2008 |
11 | EE | Li Zhuang,
John Dunagan,
Daniel R. Simon,
Helen J. Wang,
Ivan Osipkov,
J. Doug Tygar:
Characterizing Botnets from Email Spam Records.
LEET 2008 |
2006 |
10 | EE | Li Zhuang,
Feng Jing,
Xiaoyan Zhu:
Movie review mining and summarization.
CIKM 2006: 43-50 |
9 | EE | Kaizhu Huang,
Jun Sun,
Yoshinobu Hotta,
Katsuhito Fujimoto,
Satoshi Naoi,
Chong Long,
Li Zhuang,
Xiaoyan Zhu:
A Hybrid Handwritten Chinese Address Recognition Approach.
ICONIP (2) 2006: 88-98 |
2005 |
8 | EE | Li Zhuang,
Feng Zhou,
J. D. Tygar:
Keyboard acoustic emanations revisited.
ACM Conference on Computer and Communications Security 2005: 373-382 |
7 | EE | Li Zhuang,
Xiaoyan Zhu:
An OCR Post-processing Approach Based on Multi-knowledge.
KES (1) 2005: 346-352 |
6 | EE | Li Zhuang,
Feng Zhou,
Ben Y. Zhao,
Antony I. T. Rowstron:
Cashmere: Resilient Anonymous Routing.
NSDI 2005 |
2004 |
5 | | Li Zhuang,
Jing Zhang,
Bryan Ng,
Yue Tang,
Yi Zhao:
Dynamic Negotiation for Real-Time Manufacturing Execution.
ICEIS (2) 2004: 321-326 |
4 | EE | Li Zhuang,
Ta Bao,
Xiaoyan Zhu,
Chunheng Wang,
Satoshi Naoi:
A Chinese OCR spelling check approach based on statistical language models.
SMC (5) 2004: 4727-4732 |
2003 |
3 | EE | Feng Zhou,
Li Zhuang,
Ben Y. Zhao,
Ling Huang,
Anthony D. Joseph,
John Kubiatowicz:
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems.
Middleware 2003: 1-20 |
2002 |
2 | | Li Zhuang,
Haizhou Ai,
Guangyou Xu:
Video Based Face Recognition By Support Vector Machines.
JCIS 2002: 700-703 |
1994 |
1 | EE | Li Zhuang,
John A. Buzacott,
Xiao-Gao Liu:
Approximate mean value performance analysis of cyclic queueing networks with production blocking.
Queueing Syst. 16(1-2): 139-165 (1994) |