default search action
Yan Gao 0003
Person information
- affiliation: Northwestern University, Evanston, IL, USA
Other persons with the same name
- Yan Gao — disambiguation page
- Yan Gao 0001 — Northeastern University, Shenyang, China
- Yan Gao 0002 — Microsoft Research Asia, Beijing, China
- Yan Gao 0004 — Shanghai Jiao Tong University, Shanghai, China (and 1 more)
- Yan Gao 0005 — Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
- Yan Gao 0006 — Clarkson University, Potsdam, NY, USA
- Yan Gao 0007 — Nanjing College of Information Technology, Nanjing, China
- Yan Gao 0008 — Guizhou Normal University, Guiyang, China
- Yan Gao 0009 — Qilu University of Technology, Jinan, China
- Yan Gao 0010 — LinkedIn, Mountain View, CA, USA (and 2 more)
- Yan Gao 0011 — South China University of Technology, Guangzhou, China
- Yan Gao 0013 — Chinese Academy of Sciences, Institute of Acoustics, Beijing, China
- Yan Gao 0014 — Northwestern Polytechnical University, School of Electronics and Information, Xi'an, Shaanxi, China
- Yan Gao 0015 — Hefei University of Technology, Hefei, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j6]Gang Hua, Chengjiang Long, Ming Yang, Yan Gao:
Collaborative Active Visual Recognition from Crowds: A Distributed Ensemble Approach. IEEE Trans. Pattern Anal. Mach. Intell. 40(3): 582-594 (2018) - 2013
- [c10]Gang Hua, Chengjiang Long, Ming Yang, Yan Gao:
Collaborative Active Learning of a Kernel Machine Ensemble for Recognition. ICCV 2013: 1209-1216 - 2010
- [j5]Zhichun Li, Yan Gao, Yan Chen:
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency. Comput. Networks 54(8): 1282-1299 (2010) - [j4]Yan Gao, Alok N. Choudhary, Gang Hua:
A Comprehensive Approach to Image Spam Detection: From Server to Client Solution. IEEE Trans. Inf. Forensics Secur. 5(4): 826-836 (2010) - [c9]Yan Gao, Alok N. Choudhary, Gang Hua:
A nonnegative sparsity induced similarity measure with application to cluster analysis of spam images. ICASSP 2010: 5594-5597
2000 – 2009
- 2009
- [c8]Yan Gao, Ming Yang, Alok N. Choudhary:
Semi Supervised Image Spam Hunter: A Regularized Discriminant EM Approach. ADMA 2009: 152-164 - [c7]Yan Gao, Alok N. Choudhary:
Active Learning Image Spam Hunter. ISVC (2) 2009: 293-302 - 2008
- [j3]Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmanovic:
Pollution attacks and defenses for Internet caching systems. Comput. Networks 52(5): 935-956 (2008) - [c6]Yan Gao, Ming Yang, Xiaonan Zhao, Bryan Pardo, Ying Wu, Thrasyvoulos N. Pappas, Alok N. Choudhary:
Image spam hunter. ICASSP 2008: 1765-1768 - 2007
- [j2]Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik:
Reversible sketches: enabling monitoring and analysis over high-speed data streams. IEEE/ACM Trans. Netw. 15(5): 1059-1072 (2007) - [c5]Yan Gao, Yao Zhao, Robert T. Schweller, Shobha Venkataraman, Yan Chen, Dawn Xiaodong Song, Ming-Yang Kao:
Detecting Stealthy Spreaders Using Online Outdegree Histograms. IWQoS 2007: 145-153 - 2006
- [j1]Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. IEEE Computer Graphics and Applications 26(2): 28-39 (2006) - [c4]Yan Gao, Zhichun Li, Yan Chen:
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. ICDCS 2006: 39 - [c3]Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, Yan Chen:
Internet Cache Pollution Attacks and Countermeasures. ICNP 2006: 54-64 - [c2]Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter A. Dinda, Ming-Yang Kao, Gokhan Memik:
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications. INFOCOM 2006 - 2005
- [c1]Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin Watson:
IDGraphs: Intrusion Detection and Analysis Using Histographs. VizSEC 2005: 5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint