The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yao Li 0002: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhanchun Li, Zhitang Li, Yao Li, Bin Liu
    Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:309-314 [Conf]
  2. Li Wang, Zhitang Li, Jie Lei, Yao Li
    A novel algorithm SF for mining attack scenarios model. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:55-61 [Conf]
  3. Yao Li, Zhitang Li, Li Wang
    Fuzzy Anomaly Detection System for IPv6 (FADS6): An Immune-Inspired Algorithm with Hash Function. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:553-562 [Conf]
  4. Liu Bin, Zhitang Li, Yao Li
    An Image Hiding Method Based on Correlation Analysis and Image Fusion. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:1049-1051 [Conf]
  5. Lingfang Zeng, Ke Zhou, Zhan Shi, Dan Feng, Fang Wang, Changsheng Xie, Zhitang Li, Zhanwu Yu, Jianya Gong, Qiang Cao, Zhongying Niu, Lingjun Qin, Qun Liu, Yao Li
    Storage challenge - HUSt: a heterogeneous unified storage system for GIS grid. [Citation Graph (0, 0)][DBLP]
    SC, 2006, pp:325- [Conf]
  6. Yao Li, Zhitang Li, Shuyu Liu
    A Fuzzy Anomaly Detection Algorithm for IPv6. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:67- [Conf]

  7. A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002