default search action
Lixin Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Huan Zhang, Lixin Zhao, Aimin Yu, Lijun Cai, Dan Meng:
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis. IEEE Trans. Inf. Forensics Secur. 19: 6113-6127 (2024) - [c17]Lifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng:
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats. CSCWD 2024: 407-412 - [c16]Chentong Zhao, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai, Jiangang Ma:
EntityParser: A Log Analytics Parser for Identifying Entities from System Logs. CSCWD 2024: 2040-2045 - [c15]Tao Leng, Lixin Zhao, Yuedong Pan, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dan Meng:
Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors. ISCC 2024: 1-7 - 2023
- [j10]Wei Li, Yuliang Chen, Lixin Zhao, Yazhou Luo, Xin Liu:
Research on malicious traffic detection based on image recognition. Int. J. Embed. Syst. 16(2): 134-142 (2023) - [j9]Zhibin Liu, Zhanpeng Lv, Lixin Zhao, Min Li, Xin Liu:
A malicious traffic detection method based on Bayesian meta-learning for few samples. Int. J. Embed. Syst. 16(3): 235-244 (2023) - [j8]Yong Zhang, Lixin Zhao, Yansong Fang, Daoming Mu, Haiyan Zhang:
LSTM-based multi-PIR sensor information fusing for estimating the speed and position of pedestrians on green campus. Int. J. Sens. Networks 43(4): 223-231 (2023) - [c14]Tao Leng, Yuedong Pan, Lixin Zhao, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dang Meng:
MemInspect: Memory Forensics for investigating Fileless Attacks. TrustCom 2023: 946-955 - 2022
- [j7]Lixin Zhao, Chengdai Huang, Xinyu Song:
Bifurcation of N-Dimensional Fractional-Order Competitive Website Model with Delay. Int. J. Bifurc. Chaos 32(13): 2250196:1-2250196:24 (2022) - [c13]Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. MILCOM 2022: 292-297 - [c12]Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. SecureComm 2022: 510-528 - 2021
- [j6]Lixin Zhao, Wu-Yuin Hwang, Timothy K. Shih:
Investigation of the Physical Learning Environment of Distance Learning Under COVID-19 and Its Influence on Students' Health and Learning Satisfaction. Int. J. Distance Educ. Technol. 19(2): 77-98 (2021) - [j5]Lixin Zhao:
A Facial Expression Recognition Method Using Two-Stream Convolutional Networks in Natural Scenes. J. Inf. Process. Syst. 17(2): 399-410 (2021) - [c11]Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
Towards Open World Traffic Classification. ICICS (1) 2021: 331-347 - [c10]Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. SecureComm (1) 2021: 3-24 - 2020
- [c9]Lixin Zhao, Xiaoxia Shen, Wu-Yuin Hwang, Timothy K. Shih:
A Study on the Factors Influencing the Participation of Face-to-Face Discussion and Online Synchronous Discussion in Class. ITS 2020: 184-195 - [c8]Yujie Wang, Xin Shen, Yu Peng, Lixin Zhao:
Research on Optimization Method of Tool Path in Five-Axis Process Singular Region. MLIS 2020: 61-70 - [c7]Hong Ji, Yujie Wang, Yu Peng, Lixin Zhao, Song Huang:
Research and Application of High Precision Machining Technology for Super-Large Integral Frame Parts of Aluminum Alloy. MLIS 2020: 80-88 - [c6]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
A novel network traffic classification approach via discriminative feature learning. SAC 2020: 1026-1033
2010 – 2019
- 2019
- [j4]Xiaoling Ding, Lixin Zhao, Tian-Tian Zhou, Yi-Bin Li, Xi-Mei Huang, Ya-Li Zhao:
Research on wheat leaf water content based on machine vision. Clust. Comput. 22(Supplement): 9199-9208 (2019) - [c5]Tianci Liu, Lixin Zhao, Bin Li, Chenglin Zhao:
Research on the Enhancement of VANET Coverage Based on UAV. CSPS 2019: 787-795 - [c4]Lixin Zhao, Dan Lu, Wu-Yuin Hwang, Timothy K. Shih:
Perception of MOOC Pedagogical Tools and Learners' Learning Styles in MOOC Blended Teaching: a Case Study. ICEBT 2019: 1-6 - [c3]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
Prototype-Based Malware Traffic Classification with Novelty Detection. ICICS 2019: 3-17 - [c2]Yunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng:
Building Trust in Container Environment. TrustCom/BigDataSE 2019: 1-9 - 2018
- [j3]Lixin Zhao, Jingjing Xu, Chengyi Wang, Xiaoling Ding, Fei Li, FaDong Hou:
Research and Design of an Automatic Grading Device in Chicken Wing Weight. Wirel. Pers. Commun. 102(2): 769-782 (2018) - 2016
- [j2]Xiaoling Ding, Li Peijian, Lixin Zhao, Chengyi Wang, Yibin Li, Naichao Chen:
Research and design of intelligent control and precision sowing simulation system for wheat. J. Intell. Fuzzy Syst. 31(4): 2313-2320 (2016) - 2015
- [j1]Wei Wu, Jiong Liu, Lixin Zhao:
Fast prediction unit partition mode selection for high-efficiency video coding intercoding using motion homogeneous coding units. J. Electronic Imaging 24(6): 063024 (2015)
2000 – 2009
- 2007
- [c1]Meijuan Gao, Jingwen Tian, Lixin Zhao, Kai Li:
The Study of Membrane Fouling Modeling Method Based on Wavelet Neural Network for Sewage Treatment Membrane Bioreactor. ICNC (2) 2007: 75-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint