊论文 |
Wang Chenxu;Hao Chongxiao;Guan Xiaohong |
60 |
High-quality tweet generation for online behavior security management based on semantics measurement
|
期刊论文 |
Qin Tao;Wang Bo;Liu Zhaoli;Chen Zhouguo;Ding Jianwei |
61 |
An Integrated Method for Anomaly Detection From Massive System Logs
|
期刊论文 |
Liu Zhaoli;Qin Tao;Guan Xiaohong;Jiang Hezhi;Wang Chenxu |
62 |
A Co-Evolutionary Model for Inferring Online Social Network User Behaviors
|
会议论文 |
Xiaoming Liu;Chao Shen;Yingyue Fan;Xiaozi Liu;Yadong Zhou;Xiaohong Guan |
63 |
Heterogeneous Network Crawling: Reaching Target Nodes by Motif-Guided Navigation
|
期刊论文 |
Pinghui Wang;Xiaohong Guan;Changyu Wang;Kevin Chen-Chuan Chang;Tao Qin |
64 |
Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management
|
期刊论文 |
Liu Zhaoli;Guan Xiaohong;Li Shancang;Qin Tao;He Chao |
65 |
Measuring the Semantic Stability of Word Embedding
|
会议论文 |
Zhenhao Huang;Chenxu Wang |
66 |
Temporal Biased Streaming Submodular Optimization
|
期刊论文 |
Chao Deng;Junzhou Zhao;Pinghui Wang;Jing Tao |
67 |
一种歌单多标签推荐方法、系统、设备和存储介质
|
专利 |
王晨旭;郭晨野;杨煜;索凯强;管晓宏 |
68 |
基于结构洞理论的城市道路网电动汽车充电站部署方法
|
专利 |
王晨旭;尚莘纯;秦涛;陶敬;马小博;管晓宏 |
69 |
一种SDN中采用深度学习的消息异常检测方法
|
专利 |
王换招;许世民;张方政;王肖晨;张鹏 |
70 |
Credible seed identification for large-scale structural network alignment
|
期刊论文 |
Chenxu Wang;Yang Wang;Zhiyuan Zhao;Dong Qin;Xiapu Luo;Tao Qin |
71 |
Moving Target Defense Approach to Detecting Stuxnet-Like Attacks
|
期刊论文 |
Jue Tian;Rui Tan;Xiaohong Guan;Zhanbo Xu;Ting Liu |
72 |
Multi-source Interactive Behavior Analysis for Continuous User Authentication on Smartphones
|
会议论文 |
Liu Xiaozi;Shen Chao;Chen Yufei |
73 |
A Privacy-Preserving E-Commerce System Based on the Blockchain Technology
|
会议论文 |
Jiang Yiming;Wang Chenxu;Wang Yawei;Gao Lang |
74 |
CORA: Conflict Razor for Policies in SDN
|
会议论文 |
Hao Li;Kaiyue Chen;Tian Pan;Yadong Zhou;Kun Qian;Kai Zheng;Bin Liu;Peng Zhang;Yazhe Tang;Chengchen Hu |
75 |
Symmetry Degree Measurement and its Applications to Anomaly Detection
|
期刊论文 |
Qin Tao;Liu Zhaoli;Wang Pinghui;Li Shancang;Guan Xiaohong;Gao Lixin |
76 |
From big data to knowledge: A spatio-temporal approach to malware detection
|
期刊论文 |
Mao Weixuan;Cai Zhongmin;Yang Yuan;Shi Xiaohong;Guan Xiaohong |
77 |
Enhancing Content Marketing Article Detection With Graph Analysis
|
期刊论文 |
Liang Xiao;Wang Chenxu;Zhao Guoshuai |
78 |
Effectively Linking Persons on Cameras and Mobile Devices on Networks
|
期刊论文 |
Zeng Juxiang;Wang Pinghui;Zhao Qiqi;Pang Jianye;Tao Jing;Guan Xiaohong |
79 |
LogLog Filter: Filtering Cold Items within a Large Range over High Speed Data Streams
|
会议论文 |
Jia Peng;Wang Pinghui;Zhao Junzhou;Yuan Ye;Tao Jing;Guan Xiaohong |
80 |
Building Fast and Compact Sketches for Approximately Multi-Set Multi-Membership Querying
|
会议论文 |
Xiaofei Yang;Jia Di;Junzhou Zhao;Pinghui Wang;Kai Ye;Rundong Li;Jiongli Zhu |
81 |
采用策略分解和符号执行的有状态数据平面故障检测方法
|
专利 |
张鹏;胡刘郏;刘雨潇;吴慧 |
82 |
一种适用于海量数据的高速网络流量异常检测系统
|
专利 |
王平辉;贾鹏;孙飞扬;李润东;兰林;管晓宏;陶敬;韩婷 |
83 |
一种电子商务中基于区块链技术的隐私保护交易方法
|
专利 |
王晨旭;姜一鸣;秦栋;陶敬;秦涛;马小博;管晓宏 |
84 |
一种面向社交网络不规则短文本的粤语分词方法
|
专利 |
周亚东;高泱晗;边策;刘晓明;沈超;管晓宏 |
85 |
一种ego网络社交圈子识别方法
|
专利 |
王晨旭;郝崇孝;管晓宏 |