The SCEAS System
Navigation Menu

Search the dblp DataBase


Shengfeng Tian: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhi He, Shengfeng Tian, Houkuan Huang
    OMVD: An Optimization of MVD. [Citation Graph (0, 0)][DBLP]
    ADMA, 2006, pp:473-484 [Conf]
  2. Chuanhuan Yin, Shengfeng Tian, Shaomin Mu
    Using Gap-Insensitive String Kernel to Detect Masquerading. [Citation Graph (0, 0)][DBLP]
    ADMA, 2005, pp:323-330 [Conf]
  3. Chengpo Mu, Houkuan Huang, Shengfeng Tian
    Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:9-16 [Conf]
  4. Fengzhan Tian, Shengfeng Tian, Jian Yu, Houkuan Huang
    An Improved Bayesian Network Learning Algorithm Based on Dependency Analysis. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:33-40 [Conf]
  5. Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun He
    Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:323-331 [Conf]
  6. Shengfeng Tian, Chuanhuan Yin, Shaomin Mu
    High-Order Markov Kernels for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICONIP (3), 2006, pp:184-191 [Conf]
  7. Chuanhuan Yin, Shengfeng Tian, Shaomin Mu
    A Fast Bit-Parallel Algorithm for Gapped String Kernels. [Citation Graph (0, 0)][DBLP]
    ICONIP (1), 2006, pp:634-641 [Conf]
  8. Shengfeng Tian, Shaomin Mu, Chuanhuan Yin
    Cooperative Clustering for Training SVMs. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:962-967 [Conf]
  9. Shengfeng Tian, Jian Yu, Chuanhuan Yin
    Anomaly Detection Using Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2004, pp:592-597 [Conf]
  10. Xiaotao Wei, Houkuan Huang, Shengfeng Tian
    A Modified RBF Neural Network for Network Anomaly Detection. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:261-266 [Conf]
  11. Jian Yu, Houkuan Huang, Shengfeng Tian
    Cluster Validity and Stability of Clustering Algorithms. [Citation Graph (0, 0)][DBLP]
    SSPR/SPR, 2004, pp:957-965 [Conf]
  12. Xiangjun Li, Shengfeng Tian, Dayong Deng, Jingnian Chen
    A method of multi-agent system conflict analysis based on rough set theory. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:180-184 [Conf]
  13. Shengfeng Tian, Shaomin Mu, Chuanhuan Yin
    Sequence-similarity kernels for SVMs to detect anomalies in system calls. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2007, v:70, n:4-6, pp:859-866 [Journal]
  14. Shengfeng Tian, Shaomin Mu, Chuanhuan Yin
    Length-weighted string kernels for sequence data classification. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2007, v:28, n:13, pp:1651-1656 [Journal]

  15. The Training of Radial Basis Function Network Classifier with Cooperative Clustering. [Citation Graph (, )][DBLP]

  16. A Selective Classifier for Incomplete Data. [Citation Graph (, )][DBLP]

  17. An Online Adaptive Network Anomaly Detection Model. [Citation Graph (, )][DBLP]

  18. Applications of HMM in Protocol Anomaly Detection. [Citation Graph (, )][DBLP]

  19. Network forensics based on fuzzy logic and expert system. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002