Prof. Peili Qiao
at Harbin Univ of Science and Technology
SPIE Involvement:
Author
Publications (8)

Proceedings Article | 29 May 2013 Paper
Peili Qiao, Shan-Shan Hu, Ji-Qiang Zhai
Proceedings Volume 8752, 87520L (2013) https://doi.org/10.1117/12.2014434
KEYWORDS: Operating systems, Analytical research, Network security, Classification systems, Target detection, Fingerprint recognition, Dynamical systems, Inspection, Network architectures, Computer networks

Proceedings Article | 21 May 2011 Paper
Peili Qiao, Ling Wan, Jiqiang Zhai
Proceedings Volume 8060, 80600O (2011) https://doi.org/10.1117/12.883600
KEYWORDS: Network security, Computer intrusion detection, Computer security, Windows XP, Operating systems, Telecommunications, Internet, Defense systems, Solid state lighting, Defense technologies

Proceedings Article | 1 May 2010 Paper
Pei-li Qiao, Shuo Yuan, Jie Su
Proceedings Volume 7705, 77050Q (2010) https://doi.org/10.1117/12.849374
KEYWORDS: Sensors, Computer intrusion detection, Genetic algorithms, Genetics, Databases, Detection and tracking algorithms, Optimization (mathematics), Data modeling, Reliability, Promethium

Proceedings Article | 28 April 2010 Paper
Jie Su, Peili Qiao, Tao Li
Proceedings Volume 7707, 77070Q (2010) https://doi.org/10.1117/12.850073
KEYWORDS: Computer intrusion detection, Distributed computing, Computing systems, Sensors, Data modeling, Tolerancing, Systems modeling, Atrial fibrillation, Parallel processing, Evolutionary algorithms

Proceedings Article | 17 March 2008 Paper
Peili Qiao, Tong Wang, Jie Su
Proceedings Volume 6973, 69730P (2008) https://doi.org/10.1117/12.772250
KEYWORDS: Computer intrusion detection, Data fusion, Sensors, Silver, Data modeling, Data mining, Tolerancing, Telecommunications, Distributed computing, Systems modeling

Showing 5 of 8 publications
SIGN IN TO:
  • View contact details

UPDATE YOUR PROFILE
Is this your profile? Update it now.
Don’t have a profile and want one?

Advertisement
Advertisement
Back to Top