default search action
Guozi Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Xiao Qu, Zhexuan Yang, Zeng Chen, Guozi Sun:
A consent-aware electronic medical records sharing method based on blockchain. Comput. Stand. Interfaces 92: 103902 (2025) - 2024
- [j21]Weiqiang Xu, Yang Liu, Wenjie Liu, Huakang Li, Guozi Sun:
HDML: hybrid data-driven multi-task learning for China's stock price forecast. Appl. Intell. 54(23): 12420-12438 (2024) - [j20]Rui Wang, Yanan Wang, Xing Liu, Haiping Huang, Guozi Sun:
Bridging spherical mixture distributions and word semantic knowledge for Neural Topic Modeling. Expert Syst. Appl. 256: 124850 (2024) - [j19]Xuan You, Changsong Zhou, Zeng Chen, Rui Han, Yu Gu, Guozi Sun:
Large File Security Outsourcing and Sharing Method Based on Blockchain. J. Signal Process. Syst. 96(3): 239-256 (2024) - [c42]Chen Dai, Tianyu Wu, Guozi Sun, Yiping Zuo, Zhengxin Guo, Fu Xiao:
Joint UAV Trajectory and Beamforming Design for RIS-aided Integrated Sensing and Communication System. INFOCOM (Workshops) 2024: 1-6 - [i1]Dewen Suo, Lei Xue, Runze Tan, Weihao Huang, Guozi Sun:
ARAP: Demystifying Anti Runtime Analysis Code in Android Apps. CoRR abs/2408.11080 (2024) - 2023
- [j18]Lingfeng Lu, Yang Liu, Weiqiang Xu, Huakang Li, Guozi Sun:
From task to evaluation: an automatic text summarization review. Artif. Intell. Rev. 56(S2): 2477-2507 (2023) - [j17]Changsong Zhou, Guozi Sun, Xuan You, Yu Gu:
A slice-based encryption scheme for IPFS. Int. J. Secur. Networks 18(1): 42-51 (2023) - [j16]Wenjie Liu, Sai Chen, Guoyao Huang, Lingfeng Lu, Huakang Li, Guozi Sun:
Incorporating I Ching Knowledge Into Prediction Task via Data Mining. J. Database Manag. 34(3): 1-16 (2023) - [j15]Hongjie Wan, Junchen Ma, Qiumei Yu, Guozi Sun, Hansen He, Huakang Li:
Modeling and Optimization of Multi-Model Waste Vehicle Routing Problem Based on the Time Window. J. Database Manag. 34(3): 1-16 (2023) - [j14]Rui Han, Yu Wang, Mingfa Wan, Teng Yuan, Guozi Sun:
FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain. Peer Peer Netw. Appl. 16(6): 2850-2864 (2023) - [c41]Puhe Hao, Tianyu Pan, Rui Han, Xiao Qu, Zhexuan Yang, Guozi Sun:
RPChain: Regulatable Privacy-Preserving Group Data Sharing Based on Consortium Blockchain. APNOMS 2023: 334-337 - [c40]Puhe Hao, Tianyu Pan, Rui Han, Xiao Qu, Zhexuan Yang, Guozi Sun:
A Privacy-Preserving Data Sharing Scheme Based on Blockchain for Vehicular Edge Networks. GLOBECOM 2023: 5116-5121 - 2022
- [c39]Shichao Zhou, Liefeng Cao, Ruizhe Zhang, Guozi Sun:
M-ISFCM: A Semisupervised Method for Anomaly Detection of MOOC Learning Behavior. ICPCSEE (2) 2022: 323-336 - [c38]Qiumei Yu, Hongjie Wan, Junchen Ma, Huakang Li, Guozi Sun:
A Method of Garbage Quantity Prediction Based on Population Change. Intelligent Information Processing 2022: 536-548 - [c37]Zhixiang Chen, Haifeng Zhao, Yan Zhang, Guozi Sun, Tianjian Wu:
Self-supervised Learning for Sketch-Based 3D Shape Retrieval. PRCV (1) 2022: 318-329 - [c36]Xuan You, Changsong Zhou, Zeng Chen, Yu Gu, Rui Han, Guozi Sun:
Secure File Outsourcing Method Based on Consortium Blockchain. SmartCom 2022: 371-380 - [c35]Jingxuan Liu, Ming Zhu, Huajiang Ouyang, Guozi Sun, Huakang Li:
Triplet Embedding Convolutional Recurrent Neural Network for Long Text Semantic Analysis. WISE 2022: 607-615 - 2021
- [j13]Jitao Wang, Guozi Sun, Yu Gu, Kun Liu:
ConGradetect: Blockchain-based detection of code and identity privacy vulnerabilities in crowdsourcing. J. Syst. Archit. 114: 101910 (2021) - [j12]Jiarui Man, Guozi Sun:
A Residual Learning-Based Network Intrusion Detection System. Secur. Commun. Networks 2021: 5593435:1-5593435:9 (2021) - [c34]Guozi Sun, Zhi Li, Huakang Li, Xiangyu Tang:
Judicial Case Determination Methods Based on Event Tuple. WASA (1) 2021: 240-252 - 2020
- [c33]Xiaoyu Sun, Huakang Li, Guozi Sun, Ming Zhu:
Fine-grained emoji sentiment analysis based on attributes of Twitter users. SmartCloud 2020: 134-139
2010 – 2019
- 2019
- [j11]Xu Jin, Lei Wang, Guozi Sun, Huakang Li:
一种基于质心空间的不均衡数据欠采样方法 (Under-sampling Method for Unbalanced Data Based on Centroid Space). 计算机科学 46(2): 50-55 (2019) - [j10]Zhen Du, Lipeng Ma, Guozi Sun:
一种基于小波分析的网络流量异常检测方法 (Network Traffic Anomaly Detection Based on Wavelet Analysis). 计算机科学 46(8): 178-182 (2019) - [c32]Zhiliang Chen, Junfeng Wu, Huakang Li, Guozi Sun:
Characterization and graph embedding of weighted social networks through Diffusion Wavelets. IEEE BigData 2019: 5346-5352 - [c31]Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu:
Chinese Spam Data Filter Model in Mobile Internet. ICACT 2019: 339-343 - [c30]Mengting Xu, Yanrong Cao, Guozi Sun, Huakang Li:
CRQA: Credibility Retrieval for Medical Question Answer Service. RCAR 2019: 347-350 - [c29]Huakang Li, Lei Wang, Yongchao Wang, Guozi Sun:
Sentiment Analysis Based on Bi-LSTM Using Tone. SKG 2019: 30-35 - [c28]Yongchao Wang, Mengting Xu, Lei Wang, Huakang Li, Guozi Sun:
JEDoDF: Judicial Event Discrimination Based on Deep Forest. SKG 2019: 36-43 - 2018
- [j9]Pan Liu, Huakang Li, Guozi Sun:
基于短时多源回归算法的P2P平台风险观测方法 (Risk Observing Method Based on Short-time Multi-source Regression Algorithm on P2P Platform). 计算机科学 45(5): 97-101 (2018) - [j8]Chonghuan Xia, Huakang Li, Guozi Sun:
基于行为特征分析的微博恶意用户识别 (Microblogging Malicious User Identification Based on Behavior Characteristic Analysis). 计算机科学 45(12): 111-116 (2018) - [c27]Yasen Aizezi, Yuhua Feng, Li Yu, Guozi Sun:
The Dynamic Data Integrity Verification and Recovery Scheme based on MHT. AVSS 2018: 1-6 - [c26]Guozi Sun, Wenti Jiang, Yu Gu, Danni Ren, Huakang Li:
DDoS Attacks and Flash Event Detection Based on Flow Characteristics in SDN. AVSS 2018: 1-6 - [c25]Guozi Sun, Lei Zhu, Huakang Li, Wenjun Li:
Web attack forensics based on network traffic behavior characteristics and URLs. AVSS 2018: 1-6 - [c24]Pan Liu, Huakang Li, Guozi Sun:
P2P Lending Platform Risk Observing Method Based on Short-Time Multi-Source Regression Algorithm. ICC 2018: 1-6 - [c23]Biao Huang, Qiao Ding, Guozi Sun, Huakang Li:
Stock Prediction based on Bayesian-LSTM. ICMLC 2018: 128-133 - [c22]Danni Ren, Wenti Jiang, Huakang Li, Guozi Sun:
An OpenvSwitch Extension for SDN Traceback. NSS 2018: 423-435 - [c21]Zhen Du, Lipeng Ma, Huakang Li, Qun Li, Guozi Sun, Zichang Liu:
Network Traffic Anomaly Detection Based on Wavelet Analysis. SERA 2018: 94-101 - [c20]Xin Li, Xianzhong Long, Guozi Sun, Geng Yang, Huakang Li:
Overdue Prediction of Bank Loans Based on LSTM-SVM. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1859-1863 - 2017
- [j7]Huakang Li, Zheng Xu, Tao Li, Guozi Sun, Kim-Kwang Raymond Choo:
An optimized approach for massive web page classification using entity similarity based on semantic network. Future Gener. Comput. Syst. 76: 510-518 (2017) - [j6]Qun Jin, Yong Xiang, Guozi Sun, Yao Liu, Chin-Chen Chang:
Cybersecurity for Cyber-Enabled Multimedia Applications. IEEE Multim. 24(4): 10-13 (2017) - [j5]Yitao Yang, Zheng Xu, Liying Liu, Guozi Sun:
A security carving approach for AVI video based on frame size and index. Multim. Tools Appl. 76(3): 3293-3312 (2017) - [c19]Yiwei Song, Kaiwen Gu, Huakang Li, Guozi Sun:
A Lexical Updating Algorithm for Sentiment Analysis on Chinese Movie Reviews. CBD 2017: 188-193 - [c18]Yitao Yang, Runqiu Hu, Chengyan Qiu, Guozi Sun, Huakang Li:
A Spam Message Detection Model Based on Bayesian Classification. EIDWT 2017: 424-435 - [c17]Haichao Guan, Huakang Li, Guozi Sun:
Analysis of User's Abnormal Behavior Based on Behavior Sequence in Enterprise Network. ICCCS (1) 2017: 531-541 - 2016
- [c16]Huakang Li, Xinwen Zhang, Yitao Yang, Guozi Sun:
A Demonstration of Encrypted Logistics Information System. APWeb (2) 2016: 525-528 - [c15]Xuesong Jia, Danni Ren, Yitao Yang, Huakang Li, Guozi Sun:
DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network. SEKE 2016: 124-127 - [c14]Huakang Li, Zhenyu Wang, Yitao Yang, Guozi Sun:
A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage. SpaCCS 2016: 14-25 - [c13]Xinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen:
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code. Trustcom/BigDataSE/ISPA 2016: 996-1000 - [c12]Yu Yang, Chao Li, Guozi Sun:
A Time-Space Attribute-Based Evidence Fixing Method in Digital Forensics. TSA 2016: 127-131 - 2015
- [j4]L. Xue, Guozi Sun:
Design and implementation of a malware detection system based on network behavior. Secur. Commun. Networks 8(3): 459-470 (2015) - [c11]Huakang Li, Siqi Huang, Guozi Sun:
An opinion leader perceptual model based on PageRank algorithm. BESC 2015: 150-155 - [c10]Lingzhi Qiu, Zixiong Zhang, Ziyi Shen, Guozi Sun:
AppTrace: Dynamic trace on Android devices. ICC 2015: 7145-7150 - [c9]Fan Zhou, Yitao Yang, Zhaokun Ding, Guozi Sun:
Dump and analysis of Android volatile memory on Wechat. ICC 2015: 7151-7156 - 2014
- [j3]Zhiwei Wang, Guozi Sun, Danwei Chen:
A new definition of homomorphic signature for identity management in mobile cloud computing. J. Comput. Syst. Sci. 80(3): 546-553 (2014) - [c8]Siqi Huang, Yitao Yang, Huakang Li, Guozi Sun:
Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis. APSCC 2014: 88-92 - [c7]Jun Pan, Liying Liu, Guozi Sun, Yanbin Tang:
A method to identify the AVI-type blocks based on their four-character codes and C4.5 algorithm. BESC 2014: 131-137 - [c6]Guozi Sun, Siqi Huang, Wan Bao, Yitao Yang, Zhiwei Wang:
A privacy protection policy combined with privacy homomorphism in the Internet of Things. ICCCN 2014: 1-6 - [c5]Huakang Li, Guozi Sun, Bei Xu, Li Li, Jie Huang, Keita Tanno, Wenxu Wu, Changen Xu:
An Information Classification Approach Based on Knowledge Network. MCSoC 2014: 3-8 - [c4]Huakang Li, Guozi Sun, Bei Xu:
An Approach for Intention Perception Based on Knowledge Network. SKG 2014: 133-136 - 2013
- [j2]Yitao Yang, Xiaolin Qin, Guozi Sun, Yong Xu, Zhongxue Yang, Zhiyue Zu:
Data Deduplication in Wireless Multimedia Monitoring Network. Int. J. Distributed Sens. Networks 9 (2013) - [c3]Xueqing Jiang, Guozi Sun:
MapReduce-based frequent itemset mining for analysis of electronic evidence. SADFE 2013: 1-6 - 2012
- [j1]Zhiwei Wang, Guozi Sun, Danwei Chen:
Short signature from factoring assumption in the standard model. J. Internet Serv. Inf. Secur. 2(3/4): 110-117 (2012)
2000 – 2009
- 2009
- [c2]Yun Li, Su-Jun Hu, Wen-Jie Yang, Guozi Sun, Fang-Wu Yao, Geng Yang:
Similarity-Based Feature Selection for Learning from Examples with Continuous Values. PAKDD 2009: 957-964 - 2007
- [c1]Wei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang:
Defending Against Jamming Attacks in Wireless Local Area Networks. ATC 2007: 519-528
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint