2009 |
36 | EE | Sung-eok Jeon,
Chuanyi Ji:
Distributed Preemption Decisions: Probabilistic Graphical Model, Algorithm and Near-Optimality
CoRR abs/0901.0753: (2009) |
35 | EE | Guanglei Liu,
Chuanyi Ji:
Scalability of network-failure resilience: analysis using multi-layer probabilistic graphical models.
IEEE/ACM Trans. Netw. 17(1): 319-331 (2009) |
2008 |
34 | EE | Zesheng Chen,
Chuanyi Ji,
Paul Barford:
Spatial-Temporal Characteristics of Internet Malicious Sources.
INFOCOM 2008: 2306-2314 |
33 | EE | Zesheng Chen,
Chuanyi Ji:
An Information-Theoretical View of Network-Aware Malware Attacks
CoRR abs/0805.0802: (2008) |
32 | EE | Sung-eok Jeon,
Chuanyi Ji:
Randomized Distributed Configuration Management of Wireless Networks: Multi-layer Markov Random Fields and Near-Optimality
CoRR abs/0809.1916: (2008) |
2007 |
31 | EE | Rajesh Narasimha,
Souvik Dihidar,
Chuanyi Ji,
Steven W. McLaughlin:
Scalable Fault Diagnosis in IP Networks using Graphical Models: A Variational Inference Approach.
ICC 2007: 147-152 |
30 | EE | Zesheng Chen,
Chuanyi Ji:
Measuring Network-Aware Worm Spreading Ability.
INFOCOM 2007: 116-124 |
29 | EE | Zesheng Chen,
Chao Chen,
Chuanyi Ji:
Understanding Localized-Scanning Worms.
IPCCC 2007: 186-193 |
28 | EE | Guanglei Liu,
Chuanyi Ji:
Resilience of all-optical network architectures under in-band crosstalk attacks: a probabilistic graphical model approach.
IEEE Journal on Selected Areas in Communications 25(S-3): 2-17 (2007) |
27 | EE | Zesheng Chen,
Chuanyi Ji:
Optimal worm-scanning method using vulnerable-host distributions.
IJSN 2(1/2): 71-80 (2007) |
2005 |
26 | | Subhabrata Sen,
Chuanyi Ji,
Debanjan Saha,
Joe McCloskey:
Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005
ACM 2005 |
25 | EE | Sung-eok Jeon,
Chuanyi Ji:
Near-Optimal Algorithm for Self-configuration of Ad-hoc Wireless Networks.
International Conference on Computational Science (3) 2005: 279-283 |
24 | EE | Sung-eok Jeon,
Chuanyi Ji:
Role of machine learning in configuration management of ad hoc wireless networks.
MineNet 2005: 223-224 |
23 | EE | Zesheng Chen,
Chuanyi Ji:
A self-learning worm using importance scanning.
WORM 2005: 22-29 |
22 | EE | Guanglei Liu,
Chuanyi Ji,
Vincent W. S. Chan:
On the scalability of network management information for inter-domain light-path assessment.
IEEE/ACM Trans. Netw. 13(1): 160-172 (2005) |
2003 |
21 | EE | Guanglei Liu,
Chuanyi Ji,
Vincent W. S. Chan:
Network Management Information For Light-Path Assessment: Trade-off between Performance and Complexity.
INFOCOM 2003 |
2002 |
20 | EE | Xusheng Tian,
Jie Wu,
Chuanyi Ji:
A Unified Framework for Understanding Network Traffic Using Independent Wavelet Models.
INFOCOM 2002 |
2001 |
19 | EE | Sheng Ma,
Chuanyi Ji:
Modeling heterogeneous network traffic in wavelet domain.
IEEE/ACM Trans. Netw. 9(5): 634-649 (2001) |
2000 |
18 | EE | Dongxu Shen,
Chuanyi Ji:
Admission of Multimedia Traffic for Third Generation CDMA Network.
INFOCOM 2000: 1077-1086 |
17 | EE | Marina Thottan,
Chuanyi Ji:
Properties of network faults.
NOMS 2000: 941-942 |
1999 |
16 | | Xusheng Tian,
Chuanyi Ji:
Bounding the Performance of Dynamic Channel Allocation with QoS Provisioning for Distributed Admission Control in Wireless Networks.
INFOCOM 1999: 1356-1363 |
15 | | Chuanyi Ji,
Sheng Ma,
Xusheng Tian:
Approximation Capability of Independent Wavelet Models to Heterogeneous Network Traffic.
INFOCOM 1999: 170-177 |
14 | EE | Marina Thottan,
Chuanyi Ji:
Statistical Detection of Enterprise Network Problems.
J. Network Syst. Manage. 7(1): (1999) |
1998 |
13 | | Sheng Ma,
Chuanyi Ji:
Modeling Video Traffic in the Wavelet Domain.
INFOCOM 1998: 201-208 |
12 | | Cynthia S. Hood,
Chuanyi Ji:
Intelligent Agents for Proactive Fault Detection.
IEEE Internet Computing 2(2): 65-72 (1998) |
11 | | Chuanyi Ji,
Demetri Psaltis:
Capacity of Two-Layer Feedforward Neural Networks with Binary Weights.
IEEE Transactions on Information Theory 44(1): 256-268 (1998) |
10 | EE | Sheng Ma,
Chuanyi Ji:
Fast training of recurrent networks based on the EM algorithm.
IEEE Transactions on Neural Networks 9(1): 11-26 (1998) |
1997 |
9 | | Cynthia S. Hood,
Chuanyi Ji:
Proactive Network Fault Detection.
INFOCOM 1997: 1147-1155 |
8 | | Cynthia S. Hood,
Chuanyi Ji:
Automated Proactive Anomaly Detection.
Integrated Network Management 1997: 688-699 |
7 | | Sheng Ma,
Chuanyi Ji:
Wavelet Models for Video Time-Series.
NIPS 1997 |
6 | EE | Sheng Ma,
Chuanyi Ji,
James Farmer:
An Efficient EM-based Training Algorithm for Feedforward Neural Networks.
Neural Networks 10(2): 243-256 (1997) |
5 | EE | Chuanyi Ji,
Demetri Psaltis:
Network Synthesis through Data-Driven Growth and Decay.
Neural Networks 10(6): 1133-1141 (1997) |
1996 |
4 | EE | Chuanyi Ji,
Sheng Ma:
Combinations of Weak Classifiers.
NIPS 1996: 494-500 |
1993 |
3 | EE | Chuanyi Ji:
Generalization Error and the Expected Network Complexity.
NIPS 1993: 367-374 |
1991 |
2 | EE | Chuanyi Ji,
Demetri Psaltis:
The VC-Dimension vs. the Statistical Capacity for Two Layer Networks with Binary Weights.
COLT 1991: 250-256 |
1 | EE | Chuanyi Ji,
Demetri Psaltis:
The VC-Dimension versus the Statistical Capacity of Multilayer Networks.
NIPS 1991: 928-935 |