Publications

 

This page may share preprint versions of our articles for fast dissemination of research work. The copyrights of the articles belong to the corresponding publishers. The co-authors underlined are my students (including visiting students) or post-doctoral fellows under my supervision at KAUST. 


2017

 

73. Chuxu Zhang, Lu Yu, Yan Wang, Chirag Shah, Xiangliang ZhangCollaborative User Network Embedding for Social Recommender Systems“. Accepted by 2017 SIAM International Conference on Data Mining (SDM 2017)​, Houston, Texas, April 27 - 29, 2017 (acceptance rate = 26%) [PDF][Bib].


72. Binbin Gu, Zhixu LiXiangliang ZhangAn Liu, Guanfeng Liu, Kai Zheng, Lei Zhao, Xiaofang Zhou. “The Interaction between Schema Matching and Record Matching in Data Integration“. IEEE Transactions on Knowledge and Data Engineering (TKDE)​, vol. 29, no. 1, pp. 186-199, 2017 [PDF][Bib].​


71. Abdulhakim A QahtanSuojin Wang, Xiangliang ZhangKDE-Track: An Efficient Dynamic Density Estimator for Data Streams“. IEEE Transactions on Knowledge and Data Engineering (TKDE)​, vol. 29, no. 3, pp. 642-655, 2017 [PDF][Bib​].


2016

 

70. Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang ZhangAbstracting Massive Data for Lightweight Intrusion Detection in Computer Networks, accepted by Information Sciences, 2016 [PDF][Bib].


69. Basma AlharbiXiangliang Zhang. “Learning from your network of friends: a trajectory representation learning model based on online social ties“. Accepted by the 16th IEEE International Conference on Data Mining (ICDM 2016), Barcelona, December 12-15, 2016 (acceptance rate=19.6%) [PDF][Bib].


68. Ibrahim AlabdulmohsinYufei Han, Yun Shen, Xiangliang Zhang. “Contentagnostic Malware Detection in Heterogeneous Malicious Distribution Graph”. Proceedings of the 25th ACM International Conference on Information and Knowledge Management (CIKM 2016), pp. 2395-2400, Indianapolis,  October 24-28, 2016 (acceptance rate=270/935=28.9%) [PDF][Bib].


67. Hai Huang, Zonghai Chen, Chengfei Liu, He Huang, Xiangliang Zhang. “An effective suggestion method for keyword search of databases“. Accepted by World Wide Web​, 2016 [PDF][Bib].​


66. Mustafa Mousa, Xiangliang Zhang, Christian Claudel. "Water Level Estimation in Urban Ultrasonic/Passive Infrared Flash Flood Sensors"​. Accepted by IEEE Sensors Journal [PDF][Bib].

65. Basma Alharbi, Abdulhakim A Qahtan, Xiangliang Zhang"Minimizing User Involvement for Learning Human Mobility Patterns from Location Traces". Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI 2016), pp. 865-871, Phoenix, Arizona, February 12-17, 2016 (regular paper, acceptance rate=549/2132=25.7%) [PDF][Bib].


64. Ibrahim Alabdulmohsin, Moustapha Cisse, Xin Gao, Xiangliang Zhang"Large Margin Classification with Indefinite Similarities". Machine Learning Journal103(2), 215-237, 2016 [PDF​][Bib].

63. Qing XieSu Wang, Jia Zhu, Xiangliang Zhang"Modeling and Predicting AD Progression by Regression Analysis of Sequential Clinical Data". Neurocomputing, vol. 195, pp. 50-55, 2016 [PDF][Bib].​

62. Qing XieXiangliang ZhangZhixu Li, Xiaofang Zhou"Optimizing Cost of Continuous Overlapping Queries over Data Streams by Filter Adaption". IEEE Transactions on Knowledge and Data Engineering (TKDE)​vol. 28, no. 5, pp.1258-1271, 2016 [PDF​][Bib]. 


61. Ibrahim Alabdulmohsin, Moustapha Cisse,  Xiangliang Zhang"Is Attribute-Based Zero-Shot Learning an Ill-Posed Strategy?​". Proceedings of the 2016 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD 2016)​, pp. 749-760, Riva del Garda, Italy, September 19-23, 2016 (acceptance rate=28%) [PDF][Bib].


60. Jian Zhou, Zhixu Li, Binbin GuQing Xie, Jia Zhu, Xiangliang Zhang, Guoliang Li, "CrowdAidRepair: A Crowd-Aided Interactive Data Repairing Method". Proceedings of the 21st International Conference on Database Systems for Advanced Applications (DASFAA 2016), pp. 51-66, Dallas, TX, USA, April 16-19, 2016 [PDF][Bib].


59. Xinran Liu, Xingwu Liu, Yuanhong Wang, Juhua Pu, Xiangliang Zhang"Detecting Anomaly in Traffic Flow from Road Similarity Analysis". Proceedings of the 17th International Conference on Web-Age Information Management (WAIM 2016), pp. 92-104, Nanchang, China, June 3-5, 2016  [PDF][Bib]


2015


58. Abdulhakim A Qahtan, Basma Alharbi, Suojin Wang, Xiangliang Zhang"A PCA-Based Change Detection Framework for Multidimensional Data Streams". Proceedings of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2015), pp. 935 - 944, Sydney, Australia, August 10-13, 2015 (acceptance rate=159/819=19.4%) [PDF][Code][Bib].

57. Zhixu Li, Lu Qin, Hong Cheng, Xiangliang Zhang, Xiaofang Zhou, "TRIP: An Interactive Retrieving-Inferring Data Imputation Approach".  IEEE Transactions on Knowledge and Data Engineering (TKDE)​, vol. 27, no. 9, pp.2550 - 2563, 2015 [PDF][Bib​].​

56. Chengbin Peng, Zhihua Zhang, Ka-Chun Wong, Xiangliang Zhang, David Keyes, "A Scalable Community Detection Algorithm for Large Graphs Using Stochastic Block Models". Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI 2015)​​, pp. 2090 - 2096,  Buenos Aires, Argentina, July 25-31, 2015 (regular paper, acceptance rate=575/1996=28.8%) [PDF][Bib].

55. Ibrahim M Alabdulmohsin, Xin Gao, Xiangliang Zhang"Efficient Active Learning of Halfspaces via Query Synthesis". Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (AAAI 2015)​, pp. 2483 - 2489, Austin, Texas, January 25–29, 2015 (regular paper, acceptance rate=531/1991=26.7%) [PDF][Code][Bib].

54. Zhixu Li, Xiangliang Zhang, Hai Huang, Qing Xie, Jia Zhu, Xiaofang Zhou, “Addressing Instance Ambiguity in Web Harvesting”. Proceedings of the 18th International Workshop on the Web and Databases (WebDB 2015), pp. 6-12, Melbourne, Australia, May 2015 (acceptance rate=9/31=29%)​[PDF][Bib].

2014


53. Ibrahim M Alabdulmohsin, Xin Gao, Xiangliang Zhang"Support vector machines with indefinite kernels". Proceedings of the 6th Asian Conference on Machine Learning (ACML 2014), pp. 32-47, Nha Trang, Vietnam, November 26-28, 2014 [PDF][Bib].

52. Wei Wang, Xing WangDawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang"Exploring Permission-induced Risk in Android Applications for Malicious Application Detection". IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp. 1869-1882, 2014 [PDF​][Bib].​​​ 

51. Ibrahim M Alabdulmohsin, Xin Gao, Xiangliang Zhang"Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering". Proceedings of the 23rd ACM International Conference on Information and Knowledge Management (CIKM 2014), pp. 231-240, Shanghai, China, November 3-7, 2014 (full paper, acceptance rate=95/457=20.8%) [PDF][Bib].​​

50. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang"Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks". Knowledge-Based Systems​ (IF (2012) =4.104), vol. 70, no. 11, pp. 103-117, 2014 [PDF][Bib].

49. Salvatore Ruggieri, Sara Hajian, Faisal Kamiran, Xiangliang Zhang"Anti-discrimination Analysis Using Privacy Attack Strategies". Proceedings of European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD 2014), pp. 694-701, Nancy, France, September 15-19, 2014 (acceptance rate=115/483=23.8%) [PDF][Bib].

48. Qing Xie, Chaoyi Pang, Xiaofang Zhou, Xiangliang Zhang, Ke Deng, "Maximum Error-bounded Piecewise Linear Representation for Online Stream Approximation​".  The VLDB Journal, vol. 23, no. 6, pp. 915-937, 2014 [PDF][Bib].

47. Xiangliang Zhang, Cyril Furtlehner, Cécile Germain, Michèle Sebag, "Data Stream Clustering with Affinity Propagation". IEEE Transactions on Knowledge and Data Engineering (TKDE)​, vol. 26, no. 7, pp. 1644-1656, 2014 [PDF][Bib].​

46. Dan Williams, Shuai Zheng, Xiangliang Zhang, Hani Jamjoom, "TideWatch: Fingerprinting the Cyclicality of Big Data Workloads". Proceedings of 33rd Annual IEEE International Conference on Computer Communications (INFOCOM 2014), pp. 2031-2039, Toronto, Canada, April 27 - May 2, 2014 (regular paper in the main conference, acceptance rate=320/1645=19.4%) [PDF][Bib].

45.  Zhixu Li, Shuo Shang, Qing Xie, Xiangliang Zhang"Cost Reduction for Web-based Data Imputation". Proceedings of 19th International Conference on Database Systems for Advanced Applications (DASFAA 2014) pp. 438-452, Bali, Indonesia, April 21-24, 2014 (full paper) [PDF][Bib].

44. Zhixu Li, Hongsong Li, Haixun Wang, Yi Yang, Xiangliang Zhang, Xiaofang Zhou. "Overcoming Semantic Drift in Information Extraction". Proceedings of 17th International Conference on Extending Database Technology (EDBT 2014), pp. 169-180, Athens, Greece, March 24-28, 2014 (acceptance rate=52/266=19.5%) [PDF][Bib].

43. Basma AlharbiXiangliang Zhang, "Exploring the Significance of Human Mobility Patterns in Social Link Prediction". Proceedings of 29th ACM Symposium On Applied Computing (SAC 2014), pp. 604-609, Gyeongju, Korea, March 24 - 28, 2014 (Social Network and Media Analysis Track) [PDF​][Bib​].

2013

42. Xiaoyu Chen, Dongming Wang, Xiangliang Zhang"Foreword to the Special Focus on Mathematics, Data and Knowledge". Mathematics in Computer Science​, Springer, vol.7, no.4, pp. 379-386, 2013 [PDF][Bib].

41Toon Calders, Asim Karim, Faisal Kamiran, Wasif Ali, Xiangliang Zhang"Controlling Attribute Effect in Linear Regression". Proceedings of 13th IEEE International Conference on Data Mining (ICDM 2013), pp. 71-80, Dallas, Texas, December 7-10, 2013 (regular paper, acceptance rate=94/809=11.6%) [PDF][Bib].

40Rajesh Chowdhary, Boris R. Jankovic, Rachel V. Stankowski, John A.C. Archer, Xiangliang Zhang, Xin Gao, Vladimir B. Bajic, "Automated Mining of Disease-Specific Protein Interaction Networks Based on Biomedical Literature​"​. Biological Data Mining and Its Applications in Healthcare, Chapter 14, pp. 393-415, Eds: Xiao-Li Li, See-Kiong Ng and Jason Wang, World Scientific Publishing Company (Invited Book chapter)ISBN: 978-981-4551-00-7, 2013. ​

39. Qing Xie, Shuo Shang, Bo Yuan, Chaoyi Pang, Xiangliang Zhang, "Local Correlation Detection with Linearity Enhancement in Streaming Data". Proceedings of 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013), pp. 309-318, San Francisco, CA, October 27-November 1, 2013 (full paper, acceptance rate=143/848=16.9%) [PDF​​][Bib].​

38. Xiangliang Zhang, Tak Man Desmond Lee, Georgios Pitsilis, "Securing Recommender Systems against Shilling Attacks Using Social-based Clustering". Journal of Computer Science and Technology, Springer, vol.28, no.4, pp. 616-624, 2013 (invited submission[PDF][Bib]

37. Chun Pong Lau, Xiangliang Zhang, Basem Shihada, "Video Quality Prediction over Wireless 4G". Proceedings of 17th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2013), pp. 414-425, LNAI 7819, Gold Coast, Australia, April 14-17, 2013 (regular paper with long presentation, acceptance rate=39/344=11.3%) [PDF][Bib]


2012


36. Faisal Kamiran, Asim Karim, and Xiangliang Zhang, "Decision Theory for Discrimination-aware Classification"​. Proceedings of 12th IEEE International Conference on Data Mining (ICDM 2012), pp. 924-929, Brussels, Belgium, December 10-13, 2012 (acceptance rate= 151/756=19.97%) [PDF][Bib]. 

35. Chengbin Peng, Ka-Chun Wong, Alyn Rockwood, Xiangliang Zhang, Jinling Jiang, and David Keyes, "​Multiplicative Algorithms for Constrained Non-negative Matrix Factorization". Proceedings of 12th IEEE International Conference on Data Mining (ICDM 2012), pp. 1068-1073, Brussels, Belgium, December 10-13, 2012 (acceptance rate=151/756=19.97%) [PDF][Bib].​


34Abdulhakim QahtanXiangliang Zhang, Suojin Wang, "Efficient Estimation of Dynamic Density Functions with an Application to Outlier Detection". Proceedings of 21st ACM International Conference on Information and Knowledge Management (CIKM 2012), pp. 2159-2163, Maui, Hawaii, October 29-November 2, 2012 (acceptance rate=302/1088=27.7%) [PDF​][Bib].​


33. Han Liu, Xiangliang Zhang, Alyn Rockwood, "A Direction Change-Based Algorithm for Polygonal Approximation"​. Proceedings of 21st International Conference on Pattern Recognition (ICPR 2012)​, pp. 3586-3589, Tsukuba Science City, Japan, November 11-15, 2012 [PDF][Bib]. 


32. Chongsheng Zhang, Florent Masseglia, Xiangliang Zhang, "Discovering Highly Informative Feature Set over High Dimensions". Proceedings of 24th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2012), pp. 1059-1064, (ICTAI 2012), Athens, Greece, November 7-9, 2012 [Bib]​​


31. Chongsheng Zhang, Florent Masseglia, Xiangliang Zhang, "Modeling and Clustering Users with Evolving Profiles in Usage Streams". Proceedings of 19th International Symposium on Temporal Representation and Reasoning (TIME 2012), pp. 133-140, Leicester, UK, September 12-14, 2012 [Bib]


30. Hengjie Song, Ruoxue Liao, Xiangliang Zhang, Chunyan Miao, Qiang Yang​, "A Mouse-Trajectory Based Model for Predicting Query-URL Relevance". Proceedings of 26th AAAI Conference on Artificial Intelligence (AAAI 2012)​, pp. 143-149, Toronto, Ontario, Canada, July 22-26, 2012 (acceptance rate=294/1129=26%) [PDF​][Bib].


29.​ Xiangliang Zhang, Zon-Yin Shae, Shuai Zheng, Hani Jamjoom, "Virtual Machine Migration in an Over-committed Cloud". Proceedings of 13th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012)​, pp. 196-203, Maui, Hawaii, April 16 -20, 2012 (long technical paper, acceptance rate=55/210=26.2%) [PDF][Bib]. 


28.​ Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, "Understanding and Analyzing Network Traffic". IEEE Network, G​uest Editorial, pp. 4-5, January 2012 [PDF][Bib].


2011

27.​ Shuai Zheng, Zon-Yin Shae, Xiangliang Zhang, Hani Jamjoom, and Liana Fong, "Analysis and Modeling of ​Social Influence in High Performance Computing Workloads". Proceedings of 17th International European Conference on Parallel and Distributed Computing (Euro-Par 2011)​, pp. 193-204, Springer, Bordeaux, France, August 29-September 2, 2011 (acceptance rate=81/271=29.9%) [PDF] [slides][Bib].


26. Georgios Pitsilis, Xiangliang Zhang, Wei Wang, "Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information". Proceedings of 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), Sprin​ger, pp. 82-97, Co​penhagen, Denmark, June 29-July 1, 2011 (full paper) [PDF][Bib].

25. Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, "Network traffic monitoring, analysis and anomaly detection". IEEE Network, Guest Editorial, pp. 6-7, May 2011 [PDF​][Bib].

24. Wei Wang, Xiangliang Zhang, "High-speed Web Attack Detection through Extracting Exemplars from HTTP Traffic". Proceedings of 26th Symposium on Applied Computing (SAC 2011)(Security track), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (security track acceptance rate=9/41=22%)[Bib].


2010

​ 

23. Xiangliang Zhang, Wei Wang, Kjetil Nørvåg, Michèle Sebag, "K-AP: Generating Specified K Clusters by Efficient Affinity Propagation". Proceedings of 10th IEEE International Conference on Data Mining (ICDM 2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptance rate=155/797=19.4%) [PDF​] [Slides] [CODE​][Bib].


22. Cyril Furtlehner, Michèle Sebag, Xiangliang Zhang, “Scaling Analysis of Affinity Propagation”, Physical Review E, vol.81, no.6. 066102 (14 pages), 2010 [PDF][Bib].


21. Wei Wang, Xiangliang Zhang, Georgios Pitsilis, "Abstracting Audit Data for Lightweight Intrusion Detection". Proceedings of 6th International Conference on Information Systems Security (ICISS 2010), pp. 201-215, Gandhinagar Gujarat, India, LNCS 6503, Springer, 15-19 December 2010 (acceptance rate =14/51=27.5%)[Bib].


20. Xiangliang Zhang, Wei Wang, "Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution".  Proceedings of 6th International Conference on Advanced Data Mining and Applications (ADMA 2010), pp. 334-345, ChongQing, China, LNCS 6440, Springer 2010, November 19-21, 2010 (oral paper, acceptance rate= 63/361=17.5%)[Bib].


19. Xiangliang Zhang, Cécile Germain-Renaud and Michèle Sebag, "Adaptively Detecting Changes in Autonomic Grid Computing". Proceedings of 11th ACM/IEEE International Conference on Grid Computing (Grid 2010)​(Autonomic Computational Science Workshop), pp. 387-392, Brussels, Belgium, October 25-29, 2010 [Bib].


18. Xiangliang Zhang, "Contributions to Large Scale Data Clustering and Streaming with Affinity Propagation. Application to Autonomic Grids.", Ph.D. thesis, INRIA and Université Paris-Sud 11, 2010 [PDF] [Slides].


2009

17. Xiangliang Zhang, Cyril Furtlehner, Julien Perez, Cécile Germain, Michèle Sebag, "Toward Autonomic Grids: Analyzing the Job Flow with Affinity Streaming". Proceedings of 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2009), pp. 987-996, Paris, France, June 28 –July 1, 2009 (acceptance rate=105/561=18.7%) [PDF] [Slides] [Video] [CODE][Bib].


16. Wei Wang, Xiangliang Zhang, Sylvain Gombault, "Constructing Attribute Weights from Audit Data for Effective Intrusion Detection", Journal of Systems and Software (JSS), Elsevier, vol. 82, no. 12, pp. 1974-1981, 2009 [PDF][Bib].


15. Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, "Attribute Normalization in Network Intrusion Detection". Proceedings of 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), IEEE Press, Kaohxiung, Taiwan, pp. 448-453, Dec 14-16, 2009 [Bib].


14. Xiangliang Zhang, Cyril Furtlehner, Cécile Germain-Renaud and Michèle Sebag, " G-StrAP: A 2-level Real-time Grid Monitoring System". Proceedings of 11st Conférence francophone sur l'Apprentissage artificiel (CAp 2009), Hammamet, Tunisia, May 25 -29, 2009.


13. Xiangliang Zhang, Michèle Sebag, Cécile Germain, "Multi-scale Realtime Grid Monitoring with Job Stream Mining". Proceedings of 9th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2009), pp. 420-427, Shanghai, China, May 18-21, 2009 (acceptance rate=57/271=21%) [PDF] [Slides​] [CODE][Bib].


12. Xiaohong Guan, Wei Wang, Xiangliang Zhang, "Fast Intrusion Detection Based on a Non-negative Matrix Factorization Model". Journal of Network and Computer Applications, Elsevier, vol. 32, no. 1, pp.31-44, 2009 [PDF][Bib].


2008

11. Xiangliang Zhang, Cyril Furtlehner, Michèle Sebag, "Data streaming with Affinity propagation". Proceedings of European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2008), Antwerp, Belgium, pp. 628-643, Lecture Notes in Computer Science 5212, Springer, September 15-19, 2008 (acceptance rate=98/521=18.8%) [PDF​] [Slides] [Video] [CODE][Bib].


10. Xiangliang Zhang, Cyril Furtlehner, Michèle Sebag, "Distributed and Incremental Clustering Based on Weighted Affinity Propagation". Proceedings of fourth European Starting AI Researcher Symposium (STAIRS 2008), conjunction with ECAI '2008, Patras, Greece, pp. 199-210, Volume 179, Frontiers in Artificial Intelligence and Applications, IOS Press, July 21-25, 2008 [Bib].


9. Xiangliang Zhang, Cyril Furtlehner, Michèle Sebag, "Frugal and online affinity propagation", Proceedings of Conférence francophone sur l'Apprentissage (CAp 2008), Ile de Porquerolles, France, May 29-31, 2008.


8. Xiangliang Zhang, Michèle Sebag, Cécile Germain, "Modelling the jobs of a Grid System". Proceedings of 16th congrès francophone AFRIF-AFIA Reconnaissance des Formes et Intelligence Artificielle (RFIA 2008), Amiens, France, Jan 23-25, 2008 (in French).


7. Wei Wang, Xiaohong Guan and Xiangliang Zhang, "Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection". J. Computer Communications, Elsevier, vol. 31, no. 1, pp.58-72, 2008 [PDF][Bib].


2007 and Before

6. Xiangliang Zhang, Michèle Sebag, Cécile Germain, "Toward Behavioral Modeling of a Grid System: Mining the Logging and Bookkeeping files". Proceedings of IEEE ICDM 2007 workshop - DSMM 07, Omaha, Nebraska, USA, pp. 581-586, Oct 28-31, IEEE Press, 2007 [PDF][Bib].


5. Haibo Zhang, Xiangliang Zhang, Yong Wang, Akio Takaoka, "Tomography experiment of an integrated circuit specimen using 3 MeV electrons in the transmission electron microscope". Review of Scientific Instruments, American Institute of Physics (AIP), 78, 013701, 2007 [PDF].


4. Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, "Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data". J. Computers & Security, Elsevier, vol. 25, no 7, pp. 539-550, 2006 [PDF​][Bib].

3. Wei Wang, Xiaohong Guan, Xiangliang Zhang, "Profiling Program and User Behaviors for Anomaly Intrusion Detection Based on Non-negative Matrix Factorization".  Proceedings of 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas, pp. 99-104, Dec 2004 [PDF].


2. Wei Wang, Xiaohong Guan, Xiangliang Zhang. "A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security". Proceedings of the first International IEEE Symposium on Neural Networks (ISNN 2004), Dalian, China. Lecture Notes in Compute Science (LNCS), No. 3174. pp. 657-662, Aug 2004 [PDF][Bib​].


1. Wei Wang, Xiaohong Guan, Xiangliang Zhang, "Modeling Program Behaviors by Hidden Markov Models for Intrusion Detection". Proceedings of the Third IEEE International Conference on Machine Learning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835. Aug 2004 [PDF].
​​​​​​​
​​​​​​​​​​​​​​​​​​