Analyzing the Composition of Cities Using Spatial Clustering Z Cao, S Wang, G Forestier, A Puissant, CF Eick Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing, 14, 2013 | 32 | 2013 |
Creativity in Trusted Data: Research on Application of Blockchain in Supply Chain Z Liang, Y Huang, Z Cao, T Liu, Y Wang International Journal of Performability Engineering 15 (2), 526-535, 2019 | 13 | 2019 |
Detecting Malicious Users Behind Circuit-Based Anonymity Networks SHS Huang, Z Cao IEEE Access 8, 208610-208622, 2020 | 4 | 2020 |
Detecting intruders and preventing hackers from evasion by tor circuit selection Z Cao, SHS Huang 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 3 | 2018 |
Detecting Intruders by User File Access Patterns SHS Huang, Z Cao, CE Raines, MN Yang, C Simon 13th International Conference on Network and System Security (NSS), 2019 | 2 | 2019 |
Host-Based Intrusion Detection: A Behavioral Approach Using Graph Model Z Cao, SH Stephen Huang International Conference on Hybrid Intelligent Systems, 1337-1346, 2022 | 1 | 2022 |
EPSSNet: A Lightweight Network With Edge Processing and Semantic Segmentation for Mobile Robotics Z Cao, GZ Villafuerte, J Almaznaai International Journal on Semantic Web and Information Systems (IJSWIS) 20 (1 …, 2024 | | 2024 |
A Behavioral Graph Model for Host-Based Intrusion Detection Z Cao, SHS Huang Journal of Information Assurance & Security 18 (2), 2023 | | 2023 |
Intrusion Detection: Detecting Network Intruders Behind Anonymity Networks and Identifying Intruders on the Hosts by Modeling User Behaviors Z Cao | | 2020 |
Study and Research on Computer Network Based on Plastic Optical Fiber N Zhang, R Liu, Z Aixiang, Y Rongjin, Z Cao Journal of Optoelectronics·Laser 18 (9), 1071-1073, 2007 | | 2007 |