default search action
Nong Ye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Ting Yan Fok, Nong Ye:
Deep Learning Approach for Knee Point Detection on Noisy Data. CoRR abs/2409.15608 (2024) - 2021
- [c9]Nong Ye, Ting Yan Fok, Douglas Montgomery:
Univariate Distribution Differences and Conditional Variables in Multivariate Data Associations as Network Flow Measures to Detect Network Attacks. ICBDC 2021: 41-48
2010 – 2019
- 2019
- [c8]Nong Ye, Ting Yan Fok:
Learning Partial-Value Variable Associations. ICBDC 2019: 24-28 - [c7]Nong Ye, Douglas Montgomery, Kevin Mills, Mark Carson:
Multivariate Metrics of Normal and Anomalous Network Behaviors. IM 2019: 55-58 - 2017
- [j48]Nong Ye:
A reverse engineering algorithm for mining a causal system model from system data. Int. J. Prod. Res. 55(3): 828-844 (2017) - [j47]Nong Ye:
The Partial-Value Association Discovery Algorithm to Learn Multilayer Structural System Models From System Data. IEEE Trans. Syst. Man Cybern. Syst. 47(12): 3377-3385 (2017) - [c6]Nong Ye:
Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association. ADF@KDD 2017: 20-32 - 2015
- [j46]Nong Ye:
Reverse engineering: Mining structural system models from system data. Inf. Knowl. Syst. Manag. 12(3-4): 205-208 (2015) - 2013
- [j45]Nong Ye, Su Seon Yang, Billibaldo Martinez Aranda:
The analysis of service provider-user coordination for resource allocation in cloud computing. Inf. Knowl. Syst. Manag. 12(1): 1-24 (2013) - [j44]Nong Ye, Billibaldo Martinez Aranda, Patrick Hurley:
System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability. Inf. Knowl. Syst. Manag. 12(1): 75-95 (2013) - 2012
- [j43]Nong Ye, Billibaldo Martinez Aranda, Stephen S. Yau, Dazhi Huang:
Analysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems. Inf. Knowl. Syst. Manag. 11(3-4): 255-274 (2012) - 2010
- [j42]Nong Ye, Stephen S. Yau, Dazhi Huang, Mustafa Gökçe Baydogan, Billibaldo Martinez Aranda, Auttawut Roontiva, Patrick Hurley:
Models of dynamic relations among service activities, system state and service quality on computer and network systems. Inf. Knowl. Syst. Manag. 9(2): 99-116 (2010)
2000 – 2009
- 2009
- [j41]Stephen S. Yau, Nong Ye, Hessam S. Sarjoughian, Dazhi Huang, Auttawut Roontiva, Mustafa Gökçe Baydogan, Mohammed A. Muqsith:
Toward Development of Adaptive Service-Based Software Systems. IEEE Trans. Serv. Comput. 2(3): 247-260 (2009) - 2008
- [j40]Nong Ye, Xiaoyun Xu, Patrick Hurley:
QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks. Inf. Knowl. Syst. Manag. 7(4): 429-451 (2008) - [c5]Stephen S. Yau, Nong Ye, Hessam S. Sarjoughian, Dazhi Huang:
Developing Service-Based Software Systems with QoS Monitoring and Adaptation. FTDCS 2008: 74-80 - 2007
- [j39]Xueping Li, Nong Ye, Tieming Liu, Yang Sun:
Job scheduling to minimize the weighted waiting time variance of jobs. Comput. Ind. Eng. 52(1): 41-56 (2007) - [j38]Nong Ye, Xueping Li, Toni Farley, Xiaoyun Xu:
Job scheduling methods for reducing waiting time variance. Comput. Oper. Res. 34(10): 3069-3083 (2007) - [j37]Nong Ye, Qiang Chen:
Attack-norm separation for detecting attack-induced quality problems on computers and networks. Qual. Reliab. Eng. Int. 23(5): 545-553 (2007) - [j36]Xiaoyun Xu, Nong Ye:
Minimization of Job Waiting Time Variance on Identical Parallel Machines. IEEE Trans. Syst. Man Cybern. Part C 37(5): 917-927 (2007) - 2006
- [j35]Nong Ye, Harish Bashettihalli, Toni Farley:
Attack profiles to derive data observations, features, and characteristics of cyber attacks. Inf. Knowl. Syst. Manag. 5(1): 23-47 (2006) - [j34]Nong Ye, Clark Newman, Toni Farley:
A System-Fault-Risk Framework for cyber attack classification. Inf. Knowl. Syst. Manag. 5(2): 135-151 (2006) - [j33]Nong Ye, Toni Farley, Xueping Li, Harish Bashettihalli:
Batch scheduled admission control for computer and network systems. Inf. Knowl. Syst. Manag. 5(4): 211-226 (2006) - [j32]Nong Ye, Toni Farley, Deepak Lakshminarasimhan:
An attack-norm separation approach for detecting cyber attacks. Inf. Syst. Frontiers 8(3): 163-177 (2006) - [j31]Nong Ye, Darshit Parmar, Connie M. Borror:
A Hybrid SPC Method with the Chi-Square Distance Monitoring Procedure for Large-scale, Complex Process Data. Qual. Reliab. Eng. Int. 22(4): 393-402 (2006) - [j30]Zhibin Yang, Nong Ye, Ying-Cheng Lai:
QoS Model of a Router with Feedback Control. Qual. Reliab. Eng. Int. 22(4): 429-444 (2006) - [j29]Xiangyang Li, Nong Ye:
A Supervised Clustering and Classification Algorithm for Mining Data With Mixed Variables. IEEE Trans. Syst. Man Cybern. Part A 36(2): 396-406 (2006) - 2005
- [j28]Nong Ye, Toni Farley:
A Scientific Approach to Cyberattack Detection. Computer 38(11): 55-61 (2005) - [j27]Nong Ye, Esma Senturk Gel, Xueping Li, Toni Farley, Ying-Cheng Lai:
Web server QoS models: applying scheduling rules from production planning. Comput. Oper. Res. 32: 1147-1164 (2005) - [j26]Nong Ye, Zhibin Yang, Ying-Cheng Lai, Toni Farley:
Enhancing router QoS through job scheduling with weighted shortest processing time-adjusted. Comput. Oper. Res. 32: 2255-2269 (2005) - [j25]Xiangyang Li, Nong Ye:
A supervised clustering algorithm for computer intrusion detection. Knowl. Inf. Syst. 8(4): 498-509 (2005) - 2004
- [j24]Yan Chen, Toni Farley, Nong Ye:
QoS Requirements of Network Applications on the Internet. Inf. Knowl. Syst. Manag. 4(1): 55-76 (2004) - [j23]Nong Ye, Toni Farley, Dipti Aswath:
Data Measures and Collection Points to Detect Traffic Condition Changes on Large-Scale Computer Networks. Inf. Knowl. Syst. Manag. 4(4): 215-224 (2004) - [j22]Nong Ye, Yebin Zhang, Connie M. Borror:
Robustness of the Markov-chain model for cyber-attack detection. IEEE Trans. Reliab. 53(1): 116-123 (2004) - [j21]Nong Ye, Qiang Chen, Connie M. Borror:
EWMA forecast of normal system activity for computer intrusion detection. IEEE Trans. Reliab. 53(4): 557-566 (2004) - [c4]Xiangyang Li, Nong Ye:
Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. ISI 2004: 226-238 - 2003
- [j20]Ying-Cheng Lai, Nong Ye:
Recent Developments in Chaotic Time Series Analysis. Int. J. Bifurc. Chaos 13(6): 1383-1422 (2003) - [j19]Nong Ye, Sean Vilbert, Qiang Chen:
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Trans. Reliab. 52(1): 75-82 (2003) - 2002
- [j18]Nong Ye:
Information infrastructure of engineering collaboration in a distributed virtual enterprise. Int. J. Comput. Integr. Manuf. 15(3): 265-273 (2002) - [j17]Nong Ye:
QoS-Centric Stateful Resource Management in Information Systems. Inf. Syst. Frontiers 4(2): 149-160 (2002) - [j16]Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert:
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection. IEEE Trans. Computers 51(7): 810-820 (2002) - 2001
- [j15]Nong Ye, Joseph Giordano, John Feldman:
A process control approach to cyber attack detection. Commun. ACM 44(8): 76-82 (2001) - [j14]Nong Ye:
A Hierarchical, Distributed Architecture of Command and Control. Inf. Knowl. Syst. Manag. 2(3): 261-269 (2001) - [j13]Syed Masum Emran, Nong Ye:
A System Architecture for Computer Intrusion Detection. Inf. Knowl. Syst. Manag. 2(3): 271-290 (2001) - [j12]Nong Ye:
Robust intrusion tolerance in information systems. Inf. Manag. Comput. Secur. 9(1): 38-43 (2001) - [j11]Xiangyang Li, Nong Ye:
Decision Tree Classifiers for Computer Intrusion Detection. Parallel Distributed Comput. Pract. 4(2) (2001) - [j10]Nong Ye, Vuong Nguyen, George C. Runger:
Assessment of operation plan performance under uncertainty. IEEE Trans. Syst. Man Cybern. Syst. 31(2): 256-260 (2001) - [j9]Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu:
Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man Cybern. Part A 31(4): 266-274 (2001) - [c3]Nong Ye, Xiangyang Li:
A Machine Learning Algorithm Based on Supervised Clustering and Classification. Active Media Technology 2001: 327-334 - 2000
- [c2]Nong Ye, Vuong Nguyen, George C. Runger:
Plan performance assessment under uncertainty for command and control. CATA 2000: 354-357
1990 – 1999
- 1999
- [j8]Amarnath Banerjee, Prashant Banerjee, Nong Ye, Fred Dech:
Assembly Planning Effectiveness using Virtual Reality. Presence Teleoperators Virtual Environ. 8(2): 204-217 (1999) - [j7]Nong Ye, Prashant Banerjee, Amarnath Banerjee, Fred Dech:
A comparative study of assembly planning in traditional and virtual environments. IEEE Trans. Syst. Man Cybern. Part C 29(4): 546-555 (1999) - 1998
- [j6]Nong Ye:
The MDS-ANAVA technique for assessing knowledge representation differences between skill groups. IEEE Trans. Syst. Man Cybern. Part A 28(5): 586-600 (1998) - 1997
- [j5]Nong Ye, Baijun Zhao:
Automatic Setting of Article Format Through Neural Networks. Int. J. Hum. Comput. Interact. 9(1): 81-100 (1997) - 1996
- [j4]Nong Ye, Gavriel Salvendy:
An objective approach to exploring skill differences in strategies of computer program comprehension. Behav. Inf. Technol. 15(3): 139-148 (1996) - [j3]Leah K. Hennings, Nong Ye:
Interaction of Screen Distances, Screen Letter Heights and Source Document Distances. Interact. Comput. 8(4): 311-322 (1996) - [j2]Nong Ye:
The presentation of knowledge and state-information for system fault diagnosis. IEEE Trans. Reliab. 45(4): 638-645 (1996) - 1994
- [j1]Nong Ye, Gavriel Salvendy:
Quantitative and qualitative differences between experts and novices in chunking computer software knowledge. Int. J. Hum. Comput. Interact. 6(1): 105-118 (1994) - 1993
- [c1]Nong Ye, Gavriel Salvendy:
Introducing Problem Solving Strategies of Users into the Interface Design. HCI (2) 1993: 873-878
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint