信息内容安全技术国家工程实验室长期开展信息内容安全基础理论和网络信息获取、过滤、分析、挖掘、安全对抗等技术的研究,近年来发表文章500余篇。近期部分文章列表如下:
2015年
-
Wei-Xue Lu, Peng Zhang, Chuan Zhou, Chunyi Liu and Li Gao. Influence Maximization in Big Network: An Incremental Algorithm for Streaming Subgraph Influence Spread Estimation. In Proceedings of the 2015 International Joint on Artificial Intelligence (IJCAI2015), Buenos Aires, Argentina, July 25-31, 2015.
-
Quan Wang, Bin Wang, Li Guo. Knowledge Base Completion Using Embeddings and Rules. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 2015) , to appear, Buenos Aires, Argentina, July 2015.
-
Shu Guo, Quan Wang, Bin Wang, Lihong Wang, Li Guo. Semantically Smooth Knowledge Graph Embedding. In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (ACL 2015), to appear, Beijing, China, July, 2015.
-
Zhendong Mao, Lei Zhang, Bin Wang, Li Guo. What is the Next Step of Binary Features. In Proceedings of the 2015 IEEE International Conference on Multimedia and Expo (ICME 2015), to appear, Torino, Italy, June, 2015.
-
Zhendong Mao, Lingling Tong, Hongtao Xie, Qi Tian. Hierarchical Encoding of Binary Descriptors for Image Matching. In Proceedings of the 2015 ACM International Conference on Multimedia Retrieva (ICMR 2015 ) , to appear, Shanghai, China, June, 2015.
-
Qingyun Liu, Hongtao Xie, Yizhi Liu,Chuang Zhang, Li Guo.Data-Oriented Multi-Index Hashing.In Proceedings of the 15th IEEE International Conference on Multimedia and Expo(ICME2015), Accepted, Torino, Italy,June 2015.
-
Weiwei Feng, Peng Wang, Chuan Zhou, Peng Zhang, and Li Guo, Fast Search for Distance Dependent Chinese Restaurant Processes, In Proceedings of the 24rd ACM International World Wide Web Conference (WWW2015), pages: 33-34, Florence, Italy, May 18-22, 2015.
-
Zheng Lin, Weiping Wang, Xiaolong Jin, Jiguang Liang, Dan Meng. A Word Vector and Matrix Factorization Based Method for Opinion Lexicon Extraction. In Proceedings of the 24th International Conference on World Wide Web Companion. (WWW 2015), pages: 67-68, Florence,Italy, May 2015.
-
Wenyu Zang, Peng Zhang, Chuan Zhou, and Li Guo, Topic-aware Source Locating in Social Networks, In Proceedings of the 24rd ACM International World Wide Web Conference (WWW2015), pages: 14120142, Florence, Italy, May 18-22, 2015.
-
Xiancai Ji, Mingze Xu, Peng Zhang, Chuan Zhou, Zhi Qiao and Li Guo, Online Event Recommendation for Event-based Social Networks, In Proceedings of the 24rd ACM International World Wide Web Conference (WWW2015), pages: 45-46, Florence, Italy, May 18-22, 2015.
-
Jianing Ding, Peng Zhang, Rong Yang, Qingyun Liu, Li Guo. FlowSitter: Labeling and Tracking Simulated Flows. In Proceedings of 36th Symposium on Security and Privacy. America. May 2015.
-
Chao Zheng, Peng Zhang, Shu Li, Jianlong Tan,Qingyun Liu. An Efficient and Scalable Cyberlocker Traffic Tracking Method. In Proceedings of 36th Symposium on Security and Privacy. America. May 2015.
-
Chuan Zhou, Peng Zhang, Wenyu Zang, and Li Guo. On the Upper Bounds of Spread for Greedy Algorithms in Social Network Influence Maximization. IEEE Transactions on Knowledge and Data Engineering, 10.1109/TKDE.2015.2419659, 2015.
-
Xiaochun Yun, Yipeng Wang, Yongzheng Zhang, and Yu Zhou. A semantics-aware approach to the automated network protocol identification. IEEE/ACM Transactions on Networking, vol. PP, no. 99, pp. 1–13, 2015.
-
Xiaoyu Zhang, Shupeng Wang, and Xiaochun Yun. Bidirectional active learning: a two-way exploration into unlabeled and labeled data set. IEEE Transactions on Neural Networks and Learning Systems, vol. PP, no. 99, pp. 1–11, 2015.
2014年
-
Hongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Wang Yong. Poster: Mining elephant applications in unknown traffic by service clustering. In Proceedings ofthe ACM Conference on Computer and Communications Security (CCS 2014), pages 1532-1534,Scottsdale, USA, November 2014.
-
Zheng Lin, Xiaolong Jin, Weiping Wang, Xueqi Cheng, Xueke Xu. A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management. ACM,(CIKM 2014), pages: 1089-1098, Shanghai,China,November 2014.
-
Quan Wang, Jing Liu, Bin Wang, Li Guo. A Regularized Competition Model for Question Difficulty Estimation in Community Question Answering Services. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP 2014), pages 1115-1126, Doha, Qatar, October 2014.
-
Zhi Qiao, Peng Zhang, Wenjia Niu, Chuan Zhou, Li Guo. Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction. In Proceedings of the 13th IEEE International Conference on Data Mining (ICDM2014), pages: 520-529, Shenzhen, China, December 7-10, 2014.
-
Tingwen Liu, Alex X Liu, Jinqiao Shi, Yong Sun, Li Guo. Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation. Journal of Selected Areas in Communications, IEEE. 32(10): 1797-1809, 2014.
-
Quan Bai, Gang Xiong, Yong Zhao, Zhenzhen Li. Poster: Automatic discovery for common protocol mimicry. In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2014), pages 487, Gothenburg, Sweden, September 2014.
-
Zigang Cao, Gang Xiong, Zhen Li, Li Guo. Poster: Improving intrusion detection on SSL/TLS channels by classifying certificates. In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2014), pages 483, Gothenburg, Sweden, September 2014.
-
Zhi Qiao, Peng Zhang, Yanan Cao, Chuan Zhou, Li Guo and Binxing Fang. Combining Heterogenous Social and Geographical Information for Event Recommendation, In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI2014), pages: 14520151, Quebec City, Canada, July 27-31, 2014.
-
Zhi Qiao, Peng Zhang, Chuan Zhou, Yanan Cao, Li Guo, Yanchuan Zhang. Event Recommendation in Event-Based Social Networks. In Proceedings of the 28th AAAI Conference on Artificial Intelligence (AAAI2014), pages: 3130-3131, Quebec City, Canada, July 27-31, 2014.
-
Hongtao Xie, Yongdong Zhang, Jianlong Tan, Li Guo, Jintao Li. Contextual Query Expansion for Image Retrieval. IEEE Trans. on Multimedia, 16(4): 1104-1114, 2014.
-
Peng Zhang, Chuan Zhou, Peng Wang, Byron J. Gao, Xingquan Zhu, and Li Guo, E-Tree: An Efficient Indexing Structure for Ensemble Models on Data Streams. IEEE Transactions on Knowledge and Data Engineering, Vol. 27(2): 461-474, 2014.
-
Chuan Zhou, Peng Zhang, Wenyu Zang and Li Guo, Maximizing the Long-term Integral Influence in Social Networks under the Voter Model, In Proceedings of the 23rd ACM International World Wide Web Conference (WWW2014), pages: 423-424, Seoul, Korea, April 7-11, 2014.
-
Chuan Zhou, Peng Zhang, Jing Guo and Li Guo, Upper Bound based Greedy Algorithm for Mining Top-k Influential Nodes in Social Networks, In Proceedings of the 23rd ACM International World Wide Web Conference (WWW2014), pages: 421-422, Seoul, Korea, April 7-11, 2014.
-
Zhi Qiao, Peng Zhang, Jing He, Yanan Cao, Chuan Zhou and Li Guo, Combining Geographical Information of Users and Content of Items for Accurate Rating Prediction, In Proceedings of the 23rd ACM International World Wide Web Conference (WWW2014), pages: 361-362, Seoul, Korea, April 7-11, 2014.
-
Yun Gao, Wei Zhou, Zhang Zhang, Jizhong Han, Dan Meng, Zhiyong Xu. An Assumption Free Online Anomaly Detection Method with Grammar Compression. In Proceedings of the 2014 SIAM International Conference on Data Mining(SDM 2014),pages:911-919, Philadelphia, USA, April 2014.
-
Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang. Utility-based Cooperative Decision in Cooperative Authentication. IEEE Conference on Computer Communications (INFOCOM), 2014:1006-1014.
-
Yunchuan Guo, Lihua Yin, Chao Li. Automatically Verifying STRAC Policy. IEEE Conference on Computer Communications(INFOCOM):2014, 141-142.
-
Yunchuan Guo, Lihua Yin, Liang Chang, Athanasios V. Vasilakos. Risk-based Approach: A New Perspective on Declassification and Endorsement. IEEE Symposium on Security and Privacy - Poster Session. 2014.
-
Licai Liu, Yunchuan Guo, Lihua Yin. Analyzing the asking/bidding price in dynamic game for cooperative authentication. IEEE Conference on Computer Communications (INFOCOM): 2014, 165-166.
-
Yan Sun, Lihua Yin, Wenmao Liu. Defending sybil attacks in mobile social networks. IEEE Conference on Computer Communications (INFOCOM). 2014: 163-164.
2013年
-
Peng Zhang, Kefu Xu, Yan Li, Li Guo. An Optimized Strategy for Data Service Response with Template-Based Caching and Compression. In Proceedings of 2013International Conference on Service Oriented Computing(ICSOC), pages 394 -405, Germany ,December 2013.
-
Jing Guo, Peng Zhang, Chuan Zhou, Yanan Cao and Li Guo. Personalized Influence Maximization on Social Networks. In Proceedings of the 22nd International Conference on Information and Knowledge Management (CIKM-13), pages: 199-208, San Francisco, CA, USA, October 28- November 1, 2013.
-
Chuan Zhou, Peng Zhang, Jing Guo, Xingquan Zhu and Li Guo, UBLF: An upper bound based approach to discover influential nodes in social networks. In Proceedings of the 13th IEEE International Conference on Data Mining (ICDM-13), pages: 907-916, Dallas, TX, USA, December 7-10, 2013.
-
Majing Su,Hongli Zhang,Binxing Fang,Xiaojiang Du,Mohsen Guizani. A Measurement Study on the Topologies of BitTorrent Networks. IEEE Journal on Selected Areas in Communications (IEEE JSAC). 31(9): 338-347, 2013.
-
Hongzhou Sha, Tingwen Liu, Peng Qin, Yong Sun, Qingyun Liu. Improving Data Quality of Proxy Logs for Intrusion Detection. In Proceedings of 16th International Symposium Research in Attacks, Intrusions, and Defenses (RAID 2013), pages 454, Rodney Bay, St. Lucia, October 2013.
-
Peipei Fu, Gang Xiong, Yong Zhao, Ming Song, Peng Zhang. Poster: An identification method based on SSL extension. In Proceedings of the 16th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2013), pages 456, Rodney Bay, St. Lucia. October 2013.
-
Yunchuan Guo, Lihua Yin, Chao Li, Xiang Cui. Poster: Measuring Location Privacy with Process Calculus. IEEE Symposium on Security and Privacy Poster Session. 2013.
2012年及以前
-
Jun Li, Peng Zhang, Yanan Cao, P. Liu, and Li Guo, Efficient Behavior Targeting Using Ensmeble SVM Indexing. In Proceedings of the 12th IEEE International Conference on Data Mining (ICDM-12), pages: 409-418, Brussels, Belgium, Dec. 09-13, 2012.
-
Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo. EFA for efficient regular expression matching in NIDS (poster abstract). In Proceedings of 15th International Symposium Research in Attacks, Intrusions, and Defenses (RAID 2012), pages 382-282, Amsterdam, The Netherlands, September 2012.
-
Chao Lee, Lihua Yin, and Yunchuan Guo. Poster: A Multilevel Security Model for Wireless Sensor Networks. In Proceedings of the 33rd IEEE Symposium on Security and Privacy(SP2012). San Francisco Bay Area, USA, May 2012.
-
Peng Wang, Peng Zhang, and Li Guo, Minining Multi-label Data Streams Using Ensemble-based Active Learning. In Proceedings of the 2012 SIAM International Conference on Data Mining (SDM-12), pages: 1131-1140, Anaheim, California, USA, April 26-28, 2012.9.
-
Y. Wang et al.. A semantics aware approach to automated reverse engineering unknown protocols. in Proc. 20th IEEE ICNP, 2012, pp. 1–10.
-
Yibao Bao,Lihua Yin, Binxing Fang, Li Guo. A Novel Logic-Based Approach to Construct Compliant Security Policy Automatically. Science in China (Series F). 2012, Vol. 55 No. 1: 149–164.
-
Qingfeng Tan, Jinqiao Shi, Xiaojun Chen, Fanwen Xu, and Shoufeng Cao. Toward unobservable data sharing in overlay networks. ACSAC 2012
-
Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen. Optimal mining on security labels for decentralized information flow control. Computers & Security. 2012.
-
Jinyu Wu, Lihua Yin, Binxing Fang. Network Security Analysis Method Taking into Account the Usage Information. RAID 2012.
-
Peng Zhang, Jun Li, Peng Wang, Byron J. Gao, Xingquan Zhu, and Li Guo, Enabling Fast Prediction for Ensemble Models on Data Streams. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-11), pages: 177-185, San Diego, CA, USA, August 21-24, 2011.
-
Peng Zhang, Byron J. Gao, Xingquan Zhu, and Li Guo, Enabling Fast Lazy Learning for Data Streams. In Proceedings of the 11th IEEE International Conference on Data Mining (ICDM-11), pages: 932-941, Vancouver, Canada, December 11-14, 2011.
-
Jing Guo, Peng Zhang, Jianlong Tan, and Li Guo, Mining Frequent Patterns across Multiple Data Streams. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM-11), pages: 2325-2328, Glasgow, Scotland, UK, October 24-28, 2011.
-
Jun Li, Peng Zhang, Jianlong Tan, Ping Liu, and Li Guo, Continuous Data Stream Query in the Cloud. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM-11), pages: 2389-2392, Glasgow, Scotland, UK, October 24-28, 2011.
-
Tingwen Liu, Yifu Yang, Yanbing Liu, Yong Sun, Li Guo. An efficient regular expressions compression algorithm from a new perspective. In Proceedings of 30th IEEE International Conference on Computer Communications (IEEE INFOCOM 2011), pages 2129-2137, Shanghai, China, April 2011.
-
Peng Zhang, Xingquan Zhu, Jianlong Tan, and Li Guo, Classifier and Cluster Ensembles for Mining Concept Drifting Data Streams, In Proceedings of the 10th IEEE International Conference on Data Mining (ICDM-10), pages: 1175-1180, Sydney, Australia, December 14-17, 2010.
-
B. X. Fang, Y. C. Guo, Y. Zhou. Information Content Security on the Internet: the Control Model and Its Evaluation. Science in China Series F: Information Sciences. 2010,53(1):30-49.
-
Peng Zhang, Xingquan Zhu, Jianlong Tan, and Li Guo, SKIF: A Data Imputation Framework for Concept Drifting Data Streams, In Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM-10), pages: 1869-1872, Toronto, Ontario, Canada, October 26-31, 2010.
-
Peng Zhang, Xingquan Zhu, and Li Guo, Mining Data Streams with Labeled and Unlabeled Training Examples. In Proceedings of the 9th IEEE International Conference on Data Mining (ICDM-09), pages: 627-636, Miami, Florida, USA, December 6-9, 2009.
|