Jianhua Yang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

43EEJianhua Yang, Athula Ginige, Heinrich C. Mayr, Ralf-Detlef Kutsche: Information Systems: Modeling, Development, and Integration, Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009. Proceedings Springer 2009
42EEJianhua Yang, Byong Lee, Stephen S. H. Huang: Monitoring Network Traffic to Detect Stepping-Stone Intrusion. AINA Workshops 2008: 56-61
41EEJianhua Yang, Byong Lee: Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ATC 2008: 2-12
40EEJianhua Yang: Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method. FSKD (1) 2008: 311-315
39EEXi Chen, Gaogang Xie, Jianhua Yang: Mitigate DDoS attack using TTL buckets and host threatening index. LCN 2008: 525-526
38EEShou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang: Stepping-Stone Detection Via Request-Response Traffic Analysis. ATC 2007: 276-285
37 Jianhua Yang, Ickjai Lee: Hybrid Clustering for Large Sequential Data. Artificial Intelligence and Pattern Recognition 2007: 76-81
36EEGaogang Xie, Ji Chen, Hongxia Zheng, Jianhua Yang, Yu Zhang: Handover Latency of MIPv6 Implementation in Linux. GLOBECOM 2007: 1780-1785
35EEDan Wang, Gaogang Xie, Jianhua Yang, Zhenyu Li, Wenjian Jiang: Feedback and Resources Guided Mechanism for Adaptive Packet Sampling. GLOBECOM 2007: 2586-2590
34EEGaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte: An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. ICN 2007: 46
33EEGaogang Xie, Guangxing Zhang, Jianhua Yang, Yinghua Min, Valérie Issarny, Alberto Conte: Survey on Traffic of Metro Area Network with Measurement On-Line. International Teletraffic Congress 2007: 666-677
32EEJianhua Yang: Fuzzy Integrative Performance Evaluation for Supply Chain System. SNPD (2) 2007: 47-52
31EEJianhua Yang: Schwarz type algorithms for parabolic problems. Applied Mathematics and Computation 188(1): 206-213 (2007)
30EEJianhua Yang, Shou-Hsuan Stephen Huang: Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. Computers & Security 26(2): 137-144 (2007)
29EEJianhua Yang, Shou-Hsuan Stephen Huang: Mining TCP/IP packets to detect stepping-stone intrusion. Computers & Security 26(7-8): 479-484 (2007)
28EEJianhua Yang, Yongzhong Zhang: Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. ACNS 2006: 18-32
27EEJianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan: A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. AINA (1) 2006: 231-236
26EEMing Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang: Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. AINA (1) 2006: 255-262
25EEYongzhong Zhang, Jianhua Yang, Chunming Ye: Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ATC 2006: 477-486
24EEJianhua Yang, Ickjai Lee: Hybrid O(n Ön) Clustering for Sequential Web Usage Mining. Australian Conference on Artificial Intelligence 2006: 1022-1026
23EEJianhua Yang, Byong Lee, Yongzhong Zhang: Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. CANS 2006: 303-317
22EEYiyou Dong, Jianhua Yang, Zhaohui Wu: ODSG: An Architecture of Ontology-based Distributed Simulation on Grid. IMSCCS (1) 2006: 759-765
21EEJianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang: Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ISC 2006: 383-397
20EEWenqi Liu, Jianhua Yang, Lei Wei: A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. PDCAT 2006: 454-459
19EEJianhua Yang, Di Jin, Ye Li, Kai-Steffen Jens Hielscher, Reinhard German: Modeling and simulation of performance analysis for a cluster-based Web server. Simulation Modelling Practice and Theory 14(2): 188-200 (2006)
18EEJianhua Yang, Shou-Hsuan Stephen Huang: Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. AINA 2005: 1005-1010
17EEIckjai Lee, Jianhua Yang: Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach. Australian Conference on Artificial Intelligence 2005: 938-941
16 Ickjai Lee, Jianhua Yang: Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering. CIMCA/IAWTIC 2005: 484-489
15EEJianhua Yang, Shou-Hsuan Stephen Huang: Improved Thumbprint and Its Application for Intrusion Detection. ICCNMC 2005: 433-442
14EEXiangguo Li, Jianhua Yang, Zhaohui Wu: An NFSv4-Based Security Scheme for NAS. ISPA Workshops 2005: 130-139
13EEJianhua Yang, Danping Yang: Additive Schwarz methods for parabolic problems. Applied Mathematics and Computation 163(1): 17-28 (2005)
12EEQinglin Zhao, Li Feng, Zhongcheng Li, Jianhua Yang: Movement detection delay analysis in mobile IP. Computer Communications 28(5): 550-556 (2005)
11EEJianhua Yang, Zhaohui Wu, Siliang Tang, Xiaosheng Guo: Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. GCC Workshops 2004: 164-172
10EEJunrang Li, Zhaohui Wu, Jianhua Yang, Mingwang Xia: A Secure Model for Network-Attached Storage on the Grid. IEEE SCC 2004: 604-608
9 Jianhua Yang, Ickjai Lee: Cluster Validity Through Graph-based Boundary Analysis. IKE 2004: 204-210
8EEJianhua Yang, Wei Lu, Wenqi Liu: PID Controller Based on the Artificial Neural Network. ISNN (2) 2004: 144-149
7EEVladimir Estivill-Castro, Jianhua Yang: Fast and Robust General Purpose Clustering Algorithms. Data Min. Knowl. Discov. 8(2): 127-150 (2004)
6EEJunfeng Wang, Jianhua Yang, Gaogang Xie, Mingtian Zhou, Zhongcheng Li: Measurement-Based Modeling with Adaptive Sampling. Asian Test Symposium 2003: 340-347
5EEVladimir Estivill-Castro, Jianhua Yang: Cluster Validity Using Support Vector Machines. DaWaK 2003: 244-256
4EEVladimir Estivill-Castro, Jianhua Yang: Clustering Web Visitors by Fast, Robust and Convergent Algorithms. Int. J. Found. Comput. Sci. 13(4): 497-520 (2002)
3EEVladimir Estivill-Castro, Jianhua Yang: Non-crisp Clustering by Fast, Convergent, and Robust Algorithms. PKDD 2001: 103-114
2EEVladimir Estivill-Castro, Jianhua Yang: Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs. Web Intelligence 2001: 498-507
1 Vladimir Estivill-Castro, Jianhua Yang: Fast and Robust General Purpose Clustering Algorithms. PRICAI 2000: 208-218

Coauthor Index

1Ji Chen [36]
2Xi Chen [39]
3Alberto Conte [33] [34]
4Yiyou Dong [22]
5Vladimir Estivill-Castro [1] [2] [3] [4] [5] [7]
6Li Feng [12]
7Reinhard German [19]
8Athula Ginige [43]
9Xiaosheng Guo [11]
10Kai-Steffen Jens Hielscher [19]
11Shou-Hsuan Stephen Huang [15] [18] [21] [26] [27] [29] [30] [38]
12Stephen S. H. Huang [42]
13Valérie Issarny [33] [34]
14Wenjian Jiang [35]
15Di Jin [19]
16Ralf-Detlef Kutsche [43]
17Byong Lee [23] [41] [42]
18Ickjai Lee [9] [16] [17] [24] [37]
19Junrang Li [10]
20Xiangguo Li [14]
21Ye Li [19]
22Zhenyu Li [35]
23Zhongcheng Li [6] [12]
24Wenqi Liu [8] [20]
25Wei Lu [8]
26Robert Lychev [38]
27Heinrich C. Mayr [43]
28Yinghua Min [33]
29Siliang Tang [11]
30Ming Dong Wan [26] [27]
31Dan Wang [35]
32Junfeng Wang [6]
33Lei Wei [20]
34Zhaohui Wu [10] [11] [14] [22]
35Mingwang Xia [10]
36Gaogang Xie [6] [33] [34] [35] [36] [39]
37Danping Yang [13]
38Chunming Ye [25]
39Guangxing Zhang [33]
40Yongzhong Zhang [21] [23] [25] [28]
41Yu Zhang [36]
42Qinglin Zhao [12]
43Hongxia Zheng [36]
44Mingtian Zhou [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)