default search action
Guowei Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Ben Pi, Chun Guo, Yunhe Cui, Guowei Shen, Jialong Yang, Yuan Ping:
Remote access trojan traffic early detection method based on Markov matrices and deep learning. Comput. Secur. 137: 103628 (2024) - [j16]Jiaxin Peng, Chun Guo, Yuan Ping, Yunhe Cui, Yi Chen, Guowei Shen:
SNDMI: Spyware network traffic detection method based on inducement operations. Comput. Secur. 140: 103806 (2024) - 2023
- [j15]Tongtong Jiang, Guowei Shen, Chun Guo, Yunhe Cui, Bo Xie:
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Comput. Networks 224: 109604 (2023) - [j14]Huaxin Deng, Chun Guo, Guowei Shen, Yunhe Cui, Yuan Ping:
MCTVD: A malware classification method based on three-channel visualization and deep learning. Comput. Secur. 126: 103084 (2023) - [j13]Kaixi Wang, Yunhe Cui, Qing Qian, Yi Chen, Chun Guo, Guowei Shen:
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method. J. Netw. Comput. Appl. 219: 103722 (2023) - 2022
- [j12]Longyan Ran, Yunhe Cui, Chun Guo, Qing Qian, Guowei Shen, Huanlai Xing:
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm. Comput. Networks 213: 109098 (2022) - [j11]Man Xiao, Yunhe Cui, Qing Qian, Guowei Shen:
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT. IEEE Internet Things J. 9(23): 23750-23771 (2022) - 2021
- [j10]Hao Liu, Chun Guo, Yunhe Cui, Guowei Shen, Yuan Ping:
2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. Appl. Intell. 51(12): 9038-9053 (2021) - [j9]Mao Xiao, Chun Guo, Guowei Shen, Yunhe Cui, Chaohui Jiang:
Image-based malware classification using section distribution information. Comput. Secur. 110: 102420 (2021) - [j8]Yunhe Cui, Qing Qian, Chun Guo, Guowei Shen, Youliang Tian, Huanlai Xing, Lianshan Yan:
Towards DDoS detection mechanisms in Software-Defined Networking. J. Netw. Comput. Appl. 190: 103156 (2021) - [j7]Huixia Zhang, Guowei Shen, Chun Guo, Yunhe Cui, Chaohui Jiang:
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. Secur. Commun. Networks 2021: 5586335:1-5586335:12 (2021) - [j6]Bo Xie, Guowei Shen, Chun Guo, Yunhe Cui:
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy. Wirel. Commun. Mob. Comput. 2021: 6629591:1-6629591:11 (2021) - [c13]Cong Wang, Yunhe Cui, Qing Qian, Guowei Shen, Hongfeng Gao, Saifei Li:
METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN. EUC 2021: 79-86 - 2020
- [j5]Guowei Shen, Wanling Wang, Qilin Mu, Yanhong Pu, Ya Qin, Miao Yu:
Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security. Wirel. Commun. Mob. Comput. 2020: 8883696:1-8883696:13 (2020) - [c12]Runhua Zhang, Guowei Shen, Liangyi Gong, Chun Guo:
DSANA: A distributed machine learning acceleration solution based on dynamic scheduling and network acceleration. HPCC/DSS/SmartCity 2020: 302-311
2010 – 2019
- 2019
- [j4]Ya Qin, Guowei Shen, Wen-bo Zhao, Yanping Chen, Miao Yu, Xin Jin:
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF. Frontiers Inf. Technol. Electron. Eng. 20(6): 872-884 (2019) - [c11]Guowei Shen, Lu Liu, Qin Wei, Jicheng Lei, Chun Guo:
DataSESec: Security Monitoring for Data Share and Exchange Platform. APWeb/WAIM (2) 2019: 422-427 - [c10]Runhua Zhang, Yang Cheng, Jinkun Geng, Shuai Wang, Kaihui Gao, Guowei Shen:
HiPower: A High-Performance RDMA Acceleration Solution for Distributed Transaction Processing. NPC 2019: 209-221 - 2015
- [j3]Wu Yang, Guowei Shen, Wei Wang, Liangyi Gong, Miao Yu, Guozhong Dong:
Anomaly Detection in Microblogging via Co-Clustering. J. Comput. Sci. Technol. 30(5): 1097-1108 (2015) - [c9]Guowei Shen, Wei Wang, Wu Yang, Miao Yu, Guozhong Dong:
Heterogeneous Sparse Relational Data Co-clustering in Social Network. UIC/ATC/ScalCom 2015: 77-84 - [c8]Liangyi Gong, Dapeng Man, Jiguang Lv, Guowei Shen, Wu Yang:
FRID: Indoor Fine-Grained Real-Time Passive Human Motion Detection. UIC/ATC/ScalCom 2015: 308-311 - 2014
- [c7]Wu Yang, Guozhong Dong, Wei Wang, Guowei Shen, Liangyi Gong, Miao Yu, Jiguang Lv, Yaxue Hu:
Detecting Bots in Follower Markets. BIC-TA 2014: 525-530 - [c6]Guowei Shen, Wu Yang, Wei Wang, Miao Yu, Guozhong Dong:
Agglomerative Hierarchical Co-clustering Based on Bregman Divergence. SCDM 2014: 389-398 - [c5]Guowei Shen, Wu Yang, Wei Wang, Miao Yu, Guozhong Dong:
Detecting Anomalies in Microblogging via Nonnegative Matrix Tri-Factorization. SMP 2014: 55-66 - [c4]Miao Yu, Wu Yang, Wei Wang, Guowei Shen, Guozhong Dong:
Information Diffusion and Influence Measurement Based on Interaction in Microblogging. SMP 2014: 129-140 - 2013
- [j2]Honghui Yan, Guowei Shen, Rudolf Zetik, Ole Hirsch, Reiner S. Thomä:
Ultra-Wideband MIMO Ambiguity Function and Its Factorability. IEEE Trans. Geosci. Remote. Sens. 51(1): 504-519 (2013) - 2010
- [j1]Guowei Shen, Rudolf Zetik, Ole Hirsch, Reiner S. Thomä:
Range-Based Localization for UWB Sensor Networks in Realistic Environments. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c3]Rudolf Zetik, Guowei Shen, Reiner S. Thomä:
Evaluation of requirements for UWB localization systems in home-entertainment applications. IPIN 2010: 1-8 - [c2]Alexis Paolo García Ariza, Martin Bachhuber, Robert Weigel, Tim Fuss, Rudolf Zetik, Guowei Shen, Robert Müller, Reiner S. Thomä:
Ultrawideband Channel Sounding within an Airbus 319. VTC Fall 2010: 1-5
2000 – 2009
- 2008
- [c1]Guowei Shen, Rudolf Zetik, Reiner S. Thomä:
Performance comparison of TOA and TDOA based location estimation algorithms in LOS environment. WPNC 2008: 71-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint