Follow
Chuanyi Ji
Chuanyi Ji
Associate Prof., ECE Georgia Tech
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Anomaly detection in IP networks
M Thottan, C Ji
IEEE Transactions on signal processing 51 (8), 2191-2204, 2003
7682003
Proactive network-fault detection
C Hood, C Ji
IEEE Trans. Reliability 46 (3), 333-341, 1997
2931997
Proactive Network Fault Detection
C Hood, C Ji
Proceeding of IEEE INFOCOM, 1147-1155, 1997
293*1997
Combinations of weak classifiers
C Ji, S Ma
Advances in Neural Information Processing Systems 9, 1996
2461996
Modeling heterogeneous network traffic in wavelet domain
S Ma, C Ji
IEEE/ACM transactions on networking 9 (5), 634-649, 2001
1732001
Spatial-temporal modeling of malware propagation in networks
Z Chen, C Ji
IEEE Transactions on Neural networks 16 (5), 1291-1303, 2005
1632005
Fault detection and prediction for management of computer networks
M Thottan, C Ji
US Patent App. 10/433,459, 2004
1322004
Proactive anomaly detection using distributed intelligent agents
M Thottan, C Ji
Ieee network 12 (5), 21-27, 1998
1311998
Adaptive thresholding for proactive network problem detection
M Thottan, C Ji
Proceedings of the IEEE third international workshop on systems management …, 1998
1181998
Satellite-based assessment of electricity restoration efforts in Puerto Rico after Hurricane Maria
MO Román, EC Stokes, R Shrestha, Z Wang, L Schultz, EAS Carlo, Q Sun, ...
PloS one 14 (6), e0218883, 2019
1102019
Generalizing smoothness constraints from discrete samples
C Ji, RR Snapp, D Psaltis
Neural Computation 2 (2), 188-197, 1990
1021990
How initial conditions affect generalization performance in large networks
A Atiya, C Ji
IEEE transactions on neural networks 8 (2), 448-451, 1997
991997
A pattern recognition serine proteinase triggers the prophenoloxidase activation cascade in the tobacco hornworm, Manduca sexta
C Ji, Y Wang, X Guo, S Hartson, H Jiang
Journal of Biological Chemistry 279 (33), 34101-34106, 2004
882004
Modeling video traffic in the wavelet domain
S Ma, C Ji
Proceedings. IEEE INFOCOM'98, the Conference on Computer Communications …, 1998
871998
Anomaly detection approaches for communication networks
M Thottan, G Liu, C Ji
Algorithms for next generation networks, 239-261, 2010
862010
A self-learning worm using importance scanning
Z Chen, C Ji
Proceedings of the 2005 ACM workshop on Rapid malcode, 22-29, 2005
732005
An information-theoretic view of network-aware malware attacks
Z Chen, C Ji
IEEE Transactions on Information Forensics and Security 4 (3), 530-541, 2009
662009
Spatial-temporal characteristics of internet malicious sources
Z Chen, C Ji, P Barford
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 2306-2314, 2008
662008
Optimal worm-scanning method using vulnerable-host distributions
Z Chen, C Ji
International Journal of Security and Networks 2 (1/2), 71, 2007
662007
Admission control of multimedia traffic for third generation CDMA network
D Shen, C Ji
Proceedings IEEE INFOCOM 2000. Conference on Computer Communications …, 2000
652000
The system can't perform the operation now. Try again later.
Articles 1–20