2009 |
19 | EE | Xiaohong Guan,
Wei Wang,
Xiangliang Zhang:
Fast intrusion detection based on a non-negative matrix factorization model.
J. Network and Computer Applications 32(1): 31-44 (2009) |
2008 |
18 | EE | Hongchao Zhou,
Xiaohong Guan,
Chengjie Wu:
Reliable Transport with Memory Consideration in Wireless Sensor Networks.
ICC 2008: 2819-2824 |
17 | EE | Wei Wang,
Xiaohong Guan,
Xiangliang Zhang:
Processing of massive audit data streams for real-time anomaly intrusion detection.
Computer Communications 31(1): 58-72 (2008) |
16 | EE | Xiuzhen Chen,
Qinghua Zheng,
Xiaohong Guan:
An OVAL-based active vulnerability assessment system for enterprise computer networks.
Information Systems Frontiers 10(5): 573-588 (2008) |
2007 |
15 | EE | Zhu Li,
Ruixi Yuan,
Xiaohong Guan:
Traffic Classification - Towards Accurate Real Time Network Applications.
HCI (4) 2007: 67-76 |
14 | EE | Zhu Li,
Ruixi Yuan,
Xiaohong Guan:
Accurate Classification of the Internet Traffic Based on the SVM Method.
ICC 2007: 1373-1378 |
2006 |
13 | EE | Hongxing Bai,
Xi Chen,
Yu-Chi Ho,
Xiaohong Guan:
Information Coverage Configuration with Energy Preservation in Large Scale Wireless Sensor Networks.
CIT 2006: 221 |
12 | EE | Shiji Song,
Guocheng Li,
Xiaohong Guan:
Differential Inclusions-Based Neural Networks for Nonsmooth Convex Optimization on a Closed Convex Subset.
ISNN (1) 2006: 350-358 |
11 | EE | Qindong Sun,
Xinbo Huang,
Xiaohong Guan,
Peng Gao:
An Erotic Image Recognition Algorithm Based on Trunk Model and SVM Classification.
ISNN (2) 2006: 346-351 |
10 | EE | Wei Wang,
Xiaohong Guan,
Xiangliang Zhang,
Liwei Yang:
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Computers & Security 25(7): 539-550 (2006) |
9 | EE | Jinqian Liang,
Xiaohong Guan:
A virtual disk environment for providing file system recovery.
Computers & Security 25(8): 589-599 (2006) |
8 | EE | Xiaohong Guan,
Chen Song,
Yu-Chi Ho,
Qianchuan Zhao:
Constrained Ordinal Optimization - A Feasibility Model Based Approach.
Discrete Event Dynamic Systems 16(2): 279-299 (2006) |
2005 |
7 | EE | Hongxing Bai,
Xi Chen,
Yu-Chi Ho,
Xiaohong Guan:
Percentage Coverage Configuration in Wireless Sensor Networks.
ISPA 2005: 780-791 |
2004 |
6 | EE | Li Xia,
Xi Chen,
Xiaohong Guan:
A New Gradient-Based Routing Protocol in Wireless Sensor Networks.
ICESS 2004: 318-325 |
5 | EE | Yongcai Wang,
Dianfei Han,
Qianchuan Zhao,
Xiaohong Guan,
Da-Zhong Zheng:
Clusters Partition and Sensors Configuration for Target Tracking in Wireless Sensor Networks.
ICESS 2004: 333-338 |
4 | EE | Wei Wang,
Xiaohong Guan,
Xiangliang Zhang:
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
ISNN (2) 2004: 657-662 |
3 | EE | Li Feng,
Xiaohong Guan,
Sangang Guo,
Yan Gao,
Peini Liu:
Predicting the intrusion intentions by observing system call sequences.
Computers & Security 23(3): 241-252 (2004) |
1999 |
2 | EE | Xiaohong Guan,
Feng Gao,
Alva J. Svoboda:
Energy Delivery Scheduling and Realizability in Deregulated Electric Energy Market.
HICSS 1999 |
1994 |
1 | | Yong Li,
Peter B. Luh,
Xiaohong Guan:
Fuzzy Optimization-Based Scheduling of Identical Machines with Possible Breakdown.
ICRA 1994: 3447-3452 |