default search action
Shu Gao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Shuo Yang, Shu Gao:
Multi-Label Text Classification Based on Contrastive and Correlation Learning. CSAIDE 2024: 325-330 - [c16]Liangchen Chen, Shu Gao, Zi-Xuan Wei, Baoxu Liu, Xu-Yao Zhang:
ENS-RFMC: An Encrypted Network Traffic Sampling Method Based on Rule-Based Feature Extraction and Multi-hierarchical Clustering for Intrusion Detection. ICPR (24) 2024: 78-92 - [c15]Liangchen Chen, Shu Gao, Baoxu Liu, Xu-Yao Zhang:
UAD-DPL: An Unknown Encrypted Attack Detection Method Based on Deep Prototype Learning. ICPR (5) 2024: 124-140 - 2023
- [c14]Shu Gao, Wenfen Liu, Yongcan Lu:
Trajectory Privacy Protection Method Based on Sensitivity Analysis. EITCE 2023: 1375-1380 - 2022
- [j7]Shu Gao, Matthew V. Bilskie, Scott C. Hagen:
PyVF: A python program for extracting vertical features from LiDAR-DEMs. Environ. Model. Softw. 157: 105503 (2022) - 2020
- [j6]Zilong Jiang, Shu Gao:
An intelligent recommendation approach for online advertising based on hybrid deep neural network and parallel computing. Clust. Comput. 23(3): 1987-2000 (2020) - [j5]Zilong Jiang, Shu Gao, Liangchen Chen:
Study on text representation method based on deep learning and topic information. Computing 102(3): 623-642 (2020) - [j4]Xiufeng Cao, Shu Gao, Liangchen Chen, Yan Wang:
Ship recognition method combined with image segmentation and deep learning feature extraction in video surveillance. Multim. Tools Appl. 79(13-14): 9177-9192 (2020) - [j3]Liangchen Chen, Shu Gao, Baoxu Liu, Zhigang Lu, Zhengwei Jiang:
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. J. Supercomput. 76(9): 7489-7518 (2020) - [c13]Fukai Liu, Shu Gao, Zhixing Zhou:
Research on Indexing Technology for AIS Data Stream. BDET 2020: 7-12 - [c12]Gang Cheng, Shu Gao, Fan Luo:
Study on a New Method of Rare Pattern Mining Based on QAR Data. ICCAE 2020: 155-160
2010 – 2019
- 2018
- [j2]Xiufeng Cao, Shu Gao, Liangchen Chen:
Gossip-Based Load Balance Strategy in Big Data Systems with Hierarchical Processors. Wirel. Pers. Commun. 98(1): 157-172 (2018) - [c11]Abdoulaye Sidibé, Shu Gao, Yunzhao Ma, Wanqi Wei:
Big Data Framework for Abnormal Vessel Trajectories Detection using Adaptive Kernel Density Estimation. ICBDR 2018: 43-46 - [c10]Ne Wang, Shu Gao, Xiangwen Peng, Minrui Wang:
Research on Fast and Parallel Clustering Method for Trajectory Data. ICPADS 2018: 252-258 - [c9]Shu Gao, Zilong Jiang, Yunhui Shi, Guanyu Wang, Liangchen Chen, Abdoulaye Sidibé:
A CTR Prediction Approach for Advertising Based on Embedding Model and Deep Learning. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 744-750 - 2017
- [j1]Zilong Jiang, Shu Gao, Wei Dai:
A CTR Prediction Approach for Text Advertising Based on the SAE-LR Deep Neural Network. J. Inf. Process. Syst. 13(5): 1052-1070 (2017) - 2015
- [c8]Shu Gao, Mark Hoogendoorn:
Using Evolutionary Algorithms to Personalize Controllers in Ambient Intelligence. ISAmI 2015: 1-11
2000 – 2009
- 2009
- [c7]Yi Liu, Shu Gao:
WSRF-Based Distributed Visualization. CCGRID 2009: 615-619 - 2007
- [c6]Shu Gao, Dingfang Chen:
Semantic Approach to Visualization Service Discovery. SNPD (3) 2007: 365-370 - 2005
- [c5]Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Gao:
Secure Software Architectures Design by Aspect Orientation. ICECCS 2005: 47-55 - 2004
- [c4]Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao:
Modeling and analyzing security protocols in SAM: A case study. IASTED Conf. on Software Engineering and Applications 2004: 115-121 - [c3]Shu Gao, Yi Deng, Huiqun Yu, Xudong He, Konstantin Beznosov, Kendra M. L. Cooper:
Applying Aspect-Orientation in Designing Security Systems: A Case Study. SEKE 2004: 360-365 - 2003
- [c2]Huiqun Yu, Xudong He, Shu Gao, Yi Deng:
Formal Software Architecture Design of Secure Distributed Systems. SEKE 2003: 450-457 - 2002
- [c1]Huiqun Yu, Xudong He, Shu Gao, Yi Deng:
Modeling and Analyzing SMIL Documents in SAM. ISMSE 2002: 132-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 02:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint