Quangang Li

  • Citations Per Year
Learn More
With the increased focus on Internet privacy, especially after the exposure of PRISM(an Internet surveillance program), anonymous communication have been getting more and more attentions. One of the most widely used anonymous communication systems is I2P(Invisible Internet Project). And as opposed to Tor’s(another popular anonymous communication system)(More)
Mining user behavior and analyzing its anomalies are crucial research issues in detecting data breaches and insider threats. In this paper, we propose an effective approach using non-textual features for identifying anomalous behaviors in communication networks. Based on user historic behaviors, we construct the benchmark of behaviors and then measure the(More)
Email plays a very important role in our daily life. Much work have been put into practice on email network. Those studies mostly require real email network datasets and reliable models to analyze user information and understand the mechanisms of network evolution. However, much research work is constrained by the absence of real large-scale email datasets.(More)
Classifying compound named entities in academic domains, such as the name of papers, patents and projects, plays an important role in enhancing many applications such as knowledge discovering and intelligence property protection. However, there are very little work on this novel and hard problem. Prior mainstream approaches mainly focus on classifying basic(More)
We study one property of Bregman projection onto closed convex sets in Banach spaces. As an application, we use this property to simplify a class of hybrid algorithms for finding fixed points of nonlinear mappings and solving convex feasibility, variational inequality and equilibrium problems. This will reduce the computational complexity.
Mining host behavior patterns from massive logs plays an important and crucial role in anomalies diagnosing and management for large-scale networks. Almost all prior work gives a macroscopic link analysis of network events, but fails to microscopically analyze the evolution of behavior patterns for each host in networks. In this paper, we propose a novel(More)
  • 1