dblp.uni-trier.dewww.uni-trier.de

Xiaohong Guan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
19EEXiaohong Guan, Wei Wang, Xiangliang Zhang: Fast intrusion detection based on a non-negative matrix factorization model. J. Network and Computer Applications 32(1): 31-44 (2009)
2008
18EEHongchao Zhou, Xiaohong Guan, Chengjie Wu: Reliable Transport with Memory Consideration in Wireless Sensor Networks. ICC 2008: 2819-2824
17EEWei Wang, Xiaohong Guan, Xiangliang Zhang: Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications 31(1): 58-72 (2008)
16EEXiuzhen Chen, Qinghua Zheng, Xiaohong Guan: An OVAL-based active vulnerability assessment system for enterprise computer networks. Information Systems Frontiers 10(5): 573-588 (2008)
2007
15EEZhu Li, Ruixi Yuan, Xiaohong Guan: Traffic Classification - Towards Accurate Real Time Network Applications. HCI (4) 2007: 67-76
14EEZhu Li, Ruixi Yuan, Xiaohong Guan: Accurate Classification of the Internet Traffic Based on the SVM Method. ICC 2007: 1373-1378
2006
13EEHongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan: Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks. CIT 2006: 221
12EEShiji Song, Guocheng Li, Xiaohong Guan: Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset. ISNN (1) 2006: 350-358
11EEQindong Sun, Xinbo Huang, Xiaohong Guan, Peng Gao: An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification. ISNN (2) 2006: 346-351
10EEWei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang: Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Computers & Security 25(7): 539-550 (2006)
9EEJinqian Liang, Xiaohong Guan: A virtual disk environment for providing file system recovery. Computers & Security 25(8): 589-599 (2006)
8EEXiaohong Guan, Chen Song, Yu-Chi Ho, Qianchuan Zhao: Constrained Ordinal Optimization - A Feasibility Model Based Approach. Discrete Event Dynamic Systems 16(2): 279-299 (2006)
2005
7EEHongxing Bai, Xi Chen, Yu-Chi Ho, Xiaohong Guan: Percentage Coverage Configuration in Wireless Sensor Networks. ISPA 2005: 780-791
2004
6EELi Xia, Xi Chen, Xiaohong Guan: A New Gradient-Based Routing Protocol in Wireless Sensor Networks. ICESS 2004: 318-325
5EEYongcai Wang, Dianfei Han, Qianchuan Zhao, Xiaohong Guan, Da-Zhong Zheng: Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks. ICESS 2004: 333-338
4EEWei Wang, Xiaohong Guan, Xiangliang Zhang: A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. ISNN (2) 2004: 657-662
3EELi Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Peini Liu: Predicting the intrusion intentions by observing system call sequences. Computers & Security 23(3): 241-252 (2004)
1999
2EEXiaohong Guan, Feng Gao, Alva J. Svoboda: Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market. HICSS 1999
1994
1 Yong Li, Peter B. Luh, Xiaohong Guan: Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown. ICRA 1994: 3447-3452

Coauthor Index

1Hongxing Bai [7] [13]
2Xi Chen [6] [7] [13]
3Xiuzhen Chen [16]
4Li Feng [3]
5Feng Gao [2]
6Peng Gao [11]
7Yan Gao [3]
8Sangang Guo [3]
9Dianfei Han [5]
10Yu-Chi Ho [7] [8] [13]
11Xinbo Huang [11]
12Guocheng Li [12]
13Yong Li [1]
14Zhu Li [14] [15]
15Jinqian Liang [9]
16Peini Liu [3]
17Peter B. Luh [1]
18Chen Song [8]
19Shiji Song [12]
20Qindong Sun [11]
21Alva J. Svoboda [2]
22Wei Wang [4] [10] [17] [19]
23Yongcai Wang [5]
24Chengjie Wu [18]
25Li Xia [6]
26Liwei Yang [10]
27Ruixi Yuan [14] [15]
28Xiangliang Zhang [4] [10] [17] [19]
29Qianchuan Zhao [5] [8]
30Da-Zhong Zheng [5]
31Qinghua Zheng [16]
32Hongchao Zhou [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)