Xiaohong Guan

Learn More
The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications over the past decade. Pattern recognition by learning the features in the training samples to classify the unknown flows is one of the main methods. However, many methods developed in(More)
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven to be ineffective in terms of dynamic port allocation and packet encapsulation. The signature matching methods, on the other hand, require a known signature set and processing of(More)
Intrusion detection is an important technique in the defense-in-depth network security framework. In recent years, it has been a widely studied topic in computer network security. In this paper, we present two methods, namely, the Hidden Markov Models (HMM) method and the Self Organizing Maps (SOM) method, to profile normal program behavior for anomaly(More)
Follower networks such as Twitter and Digg are becoming popular form of social information networks. This paper seeks to gain insights into how they evolve and the relationship between their structure and their ability to spread information. By studying the Douban follower network, which is a popular online social network in China, we provide some evidences(More)
Exploring statistics of locally connected subgraph patterns (also known as network motifs) has helped researchers better understand the structure and function of biological and Online Social Networks (OSNs). Nowadays, the massive size of some critical networks—often stored in already overloaded relational databases—effectively limits the rate at(More)
When simulating a mobile ad hoc network (MANET), it is important to use a realistic mobility model to reflect the actual performance of a mobile system. The spatial distribution of node locations in a mobile model plays a key role when investigating the characteristics of a MANET. However, most existing mobility models with random and simple straight line(More)
Wireless sensor networks are often composed of resource-constrained sensor nodes with limited memory space, computational capacity and communication range. The links in WSN are often lossy and unreliable. In order to make fluent and reliable data transport on memory-constrained sensor nodes, we propose a new transport layer protocol Reliable Transport with(More)
The problem of cognitive access of channels of primary users by a secondary user is considered. The transmissions of primary users are modeled as independent continuous-time Markovian on-off processes. A secondary cognitive user employs slotted transmissions, and it senses one of the possible channels before transmission. The objective of the cognitive user(More)
Over the past 20 years, zero-valent iron (ZVI) has been extensively applied for the remediation/treatment of groundwater and wastewater contaminated with various organic and inorganic pollutants. Based on the intrinsic properties of ZVI and the reactions that occur in the process of contaminants sequestration by ZVI, this review summarizes the limitations(More)