default search action
Mingshu He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Yiqing Luo, Mingshu He, Xiaojuan Wang:
Analyzing the Semantic Structure of Network Flow: A Threat Detection Method With Independent Generalization Capabilities. IEEE Trans. Netw. Sci. Eng. 12(1): 28-43 (2025) - 2024
- [j20]Mingshu He, Yuanming Huang, Xinlei Wang, Peng Wei, Xiaojuan Wang:
A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping. IEEE Internet Things J. 11(2): 2935-2949 (2024) - [j19]Ying Han, Xinlei Wang, Mingshu He, Xiaojuan Wang, Shize Guo:
Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory. IEEE Internet Things J. 11(10): 17589-17601 (2024) - [j18]Xinlei Wang, Mingshu He, Jiaxuan Wang, Xiaojuan Wang:
Toward Efficient Neural Networks Through Predictor-Assisted NSGA-III for Anomaly Traffic Detection of IoT. IEEE Trans. Cogn. Commun. Netw. 10(3): 982-995 (2024) - [j17]Xiaojuan Wang, Zikui Lu, Xinlei Wang, Mingshu He, Xiaojun Wang:
GETRF: A General Framework for Encrypted Traffic Identification With Robust Representation Based on Datagram Structure. IEEE Trans. Cogn. Commun. Netw. 10(6): 2045-2060 (2024) - [j16]Yuanming Huang, Mingshu He, Xiaojuan Wang, Jie Zhang:
HeVulD: A Static Vulnerability Detection Method Using Heterogeneous Graph Code Representation. IEEE Trans. Inf. Forensics Secur. 19: 9129-9144 (2024) - [j15]Xinlei Wang, Xiaojuan Wang, Mingshu He, Min Zhang, Zikui Lu:
Spatial-Temporal Graph Model Based on Attention Mechanism for Anomalous IoT Intrusion Detection. IEEE Trans. Ind. Informatics 20(3): 3497-3509 (2024) - [j14]Mingshu He, Xiaojuan Wang, Peng Wei, Liu Yang, Yinglei Teng, Renjian Lyu:
Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification. IEEE Trans. Netw. Serv. Manag. 21(2): 2477-2492 (2024) - [j13]Xiaojuan Wang, Yiqing Luo, Mingshu He, Xinlei Wang:
A Semantic Detection Method for Network Flows With Global and Generalized Nature. IEEE Trans. Netw. Serv. Manag. 21(4): 4713-4730 (2024) - [j12]Xiaojuan Wang, Yu Zhang, Mingshu He, Shize Guo, Liu Yang:
Supervised Representation Learning for Network Traffic With Cluster Compression. IEEE Trans. Sustain. Comput. 9(1): 1-13 (2024) - [c10]Yabo Xiao, Mingshu He, Dongdong Yu:
Global-To-Pixel Regression for Human Mesh Recovery. ECCV (16) 2024: 481-497 - 2023
- [j11]Jiaming Song, Xiaojuan Wang, Mingshu He, Lei Jin:
CSK-CNN: Network Intrusion Detection Model Based on Two-Layer Convolution Neural Network for Handling Imbalanced Dataset. Inf. 14(2): 130 (2023) - [j10]Xinlei Wang, Xiaojuan Wang, Mingshu He, Min Zhang, Zhao Zhang:
A Manifold Consistency Interpolation Method of Poisoning Attacks Against Semi-Supervised Model. IEEE Trans. Inf. Forensics Secur. 18: 5272-5285 (2023) - 2022
- [j9]Zhijie Han, Qingfang Zhang, Xiaoyu Du, Kun Guo, Mingshu He:
Topology analysis and routing algorithms design for PTNet network. Concurr. Comput. Pract. Exp. 34(8) (2022) - [c9]Yabo Xiao, Xiaojuan Wang, Dongdong Yu, Guoli Wang, Qian Zhang, Mingshu He:
AdaptivePose: Human Parts as Adaptive Points. AAAI 2022: 2813-2821 - [c8]Yiqing Luo, Mingshu He, Xiaojuan Wang, Lei Jin:
between flow and bytes. BigDataService 2022: 179-180 - [c7]Yabo Xiao, Kai Su, Xiaojuan Wang, Dongdong Yu, Lei Jin, Mingshu He, Zehuan Yuan:
QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query. NeurIPS 2022 - [i2]Yabo Xiao, Kai Su, Xiaojuan Wang, Dongdong Yu, Lei Jin, Mingshu He, Zehuan Yuan:
QueryPose: Sparse Multi-Person Pose Regression via Spatial-Aware Part-Level Query. CoRR abs/2212.07855 (2022) - 2021
- [j8]Xiaojuan Wang, Xinlei Wang, Lei Jin, Renjian Lv, Bingying Dai, Mingshu He, Tianqi Lv:
Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification. IEEE Access 9: 52310-52325 (2021) - [j7]Haiyang Jiang, Mingshu He, Yuanyuan Xi, Jianqiu Zeng:
Machine-Learning-Based User Position Prediction and Behavior Analysis for Location Services. Inf. 12(5): 180 (2021) - [j6]Mingshu He, Xiaojuan Wang, Junhua Zhou, Yuanyuan Xi, Lei Jin, Xinlei Wang:
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection. Secur. Commun. Networks 2021: 6659022:1-6659022:13 (2021) - [j5]Lei Jin, Xiaojuan Wang, Mingshu He, Jingyue Wang:
DRNet: A Depth-Based Regression Network for 6D Object Pose Estimation. Sensors 21(5): 1692 (2021) - [j4]Mingshu He, Xiaojuan Wang, Lei Jin, Bingying Dai, Kaiwenlv Kacuila, Xiaosu Xue:
Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data. Sensors 21(17): 5942 (2021) - [j3]Xiaojuan Wang, Xinlei Wang, Tianqi Lv, Lei Jin, Mingshu He:
HARNAS: Human Activity Recognition Based on Automatic Neural Architecture Search Using Evolutionary Algorithms. Sensors 21(20): 6927 (2021) - [j2]Mingshu He, Xiaojuan Wang, Chundong Zou, Bingying Dai, Lei Jin:
A Commodity Classification Framework Based on Machine Learning for Analysis of Trade Declaration. Symmetry 13(6): 964 (2021) - [j1]Renjian Lyu, Mingshu He, Yu Zhang, Lei Jin, Xinlei Wang:
Network Intrusion Detection Based on an Efficient Neural Architecture Search. Symmetry 13(8): 1453 (2021) - [c6]Xiaojuan Wang, Kaiwenlv Kacuila, Mingshu He:
An N-gram Based Deep Learning Method for Network Traffic Classification. ICAIS (2) 2021: 289-304 - [c5]Mingshu He, Lei Jin, Mei Song:
Interpretability Framework of Network Security Traffic Classification Based on Machine Learning. ICAIS (2) 2021: 305-320 - [i1]Yabo Xiao, Xiaojuan Wang, Dongdong Yu, Guoli Wang, Qian Zhang, Mingshu He:
AdaptivePose: Human Parts as Adaptive Points. CoRR abs/2112.13635 (2021)
2010 – 2019
- 2019
- [c4]Zhijie Han, Qingfang Zhang, Xiaoyu Du, Kun Guo, Mingshu He:
Toward PTNET Network Topology Analysis and Routing Algorithm Design. ICDS 2019: 613-627 - 2018
- [c3]Xin He, Mingshu He, Zhijie Han:
A Survey of Network Topology of Data Center. BigDataSecurity/HPSC/IDS 2018: 39-41 - [c2]Xin Guo, Mingshu He, Mo Chen, Xiaojie Zhao, Ye Tian:
Research on Data Visualization in Different Scenarios. HCC 2018: 232-243 - 2017
- [c1]Mingshu He, Xiaojuan Wang, Jingwen You, Zhen Wang:
Analysis on Structural Vulnerability Under the Asymmetric Information. HCC 2017: 503-515
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint