default search action
Dong Guo 0002
Person information
- affiliation: Jilin Univesity, College of Computer Science and Technology, China
Other persons with the same name
- Dong Guo — disambiguation page
- Dong Guo 0001 — National University of Singapore, School of Computing, Singapore
- Dong Guo 0003 — Columbia University, Department of Electrical Engineering, New York City, NY, USA
- Dong Guo 0004 — Boston University, MA, USA
- Dong Guo 0005 — Liaoning University of Technology, School of Electrical Engineering, Jinzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Huifen Wang, Dong Guo, Jinrui Wei, Jinze Li:
A method of classifying IoT devices based on attack sensitivity. J. Inf. Secur. Appl. 82: 103751 (2024) - 2022
- [j20]Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng:
Exploring the vulnerability in the inference phase of advanced persistent threats. Int. J. Distributed Sens. Networks 18(3): 155013292210804 (2022) - 2021
- [j19]Longkang Shang, Dong Guo, Yuede Ji, Qiang Li:
Discovering unknown advanced persistent threat using shared features mined by neural networks. Comput. Networks 189: 107937 (2021) - [j18]Zhengqiang Ge, Xinyu Liu, Qiang Li, Yu Li, Dong Guo:
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation. Int. J. Distributed Sens. Networks 17(12): 155014772110612 (2021) - [j17]Ming Li, Qiang Li, Guangzhe Xuan, Dong Guo:
Identifying compromised hosts under APT using DNS request sequences. J. Parallel Distributed Comput. 152: 67-78 (2021) - [i1]Zhengqiang Ge, Zhipeng Zhou, Dong Guo, Qiang Li:
Practical Two-party Privacy-preserving Neural Network Based on Secret Sharing. CoRR abs/2104.04709 (2021) - 2020
- [j16]Zongyuan Xiang, Dong Guo, Qiang Li:
Detecting mobile advanced persistent threats based on large-scale DNS logs. Comput. Secur. 96: 101933 (2020) - [j15]Guanghua Yan, Qiang Li, Dong Guo, Xiangyu Meng:
Discovering Suspicious APT Behaviors by Analyzing DNS Activities. Sensors 20(3): 731 (2020)
2010 – 2019
- 2019
- [j14]Xinyang Jiang, Qiang Li, Zhen Ma, Mianxiong Dong, Jun Wu, Dong Guo:
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks. Peer-to-Peer Netw. Appl. 12(5): 1385-1402 (2019) - [j13]Bo Feng, Qiang Li, Yuede Ji, Dong Guo, Xiangyu Meng:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. Secur. Commun. Networks 2019: 3053418:1-3053418:14 (2019) - [j12]Guanghua Yan, Qiang Li, Dong Guo, Bing Li:
AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats. Sensors 19(14): 3180 (2019) - [j11]Zhen Zhang, Shuqiang Huang, Dong Guo, Yonghui Li:
RVCCC: A new variational network of cube-connected cycles and its topological properties. Theor. Comput. Sci. 767: 34-50 (2019) - 2018
- [j10]Qiang Fu, Bo Feng, Dong Guo, Qiang Li:
Combating the evolving spammers in online social networks. Comput. Secur. 72: 60-73 (2018) - [j9]Bo Feng, Qiang Fu, Mianxiong Dong, Dong Guo, Qiang Li:
Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Netw. 32(4): 15-21 (2018) - [j8]Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo:
Towards fast and lightweight spam account detection in mobile social networks through fog computing. Peer-to-Peer Netw. Appl. 11(4): 778-792 (2018) - 2017
- [j7]Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo:
Understanding socialbot behavior on end hosts. Int. J. Distributed Sens. Networks 13(2) (2017) - [j6]Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo:
GroupFound: An effective approach to detect suspicious accounts in online social networks. Int. J. Distributed Sens. Networks 13(7) (2017) - [j5]Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Discovering hidden suspicious accounts in online social networks. Inf. Sci. 394: 123-140 (2017) - 2016
- [j4]Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo:
Detection of Forwarding-Based Malicious URLs in Online Social Networks. Int. J. Parallel Program. 44(1): 163-180 (2016) - [j3]Dong Guo, Jian Cao, Xiaoqi Wang, Qiang Fu, Qiang Li:
Combating QR-Code-Based Compromised Accounts in Mobile Social Networks. Sensors 16(9): 1522 (2016) - 2015
- [j2]Yuede Ji, Qiang Li, Yukun He, Dong Guo:
Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection. Int. J. Distributed Sens. Networks 11: 524627:1-524627:17 (2015) - [j1]Yuede Ji, Qiang Li, Yukun He, Dong Guo:
BotCatch: leveraging signature and behavior for bot detection. Secur. Commun. Networks 8(6): 952-969 (2015) - [c14]Jian Cao, Qiang Fu, Qiang Li, Dong Guo:
Leveraging Behavior Diversity to Detect Spammers in Online Social Networks. ICA3PP (3) 2015: 323-336 - 2014
- [c13]Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo:
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. ISPEC 2014: 75-89 - 2013
- [c12]Yuede Ji, Yukun He, Qiang Li, Dong Guo:
BotCatch: A Behavior and Signature Correlated Bot Detection Approach. HPCC/EUC 2013: 1634-1639 - [c11]Yukun He, Qiang Li, Yuede Ji, Dong Guo:
BotInfer: A Bot Inference Approach by Correlating Host and Network Information. NPC 2013: 356-367 - 2011
- [c10]Dong Guo, Yong Du, Qiang Li, Liang Hu:
Design and Realization of the Cloud Data Backup System Based on HDFS. WISM (3) 2011: 396-403
2000 – 2009
- 2009
- [c9]Wei Shi, Qiang Li, Jian Kang, Dong Guo:
Reconstruction of Worm Propagation Path by Causality. NAS 2009: 129-132 - 2008
- [c8]Liang Hu, Dong Guo, Xilong Che:
A Fast Resource Selection Approach for Grid Applications Based on Fuzzy Clustering Technology. HPCC 2008: 1019-1024 - [c7]Yang Xiang, Qiang Li, Dong Guo:
Online Accumulation: Reconstruction of Worm Propagation Path. NPC 2008: 162-172 - 2007
- [c6]Dong Guo, Liang Hu, Shilan Jin, Bingxin Guo:
Applying Preference-Based Fuzzy Clustering Technology to Improve Grid Resources Selection Performance. FSKD (2) 2007: 214-218 - 2006
- [c5]Liang Hu, Kuo Tang, Kuo Zhao, Dong Guo, Bing Liang:
Extended Resource Information Services Based-on Directory Service Technology. CSCWD 2006: 905-909 - [c4]Meng Zhang, Jijun Tang, Dong Guo, Liang Hu, Qiang Li:
Succinct Text Indexes on Large Alphabet. TAMC 2006: 528-537 - 2005
- [c3]Xiu-chuan Wu, Li-jie Sha, Dong Guo, Lan-fang Lou, Liang Hu:
GT-Based Performance Improving for Resource Management of Computational Grid. GCC 2005: 1072-1077 - [c2]Liang Hu, Dong Guo, Gaochao Xu, Xiaohui Wei, Bingxin Guo, Kuo Tang, Shengli Zhao:
A Grid CPU Availability Forecasting Tool for Windows. IASTED PDCS 2005: 25-30 - [c1]Dong Guo, Liang Hu, Meng Zhang, Zhuopeng Zhang:
GcpSensor: a CPU Performance Tool for Grid Environments. QSIC 2005: 273-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint