Остановите войну!
for scientists:
default search action
Xiaohong Guan
- > Home > Persons > Xiaohong Guan
Publications
- 2019
- [j116]Weixuan Mao, Zhongmin Cai, Bo Zeng, Xiaohong Guan:
Learning edge weights in file co-occurrence graphs for malware detection. Data Min. Knowl. Discov. 33(1): 168-203 (2019) - 2018
- [j102]Weixuan Mao, Zhongmin Cai, Yuan Yang, Xiaohong Shi, Xiaohong Guan:
From big data to knowledge: A spatio-temporal approach to malware detection. Comput. Secur. 74: 167-183 (2018) - 2017
- [j88]Weixuan Mao, Zhongmin Cai, Don Towsley, Qian Feng, Xiaohong Guan:
Security importance assessment for system objects and malware detection. Comput. Secur. 68: 47-68 (2017) - 2016
- [j76]Zhihai Yang, Zhongmin Cai, Xiaohong Guan:
Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl. Based Syst. 111: 144-158 (2016) - [j73]Chao Shen, Zhongmin Cai, Xiaomei Liu, Xiaohong Guan, Roy A. Maxion:
MouseIdentity: Modeling Mouse-Interaction Behavior for a User Verification System. IEEE Trans. Hum. Mach. Syst. 46(5): 734-748 (2016) - 2015
- [c91]Chao Shen, Yong Zhang, Zhongmin Cai, Tianwen Yu, Xiaohong Guan:
Touch-interaction behavior for continuous user authentication on smartphones. ICB 2015: 157-162 - [c86]Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan:
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. RAID 2015: 155-176 - 2014
- [j57]Chao Shen, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. Comput. Secur. 45: 156-171 (2014) - [j53]Zhongmin Cai, Chao Shen, Xiaohong Guan:
Mitigating Behavioral Variability for Mouse Dynamics: A Dimensionality-Reduction-Based Approach. IEEE Trans. Hum. Mach. Syst. 44(2): 244-255 (2014) - [c83]Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley:
Centrality metrics of importance in access behaviors and malware detections. ACSAC 2014: 376-385 - 2013
- [j48]Weibo Chu, Xiaohong Guan, Zhongmin Cai, Lixin Gao:
Real-time volume control for interactive network traffic replay. Comput. Networks 57(7): 1611-1629 (2013) - [j45]Youtian Du, Qian Li, Zhongmin Cai, Xiaohong Guan:
Multi-view semi-supervised web image classification via co-graph. Neurocomputing 122: 430-440 (2013) - [j43]Youtian Du, Chang Su, Zhongmin Cai, Xiaohong Guan:
Web page and image semi-supervised classification with heterogeneous information fusion. J. Inf. Sci. 39(3): 289-306 (2013) - [j41]Chao Shen, Zhongmin Cai, Xiaohong Guan, Youtian Du, Roy A. Maxion:
User Authentication Through Mouse Dynamics. IEEE Trans. Inf. Forensics Secur. 8(1): 16-30 (2013) - [c67]Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai:
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. ICC 2013: 1990-1994 - [c63]Weibo Chu, Xiaohong Guan, John C. S. Lui, Zhongmin Cai, Xiaohong Shi:
Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication. ICDCS Workshops 2013: 58-63 - [c58]Chao Shen, Zhongmin Cai, Roy A. Maxion, Xiaohong Guan:
On User Interaction Behavior as Evidence for Computer Forensic Analysis. IWDW 2013: 221-231 - 2012
- [c53]Chao Shen, Zhongmin Cai, Roy A. Maxion, Guang Xiang, Xiaohong Guan:
Comparing classification algorithm for mouse dynamics based user identification. BTAS 2012: 61-66 - [c52]Chao Shen, Zhongmin Cai, Xiaohong Guan:
Continuous authentication for mouse dynamics: A pattern-growth approach. DSN 2012: 1-12 - [c48]Chao Shen, Zhongmin Cai, Xiaohong Guan, Jialin Wang:
On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study. ICB 2012: 378-383 - [c45]Weibo Chu, Xiaohong Guan, Lixin Gao, Zhongmin Cai:
Model-based real-time volume control for interactive network traffic replay. NOMS 2012: 163-170 - 2011
- [c43]Chao Shen, Zhongmin Cai, Xiaohong Guan:
Poster: can it be more practical?: improving mouse dynamics biometric performance. CCS 2011: 853-856 - 2010
- [c36]Weibo Chu, Xiaohong Guan, Zhongmin Cai, Mingxu Chen:
Balance Based Performance Enhancement for Interactive TCP Traffic Replay. ICC 2010: 1-5 - [c32]Youtian Du, Xiaohong Guan, Zhongmin Cai:
Enhancing Web Page Classification via Local Co-training. ICPR 2010: 2905-2908 - 2009
- [c22]Chao Shen, Zhongmin Cai, Xiaohong Guan, Huilan Sha, Jingzi Du:
Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. ICC 2009: 1-5 - 2003
- [j2]Zhongmin Cai, Xiaohong Guan, Ping Shao, Qingke Peng, Guoji Sun:
A rough set theory based method for anomaly intrusion detection in computer network systems. Expert Syst. J. Knowl. Eng. 20(5): 251-259 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint