Chuanyi Ji
Chuanyi Ji
Associate Prof., ECE Georgia Tech
Verified email at - Homepage
Cited by
Cited by
Anomaly detection in IP networks
M Thottan, C Ji
IEEE Transactions on signal processing 51 (8), 2191-2204, 2003
Proactive network-fault detection
C Hood, C Ji
IEEE Trans. Reliability 46 (3), 333-341, 1997
Proactive Network Fault Detection
C Hood, C Ji
Proceeding of IEEE INFOCOM, 1147-1155, 1997
Combinations of weak classifiers
C Ji, S Ma
IEEE Transactions on neural networks 8 (1), 32-42, 1997
Modeling heterogeneous network traffic in wavelet domain
S Ma, C Ji
IEEE/ACM transactions on networking 9 (5), 634-649, 2001
Spatial-temporal modeling of malware propagation in networks
Z Chen, C Ji
IEEE Transactions on Neural networks 16 (5), 1291-1303, 2005
Proactive anomaly detection using distributed intelligent agents
M Thottan, C Ji
Ieee network 12 (5), 21-27, 1998
Fault detection and prediction for management of computer networks
M Thottan, C Ji
US Patent App. 10/433,459, 2004
Adaptive thresholding for proactive network problem detection
M Thottan, C Ji
Proceedings of the IEEE third international workshop on systems management …, 1998
Generalizing smoothness constraints from discrete samples
C Ji, RR Snapp, D Psaltis
Neural Computation 2 (2), 188-197, 1990
How initial conditions affect generalization performance in large networks
A Atiya, C Ji
IEEE transactions on neural networks 8 (2), 448-451, 1997
Modeling video traffic in the wavelet domain
S Ma, C Ji
Proceedings. IEEE INFOCOM'98, the Conference on Computer Communications …, 1998
A pattern recognition serine proteinase triggers the prophenoloxidase activation cascade in the tobacco hornworm, Manduca sexta
C Ji, Y Wang, X Guo, S Hartson, H Jiang
Journal of Biological Chemistry 279 (33), 34101-34106, 2004
Anomaly detection approaches for communication networks
M Thottan, G Liu, C Ji
Algorithms for next generation networks, 239-261, 2010
A self-learning worm using importance scanning
Z Chen, C Ji
Proceedings of the 2005 ACM workshop on Rapid malcode, 22-29, 2005
Optimal worm-scanning method using vulnerable-host distributions
Z Chen, C Ji
International Journal of Security and Networks 2 (1-2), 71-80, 2007
Intelligent agents for proactive fault detection
CS Hood, C Ji
IEEE Internet Computing 2 (2), 65-72, 1998
Satellite-based assessment of electricity restoration efforts in Puerto Rico after Hurricane Maria
MO Román, EC Stokes, R Shrestha, Z Wang, L Schultz, EAS Carlo, Q Sun, ...
PloS one 14 (6), e0218883, 2019
Spatial-temporal characteristics of internet malicious sources
Z Chen, C Ji, P Barford
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2306-2314, 2008
An information-theoretic view of network-aware malware attacks
Z Chen, C Ji
IEEE Transactions on Information Forensics and Security 4 (3), 530-541, 2009
The system can't perform the operation now. Try again later.
Articles 1–20