Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Xue, Yibo
add a person with the name Xue, Yibo
 

Other publications of authors with the same name

YACA: Yet Another Cluster-Based Architecture for Network Intrusion Prevention., , , and . GLOBECOM, page 1-5. IEEE, (2010)Proximity-Aware cache Replication., , , , and . ASP-DAC, page 481-486. IEEE, (2012)Utilization-Aware Allocation for Multi-Tenant Datacenters., , and . ICDCS Workshops, page 82-87. IEEE Computer Society, (2013)Emilie: Enhance the power of traffic identification., , , , and . ICNC, page 31-35. IEEE, (2014)DBS: A Bit-level Heuristic Packet Classification Algorithm for High Speed Network., , , and . ICPADS, page 260-267. IEEE Computer Society, (2009)Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor., , , , and . ICPADS, page 220-227. IEEE Computer Society, (2009)A Novel Optimization Method to Improve De-duplication Storage System Performance., , , and . ICPADS, page 228-235. IEEE Computer Society, (2009)Optimizing multi-thread string matching for network processor based intrusion management system., , and . Communication, Network, and Information Security, page 199-204. IASTED/ACTA Press, (2006)DroidChain: A novel Android malware detection method based on behavior chains., , , , and . Pervasive and Mobile Computing, (2016)BCBPI: A noval behavior chain based protocol identification method., , and . CCIS, page 651-656. IEEE, (2012)