The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yi-an Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
    Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:478-0 [Conf]
  2. Wei Fan, Yi-an Huang, Philip S. Yu
    Decision Tree Evolution Using Limited Number of Labeled Data Items from Drifting Data Streams. [Citation Graph (0, 0)][DBLP]
    ICDM, 2004, pp:379-382 [Conf]
  3. Yi-an Huang, Wenke Lee
    Attack Analysis and Detection for Ad Hoc Routing Protocols. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:125-145 [Conf]
  4. Yi-an Huang, Wenke Lee
    A cooperative intrusion detection system for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:135-147 [Conf]
  5. Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu
    Active Mining of Data Streams. [Citation Graph (0, 0)][DBLP]
    SDM, 2004, pp:- [Conf]

  6. Hotspot-based traceback for mobile ad hoc networks. [Citation Graph (, )][DBLP]


  7. Application of neural networks and genetic algorithms to the screening for high quality chips. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002